{"id":9482,"date":"2024-08-09T11:48:11","date_gmt":"2024-08-09T09:48:11","guid":{"rendered":"https:\/\/netxconsult.de\/blog\/nis2-is-coming-do-we-need-a-siem-system\/"},"modified":"2025-09-12T13:29:06","modified_gmt":"2025-09-12T11:29:06","slug":"nis2-is-coming-do-you-need-a-siem-system","status":"publish","type":"post","link":"https:\/\/netxconsult.de\/en\/blog\/nis2-is-coming-do-you-need-a-siem-system\/","title":{"rendered":"NIS2 Is Coming \u2013 Do You Need a SIEM System?"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1372.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p>From October 18, many companies will be obliged to register themselves with the authorities as part of the new NIS2 directive. But what exactly does NIS2 mean and how does it relate to SIEM? In this blog, you will find out what the NIS2 directive requires and what measures need to be implemented. At the end you will find a practical <a class=\"_ps2id\" href=\"#nis2tester\" data-ps2id-offset=\"\">NIS2 directive self-test<\/a> that you can use to check whether your company could be affected by the NIS2 directive<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-one\" style=\"--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h1 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:72;line-height:1.12;\"><h1>What is the NIS2 Directive?<\/h1><\/h1><\/div><div class=\"fusion-text fusion-text-2\"><p>The NIS2 Directive is intended to improve cyber security in the EU and affects many companies &#8211; both directly and indirectly, as the supply chains of the affected sectors must also be protected. Above all, the EU&#8217;s strict requirements demand a response time to cyber security incidents that most companies cannot meet without preparation. You can find the <a href=\"https:\/\/eur-lex.europa.eu\/eli\/dir\/2022\/2555\">directive on the EU website<\/a> here Since July 24, 2024, this EU-wide directive has also been enshrined in German national law. Which aspects of the NIS2 Directive pose the greatest challenges in terms of implementation? In our opinion, they are the following:<\/p>\n<\/div><ul style=\"--awb-line-height:34px;--awb-icon-width:34px;--awb-icon-height:34px;--awb-icon-margin:14px;--awb-content-margin:48px;--awb-circlecolor:var(--awb-color6);--awb-circle-yes-font-size:17.6px;\" class=\"fusion-checklist fusion-checklist-1 fusion-checklist-default type-icons\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p><b>Reporting obligations: <\/b><br \/>\n<b>Within 24 hours:<\/b> Security incidents or near-incidents must be reported to the authorities within 24 hours. An initial suspicion as to the cause of the incident should also be reported.<\/p>\n<p><b>Within 72 hours:<\/b> A detailed report is now required. This report should assess the severity of the incident, outline the impact and explain the indicators of compromise.<\/p>\n<p><b>Within one month:<\/b> A comprehensive final or progress report must be submitted after one month. This report must describe the nature of the threat, the causes and the remedial measures taken. It should also address possible cross-border effects of the incident.<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p><b>Audits:<\/b><\/p>\n<p>According to the EU&#8217;s NIS2 guidelines, companies are obliged to carry out regular audits and assessments of their IT security. The frequency of these audits depends on the company&#8217;s risk assessment. Security assessments and reports should be forwarded to the management so that any necessary corrective measures can be initiated quickly if deficiencies are identified.<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p><b>Sensitization of employees:<\/b><\/p>\n<p>In the past, training courses helped companies to protect themselves against espionage and ransomware attacks. Now such training is mandatory in order to comply with the NIS2 standards. So you are not only protecting yourself from attacks, but also from penalties. Regular training and ongoing support for employees is more important than ever to ensure a high level of security awareness and strengthen resilience against cyber threats. Find out more in our <a href=\"https:\/\/netxconsult.de\/en\/blog\/microsoft-365-how-secure-is-working-in-the-cloud-really\/\" target=\"_blank\" rel=\"noopener noreferrer\">blog on working securely in M365<\/a>.<\/p>\n<\/div><\/li><\/ul><div class=\"fusion-text fusion-text-3\"><p>You are only as good as your tools. To meet the demanding requirements, we believe you need a new tool that can handle the load. This is exactly where SIEM comes into play.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1372.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-one\" style=\"--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h1 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:72;line-height:1.12;\"><h1>What is SIEM?<\/h1><\/h1><\/div><div class=\"fusion-text fusion-text-4\"><p>SIEM stands for <b><u>S<\/u><\/b>ecurity <u><b>I<\/b><\/u>nformation <u><b>E<\/b><\/u>vent <u><b>M<\/b><\/u>anagement. E <span style=\"color: var(--awb-text-color); font-family: var(--awb-text-font-family); font-size: var(--awb-font-size); font-style: var(--awb-text-font-style); font-weight: var(--awb-text-font-weight); letter-spacing: var(--awb-letter-spacing); text-align: var(--awb-content-alignment); text-transform: var(--awb-text-transform); background-color: var(--awb-bg-color-hover);\">SIEM system provides a comprehensive overview of your company&#8217;s IT security. It collects and analyzes security data from various sources such as ERP systems, cloud services and IoT devices (e.g. smart TVs, cameras, etc.). By monitoring login attempts, system changes and other security-related events, the SIEM system detects suspicious behavior. In the event of anomalies, alarms are triggered and detailed logs are created to quickly identify and resolve threats. <\/span><\/p>\n<p>What makes a SIEM system so powerful is its ability to harmonize log files from different sources. As a result, it provides a comprehensive overview of all activities in the network at a glance, even in large and complex IT environments that would otherwise be difficult to analyze.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1372.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-one\" style=\"--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h1 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:72;line-height:1.12;\"><h2>NIS2 and SIEM &#8211; The Perfect Pair<\/h2><\/h1><\/div><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\" style=\"border-radius:8px;\"><img decoding=\"async\" width=\"1501\" height=\"451\" alt=\"The image illustrates how a SIEM system and the NIS2 Directive fit together perfectly like two puzzle pieces, creating an ideal pair.\" title=\"perfekte Paar\" src=\"https:\/\/netxconsult.de\/wp-content\/uploads\/2024\/06\/perfekte-Paar-.png\" class=\"img-responsive wp-image-9251\" srcset=\"https:\/\/netxconsult.de\/wp-content\/uploads\/2024\/06\/perfekte-Paar--200x60.png 200w, https:\/\/netxconsult.de\/wp-content\/uploads\/2024\/06\/perfekte-Paar--400x120.png 400w, https:\/\/netxconsult.de\/wp-content\/uploads\/2024\/06\/perfekte-Paar--600x180.png 600w, https:\/\/netxconsult.de\/wp-content\/uploads\/2024\/06\/perfekte-Paar--800x240.png 800w, https:\/\/netxconsult.de\/wp-content\/uploads\/2024\/06\/perfekte-Paar--1200x361.png 1200w, https:\/\/netxconsult.de\/wp-content\/uploads\/2024\/06\/perfekte-Paar-.png 1501w\" sizes=\"(max-width: 640px) 100vw, 1501px\" \/><\/span><\/div><div class=\"fusion-text fusion-text-5\"><p>A SIEM system is essential to meeting the requirements of the NIS2 directive because it provides several core functions that are critical to compliance. Here are the main reasons:<\/p>\n<\/div><div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:24px;--awb-content-font-size:20px;--awb-icon-alignment:left;--awb-hover-color:#f4f4f6;--awb-border-color:rgba(0,0,0,0.08);--awb-background-color:#ffffff;--awb-divider-color:rgba(0,0,0,0.08);--awb-divider-hover-color:rgba(0,0,0,0.08);--awb-icon-color:#ffffff;--awb-title-color:#000000;--awb-content-color:#000000;--awb-icon-box-color:#000000;--awb-toggle-hover-accent-color:#f86011;--awb-title-font-family:&quot;DM Sans&quot;;--awb-title-font-weight:500;--awb-title-font-style:normal;--awb-title-font-size:22px;--awb-content-font-family:&quot;DM Sans&quot;;--awb-content-font-style:normal;--awb-content-font-weight:400;\"><div class=\"panel-group fusion-toggle-icon-unboxed\" id=\"accordion-9482-1\"><div class=\"fusion-panel panel-default panel-9c40e6d1fff2d2553 fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_9c40e6d1fff2d2553\"><a aria-expanded=\"false\" aria-controls=\"9c40e6d1fff2d2553\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-9482-1\" data-target=\"#9c40e6d1fff2d2553\" href=\"#9c40e6d1fff2d2553\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon fa-angle-double-down fas\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon fa-angle-double-right fas\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Centralized Monitoring and Analysis<\/span><\/a><\/h4><\/div><div id=\"9c40e6d1fff2d2553\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_9c40e6d1fff2d2553\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<ul>\n<li><strong>NIS2 Requirement: <\/strong>The directive requires companies to ensure a high level of IT security, including the monitoring and analysis of security-related events.<\/li>\n<li><strong>SIEM function<\/strong>: SIEM systems provide a central platform for monitoring the entire IT infrastructure and analyzing security-relevant data in real time. This helps companies to quickly detect and react to suspicious activities.<\/li>\n<\/ul>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-a1188399fad7c0602 fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_a1188399fad7c0602\"><a aria-expanded=\"false\" aria-controls=\"a1188399fad7c0602\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-9482-1\" data-target=\"#a1188399fad7c0602\" href=\"#a1188399fad7c0602\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon fa-angle-double-down fas\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon fa-angle-double-right fas\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Real-Time Threat Detection<\/span><\/a><\/h4><\/div><div id=\"a1188399fad7c0602\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_a1188399fad7c0602\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<ul>\n<li><strong>NIS2 Requirement:<\/strong> Companies must be able to detect and respond to threats and security incidents as quickly as possible.<\/li>\n<li><strong>SIEM Function<\/strong>: SIEM systems capture and analyze data streams in real time and can immediately detect anomalies or unusual activities, allowing for a swift response to potential security incidents.<\/li>\n<\/ul>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-4711c53a56eb53d49 fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_4711c53a56eb53d49\"><a aria-expanded=\"false\" aria-controls=\"4711c53a56eb53d49\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-9482-1\" data-target=\"#4711c53a56eb53d49\" href=\"#4711c53a56eb53d49\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon fa-angle-double-down fas\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon fa-angle-double-right fas\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Incident Management and Reporting<\/span><\/a><\/h4><\/div><div id=\"4711c53a56eb53d49\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_4711c53a56eb53d49\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<ul>\n<li><strong>NIS2 Requirement:<\/strong> The directive stipulates that security incidents must be documented and reported to the relevant authorities within specified deadlines.<\/li>\n<li><strong>SIEM function<\/strong>: SIEM systems create detailed logs and reports on security-relevant events and incidents. They support the fulfillment of reporting obligations through automated reporting and documentation.<\/li>\n<\/ul>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-3872b1d924dc16267 fusion-toggle-no-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_3872b1d924dc16267\"><a aria-expanded=\"false\" aria-controls=\"3872b1d924dc16267\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-9482-1\" data-target=\"#3872b1d924dc16267\" href=\"#3872b1d924dc16267\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon fa-angle-double-down fas\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon fa-angle-double-right fas\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">Risk Management<\/span><\/a><\/h4><\/div><div id=\"3872b1d924dc16267\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_3872b1d924dc16267\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<ul>\n<li><strong>NIS2 Requirement:<\/strong> The directive requires effective risk management to identify and mitigate potential security threats.<\/li>\n<li><strong>SIEM function<\/strong>: SIEM systems aggregate security data from various sources and analyze it to assess risks and identify vulnerabilities. This information is crucial for the development and adaptation of risk management strategies.<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1372.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-one\" style=\"--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h1 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:72;line-height:1.12;\"><h1>Which SIEM System?<\/h1><\/h1><\/div><div class=\"fusion-text fusion-text-6\"><p>The market is virtually flooded with providers of SIEM software. So which provider can you trust? As is so often the case, it&#8217;s a matter of taste and we are happy to introduce you to 3 providers and have drawn comparisons for you.<\/p>\n<\/div>\n<div class=\"table-1\">\n<table width=\"100%\">\n<thead>\n<tr>\n<th align=\"left\"><\/th>\n<th align=\"left\"><a href=\"https:\/\/www.manageengine.com\/log-management\/sem\/siem-security-information-event-management-software.html\" target=\"_blank\" rel=\"noopener\"><strong>ManageEngine Log360<\/strong><\/a><\/th>\n<th align=\"left\"><a href=\"https:\/\/azure.microsoft.com\/de-de\/products\/microsoft-sentinel\" target=\"_blank\" rel=\"noopener\"><strong>Microsoft Sentinel<\/strong><\/a><\/th>\n<th align=\"left\"><a href=\"https:\/\/www.splunk.com\/de_de\" target=\"_blank\" rel=\"noopener\"><strong>Splunk<\/strong><\/a><\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td align=\"left\">Implementation<\/td>\n<td align=\"left\">Cloud and on-premise<\/td>\n<td align=\"left\">Cloud-native (Azure)<\/td>\n<td align=\"left\">Cloud and OnPremise<\/td>\n<\/tr>\n<tr>\n<td align=\"left\">Data Sources<\/td>\n<td align=\"left\">Broad support,<br \/>\nincl. AD<\/td>\n<td align=\"left\">Integrated with Azure services<br \/>\nand other data sources<\/td>\n<td align=\"left\">Broad support for<br \/>\ndifferent data sources<\/td>\n<\/tr>\n<tr>\n<td align=\"left\">Scalability<\/td>\n<td align=\"left\">Suitable for SMEs,<br \/>\nlimited scalability<\/td>\n<td align=\"left\">Highly scalable, particularly suitable for<br \/>\nAzure users<\/td>\n<td align=\"left\">Very high scalability,<br \/>\nsuitable for large companies<\/td>\n<\/tr>\n<tr>\n<td align=\"left\">Analysis and visualization<\/td>\n<td align=\"left\">Detailed reports and<br \/>\ndashboards, but limited<\/td>\n<td align=\"left\">Powerful visualizations<\/td>\n<td align=\"left\">Comprehensive analysis functions,<br \/>\npowerful dashboards<\/td>\n<\/tr>\n<tr>\n<td align=\"left\">Machine learning<\/td>\n<td align=\"left\">Basic threat detection and analytics<\/td>\n<td align=\"left\">AI-driven threat detection and automation<\/td>\n<td align=\"left\">Advanced machine learning models for anomaly detection<\/td>\n<\/tr>\n<tr>\n<td align=\"left\">Real-time monitoring<\/td>\n<td align=\"left\">Yes<\/td>\n<td align=\"left\">Yes, AI supported<\/td>\n<td align=\"left\">Yes<\/td>\n<\/tr>\n<tr>\n<td align=\"left\">Compliance<\/td>\n<td align=\"left\">Templates and reports for compliance<\/td>\n<td align=\"left\">Integrates compliance management for Azure services<\/td>\n<td align=\"left\">Provides comprehensive compliance reports<\/td>\n<\/tr>\n<tr>\n<td align=\"left\">Automation<\/td>\n<td align=\"left\">Basic functions<\/td>\n<td align=\"left\">Strong automation through playbooks and integrations<\/td>\n<td align=\"left\">Extensive automation options<\/td>\n<\/tr>\n<tr>\n<td align=\"left\">Integration<\/td>\n<td align=\"left\">Well integrated with ManageEngine products<\/td>\n<td align=\"left\">Tightly integrated with Azure services and Microsoft 365<\/td>\n<td align=\"left\">Extensive integration options with third-party providers<\/td>\n<\/tr>\n<tr>\n<td align=\"left\">Costs<\/td>\n<td align=\"left\">\u20ac<\/td>\n<td align=\"left\">\u20ac\u20ac<\/td>\n<td align=\"left\">\u20ac\u20ac\u20ac<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div class=\"fusion-text fusion-text-7\"><p><em><strong>Important note:<\/strong><\/em> It should be mentioned that there are many other providers in the SIEM sector and that the market landscape is currently changing very rapidly. Six months ago, Splunk was still considered the clear market leader. In the meantime, however, Microsoft Sentinel has caught up considerably thanks to numerous upgrades. Now it&#8217;s more of a neck-and-neck race. In addition, Splunk has concerns about its long-term business model, particularly due to the acquisition by Cisco, which could lead to possible changes in the license structure.<\/p>\n<a id=\"nis2tester\"><\/a>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1372.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-5 fusion-sep-none fusion-title-text fusion-title-size-one\" style=\"--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h1 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:72;line-height:1.12;\"><h2>NIS2 Directive &#8211; FAQ<\/h2><\/h1><\/div><style type=\"text\/css\">#accordian-1 .fusion-panel:hover,#accordian-1 .fusion-panel.hover{ background-color: #ffffff } #accordian-1 .fusion-panel { border-color:rgba(0,0,0,0.08); border-width:0px; background-color:rgba(255,255,255,0); }.fusion-accordian #accordian-1 .panel-title a .fa-fusion-box:before{ font-size: 32px;width: 32px;}.fusion-accordian #accordian-1 .panel-title a .fa-fusion-box{ color: #f86011;}.fusion-accordian #accordian-1.fusion-toggle-icon-right .fusion-toggle-heading{ margin-right: 50px;}.fusion-accordian  #accordian-1 .panel-title a{font-family:\"DM Sans\";font-style:normal;font-weight:500;}.fusion-accordian  #accordian-1 .panel-title a:not(:hover){}.fusion-accordian  #accordian-1 .toggle-content{font-family:\"DM Sans\";font-style:normal;font-weight:400;}.fusion-accordian #accordian-1 .panel-title a:hover,.fusion-accordian #accordian-1 .panel-title a.hover { color: #f86011;}.fusion-faq-shortcode .fusion-accordian #accordian-1 .fusion-toggle-boxed-mode:hover .panel-title a { color: #f86011;}.fusion-accordian #accordian-1.fusion-toggle-icon-unboxed .panel-title a:hover .fa-fusion-box,.fusion-accordian #accordian-1.fusion-toggle-icon-unboxed .panel-title a.hover .fa-fusion-box { color: #f86011; }<\/style><div class=\"fusion-faq-shortcode\" style=\"\"><div class=\"fusion-faqs-wrapper\"><div class=\"accordian fusion-accordian\"><div class=\"panel-group  fusion-toggle-icon-right fusion-toggle-icon-unboxed\" id=\"accordian-1\"><div class=\"fusion-panel fusion-toggle-no-divider fusion-toggle-boxed-mode panel-default fusion-faq-post fusion-faq-post-12795 nis2-directive-faq-blog \"><span class=\"entry-title rich-snippet-hidden\">What Penalties Will We Face for Non-Compliance?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/netxconsult.de\/en\/blog\/author\/manuelnetx\/\" title=\"Posts by Manuel Mayer\" rel=\"author\">Manuel Mayer<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2025-11-07T14:16:47+01:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-12795\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-target=\"#collapse-1-12795\" href=\"#collapse-1-12795\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">What Penalties Will We Face for Non-Compliance?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-12795\" aria-labelledby=\"faq_1-12795\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><p>The amount of the penalty depends on the sector and the severity of the infringement, and can be up to 10 million Euros or 2% of the global annual turnover. This is another reason not to take the NIS2 directive lightly. <\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider fusion-toggle-boxed-mode panel-default fusion-faq-post fusion-faq-post-12797 nis2-directive-faq-blog \"><span class=\"entry-title rich-snippet-hidden\">Is Implementing a SIEM System Sufficient?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/netxconsult.de\/en\/blog\/author\/manuelnetx\/\" title=\"Posts by Manuel Mayer\" rel=\"author\">Manuel Mayer<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2025-11-07T14:16:47+01:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-12797\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-target=\"#collapse-1-12797\" href=\"#collapse-1-12797\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">Is Implementing a SIEM System Sufficient?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-12797\" aria-labelledby=\"faq_1-12797\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><p>No. To comply with the NIS2 directive standards, clear and efficient reporting and communication channels must be implemented. A SIEM system is a significant aid in this, but only one piece of the puzzle.  <\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider fusion-toggle-boxed-mode panel-default fusion-faq-post fusion-faq-post-12789 nis2-directive-faq-blog \"><span class=\"entry-title rich-snippet-hidden\">When Do I Need to Start Implementing NIS2?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/netxconsult.de\/en\/blog\/author\/manuelnetx\/\" title=\"Posts by Manuel Mayer\" rel=\"author\">Manuel Mayer<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2025-11-07T14:16:46+01:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-12789\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-target=\"#collapse-1-12789\" href=\"#collapse-1-12789\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">When Do I Need to Start Implementing NIS2?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-12789\" aria-labelledby=\"faq_1-12789\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><p>Short answer: Immediately.<br \/>\nLong answer: Depending on the existing cybersecurity standards in your company, the scope of implementation may vary. However, for most companies, the implementation will require considerable resources, so implementation should be started as soon as possible to meet all requirements in a timely manner. <\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider fusion-toggle-boxed-mode panel-default fusion-faq-post fusion-faq-post-12792 nis2-directive-faq-blog \"><span class=\"entry-title rich-snippet-hidden\">Is it Primarily IT or Management that Needs to Act?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/netxconsult.de\/en\/blog\/author\/manuelnetx\/\" title=\"Posts by Manuel Mayer\" rel=\"author\">Manuel Mayer<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2025-11-07T14:16:46+01:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-12792\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-target=\"#collapse-1-12792\" href=\"#collapse-1-12792\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">Is it Primarily IT or Management that Needs to Act?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-12792\" aria-labelledby=\"faq_1-12792\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><p>Collaboration is crucial: Both the IT department and management must take action. The IT department implements technical security measures, while management ensures that resources, policies, and processes are in place. Both levels must work together to meet the requirements of the NIS2 directive and ensure the company&#8217;s cybersecurity. As non-compliance is often due to management issues, management should take the situation particularly seriously.   <\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel fusion-toggle-no-divider fusion-toggle-boxed-mode panel-default fusion-faq-post fusion-faq-post-10244 nis2-directive-faq-blog \"><span class=\"entry-title rich-snippet-hidden\">Where can I get help with the implementation of the NIS2 directive?<\/span><span class=\"vcard rich-snippet-hidden\"><span class=\"fn\"><a href=\"https:\/\/netxconsult.de\/en\/blog\/author\/manuelnetx\/\" title=\"Posts by Manuel Mayer\" rel=\"author\">Manuel Mayer<\/a><\/span><\/span><span class=\"updated rich-snippet-hidden\">2025-02-24T09:56:09+01:00<\/span><div class=\"panel-heading\"><h4 id=\"faq_1-10244\" class=\"panel-title toggle\"><a data-toggle=\"collapse\" class=\"collapsed\" data-target=\"#collapse-1-10244\" href=\"#collapse-1-10244\" aria-expanded=\"false\"><div class=\"fusion-toggle-icon-wrapper\"><div class=\"fusion-toggle-icon-wrapper-main\"><div class=\"fusion-toggle-icon-wrapper-sub\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/div><\/div><\/div><div class=\"fusion-toggle-heading\">Where can I get help with the implementation of the NIS2 directive?<\/div><\/a><\/h4><\/div><div id=\"collapse-1-10244\" aria-labelledby=\"faq_1-10244\" class=\"panel-collapse collapse\"><div class=\"panel-body toggle-content post-content\"><p>We are happy to support you with the technical implementation and show you how you can meet the standard. In a free initial consultation, we will discuss your current situation and your goals to determine whether a collaboration will provide the help you need. Our <a href=\"https:\/\/netxconsult.de\/en\/contact\/\" target=\"_blank\" rel=\"noopener\">contact form<\/a> opens the door to a NIS2-compliant future.  <\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":21,"featured_media":9806,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[334],"tags":[330,331,332],"class_list":["post-9482","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-en_it_projects","tag-it-security-en-2","tag-nis2-en","tag-siem-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>NIS2 &amp; SIEM \u2013 What Businesses Need to Know<\/title>\n<meta name=\"description\" content=\"NIS2 and SIEM explained: learn why Security Information &amp; Event Management plays a key role in meeting the new EU cybersecurity directive.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/netxconsult.de\/en\/blog\/nis2-is-coming-do-you-need-a-siem-system\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NIS2 &amp; SIEM \u2013 What Businesses Need to Know\" \/>\n<meta property=\"og:description\" content=\"NIS2 and SIEM explained: learn why Security Information &amp; Event Management plays a key role in meeting the new EU cybersecurity directive.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/netxconsult.de\/en\/blog\/nis2-is-coming-do-you-need-a-siem-system\/\" \/>\n<meta property=\"og:site_name\" content=\"netX consult\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-09T09:48:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-12T11:29:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/netxconsult.de\/wp-content\/uploads\/2024\/08\/NIS2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1801\" \/>\n\t<meta property=\"og:image:height\" content=\"1200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Manuel Mayer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Manuel Mayer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/nis2-is-coming-do-you-need-a-siem-system\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/nis2-is-coming-do-you-need-a-siem-system\\\/\"},\"author\":{\"name\":\"Manuel Mayer\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#\\\/schema\\\/person\\\/2a71da04439b566eb6d3d3719e41f764\"},\"headline\":\"NIS2 Is Coming \u2013 Do You Need a SIEM System?\",\"datePublished\":\"2024-08-09T09:48:11+00:00\",\"dateModified\":\"2025-09-12T11:29:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/nis2-is-coming-do-you-need-a-siem-system\\\/\"},\"wordCount\":4815,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/nis2-is-coming-do-you-need-a-siem-system\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/netxconsult.de\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/NIS2.png\",\"keywords\":[\"IT security\",\"NIS2\",\"SIEM\"],\"articleSection\":[\"EN_IT_Projects\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/nis2-is-coming-do-you-need-a-siem-system\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/nis2-is-coming-do-you-need-a-siem-system\\\/\",\"url\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/nis2-is-coming-do-you-need-a-siem-system\\\/\",\"name\":\"NIS2 & SIEM \u2013 What Businesses Need to Know\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/nis2-is-coming-do-you-need-a-siem-system\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/nis2-is-coming-do-you-need-a-siem-system\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/netxconsult.de\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/NIS2.png\",\"datePublished\":\"2024-08-09T09:48:11+00:00\",\"dateModified\":\"2025-09-12T11:29:06+00:00\",\"description\":\"NIS2 and SIEM explained: learn why Security Information & Event Management plays a key role in meeting the new EU cybersecurity directive.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/nis2-is-coming-do-you-need-a-siem-system\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/nis2-is-coming-do-you-need-a-siem-system\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/nis2-is-coming-do-you-need-a-siem-system\\\/#primaryimage\",\"url\":\"https:\\\/\\\/netxconsult.de\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/NIS2.png\",\"contentUrl\":\"https:\\\/\\\/netxconsult.de\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/NIS2.png\",\"width\":1801,\"height\":1200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/nis2-is-coming-do-you-need-a-siem-system\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NIS2 Is Coming \u2013 Do You Need a SIEM System?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/\",\"name\":\"netX consult\",\"description\":\"IT-Beratung\",\"publisher\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#organization\",\"name\":\"netX consult e.K.\",\"url\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/netxconsult.de\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/netX-Logo-MS-Teams.png\",\"contentUrl\":\"https:\\\/\\\/netxconsult.de\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/netX-Logo-MS-Teams.png\",\"width\":241,\"height\":240,\"caption\":\"netX consult e.K.\"},\"image\":{\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/netxconsult\\\/about\",\"https:\\\/\\\/www.youtube.com\\\/@netXconsult\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/#\\\/schema\\\/person\\\/2a71da04439b566eb6d3d3719e41f764\",\"name\":\"Manuel Mayer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0e780e9d7f3c3be967b206057b1215913f4c6f958b69f64d26117526a7b65361?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0e780e9d7f3c3be967b206057b1215913f4c6f958b69f64d26117526a7b65361?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0e780e9d7f3c3be967b206057b1215913f4c6f958b69f64d26117526a7b65361?s=96&d=mm&r=g\",\"caption\":\"Manuel Mayer\"},\"url\":\"https:\\\/\\\/netxconsult.de\\\/en\\\/blog\\\/author\\\/manuelnetx\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NIS2 & SIEM \u2013 What Businesses Need to Know","description":"NIS2 and SIEM explained: learn why Security Information & Event Management plays a key role in meeting the new EU cybersecurity directive.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/netxconsult.de\/en\/blog\/nis2-is-coming-do-you-need-a-siem-system\/","og_locale":"en_US","og_type":"article","og_title":"NIS2 & SIEM \u2013 What Businesses Need to Know","og_description":"NIS2 and SIEM explained: learn why Security Information & Event Management plays a key role in meeting the new EU cybersecurity directive.","og_url":"https:\/\/netxconsult.de\/en\/blog\/nis2-is-coming-do-you-need-a-siem-system\/","og_site_name":"netX consult","article_published_time":"2024-08-09T09:48:11+00:00","article_modified_time":"2025-09-12T11:29:06+00:00","og_image":[{"width":1801,"height":1200,"url":"https:\/\/netxconsult.de\/wp-content\/uploads\/2024\/08\/NIS2.png","type":"image\/png"}],"author":"Manuel Mayer","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Manuel Mayer","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/netxconsult.de\/en\/blog\/nis2-is-coming-do-you-need-a-siem-system\/#article","isPartOf":{"@id":"https:\/\/netxconsult.de\/en\/blog\/nis2-is-coming-do-you-need-a-siem-system\/"},"author":{"name":"Manuel Mayer","@id":"https:\/\/netxconsult.de\/en\/#\/schema\/person\/2a71da04439b566eb6d3d3719e41f764"},"headline":"NIS2 Is Coming \u2013 Do You Need a SIEM System?","datePublished":"2024-08-09T09:48:11+00:00","dateModified":"2025-09-12T11:29:06+00:00","mainEntityOfPage":{"@id":"https:\/\/netxconsult.de\/en\/blog\/nis2-is-coming-do-you-need-a-siem-system\/"},"wordCount":4815,"commentCount":0,"publisher":{"@id":"https:\/\/netxconsult.de\/en\/#organization"},"image":{"@id":"https:\/\/netxconsult.de\/en\/blog\/nis2-is-coming-do-you-need-a-siem-system\/#primaryimage"},"thumbnailUrl":"https:\/\/netxconsult.de\/wp-content\/uploads\/2024\/08\/NIS2.png","keywords":["IT security","NIS2","SIEM"],"articleSection":["EN_IT_Projects"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/netxconsult.de\/en\/blog\/nis2-is-coming-do-you-need-a-siem-system\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/netxconsult.de\/en\/blog\/nis2-is-coming-do-you-need-a-siem-system\/","url":"https:\/\/netxconsult.de\/en\/blog\/nis2-is-coming-do-you-need-a-siem-system\/","name":"NIS2 & SIEM \u2013 What Businesses Need to Know","isPartOf":{"@id":"https:\/\/netxconsult.de\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/netxconsult.de\/en\/blog\/nis2-is-coming-do-you-need-a-siem-system\/#primaryimage"},"image":{"@id":"https:\/\/netxconsult.de\/en\/blog\/nis2-is-coming-do-you-need-a-siem-system\/#primaryimage"},"thumbnailUrl":"https:\/\/netxconsult.de\/wp-content\/uploads\/2024\/08\/NIS2.png","datePublished":"2024-08-09T09:48:11+00:00","dateModified":"2025-09-12T11:29:06+00:00","description":"NIS2 and SIEM explained: learn why Security Information & Event Management plays a key role in meeting the new EU cybersecurity directive.","breadcrumb":{"@id":"https:\/\/netxconsult.de\/en\/blog\/nis2-is-coming-do-you-need-a-siem-system\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/netxconsult.de\/en\/blog\/nis2-is-coming-do-you-need-a-siem-system\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netxconsult.de\/en\/blog\/nis2-is-coming-do-you-need-a-siem-system\/#primaryimage","url":"https:\/\/netxconsult.de\/wp-content\/uploads\/2024\/08\/NIS2.png","contentUrl":"https:\/\/netxconsult.de\/wp-content\/uploads\/2024\/08\/NIS2.png","width":1801,"height":1200},{"@type":"BreadcrumbList","@id":"https:\/\/netxconsult.de\/en\/blog\/nis2-is-coming-do-you-need-a-siem-system\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/netxconsult.de\/en\/"},{"@type":"ListItem","position":2,"name":"NIS2 Is Coming \u2013 Do You Need a SIEM System?"}]},{"@type":"WebSite","@id":"https:\/\/netxconsult.de\/en\/#website","url":"https:\/\/netxconsult.de\/en\/","name":"netX consult","description":"IT-Beratung","publisher":{"@id":"https:\/\/netxconsult.de\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/netxconsult.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/netxconsult.de\/en\/#organization","name":"netX consult e.K.","url":"https:\/\/netxconsult.de\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netxconsult.de\/en\/#\/schema\/logo\/image\/","url":"https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/05\/netX-Logo-MS-Teams.png","contentUrl":"https:\/\/netxconsult.de\/wp-content\/uploads\/2022\/05\/netX-Logo-MS-Teams.png","width":241,"height":240,"caption":"netX consult e.K."},"image":{"@id":"https:\/\/netxconsult.de\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/netxconsult\/about","https:\/\/www.youtube.com\/@netXconsult"]},{"@type":"Person","@id":"https:\/\/netxconsult.de\/en\/#\/schema\/person\/2a71da04439b566eb6d3d3719e41f764","name":"Manuel Mayer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/0e780e9d7f3c3be967b206057b1215913f4c6f958b69f64d26117526a7b65361?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0e780e9d7f3c3be967b206057b1215913f4c6f958b69f64d26117526a7b65361?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0e780e9d7f3c3be967b206057b1215913f4c6f958b69f64d26117526a7b65361?s=96&d=mm&r=g","caption":"Manuel Mayer"},"url":"https:\/\/netxconsult.de\/en\/blog\/author\/manuelnetx\/"}]}},"_links":{"self":[{"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/posts\/9482","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/comments?post=9482"}],"version-history":[{"count":0,"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/posts\/9482\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/media\/9806"}],"wp:attachment":[{"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/media?parent=9482"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/categories?post=9482"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/netxconsult.de\/en\/wp-json\/wp\/v2\/tags?post=9482"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}