Navigating NIS2 Compliance with IPROTECT AC and TANlock

The NIS2 directive is reshaping the cybersecurity landscape across Europe, introducing stringent requirements for organizations to enhance their resilience against cyber threats.
Key Requirements Under NIS2:
- Personnel security& access control concepts
- Cryptography and encryption
- Management of security incidents
- Multi-factor authentication
- Business continuity and crisis management
- Security measures for the acquisition/development/maintenance of ICT
Our tailored solutions support compliance while enhancing operational efficiency and scalability.
How?
Daily Operations:
- A comprehensive overview for operators through intuitive icons with the status of all defined areas.
- Easily access logged events from the rack handle in IPROTECT including images of those accessing racks thanks to our Video Management System – VDG SENSE.
- Automation of predefined actions—such as turning on lights, calling a guard, or alerting police—can be triggered automatically within the interface, with all actions logged for traceability.
- Stable and secure access is maintained even during network connection loss, with specific cards that can be used for calamity openings.
- Automation of intrusion detection by showing handle status, monitoring door state, and detecting side panel tampering, also possible through on-site cameras.
- A secure remote opening feature is available for operators, which requires a button push on the TANlock device to confirm presence.
- Automation of reporting for all events, based on user preferences, which can be sent to different servers.
Critical Infrastructure:
- All daily operation functionalities can be used for unmanned critical locations (cabinets) to mitigate risks of vandalism and ensure controlled & efficient access management.
Multi-Tenant:
- Secure independent tenant access management within one server room for different companies and server cabinets, enabling tenants with access.
High-End Security:
- The four-eyes principle, in addition to authentication methods such as PIN code, means that two authorized individuals must present valid access cards – optimal for high-secure environments such as banks or data centers.
Technology
- Easily provision and keep TANlock’s updated with a single click, eliminating the need for manual updates or 3rd party applications.
- A certified, established protocol for secure and efficient data exchange. WebSocket TLS connection offers a secure, open-standard method for real-time communication between clients and servers.
Contact us to find out how our integration offers you unmatched security and compliance.