Visitor Management
Read more about Visitor Management
Lend & Lease Management
Read more about Lend & Lease Management
Mailroom Management
Read more about Mailroom Management
Support NIS2 and CER requirements with digital documentation of visitors, access, and traceability.
July 9, 2025
Companies within healthcare, energy, transport, finance, water supply, public administration, and digital infrastructure constitute the backbone of the nation's critical infrastructure. They are essential for the secure and stable operation of society. With the introduction of the CER and NIS2 directives, the requirements for both cyber and physical security have been significantly heightened – and in this context, digital visitor registration assumes a pivotal, yet frequently underestimated, significance.
The EU's NIS2 Directive and CER Directive impose significantly stricter requirements on companies' security, documentation, and resilience.
NIS2 is not just about IT and networks. The directive focuses on governance, risk management, control, and traceability across the entire organization—including control of who has physical access to the company's locations, systems, and critical assets.
The CER Directive focuses on physical preparedness and protection of critical infrastructure such as buildings and facilities. Here, the requirement is that companies must be able to prevent, withstand, and respond to physical and hybrid threats—and document their efforts.
The directives cover far more sectors and companies than before and require, among other things, that organizations:
In practice, this applies to both digital and physical security – and the interaction between them.
Visitors, suppliers, and external consultants are an inherent part of daily operations – yet they also contribute to the company's overall risk landscape. For compliance with both CER and NIS2, it is imperative to maintain documented control over who has access, when, and under what conditions.
Although "visitor registration" is not explicitly mentioned in the NIS2 and CER Directives, access and visitor logging is, in practice, a prerequisite for complying with the requirements for traceability, control, and incident management.
Digital visitor registration solutions contribute to, among other things:
Should an organization be unable to document who has accessed critical areas – specifying when and why – visitor registration will be considered a significant deficiency in its security measures, particularly within the context of NIS2 and CER compliance.
A modern visitor registration system is not just about names and times. It is also about responsibility.
A digital solution enables visitors toactively accept access conditions, security policies, and internal guidelinesbefore or upon arrival. This strengthens both compliance and documentation.
For companies covered by CER and NIS2, this is particularly relevant because:
At the same time, personal data must be handled in accordance with applicable data protection regulations, GDPR.
For companies classified as critical infrastructure and thus subject to CER and NIS2, visitor registration is not merely an administrative detail. It is a concrete, demonstrable, and operational security measure that supports:
When visitor registration is digitized, structured, and seamlessly integrated into an organization's comprehensive security architecture, it transforms into an indispensable element for ensuring CER and NIS2 compliance.
Solutions such as BmyGuest Visitor Management makes it possible to combine efficient visitor registration, digital acceptance of policies, and documentable access control in a single platform – thereby taking a concrete step toward a more robust and compliant organization.
Read more about BmyGuest Visitor Management here
We will get back to you as soon as possible.
We use cookies and similar technologies to ensure the functionality of the website, improve the user experience, compile statistics, and for marketing purposes. You can read more about how we use cookies and similar technologies, as well as how we process your personal data, in our cookie policy.
If you have any questions about our data processing or your rights, you are always welcome to contact our Data Protection Officer.
Service
BmyGuest Cookie Information
Privacy Policy
See privacy policy
Name
BMGCookieConsent
Purpose
Records and documents the user's consent choices in accordance with applicable data protection and ePrivacy regulations.
Expiration
Up to 12 months
Cloudflare (security and bot protection)
radar_sn_shradar_sn_sgradar_sn_rsradar_sn_pedradar_sn_de
Protects the website from automated abuse, bot traffic, and unauthorized attacks.
Session or short-term storage
Weglot
WG_CHOOSE_ORIGINALweglot_allow_private
Saves the user's language selection and ensures correct display of translated or original content.
WordPress (consent management)
wp_consent_functionalwp_consent_marketingwp_consent_preferenceswp_consent_statisticswp_consent_statistics-anonymous
Saves the user's choices regarding cookie categories and controls which scripts may be activated.
WordPress (login & security)
wordpress_logged_in_*wordpress_sec_*wordpress_test_cookie
Handles login, session management, and protects against unauthorized access.
Session lasting approx. 14 days
WordPress (administration)
wp-settings-*wp-settings-time-*
Stores backend settings such as layout and display options.
Up to 1 year
Mouseflow
mf_usermf_*
Analyzes user behavior such as clicks, scrolling, and navigation.
Google Analytics (Google LLC)
_ga_ga_EQDN3BWDSD_ga_BCZ3DEJXBW
Collects statistical information about the use of the website.
Up to 24 months
Google
g_state
Handles session state in connection with Google integrations.
Up to 6 months
LinkedIn (LinkedIn Corporation)
bcookieli_gclidc
Supports LinkedIn Insight Tag and campaign measurement.
1 day to 12 months depending on the cookie
Snitcher
snitcher_device_idsnitcher_device_id_expiressnitcher_sessionsnitcher_session_expires
Identifies and analyzes company visits and user journeys.
Session up to 12 months depending on cookie
What is a cookie?
A cookie is a small text file that is stored on your computer, tablet, or mobile phone when you visit a website. Cookies are widely used to make websites work, improve the user experience, and provide the website owner with information about how the site is used. A cookie is not a program and cannot contain viruses or other malicious code.
Use of cookies on the website
We use cookies to ensure that the website functions correctly and to improve your user experience. Cookies can be used, among other things, to remember your choices, such as language settings, consent choices, and technical preferences.
In addition, we use statistical cookies to analyze how the website is used, so that we can optimize its functionality, structure, and content. In some cases, cookies are also used for business-related communication and campaign measurement.
You can see a detailed overview of the cookies we use, including their purpose and expiration time, under the categories: Necessary, Functional, Statistical, and Marketing.
How long are cookies stored?
How long a cookie is stored on your device depends on the individual cookie. Some cookies are automatically deleted when you close your browser (session cookies), while others are stored for a longer period of time.
The lifetime of each cookie is specified in our cookie overview. The storage period is calculated from your most recent visit to the website.
How to reject or delete cookies
You can change or withdraw your consent at any time by clicking on the cookie icon or the link at the bottom of the website.
You can also block or delete cookies via your browser settings. Please note, however, that if you reject necessary cookies, certain features on the website may not function properly.
If you wish to opt out of Google Analytics specifically, you can do so here: Opt out of Google Analytics
How to delete cookies in your browser
Cookies that you have previously accepted can be deleted via your browser settings. The procedure depends on which browser and device you are using.
Changing your consent
You can change or withdraw your consent at any time by reopening the cookie settings via the link or icon at the bottom of the website.
Do you have any questions?
If you have any questions about our use of cookies or processing of personal data, please feel free to contact us at [email protected].