Newsletter
Exclusive expert tips, customer stories and more.
This internationally recognized standard ensures that all processes—from the development of our cameras and recorders to software and data processing—are systematically protected against risks. This includes clear security guidelines, controlled access concepts, regular audits, and comprehensive risk management.
For our customers, this means maximum reliability, verified data security, and technology that meets the highest requirements even in critical infrastructures or sensitive areas of application.

In addition to our ISO 27001 certification, we hold other recognized certificates that demonstrate our commitment to the highest security and quality standards. They confirm that, as a manufacturer of security systems, we work responsibly, reliably, and in proven compliance with international requirements. All current certificates are available for download in a transparent and convenient manner.
| NIS2 requirement | NIS2 Directive (EU) | NIS2 Implementation Act / BSIG (Germany) | Dallmeier ISO 27001 | Dallmeier as upstream supplier/manufacturer |
|---|---|---|---|---|
| State of the art | Article 21 (1),EG 85 | § 30 | ISO 27001 = technology-neutral ISO as the basis for state-of-the-art IT security (TeleTrust guideline) + state-of-the-art video surveillance technology + note (*): Dallmeier complies | ✓ |
| Security by Design | Article 21 (2) e) | § 30 | A.5.20, A.5.24, A.5.36, 5.37, A.6.08, A.8.09, A.8.19, A.8.20, A.8.21 | ✓ |
| Supply chain security | Article 21 (2) d),Article 21 (3) | § 30 | A.5.19, A.5.20, A.5.21, A.5.22, A.5.23 | ✓ |
| Integration chain security | Article 21 (2) d) and e) | § 30 | A.5.19, A.5.20, A.5.21, A.5.22, A.5.23 | ✓ |
| Regular updates and patches | Article 21 (2) e) and g) | § 30 | A.5.35, A.5.36, A.5.07, A.5.24, A.5.25, A.5.26, A.5.27, A.5.28, A.6.08, A.8.16 | ✓ |
| Authentication and authorization | Article 21 (2) i) and j) | § 30 | A.5.12, A.5.13, A.5.14, A.5.15, A.5.16, A.5.17, A.5.18, A.8.01, A.8.02, A.8.03 | ✓ |
| Cryptography and data encryption | Article 21 (2) f) | § 30 | A.8.20, A.8.21, A.8.22, A.8.24 | ✓ |
| Reporting and vulnerability management | Article 21 (2) e) | § 30 | A.5.07, A.5.24, A.5.25, A.5.26, A.5.27, A.5.28, A.6.08, A8.07, A8.08, A8.15, A8.16 | ✓ |
| Data protection through IT security | Derivation from Article 20, Article 21 (1), Article 23 (4), EG 14 and 51 | § 30 | in particular: A.5.34 Privacy and protection of personal information (PII) | ✓ |
| Training and awareness measures | Article 20 (1) and (2), Article 21 (2) d) and g); EG 88 and 89 | § 30 | A.5.1, A. 5.2, A.5.3, A.6.3, A. 5.23, A.5.28 | ✓ |
(*)
There is no provision in ISO 27001 or in any law that states in a general and binding manner: “Anyone who complies with ISO 27001 automatically complies with the state of the art.”
Why not?
Where does the reference to ISO 27001 ↔ “state of the art” come from?