Configuración de Cookies

Utilizamos cookies propias y de terceros para analizar nuestros servicios y mostrarte publicidad relacionada con tus preferencias en base a un perfil elaborado a partir de tus hábitos de navegación (por ejemplo, páginas visitadas). Puedes aceptar todas estas cookies pulsando el botón ACEPTAR o configurarlas o rechazar su uso clicando en el apartado CONFIGURACIÓN DE COOKIES.

Si quieres más información, consulta la Política de Cookies y Lista de Cookies de nuestra página web.

Sus preferencias





NIS 2 and your CCTV system

NIS 2

Jordi Gallego
Sales Director
Telecommunications Engineer

16 October, 2024

Share

Table of contents

If your company is based in the EU and operates in a critical sector or provides digital services, the NIS 2 regulation applies to you. Its implementation is imminent, once Spain completes the transposition process.

The Network and Information Systems Security (NIS 2) regulation expands cybersecurity requirements beyond those of its predecessor.

The goal is to enhance resilience against digital threats in an increasingly interconnected world. It also introduces fines of up to €10 million or 2% of global annual revenue, along with operational restrictions for non-compliant companies.

As part of your connected infrastructure, your video surveillance system must implement specific measures to ensure resilience against cyberattacks or minimise their impact if one occurs.

In this article, we explain the safeguards provided by a video surveillance network powered by our technology.

Scope and purpose of NIS 2

Operators of Essential Services (OES) and Digital Service Providers (DSP) play a crucial role in the EU. This group includes sectors such as banking, energy, transport, healthcare and data centres, among others.

All these entities must implement robust measures to manage cyberattack risks and report any incidents to the relevant authorities without unjustified delays.

Lanaccess has been working with these economic players for over 25 years

With a proven track record in critical sectors, Lanaccess has the expertise to deliver cybersecurity solutions that meet the most rigorous standards. In the banking sector, for example, we conduct regular audits, including penetration testing, vulnerability assessments and remediation strategies.

The importance of the supply chain

NIS 2 acknowledges the risks of relying on a technology partner without sufficient security assurances. If a provider is vulnerable to a cyberattack, the entire supply chain is exposed. That’s why organisations subject to NIS 2 must evaluate their partners and require them to provide guarantees regarding their own supply chains.

Lanaccess manufactures its products in Spain and assembles the equipment in-house at its own facilities

Our recorders are made in Europe, with electronic circuits assembled using Japanese and German machinery. After selective soldering, each unit undergoes an automated optical inspection. The final assembly is carried out in our own facilities, because when it comes to security, we believe in having full control over every last detail.

The electronic circuits are mounted onto the board using Japanese machinery, under our direct supervision.

In our Barcelona facility, our team assembles each recorder, ensuring that every component meets our highest standards.

Network security

Critical infrastructure and essential services must secure their networks through segmentation, strict access control and regular updates to connected systems. To ensure the confidentiality, integrity and availability of data, encryption must be applied both in transit and at rest.

Lanaccess manufactures its products in Spain and assembles the equipment in-house at its own facilities

Our R&D+I team, based in Spain, brings together experts from various fields to enhance the cybersecurity of Lanaccess systems. Their goal is to strengthen resilience without compromising user experience or productivity.

We focus on three key areas:

1. Ensuring video availability

  • Authentication systems.
  • Granular access permissions, restricting access as much as necessary.

2. Safeguarding data and network integrity

  • Secure protocols, including HTTPS, FTPS, SSH and proprietary encrypted protocols.
  • Software and firmware encryption.
  • Encrypted video clips, accessible only via a proprietary decryption tool.

3. Preventing vulnerabilities

  • A non-Windows operating system to minimise exposure to common cyber threats.
  • Recorders equipped with PoE switches for an additional layer of security.
  • Regular software updates, with VMS updates running in the background to avoid disrupting users.

Key takeaways

The NIS 2 Directive is a major step forward in strengthening cybersecurity across the EU.

With stricter requirements now in place, it’s essential to choose a video surveillance solutions provider like Lanaccess – one that can help you build a secure, resilient environment that aligns with both the NIS 2 Directive and your organisation’s own security needs.

Protect your organisation with a resilient, cybersecure video surveillance platform. Find out how we can help you.

Frequently asked questions

Yes, but for full enforcement, the Spanish government must transpose it into national law.

NIS 2 applies to Digital Service Providers (DSPs) and Operators of Essential Services (OES), including banking, energy, transport, healthcare and data centres, among others.

Companies failing to comply with the NIS 2 Directive could face fines of up to €10 million or 2% of their global annual turnover.

NIS 2 mandates strict cybersecurity measures throughout the supply chain, requiring robust incident management protocols, access controls and encryption to safeguard the privacy and availability of CCTV system data.

Lanaccess video recorders feature:

  • Authentication systems
  • Granular access permissions
  • Secure communication protocols (HTTPS and FTPS)
  • Data encryption at rest and in transit
  • An alternative operating system to Windows
  • Regular software
    updates

In addition, some models feature built-in PoE switches for an extra layer of security.