Skip to content
Comprehensive Protection and Security for Critical Infrastructures

NIS2 and RCE – EU Directives for Cyber Resilience and Physical Security

Cybercrime against businesses, infrastructures, and supply chains is rapidly increasing. To counter these threats, the NIS2 Regulation (EU 2022/2555) will be enforced from October 2024, enhancing Resilience and Physical Security across Europe. Additionally, the RCE Directive (EU 2022/2557) mandates operators of critical facilities to implement stringent Cyber Security measures and report serious incidents.  

Staying technologically advanced is essential for an organization’s resilience. Don’t wait until it’s too late – ensure compliance with the upcoming NIS2 and RCE regulations now! 

Who is Affected?

Many companies in the EU will be directly impacted by the NIS2 (2022/2555) and RCE (2022/2557) directives as their scope is broader and thresholds lower than previous regulations. Companies should assess whether they fall under the scope and meet the thresholds as soon as the national implementation law is enacted.

What Does the Implementation of NIS2 and RCE Directives Involve?

For all companies, not only operators of critical infrastructures, educational institutions and public administrations, having a technological edge is not a luxury, but a must. Be prepared and drop a query, or check the Commend Whitepaper on Cyber Security and Cyber Defense below. 

Resilience

Operators must adhere to guidelines including reporting obligations, risk analysis, crisis and risk management, and developing robust emergency plans that ensure measures are “appropriate and proportional” and technologically up-to-date.

Regulatory Oversight

Compliance will be monitored by regulatory bodies and government agencies.

Penalties for Non-Compliance

Management must approve and oversee the implementation of required measures. They are personally liable for violations and face significant fines.

What Does Management Need to Know?

According to NIS2 and RCE regulations, appropriate organizational, operational, and technical measures must be taken:

Risk Control and Incident Mitigation
Measures are required to control risks and minimize the impact of security incidents on network and information systems.

Secure Communication Systems
Emphasis on secure communication for both normal and emergency operations.

Supply Chain Security
Ensure Cyber Security throughout the supply chain by close collaboration between operators and suppliers.

With this in view, the regulations strongly encourage compliance with relevant norms and standards, whereby following standards are of particular importance and have proven themselves in practice:

  • Information security management systems according to ISO 27001
  • Technical risk management according to EN 50726
  • Communication systems according to IEC 62820-2 (ASBIS)

 

How can a Commend Intercom System Help Mitigate Risks?

 

 

Physical Security Meets Cyber Security

Commend Leading the Way to Compliance and Security
for EU-NIS2 and EU-RCE

Security technologies like access control, video surveillance, and intercom systems protect critical infrastructure perimeters as well as access points. However, as part of the IT landscape, they are vulnerable to cyber threats. A cyber attack on these systems can disrupt business operations, with connected devices potentially compromising your system security.

The consequences include high outage costs, reputational damage, financial claims, component replacements, and data theft. At Commend, we lead in Cyber Security, keeping our customers technologically up-to-date and ensuring their peace of mind

Cyber-security_protect-prevent-prevail-transparent

 

The Advantages of Commend

A Partner of Trust – for Your Safe Decision


Commend systems ensure sustainable, secure communication and support the business continuity of operators. They are designed to withstand cyber attacks and reliably protect infrastructure, allowing you to work with confidence even in critical environments.

We understand the requirements for protecting Critical Infrastructures and offer solutions that help comply with specific regulations.

Dev SecOps
  • Certified to ISO 27001 ISMS and IEC 62443-4-1 for secure product development lifecycle
  • Secure standard internet protocols
  • Strong cryptography
  • Device, data, and network security
  • Regular vulnerability assessments and penetration testing
  • Coordinated vulnerability disclosure program
  • Continuous software monitoring and updates
  • Proactive perimeter protection
  • Intergrated security communication at driveways and secured access areas
  • Solutions for comprehensive security control rooms
  • Advanced Security Building Intercom Systems (ASBIS) for emergency calls, lift/elevator emergency calls, alarms, public address
  • Fail-safe communication via Intercom conferences for crisis teams
Perimeter-protection

Perimeter Protection

Prevent strangers from entering your premises with perimeter protection, public address and seamless integration with video surveillance systems.
Access-control-barrier-industry

Access Control for Doors & Barriers

Provide controlled access for your employees and service providers (vehicular and pedestrian) at all entrances to your premises.
Emergency-evacuation-gathering-point-industry

Emergency & Evacuation

Ensure that your employees are safe in any situation with trusted emergency and evacuation systems, integrating two-way communication for fast incident reaction, complying with IEC 62820-2 and IEC 62820-3-2 as well as EN 50726.
Control-desk-management-industry-ex

Control Desk Management

Enable a clear overview of several areas and locations of your facilities, as well as the whereabouts of your employees, with a centralised management system .

We are committed to a certified QMS according to ISO 9001, external audits, and to intensive collaboration with integration partners, research institutes, and universities.

We understand the requirements for protecting critical infrastructures and offer solutions that help comply with regulations. This includes the development and dissemination of key international security standards such as IEC 62820 for ASBIS (Advanced Security Building Intercom Solutions) or EN 50726 for EDRS (Emergency and Danger Response Systems). For this we stand with our name!

Get in touch!

You have a question, need consultation or a quote?
Our local sales team will be happy to provide you with information and discuss your requirements.

Cyber Security Whitepaper

 Discover how collaboration across the product supply chain enhances cybersecurity for your Commend system. Learn about potential risks, effective measures, and best practices to safeguard your devices, services, and network infrastructure. Download this essential cybersecurity whitepaper for expert advice and guidelines.

WP-Cyber-Security_Cover_EN