New Telekom
Home Services IT Security

IT Security

Comprehensive cybersecurity and NIS2 compliance for Czech companies. ISO 27001 security audits, Fortinet firewall deployment, AES-256 encryption, and 24/7 incident monitoring. Fines for NIS2 violations can reach up to €10 million — we will prepare you in time.

NIS 2

The New EU Cybersecurity Directive

In response to the ever-increasing number of cyber attacks, the NIS 2 Directive has been issued, expanding the scope of legislation focused on the security of networks and information systems.

In the Czech Republic and Slovakia, more than 10,000 companies are expected to be affected. The emphasis is also placed on supply chains. Violations can lead to fines of up to €10,000,000 or 2% of annual global turnover.

Energy Transport Banking Healthcare Digital Infrastructure Public Administration and many more…

What does NIS 2 require?

Obligations for affected entities

  • Risk analysis and information system security policies
  • Detection and reporting of security incidents
  • Supply chain security
  • Cryptography and communication encryption
  • System resilience testing and penetration tests
Our Process

Our Approach in 3 Steps

With over 26 years of experience in the market, we will help bring your company into compliance with the NIS 2 directive — while strengthening the overall security of your systems.

1

Analysis

We will conduct a thorough security analysis of your system, evaluate potential risks, existing security measures, and current vulnerabilities.

2

Design

Together with you, we will design a solution that complies with the NIS 2 directive while meeting the budget and specific needs of your company.

3

Protection

We provide robust system security, preventing cyber attacks, data loss, and hefty fines for non-compliance with the directive.

Services

Comprehensive Cybersecurity

We offer a complete portfolio of security services — from network protection and encryption to monitoring and employee training.

Firewall & Network Protection

Deployment and management of Next-Generation Firewalls (NGFW) Fortinet FortiGate with Deep Packet Inspection (DPI). Perimeter protection, network micro-segmentation, and IDS/IPS intrusion prevention.

Penetration Testing

Simulation of real-world attacks on your infrastructure. We uncover vulnerabilities before an attacker finds them.

Encryption & VPN

AES-256 encryption securing communication between branches and remote workers. IPsec with IKEv2, SSL VPN, SD-WAN encrypted overlay networks, and SASE architecture.

Monitoring & Detection

Continuous 24/7 network monitoring using a SIEM/SOAR platform. Automatic anomaly detection via NetFlow/IPFIX telemetry and real-time incident response.

NIS 2 Compliance

Complete support in implementing the NIS 2 directive — from gap analysis to the deployment of security measures.

Employee Training

Security awareness for your team. Phishing simulations, best practices training, and building a strong security culture.

Comparison

How Does a Company Differ Before and After NIS2 Security Measures?

A comparison of a typical corporate network without implemented security measures versus one equipped with a complete New Telekom solution.

Parameter Without Security With New Telekom Solution
Data Transmission Encryption Often unencrypted or uses outdated SSL/TLS AES-256 end-to-end, IPsec with IKEv2
Security Incident Detection Manual log checks, slow response 24/7 SIEM monitoring with automated anomaly detection
Network Segmentation Flat network without traffic separation Micro-segmentation with VRF and Zero Trust architecture
Firewall Basic stateful firewall without DPI Fortinet NGFW with Deep Packet Inspection (DPI)
Reporting Incidents to NÚKIB No process, risk of fines for delays Automated reporting within 24 hours under ZoKB
Penetration Testing None or one-off Regular quarterly tests aligned with NÚKIB methodology
Risk of NIS2 Fines Up to €10,000,000 / 2% of annual turnover Full compliance — minimized risk
25+
Years of Experience
24/7
Monitoring
NIS 2
Compliance
NGFW
Next-Gen Firewalls
Why Choose Us

Security from an Operator Who Understands Networks

As a telecommunications operator with our own infrastructure, we possess extensive expertise in network security. Our solutions are built on real-world experience protecting critical infrastructure.

Proactive Approach

  • Threat detection before damage occurs
  • Regular security audits and penetration testing
  • Automated responses to security incidents

Technology

  • NGFW Firewalls (Fortinet, Palo Alto)
  • SIEM/SOAR for centralized monitoring
  • Zero Trust architecture and micro-segmentation

Support & Training

  • Dedicated security team available 24/7
  • Employee training and phishing simulations
  • Consulting and management recommendations
Server Room
Infrastructure
FAQ

Frequently Asked Questions

Answers to the most common questions regarding cybersecurity and NIS 2.

The directive applies to medium and large companies in sectors like energy, transportation, banking, healthcare, water management, digital infrastructure, public administration, and more. If you're unsure, we’ll gladly review your situation — contact us for a free consultation.
Under the new legislation, fines can reach up to €10,000,000 or 2% of the company's total worldwide annual turnover — whichever is higher. Early preparation is therefore critical.
It depends on the scale and current state of your systems. We can usually complete an analysis within 2–4 weeks; solution design and deployment are tailored to your schedule. The entire process generally spans several months.
Yes, we provide 24/7 continuous monitoring of network and security events. This includes anomaly detection, automated incident responses, and regular management reporting.
NIS 2 (EU 2022/2555) and the successive Czech Act on Cyber Security impact roughly 6,000 to 10,000 firms. Besides critical infrastructure providers (energy, public transport, health, banking), it newly envelops their suppliers of IT services, components, and service support. If you supply a regulated entity, you must meet the corresponding standards — without it, they are not permitted to form contracts with you.
Our solution is built on technologies from Fortinet (NGFW FortiGate firewalls), Juniper (backbone network infrastructure), and Cisco (switches and routers). For monitoring, we deploy SIEM/SOAR platforms with automated anomaly detection. Encryption occurs at the AES-256 level with IPsec protocols (IKEv2). We implement Zero Trust architecture alongside network micro-segmentation using VRF.
Registration with NÚKIB (the National Cyber and Information Security Agency) entails identifying regulated services, drafting security documentation compliant with ISO/IEC 27001, and instating an Information Security Management System (ISMS). Subsequently, organizations must implement technical measures, assure workflows to report incidents up to 24 hours, and undergo periodic full-scope audits. New Telekom supports you through this whole process, from provisional gap analysis to definitive validation.
Yes, we offer a Managed Security Services (MSS) model, outright commanding the management of your security infrastructure. This encompasses 24/7 SIEM monitoring, firewall orchestration, recurring penetration probes, incident response, executive reporting, and ongoing enhancements toward security policies. This model serves efficiently for organizations devoid of a specialized security team, yet mandated to satisfy NIS 2 and cybersecurity legal demands.
Let's work together

Are you interested in a security solution?

Leave us a non-binding enquiry. Our team of specialists will get back to you with a tailored solution proposal.

Email us
Loading...
Headquarters
Přípotoční 1519/10C
100 00, Praha 10

Let's build a solution for your business

Share a few details and a New Telekom specialist will contact you, usually within 24 hours.

This form is protected by reCAPTCHA.