IT Security
Comprehensive cybersecurity and NIS2 compliance for Czech companies. ISO 27001 security audits, Fortinet firewall deployment, AES-256 encryption, and 24/7 incident monitoring. Fines for NIS2 violations can reach up to €10 million — we will prepare you in time.
The New EU Cybersecurity Directive
In response to the ever-increasing number of cyber attacks, the NIS 2 Directive has been issued, expanding the scope of legislation focused on the security of networks and information systems.
In the Czech Republic and Slovakia, more than 10,000 companies are expected to be affected. The emphasis is also placed on supply chains. Violations can lead to fines of up to €10,000,000 or 2% of annual global turnover.
What does NIS 2 require?
Obligations for affected entities
-
Risk analysis and information system security policies
-
Detection and reporting of security incidents
-
Supply chain security
-
Cryptography and communication encryption
-
System resilience testing and penetration tests
Our Approach in 3 Steps
With over 26 years of experience in the market, we will help bring your company into compliance with the NIS 2 directive — while strengthening the overall security of your systems.
Analysis
We will conduct a thorough security analysis of your system, evaluate potential risks, existing security measures, and current vulnerabilities.
Design
Together with you, we will design a solution that complies with the NIS 2 directive while meeting the budget and specific needs of your company.
Protection
We provide robust system security, preventing cyber attacks, data loss, and hefty fines for non-compliance with the directive.
Comprehensive Cybersecurity
We offer a complete portfolio of security services — from network protection and encryption to monitoring and employee training.
Firewall & Network Protection
Deployment and management of Next-Generation Firewalls (NGFW) Fortinet FortiGate with Deep Packet Inspection (DPI). Perimeter protection, network micro-segmentation, and IDS/IPS intrusion prevention.
Penetration Testing
Simulation of real-world attacks on your infrastructure. We uncover vulnerabilities before an attacker finds them.
Encryption & VPN
AES-256 encryption securing communication between branches and remote workers. IPsec with IKEv2, SSL VPN, SD-WAN encrypted overlay networks, and SASE architecture.
Monitoring & Detection
Continuous 24/7 network monitoring using a SIEM/SOAR platform. Automatic anomaly detection via NetFlow/IPFIX telemetry and real-time incident response.
NIS 2 Compliance
Complete support in implementing the NIS 2 directive — from gap analysis to the deployment of security measures.
Employee Training
Security awareness for your team. Phishing simulations, best practices training, and building a strong security culture.
How Does a Company Differ Before and After NIS2 Security Measures?
A comparison of a typical corporate network without implemented security measures versus one equipped with a complete New Telekom solution.
| Parameter | Without Security | With New Telekom Solution |
|---|---|---|
| Data Transmission Encryption | Often unencrypted or uses outdated SSL/TLS | AES-256 end-to-end, IPsec with IKEv2 |
| Security Incident Detection | Manual log checks, slow response | 24/7 SIEM monitoring with automated anomaly detection |
| Network Segmentation | Flat network without traffic separation | Micro-segmentation with VRF and Zero Trust architecture |
| Firewall | Basic stateful firewall without DPI | Fortinet NGFW with Deep Packet Inspection (DPI) |
| Reporting Incidents to NÚKIB | No process, risk of fines for delays | Automated reporting within 24 hours under ZoKB |
| Penetration Testing | None or one-off | Regular quarterly tests aligned with NÚKIB methodology |
| Risk of NIS2 Fines | Up to €10,000,000 / 2% of annual turnover | Full compliance — minimized risk |
Security from an Operator Who Understands Networks
As a telecommunications operator with our own infrastructure, we possess extensive expertise in network security. Our solutions are built on real-world experience protecting critical infrastructure.
Proactive Approach
- Threat detection before damage occurs
- Regular security audits and penetration testing
- Automated responses to security incidents
Technology
- NGFW Firewalls (Fortinet, Palo Alto)
- SIEM/SOAR for centralized monitoring
- Zero Trust architecture and micro-segmentation
Support & Training
- Dedicated security team available 24/7
- Employee training and phishing simulations
- Consulting and management recommendations
Frequently Asked Questions
Answers to the most common questions regarding cybersecurity and NIS 2.
Are you interested in a security solution?
Leave us a non-binding enquiry. Our team of specialists will get back to you with a tailored solution proposal.
Let's build a solution for your business
Share a few details and a New Telekom specialist will contact you, usually within 24 hours.