Visitor Management
Read more about Visitor Management
Lend & Lease Management
Read more about Lend & Lease Management
Mailroom Management
Read more about Mailroom Management
Global and multi-site
One solution across entrances, locations, and countries.
Unstaffed reception desks
visitor management locked and unstaffed entrances and reception areas.
Multi-tenant Buildings
Security, compliance, and professional visitor management organizations.
Critical Infrastructure
How do the NIS2 and CER Directives affect companies that are part of the country’s critical infrastructure?
Financial Companies
Ensure compliance with regulatory requirements, standards, and compliance through digital visitor registration.
Food & Pharmaceuticals
When safety, traceability, and documentation are essential.
Utility companies
Visitor Registration in Utility Companies
Because compliance, adherence to ISO standards, safety, and documentation are of the utmost importance.
December 17, 2025
January 13, 2026
July 9, 2025
The NIS2 and CER Directives tighten the requirements for digital and physical security at the country’s utility companies. As a result, the registration, handling, and documentation of visitors have become a central and crucial part of these companies’ security systems.
Utilities that operate some of society’s most critical functions—energy, water, heating, and waste management—are facing stricter requirements for digital and physical security under regulations such as the NIS2 and CER directives.
Many organizations have everything under control when it comes to employees, but visitors are often an oversight in security efforts. If visitors are registered manually or inconsistently across locations or entrances, this poses a real security and compliance risk.
With external parties such as contractors, technicians, consultants, suppliers, and government agencies moving in and out of production areas, equipment rooms, and other critical facilities on a daily basis, visitor registration is visitor registration merely an administrative formality. It is a key layer of security and a concrete part of the effort to comply with the NIS2 and CER directives.
Every utility company should be able to answer the following at any time:
Because utility companies deal with many different types of visitors, it is important that the solution can handle various visitor check-in processes tailored to different visitor profiles, such as:
This provides both legal documentation and a clear safety culture in which responsibility is clearly assigned—before the door or gate is opened.
With a digital solution like BmyGuest Visitor Management, the company gains a real-time overview and a historical, time-stamped log of all visitors, enabling it to demonstrate that it actively manages visitor access to facilities and areas.
The result is a clear overview and full control, right down to the smallest pumping station.
In a world of increasing regulatory requirements, it is important to have processes and documentation in place. Responsibility and ownership typically lie with the IT or security department, and the documentation must be:
A modern solution like BmyGuest Visitor Management offers:
This is the type of documentation that authorities expect to see during audits, incidents, and investigations.
Visitor registration achieves its full potential when seamlessly integrated into the organization's comprehensive security framework.
BmyGuest Visitor Management is designed for integration, not to create new silos, and supports, among other things:
The result is straightforward: A system that enhances your existing capabilities.
When registration is directly linked to access control, it ensures that visitors only move within the zones they are authorized to enter.
A repair technician is not allowed access to the executive corridor. An auditor is not allowed access to technical areas.
Modern visitor registration solutions are much more than just a digital logbook.
They play an active role in physical security and support, among other things:
Visitor registration the most complex IT system in a utility company’s IT arsenal. But it is often the first - and most important - checkpoint when outsiders enter the organization.
When implemented correctly, it creates value across the organization while enabling the company to handle guest data in compliance with the GDPR, NIS2, and CER directives:
In an industry where security is non-negotiable, access control is not just a nice-to-have.
It’s a requirement. And that’s exactly what BmyGuest is designed to address.
Contact us for a brief, no-obligation discussion about your current setup and needs. If our solutions meet your needs, we’ll schedule a meeting—and if not, you’ll have gained some valuable insights along the way.
We will get back to you as soon as possible.
We use cookies and similar technologies to ensure the functionality of the website, improve the user experience, compile statistics, and for marketing purposes. You can read more about how we use cookies and similar technologies, as well as how we process your personal data, in our cookie policy.
If you have any questions about our data processing or your rights, you are always welcome to contact our Data Protection Officer.
Service
BmyGuest Cookie Information
Privacy Policy
See privacy policy
Name
BMGCookieConsent
Purpose
Records and documents the user's consent choices in accordance with applicable data protection and ePrivacy regulations.
Expiration
Up to 12 months
Cloudflare (security and bot protection)
radar_sn_shradar_sn_sgradar_sn_rsradar_sn_pedradar_sn_de
Protects the website from automated abuse, bot traffic, and unauthorized attacks.
Session or short-term storage
Weglot
WG_CHOOSE_ORIGINALweglot_allow_private
Saves the user's language selection and ensures correct display of translated or original content.
WordPress (consent management)
wp_consent_functionalwp_consent_marketingwp_consent_preferenceswp_consent_statisticswp_consent_statistics-anonymous
Saves the user's choices regarding cookie categories and controls which scripts may be activated.
WordPress (login & security)
wordpress_logged_in_*wordpress_sec_*wordpress_test_cookie
Handles login, session management, and protects against unauthorized access.
Session lasting approx. 14 days
WordPress (administration)
wp-settings-*wp-settings-time-*
Stores backend settings such as layout and display options.
Up to 1 year
Mouseflow
mf_usermf_*
Analyzes user behavior such as clicks, scrolling, and navigation.
Google Analytics (Google LLC)
_ga_ga_EQDN3BWDSD_ga_BCZ3DEJXBW
Collects statistical information about the use of the website.
Up to 24 months
Google
g_state
Handles session state in connection with Google integrations.
Up to 6 months
LinkedIn (LinkedIn Corporation)
bcookieli_gclidc
Supports LinkedIn Insight Tag and campaign measurement.
1 day to 12 months depending on the cookie
Snitcher
snitcher_device_idsnitcher_device_id_expiressnitcher_sessionsnitcher_session_expires
Identifies and analyzes company visits and user journeys.
Session up to 12 months depending on cookie
What is a cookie?
A cookie is a small text file that is stored on your computer, tablet, or mobile phone when you visit a website. Cookies are widely used to make websites work, improve the user experience, and provide the website owner with information about how the site is used. A cookie is not a program and cannot contain viruses or other malicious code.
Use of cookies on the website
We use cookies to ensure that the website functions correctly and to improve your user experience. Cookies can be used, among other things, to remember your choices, such as language settings, consent choices, and technical preferences.
In addition, we use statistical cookies to analyze how the website is used, so that we can optimize its functionality, structure, and content. In some cases, cookies are also used for business-related communication and campaign measurement.
You can see a detailed overview of the cookies we use, including their purpose and expiration time, under the categories: Necessary, Functional, Statistical, and Marketing.
How long are cookies stored?
How long a cookie is stored on your device depends on the individual cookie. Some cookies are automatically deleted when you close your browser (session cookies), while others are stored for a longer period of time.
The lifetime of each cookie is specified in our cookie overview. The storage period is calculated from your most recent visit to the website.
How to reject or delete cookies
You can change or withdraw your consent at any time by clicking on the cookie icon or the link at the bottom of the website.
You can also block or delete cookies via your browser settings. Please note, however, that if you reject necessary cookies, certain features on the website may not function properly.
If you wish to opt out of Google Analytics specifically, you can do so here: Opt out of Google Analytics
How to delete cookies in your browser
Cookies that you have previously accepted can be deleted via your browser settings. The procedure depends on which browser and device you are using.
Changing your consent
You can change or withdraw your consent at any time by reopening the cookie settings via the link or icon at the bottom of the website.
Do you have any questions?
If you have any questions about our use of cookies or processing of personal data, please feel free to contact us at [email protected].