ISO 27001

Security you can trust

This internationally recognized standard ensures that all processes—from the development of our cameras and recorders to software and data processing—are systematically protected against risks. This includes clear security guidelines, controlled access concepts, regular audits, and comprehensive risk management.

For our customers, this means maximum reliability, verified data security, and technology that meets the highest requirements even in critical infrastructures or sensitive areas of application.

Download Dallmeiers ISO 27001 Certificate >

Certificates

In addition to our ISO 27001 certification, we hold other recognized certificates that demonstrate our commitment to the highest security and quality standards. They confirm that, as a manufacturer of security systems, we work responsibly, reliably, and in proven compliance with international requirements. All current certificates are available for download in a transparent and convenient manner.

Go to Dallmeiers Certificates >

NIS-2 individual requirements

Mirrored in Dallmeier ISO 27001 processes

NIS-2 requirement NIS-2 Directive (EU) NIS-2 Implementation Act / BSIG (Germany) Dallmeier ISO 27001 Dallmeier as upstream supplier/manufacturer
State of the art Article 21 (1),
EG 85
§ 30 ISO 27001 = technology-neutral ISO as the basis for state-of-the-art IT security (TeleTrust guideline) + state-of-the-art video surveillance technology
Security by Design Article 21 (2) e) § 30 A.5.20, A.5.24, A.5.36, 5.37, A.6.08, A.8.09, A.8.19, A.8.20, A.8.21
Supply chain security Article 21 (2) d),
Article 21 (3)
§ 30 A.5.19, A.5.20, A.5.21, A.5.22, A.5.23
Integration chain security Article 21 (2) d) and e) § 30 A.5.19, A.5.20, A.5.21, A.5.22, A.5.23
Regular updates and patches Article 21 (2) e) and g) § 30 A.5.35, A.5.36, A.5.07, A.5.24, A.5.25, A.5.26, A.5.27, A.5.28, A.6.08, A.8.16
Authentication and authorization Article 21 (2) i) and j) § 30 A.5.12, A.5.13, A.5.14, A.5.15, A.5.16, A.5.17, A.5.18, A.8.01, A.8.02, A.8.03
Cryptography and data encryption Article 21 (2) f) § 30 A.8.20, A.8.21, A.8.22, A.8.24
Reporting and vulnerability management Article 21 (2) e) § 30 A.5.07, A.5.24, A.5.25, A.5.26, A.5.27, A.5.28, A.6.08, A8.07, A8.08, A8.15, A8.16
Data protection through IT security Derivation from Article 20,
Article 21 (1),
Article 23 (4),
EG 14 and 51
§ 30 in particular: A.5.34 Privacy and protection of personal information (PII)
Training and awareness measures Article 20 (1) and (2),
Article 21 (2) d) and g);
EG 88 and 89
§ 30 A.5.1, A. 5.2, A.5.3, A.6.3, A. 5.23, A.5.28

Benefits for NIS-2 customers

  • Cyber resilience along the entire supply chain
  • Proof of NIS-2 compliance to regulatory authorities
  • Avoidance of downtime costs through stable business continuity
  • Avoiding fines for the institution
  • Avoiding personal liability for management