To the page content
T Business

NIS-2 implementation

Whether it's transport, energy or water supply, critical infrastructure in Germany is coming under attack more and more frequently. The EU's NIS-2 Directive (Second Network and Information Security Directive) aims to protect against this. From 2026, around 30,000 important companies and institutions in Germany will have to register with the BSI, report relevant incidents and professionalise their risk management.

EU flag and German flag

Your contact for questions and advice

Our experts are happy to assist you.

Securing critical infrastructure now

A stable and secure IT infrastructure is essential for businesses. Do the new rules also apply to your company? Does your company operate infrastructure or facilities in one of the relevant sectors according to ? If so, we can provide you with advice and support.

Skip anchor navigation

Technical and organisational measures (TOMs)

Telekom operates critical infrastructure itself and is well versed in this area. Together, we will review your requirements and identify specific actions that need to be taken. This will enable you, as a NIS 2-relevant company, to fulfil your core obligations with regard to additional management responsibilities, risk management, and reporting, documentation and registration requirements.

Implement the technical requirements:
We will assist you in updating your technical equipment:

  • Secure networks with SD-WAN and Secure Service Edge
  • Firewall and firewall management
  • Fail-safe connections and backups
  • MDR and SOC solutions tailored to small and medium-sized enterprises

Be on the safe side
when it comes to organisation. Telekom is a trustworthy partner for 100% professional security organisation:

  • Information Management System (ISMS)
  • Internal training courses – for example, on awareness
  • Business Continuity Management (BCM)
     

Our partners for specific questions

  • Juniper Networks logo
  • Cisco-Meraki-logo
  • Logo-Dataguard-Icon
  • Fortinet logo
  • Logo-sosafe

Implementation of NIS-2

With the entry into force of the NIS 2 Implementation Act, the scope of application of the BSIG will be significantly expanded. Companies operating in certain sectors and exceeding specified thresholds in terms of employees, turnover and balance sheet total will fall under the new categories of "important entities" and "particularly important entities". These entities must comply with three key obligations: 

  1. You are legally obliged to register as an NIS 2 company.
  2. Report significant security incidents to the BSI and
  3. Implement risk management measures and document them.

To implement the necessary technical and organisational measures (TOMs), Telekom offers a wide range of technical solutions for network and IT security in companies. It also provides support for organisational measures relating to governance and IT security, such as security audits and security awareness training for employees.
 

Technical solutions at a glance

Airport staff use software-defined networking to manage the network more easily, quickly, flexibly and securely.
Airport staff use software-defined networking to manage the network more easily, quickly, flexibly and securely.

Software-defined networking (SDN) enables you to manage your corporate network more easily, quickly, flexibly and securely, while also simplifying your network architecture.

A woman wearing a safety helmet uses a tablet to access the 5G campus networks for data transmission on the company premises.
A woman wearing a safety helmet uses a tablet to access the 5G campus networks for data transmission on the company premises.

5G campus networks

Campus networks enable fast, secure data transmission with high bandwidth and low latency directly on the company premises.

Smiling businesswoman with glasses working on a laptop in a modern office in a company
Smiling businesswoman with glasses working on a laptop in a modern office in a company

Mobile work

Mobile Work from Telekom is a comprehensive solution that bundles and coordinates relevant services related to mobile working.

A smiling businessman is delighted with his company's dedicated internet access as he looks at his mobile phone.
A smiling businessman is delighted with his company's dedicated internet access as he looks at his mobile phone.

Our solutions enable you to collaborate even more effectively across locations thanks to dedicated internet access.

A group of experts takes care of Cisco Meraki Managed Services.
A group of experts takes care of Cisco Meraki Managed Services.

We have the solution for maintaining and operating your network: our Cisco Meraki Managed Service.

A woman is sitting in front of her laptop and talking on the phone.
A woman is sitting in front of her laptop and talking on the phone.

With Telekom Secure Business Connect, you benefit from the experience and expertise of Deutsche Telekom's specialists and leave the setup and operation of your corporate networks, including IT security, to us. Our contact persons are available to answer your questions and respond to your requests by telephone, or our field service is available nationwide.

Organisational measures

Confident professional conducts interview with customers
Confident professional conducts interview with customers

Organisational and technical focus

In an initial meeting prior to the assessment, we determine your individual requirements and define the technical scope. We also coordinate the administrative details such as participants, date and location to ensure smooth implementation.

Businessman talking to a customer in the office
Businessman talking to a customer in the office

Assessment of your company’s security situation

Our customised assessment uses a standardised questionnaire tailored to your situation. Through guided interviews and analyses, we gather relevant information about your current maturity level across all security domains.

Two businessmen analysing data in front of a futuristic display
Two businessmen analysing data in front of a futuristic display

Identification of vulnerabilities

Following our assessment, we conduct a gap analysis and evaluate the results in accordance with the relevant standard. For any gaps identified, we document appropriate recommendations for action and present them to you in a separate meeting.

Female project manager at a meeting with her team in an office on the topic of Magenta Security Assessments & Audits
Female project manager at a meeting with her team in an office on the topic of Magenta Security Assessments & Audits

Identify appropriate recommendations for action and prioritisation proposals

The results of the assessment are combined with your requirements and then presented by our consultant in charge. Potential solutions are presented in the form of a prioritised roadmap to increase your organisation's IT security level.

Your contact for questions and advice

Our experts are happy to assist you.

Webinars

  • Woman and man at laptop in front of globe with magenta swirl

    Secure Network – AI-supported network monitoring

    Our T Business Webinar offers a one-hour introduction to the basic concepts of network security and artificial intelligence: optimising and monitoring network infrastructure using AI, SD-WAN for intelligent control of network resources, protection mechanisms such as firewalls and Secure Access Service Edge (SASE), and managed services provided by Telekom experts. Practical examples and use cases offer interesting insights.

    To register on 26 February 2026
  • Brnzestatus Justitia with scales next to Security Shield and European flag

    Obligations and implementation of the EU's NIS2 Directive from 2026 onwards

    Those who fail to respond now risk heavy penalties, liability for management and a massive loss of trust. In the T Business webinar, Telekom Security and DataGuard show you how to independently and reliably check whether your company is subject to NIS2 implementation, what requirements this entails and how medium-sized companies can efficiently fulfil their documentation obligations thanks to intelligent technology.

    To the webinar on 5 March 2026
Logo T Security

Telekom Security

Telekom Security considers customers as part of its governance, risk and compliance approach and offers comprehensive solutions for networks, cloud services and end-user applications with a focus on this area. Telekom Security works closely with leading manufacturers of security technologies and innovative start-ups. Learn more about the entire lifecycle – from identification to protection, detection, response and recovery – in the guide or a white paper that suits your needs.

Cover of the white paper Efficient Security

Efficient security

Traditional segmentation at the network level is no longer sufficient. Software-defined microsegmentation is more efficient, precise and cost-effective. It saves time, money and stress. This protection also meets the requirements of the BSI, Kritis and the NIS 2 Directive. You can find background information and tips in this white paper.

Download now
Cover from Whitepager – Stress test of generative AI

The stress test for generative AI

The use of AI chatbots is becoming increasingly popular. Generative AI and AI chatbots offer many opportunities, but they also pose cybersecurity risks. In this white paper, companies learn how they can secure their AI systems through security measures and pentesting.

Download now
Supplier management white paper

White paper – NIS 2-compliant supplier management

The NIS 2 Directive calls for structured supplier management to strengthen cybersecurity. Companies must assess their suppliers according to risk levels, review security measures and secure them contractually. A continuous control and improvement process ensures that future risks are also identified and addressed at an early stage.

Download now
White paper on implementing the NIS 2 Directive for companies and legal departments

White paper on the implementation of the NIS 2 Directive

A guide for companies, managers and legal departments

Download white paper

Downloads & Links

Cyber Security Assessment flyer (212 kB)Download
NIS-2 decision tree BSITo the BSI website
Act implementing NIS-2To the Federal Law Gazette
BSI reporting and information portalTo the BSI portal
BSI company account vulnerability reporterTo the BSI portal