News

Zero Trust for the Real World: Why Complex NAC Systems Fail and How a Pragmatic Approach Changes the Game

News | 28.08.2025

Introduction: A Paradigm Shift for Industry

In the contemporary geopolitical landscape, the global digital economy faces a persistent, low-grade cyber conflict. This stark reality fundamentally transforms the nature of cybersecurity. It is no longer a siloed IT function concerned with technical vulnerabilities but has evolved into a fundamental pillar of national economic security and corporate survival. For business leaders, particularly within the vital manufacturing sector, this new era demands a radical shift in perspective—from reactive defense to proactive resilience.

The European Union's Directive on Security of Network and Information Systems (NIS2) serves as the primary catalyst for this transformation. Far from being another layer of bureaucratic compliance, the NIS2 Directive is a strategically vital framework engineered for this new reality of heightened and persistent threats. It provides a mandatory blueprint for building the operational resilience necessary not just to survive but to thrive amidst escalating digital risks. The directive's stringent requirements, particularly regarding management liability and supply chain security, are designed to integrate cybersecurity into the core of corporate governance and strategy.

This report is intended to guide business leaders through this paradigm shift. It will deconstruct the complex threat landscape facing industries and demonstrate how the perceived burden of NIS2 compliance can be transformed into a tangible competitive advantage. By moving beyond a narrow focus on potential fines, this analysis will illuminate a clear path from understanding the multifaceted threats to implementing a robust, technology-driven, and partnership-based solution, ultimately forging a more secure and resilient enterprise.

Section 1: The New Frontline: The Escalating Cyber-Threat Landscape

The imperative to build robust cyber resilience is not an abstract strategic goal for companies; it is a direct response to a clear and present danger. An analysis of the current threat landscape reveals that certain regions are disproportionately targeted by sophisticated cyber adversaries. This external pressure is dangerously amplified by specific vulnerabilities within the industrial sector and a pervasive lack of internal preparedness, creating a uniquely challenging environment.

1.1. Analyzing the Position as a Global Cyber Hotspot

Recent data paints an alarming picture of the global cyber threat arena. In the first half of 2025, some regions ranked first globally in the number of detected ransomware attacks, accounting for a staggering 6% of all incidents worldwide—a figure that surpasses even the United States. This is not an isolated statistical anomaly but a sustained trend. Since the escalation of geopolitical conflict in 2022, certain areas have consistently been among the most cyber-attacked in the world. This high volume of malicious activity is inextricably linked to the geopolitical context. State-sponsored and state-affiliated threat actors are actively and systematically targeting government entities, critical infrastructure, and private companies. These are not random acts of cybercrime; they are calculated components of a broader hybrid warfare strategy aimed at destabilizing key economic regions. The deliberate drone attack on an industrial factory serves as a chilling case study, demonstrating that industrial assets are no longer just collateral damage but can be direct targets in this conflict. This geopolitical reality means that for any significant enterprise, cybersecurity is now an integral part of its overall risk management strategy.

1.2. The Manufacturing Sector: A High-Value, High-Vulnerability Target

Within this high-threat environment, the manufacturing sector—particularly in industrial heartlands—has emerged as a prime target. The reason is twofold: the sector's critical importance to regional and global economies makes it a high-value target for disruption, and its unique technological landscape renders it highly vulnerable. The ongoing digital transformation and adoption of Industry 4.0 principles have led to a deep convergence of Information Technology (IT) and Operational Technology (OT) networks. While this convergence unlocks immense efficiencies, it also creates a vast and complex attack surface that is difficult to secure. Each new robotic arm, PLC (Programmable Logic Controller), or internet-connected sensor added to the factory floor represents a potential new ingress point for an attacker. These OT environments are rife with specific vulnerabilities that malicious actors are keen to exploit. Many industrial networks rely on legacy hardware and software that are no longer supported with security patches, operate with misconfigured security settings, and use industrial communication protocols that lack modern authentication and encryption features. The consequences of a successful cyberattack on an OT environment are far more severe than a typical IT breach. An attack can move beyond data theft to trigger catastrophic physical outcomes, including production halts, damage to expensive machinery, sabotage of product quality, and even significant environmental or human safety incidents. The financial materiality of factory downtime is now so significant that it is becoming a required disclosure in annual reports, elevating OT cybersecurity from a niche engineering concern to a board-level financial and operational risk.

1.3. The Internal Threat Multiplier: Why Companies Are at Heightened Risk

The intense external threat environment is dangerously compounded by significant internal weaknesses within many organizations. These internal factors act as a threat multiplier, lowering the bar for attackers and increasing the probability of a successful breach. An alarming report indicates that only 59% of businesses utilize basic security software, meaning over a third operate without this fundamental layer of protection. This technological gap is magnified by a critical deficiency in the "human firewall." Cybersecurity awareness among employees is worryingly low. A recent study found that only 19% of employees understand the term "ransomware," compared to 78% who recognize identity theft. This lack of awareness is a direct result of inadequate training, as over half (52%) of employees have not received any cybersecurity training in the past five years. This makes them highly susceptible to the increasingly sophisticated social engineering and phishing campaigns being deployed by adversaries. One such technique, "ClickFix," which surged by 517% in late 2024 and early 2025, utilizes fake error messages that mimic familiar tools like Microsoft Teams to trick users into running malicious scripts, thereby bypassing technical controls through human error. Finally, these issues are exacerbated by a national shortage of skilled cybersecurity professionals. Some estimates suggest a deficit of around 50,000 IT professionals, with nearly 20% of that gap being in cybersecurity specializations. This talent shortage makes it exceedingly difficult for companies, particularly small and medium-sized enterprises (SMEs), to recruit and retain the expertise necessary to build and maintain an effective defense against modern threats, creating a dangerous and persistent "expertise gap."

The convergence of a hostile geopolitical environment, the inherent vulnerabilities of converged IT/OT systems, and significant internal weaknesses has created a uniquely perilous situation for the manufacturing sector. The threat is not abstract or singular; it is targeted, persistent, and amplified by a lack of internal preparedness. The risk to a manufacturing firm is not just a function of one of these factors, but the multiplicative effect of all three. A geopolitical motive finds a technical vulnerability that is then exploited via a human weakness. This complex reality dictates that cybersecurity can no longer be delegated as a purely technical function. It must be treated as a core component of geopolitical risk management, operational continuity, and human capital strategy, as a failure in one area can cascade into a catastrophic failure of the entire enterprise.

Section 2: The NIS2 Directive: From a Compliance Checklist to a Resilience Catalyst

Faced with this escalating and multifaceted threat landscape, the European Union has responded with the NIS2 Directive, a landmark piece of legislation that fundamentally redefines cybersecurity obligations for critical sectors. For companies, particularly those in manufacturing, it is crucial to view NIS2 not as a punitive compliance exercise but as a strategic framework for building genuine, sustainable resilience. The directive's core tenets—especially those concerning management liability and supply chain security—are designed to catalyze a profound cultural and operational transformation, elevating cybersecurity to its rightful place as a cornerstone of modern corporate governance.

2.1. Deconstructing the Four Pillars of NIS2

The NIS2 Directive is based on four foundational pillars that collectively form a comprehensive framework for cyber resilience. These are:

  • Risk Management: Entities must adopt an "all-hazards" approach, implementing appropriate and proportionate technical, operational, and organizational measures to manage the risks posed to their network and information systems. This includes, at a minimum, policies on risk analysis, incident handling, supply chain security, access control, and the use of encryption.
  • Corporate Accountability: In a significant departure from previous regulations, NIS2 places direct responsibility on the shoulders of senior leadership. Management bodies are required to approve, oversee, and be trained on cybersecurity risk-management measures.
  • Reporting Obligations: The directive mandates a strict, multi-stage incident reporting process. A preliminary "early warning" must be submitted to the relevant national authority (CSIRT) within 24 hours of becoming aware of a significant incident, followed by a more detailed notification within 72 hours, and a final report within one month.
  • Business Continuity: Organizations must plan for how they will maintain or restore essential functions during and after a major cyber incident. This includes requirements for robust backup management, disaster recovery plans, and crisis management procedures to ensure operational resilience.

NIS2 significantly expands upon its predecessor, NIS1, by broadening its scope to include new sectors classified as "important" or "essential," such as the manufacturing of critical products like pharmaceuticals, chemicals, and electronic devices. This expansion, combined with more rigorous and harmonized standards across all EU member states, signals a clear intent to create a uniformly high level of cybersecurity across the Union's economic backbone.

"Perhaps the most transformative element of the NIS2 Directive is its focus on corporate accountability. The legislation explicitly states that management bodies can be held personally liable for an organization's failure to comply."

2.2. The Accountability Engine: Why NIS2 Puts Cybersecurity in the Boardroom

The potential consequences for non-compliant executives extend far beyond corporate fines. National authorities are empowered to issue temporary prohibitions, banning individuals such as CEOs or legal representatives from exercising managerial functions within the company. This provision elevates the stakes dramatically, making cybersecurity a matter of personal professional risk for the C-suite. The direct line of accountability forces cybersecurity to be treated with the same diligence and rigor as financial reporting and operational risk management. It can no longer be delegated and forgotten; it must be understood, governed, and overseen at the highest level of the organization. This shift transforms cybersecurity from a "cost of doing business" to be minimized into a fundamental component of corporate governance and fiduciary duty, essential for protecting both the company and its leadership.

2.3. Fortifying the Ecosystem: A Deep Dive into Article 21 and Supply Chain Security

NIS2 recognizes that in a deeply interconnected economy, an organization's security is only as strong as its weakest link. Article 21 of the directive codifies this reality by placing significant emphasis on supply chain security. Entities are now legally mandated to manage the cybersecurity risks inherent in their relationships with direct suppliers and service providers. This requires them to assess the specific vulnerabilities of each supplier and evaluate the overall quality of their cybersecurity practices and products. The business impact of this provision is profound. A company's own NIS2 compliance is now inextricably linked to the security posture of its entire digital ecosystem. A vulnerability exploited at a third-party software provider, a cloud service, or even a maintenance contractor can trigger a significant incident, leading to a compliance failure and severe penalties for the primary organization. This mandate forces a fundamental shift in procurement and vendor management. Decisions can no longer be based solely on cost and functionality; they must now incorporate a rigorous assessment of cybersecurity and resilience. This creates a cascading effect, compelling suppliers to elevate their own security standards to remain competitive, ultimately fostering a more secure and trustworthy business ecosystem for all participants.

Section 3: Mastering the Converged IT/OT Environment: A Foundational Step for NIS2

For the manufacturing sector, the path to NIS2 compliance runs directly through the factory floor. The directive's mandates for comprehensive risk management, asset control, and incident response cannot be met without first solving the unique and complex security challenges posed by the convergence of Information Technology (IT) and Operational Technology (OT). The technical reality of the modern industrial network and the legal requirements of NIS2 are not separate problems; they are two sides of the same coin, and the solution to one is the key to solving the other.

3.1. Introducing Network Access Control (NAC): The Principle of "See, Segment, Secure"

Network Access Control (NAC) is a foundational security technology specifically designed to address the core challenges of visibility and control in complex, heterogeneous networks. It operates on a simple yet powerful principle: no device should be trusted or granted access to the network until it has been identified, authenticated, and proven to be compliant with security policies. NAC provides the essential capabilities needed to bridge the IT/OT divide and build a secure foundation for NIS2 compliance. Its functions can be broken down into three key areas:

  • See: The first and most critical function of a NAC solution is discovery. It actively and passively scans the network to identify and profile every single device attempting to connect, whether it is a corporate laptop (IT), a PLC on the production line (OT), a building management sensor (IoT), or a contractor's personal device (BYOD). This process eliminates the visibility black hole and creates a comprehensive, real-time asset inventory.
  • Segment: Once a device is identified, the NAC solution enforces access policies to control its behavior. This is the core of network segmentation. Based on pre-defined rules, the NAC can automatically place a device into a specific Virtual LAN (VLAN). For example, an engineering workstation might be placed in a VLAN that allows it to communicate with specific PLCs, while a guest's device is isolated in a VLAN with only internet access. Crucially, if a device is identified as non-compliant or malicious, the NAC can automatically move it to a quarantine VLAN, isolating it from the rest of the network.
  • Secure: The NAC solution acts as the central gatekeeper, ensuring that only authorized and compliant users and devices are granted access to network resources. It enforces the principle of least privilege, meaning each device is given only the minimum level of access required for its function. This dramatically reduces the attack surface and contains the potential impact of a breach.

The primary obstacle to achieving NIS2 compliance in a modern manufacturing environment is the inability to see all assets, control access uniformly across IT and OT domains, and isolate threats without causing widespread production shutdowns. A NAC solution is specifically designed to provide this exact set of capabilities: total asset visibility, granular access control, and automated segmentation. Therefore, implementing NAC is not merely a security upgrade; it is the most direct and effective way to build the technical foundation required to demonstrate NIS2 compliance in a complex industrial setting.

Section 4: A Practical Blueprint for Resilience: Implementing macmon NAC

Understanding the theoretical need for Network Access Control is the first step; selecting and implementing the right solution is the critical next one. For manufacturing companies navigating the dual challenges of IT/OT convergence and NIS2 compliance, the macmon NAC solution stands out as a technology purpose-built for their specific environment. Its vendor-agnostic architecture, ease of use for OT personnel, and comprehensive feature set provide a direct and efficient pathway to building a resilient and compliant network infrastructure.

4.1. Why macmon NAC is Purpose-Built for Industrial Environments

macmon NAC is engineered from the ground up to address the complexities of modern industrial networks. This focus provides several key differentiators that are particularly valuable for the manufacturing sector:

  • Vendor-Agnostic Architecture: Unlike some NAC solutions that work best within a single vendor's ecosystem, macmon NAC is designed to be manufacturer-agnostic. It can integrate and control network hardware from a wide range of vendors, including Cisco, Hirschmann (a Belden brand), and many others. This allows manufacturers to layer robust security onto their existing infrastructure without a costly "rip and replace" strategy.
  • Rapid Deployment and Ease of Use: In an environment where downtime incurs significant financial loss, the speed of implementation is paramount. macmon NAC is known for its rapid deployment, often providing initial visibility and control within days. Its intuitive graphical user interface (GUI) is designed to be accessible to OT engineers who may not have deep IT security knowledge.
  • Deep IT/OT Integration: As part of Belden, a global leader in industrial networking, the macmon solution benefits from a deep understanding of both IT and OT requirements. It is designed to provide comprehensive security for critical infrastructures with a core mission to prevent system failures and production stops.

4.2. Mapping macmon NAC Features to NIS2 Article 21 Requirements

The true value of macmon NAC for manufacturers lies in how its specific features directly map to the risk management measures mandated by Article 21 of the NIS2 Directive. This alignment transforms the solution from a simple security tool into a strategic compliance engine.

NIS2 Article 21 Requirement macmon NAC Feature/Module How it Fulfills the Requirement
Asset Management Topology & Advanced Security Provides a complete, real-time inventory of all IT and OT endpoints connected to the network. It identifies device type, operating system, open ports, and communication patterns, fulfilling the need for a comprehensive asset overview required for risk analysis.
Access Control Policies VLAN Manager, 802.1X, & Core NAC Enforces granular, role-based access control for all users and devices. It uses dynamic VLAN assignment and 802.1X authentication to ensure that each endpoint is granted only the minimum necessary network access (principle of least privilege).
Supply Chain Security Guest Service Creates secure, temporary, and policy-restricted network access for third-party vendors, contractors, and partners, allowing for controlled access to specific resources for a limited time and securing a critical vector of the supply chain.
Incident Handling Advanced Security & Compliance Module Automatically detects anomalous behavior (e.g., MAC spoofing, unauthorized devices) and can immediately isolate a compromised or non-compliant endpoint by moving it to a quarantine VLAN. This provides an automated, immediate response mechanism for incident handling.
Effectiveness Assessment Reporting & Past Viewer Logs all network access events, policy enforcement actions, and detected anomalies, creating a detailed audit trail. The Past Viewer add-on enables the analysis of historical data for forensic investigations, helping to demonstrate due diligence to auditors.
Basic Cyber Hygiene Core NAC & Compliance Module Enforces basic cyber hygiene by preventing unauthorized and potentially insecure devices from connecting to the network. The Compliance module can integrate with other security tools to ensure endpoints meet security standards before granting access.

As the official distributor, Softprom possesses deep expertise in implementing next-generation cybersecurity solutions. Our team is ready to demonstrate how macmon NAC can enhance your security framework with proactive, preventative protection. Request a personalized demo today to see the technology in action.

Section 5: The Strategic Implementation Partner: Accelerating Compliance with Softprom

For many manufacturing companies, the primary obstacles to achieving NIS2 compliance are not a lack of will, but a shortage of specialized expertise and internal resources. The complexity of deploying advanced security solutions like Network Access Control within a sensitive IT/OT environment, coupled with a tight regulatory timeline, makes a "do-it-yourself" approach both risky and inefficient. The solution lies in strategic partnership. Engaging a Value-Added Distributor (VAD) with deep local expertise, a proven track record in cybersecurity, and specific knowledge of the chosen technology is the most effective way to de-risk the project, accelerate compliance, and maximize the return on investment.

Softprom is a leading VAD with a 25-year history and a strong focus on key markets. Crucially, they maintain a physical presence and a dedicated team in major hubs, providing the local knowledge and accessibility that is vital for successful project execution. By synthesizing deep cybersecurity knowledge, specific expertise with macmon NAC, and a full lifecycle of professional services, Softprom offers a uniquely compelling value proposition. This partnership model allows organizations to access enterprise-grade security and compliance capabilities without the prohibitive cost and time required to build a large, specialized internal security team from scratch. It democratizes access to high-level cyber resilience, enabling even medium-sized enterprises to meet their legal obligations and compete on a more secure and stable footing in the global marketplace.

Conclusion: Building the Future-Proof Enterprise

The convergence of a heightened cyber-threat landscape with the strategic imperatives of the NIS2 Directive has irrevocably elevated cybersecurity from a technical necessity to a cornerstone of business resilience and competitive advantage. For manufacturing leaders, the question is no longer if they should invest in a more robust security posture, but how to do so in a way that is effective, efficient, and aligned with both regulatory mandates and long-term business goals. A reactive, check-box approach to compliance is a recipe for failure, offering neither genuine security nor sustainable value.

The path forward requires a clear-eyed, strategic approach that addresses the challenge on two fronts: implementing the right technology and engaging the right partner. The analysis presented in this report demonstrates that this optimal path is both clear and actionable. The combination of macmon NAC's purpose-built capabilities for securing complex, converged IT/OT environments and Softprom's expert implementation, consulting, and support services provides a powerful and integrated solution. By embracing this integrated, strategic approach, manufacturing leaders can move decisively beyond a reactive security posture. They can transform a legal mandate into a foundational element of a more secure, efficient, and globally competitive enterprise. This is the true promise of NIS2: not merely to avoid fines, but to forge the future-proof enterprise, resilient by design and secure by default.