ISO 27001

Security you can trust

This internationally recognized standard ensures that all processes—from the development of our cameras and recorders to software and data processing—are systematically protected against risks. This includes clear security guidelines, controlled access concepts, regular audits, and comprehensive risk management.

For our customers, this means maximum reliability, verified data security, and technology that meets the highest requirements even in critical infrastructures or sensitive areas of application.

Download Dallmeiers ISO 27001 Certificate >

Certificates

In addition to our ISO 27001 certification, we hold other recognized certificates that demonstrate our commitment to the highest security and quality standards. They confirm that, as a manufacturer of security systems, we work responsibly, reliably, and in proven compliance with international requirements. All current certificates are available for download in a transparent and convenient manner.

Go to Dallmeiers Certificates >

NIS2 individual requirements

Mirrored in Dallmeier ISO 27001 processes

NIS2 requirement NIS2 Directive (EU) NIS2 Implementation Act / BSIG (Germany) Dallmeier ISO 27001 Dallmeier as upstream supplier/manufacturer
State of the art Article 21 (1),
EG 85
§ 30 ISO 27001 = technology-neutral ISO as the basis for state-of-the-art IT security (TeleTrust guideline) + state-of-the-art video surveillance technology + note (*): Dallmeier complies
Security by Design Article 21 (2) e) § 30 A.5.20, A.5.24, A.5.36, 5.37, A.6.08, A.8.09, A.8.19, A.8.20, A.8.21
Supply chain security Article 21 (2) d),
Article 21 (3)
§ 30 A.5.19, A.5.20, A.5.21, A.5.22, A.5.23
Integration chain security Article 21 (2) d) and e) § 30 A.5.19, A.5.20, A.5.21, A.5.22, A.5.23
Regular updates and patches Article 21 (2) e) and g) § 30 A.5.35, A.5.36, A.5.07, A.5.24, A.5.25, A.5.26, A.5.27, A.5.28, A.6.08, A.8.16
Authentication and authorization Article 21 (2) i) and j) § 30 A.5.12, A.5.13, A.5.14, A.5.15, A.5.16, A.5.17, A.5.18, A.8.01, A.8.02, A.8.03
Cryptography and data encryption Article 21 (2) f) § 30 A.8.20, A.8.21, A.8.22, A.8.24
Reporting and vulnerability management Article 21 (2) e) § 30 A.5.07, A.5.24, A.5.25, A.5.26, A.5.27, A.5.28, A.6.08, A8.07, A8.08, A8.15, A8.16
Data protection through IT security Derivation from Article 20,
Article 21 (1),
Article 23 (4),
EG 14 and 51
§ 30 in particular: A.5.34 Privacy and protection of personal information (PII)
Training and awareness measures Article 20 (1) and (2),
Article 21 (2) d) and g);
EG 88 and 89
§ 30 A.5.1, A. 5.2, A.5.3, A.6.3, A. 5.23, A.5.28

Benefits for NIS2 customers

  • Cyber resilience along the entire supply chain
  • Proof of NIS2 compliance to regulatory authorities
  • Avoidance of downtime costs through stable business continuity
  • Avoiding fines for the institution
  • Avoiding personal liability for management

(*)
There is no provision in ISO 27001 or in any law that states in a general and binding manner: “Anyone who complies with ISO 27001 automatically complies with the state of the art.”

Why not?

  • ISO 27001 is an international management standard for information security management systems (ISMS).
  • It defines processes and controls, but it is technology-neutral and does not specify which specific security measures are “state of the art.”

Where does the reference to ISO 27001 ↔ “state of the art” come from?

  • Authorities such as the BSI or data protection supervisory authorities often say:
    The introduction of an ISMS in accordance with ISO 27001 supports compliance with the state of the art because the standard systematically records security risks and selects appropriate measures.
  • In practice, ISO 27001 is often accepted as proof that an organization works in a state-of-the-art manner in terms of organization and processes.
  • ISO 27001 alone = a good foundation, but does not automatically fulfill “state of the art.”
  • Combination of ISO 27001 + current technical security standards = strong evidence.