TELEKOM SECURITY SOLUTIONS TO PREPARE FOR NIS2

With our security experts and services, we prepare your company to comply with the NIS2 Directive

Am I a stakeholder?
In Hungary, there are at least 2500 companies that are covered by the NIS2 Directive based on their size, turnover and activities. Official self-identification is essential, ask our experts for help!
What should I do if I am a stakeholder?
The next important deadline is 31 December 2025. This is the date by which  the companies will complete their first audit. The registration had to be completed by 30 June 2024 via the company portal after self-identification. After 18 October 2024, the stakeholder organisations must apply the specific security measures defined for their security class.
Why is this important?
The motivation behind the EU directive is that cyber-attacks against business actors are no longer just hurt business interests, but often pose a threat to the national economy. IT security is our common interest, a conscious investment in the future.

Together we will assess the current level of readiness of NIS2

GAP-ANALYSIS SERVICE

What do we offer?
NIS2 compliance is a complex process, preparations should be started from the ground up. With our Gap Analysis service, we provide a comprehensive IT security assessment that will analyse the physical, administrative, logical and personnel security areas of your organisation.
NIS2 training and support
Following the survey, our experts will draw up a timetable for closing the gaps identified and make concrete recommendations. We implement and manage the proposed solutions, even from our broad IT security portfolio.

We build and maintain your IT security environment

IT-SECURITY PORTFOLIO

What do we offer?
Once security solutions are implemented, we help you maintain the right level of security and manage any incidents. As IT security is not just about having software, we also provide support in setting up internal procedures.
NIS2 training and support
We have a broad IT security portfolio that identifies solutions to help your business successfully prepare for compliance.
Find out more about our IT security solutions from our experts!

Business continuity support

We help you keep your business up and running with our managed cloud backup service to keep your data safe

BaaS (mail and cloud)

BaaS (virtual server)

BaaS (physical server)

DRaaS

CTRL 360 Managed services

We provide a solution for protecting and managing your IT systems with predictable, monthly fee plans, customisable and flexible packages

CTRL Managed border protection

CTRL Menedzselt Anti-DDoS

CTRL Managed border protection

CTRL Managed email protection

CTRL SOC services

The Security Operations Center aims to provide the professional resources to prevent and manage possible incidents

CTRL SWAT

CTRL SIEMaaS

CTRL Vulnerability Management

Many other services

Ask our experts!

We develop the knowledge of your IBF specialist

IBF MENTOR SERVICE

What do we offer?
The Information Security Officer (IBF) will ensure compliance with legal requirements. Our experts support the work of the designated IBF through weekly online consultations, providing professional support for compliance with NIS2 audits.
NIS2 training and support
We support you in preparing before the first important deadline. We can help you meet deadlines and interpret legislation, and are available for any technical questions you may have about compliance.

We provide an IBF specialist

IBF AS A SERVICE (IBFaaS)

What do we offer?
We provide a dedicated Information Security Officer. Our experts provide professional support to help you comply with NIS2 audits through regular face-to-face and online consultations (tailored to your specific needs) several times a week.
NIS2 training and support
We offer professional support in preparation through close cooperation, even on a daily basis (working days). We fulfil the IBF's role, helping the company’s day-to-day operation and navigate the requirements set by NIS2.

We support regular IT security training for your employees

IT-SECURITY E-LEARNING PLATFORM (OKTaaS)

Log in to the site: https://oktaas.telekom.hu

What do we offer?
We help train your employees in IT security so that they can make responsible decisions in their daily work, preventing both internal and external incidents.
NIS2 training and support
The learning materials in the learning interface also meet the requirements of NIS2 and other regulations (e.g. DORA). Employees without high level computer skills can learn a basic set of skills that will prepare them for the audit.

Telekom Security Operations Center

Stand-alone monitoring centre
The region's largest specialised audited cybersecurity monitoring centre.
Detection, troubleshooting
CTRL's SOC team helps detect and respond to cyber security incidents and events in an organised manner, in 24/7.
0-24 operator presence
Broad system knowledge, support beyond cybersecurity tasks, systems engineering availability.
Deutsche Telekom
As part of the Telekom family, we have international connections and unique cyber intelligence.