NIS2 for utilities: a practical connectivity checklist
Effective NIS2 compliance for utilities: A practical checklist to secure and manage connected assets, focusing on identity, access control, monitoring, supply chain, and incident response.
You’ve proved the product at home. Your machines send useful telemetry, take remote updates, and your service team solves issues faster. Then a distributor from another country asks for 500 units. Brilliant. And then the questions start: Will it connect in a basement café? What about roaming rules? Are data costs going to spike? How will support see what’s happening when a machine is silent?
There is always some pain when going from a successful local roll-out to scaling to other countries, maybe even several different countries. In professional coffee, connected is now the norm, not a novelty. And we see this at Host Milan every edition: a local hero brand finds new distributors, then needs coverage, roaming and security that work in multiple countries. The same pattern shows up in other connected HORECA devices too, like beverage dispensers, vending etc. Largely the connectivity playbook is the same, so read on.
So what are the things you should know and care about when choosing a connectivity partner for cross-country scaling? Let's map it out.
Most coffee machines don’t sit by a window. They hide in stainless cabinets, busy kiosks, shopping centres and train stations. There’s metal, electrical noise and a lot going on.
Multi-network access in every country. Let each SIM pick the strongest signal automatically, not just the “default” network.
Antenna options for tricky installs.
Plan for antenna options with your hardware vendor. Your connectivity partner should help validate the choice with field tests and RF diagnostics.
Store-and-forward built in. If coverage dips during the morning rush, buffer non-critical data and send it later.
Ask your Connectivity provider
Can we access more than one operator per country with automatic failover?
Can we see a history of cells and networks for problem sites?
A handful of markets push back on long-term roaming. Discovering that mid-deployment can stall installs, annoy customers, and burn time you don’t have.
Use eSIM or multi-IMSI from day one. If a country doesn’t allow long-term roaming, you can switch that device to a local network profile remotely and avoid site visits.
Keep a simple register. Note which batches use which profiles so renewals and audits don’t turn into detective work.
Ship with a “bootstrap” profile. Every unit leaves the factory with a safe, global setting that lets it call home on first power-up, then it automatically pulls the right local profile for where it’s installed.
Red flags
A global operator with no way to swap profiles.
Vague “should be fine” answers about roaming in specific countries.
Usage in espresso or other HORECA fleets is spiky. One site uploads detailed diagnostics; another just sends counters. Separate data bundles by country almost always create waste in one place and overage somewhere else.
A single global pool across all SIMs and markets. All your SIMs share the data pool which means those who need more get it, and those that don't use a lot share with the others.
Lifecycle states: Your SIMs are tagges as "test", "active" and "parked" so demo units and spare stock don’t rack up the same costs as live machines.
Clear, fair alerts so you catch odd usage without a nasty bill.
Why it helps
Operations get fewer alarms and simpler dashboards to monitor SIMs.
Finance gets predictable cost per cup, not guesswork.
Having your machines connected and online gives instant value. You see that fast when support can diagnose and fix issues remotely, without a site visit.
Remote everything. Configuration, firmware, certificates and soft resets should all be able to do online.
Easy first-boot. Power on → connect → pull policy → register to your cloud, with no manual steps.
Real-time visibility. Your connectivity platform (CMP) should show live SIM status, last contact, route and usage — and expose it all via API so your service desk can see it inside your own tools.
A simple triage flow
Is the SIM registered, and on which network?
When did we last receive data, and how much?
Is the device following the approved policy (hostnames and ports)?
Can we trigger a controlled reconnect or profile swap?
Buyers in hospitality, especially chains, malls and airports, now ask smart questions about exposure. Good. Here is a simple model that covers your security needs.
Private first. Keep device traffic off the public internet. An example is our SecureNet that routes data over a private APN or straight into your cloud (AWS, Azure, GCP), so data only flows where you’ve decided.
Only what’s needed. Approve the few services your machines must reach (updates and your data hub) and keep everything else closed by default. A simple, real-world take on a zero trust approach to IoT security.
The machine starts it, and it’s checked every time. Support sessions are device-initiated, with no exposed inbound services. With our Zero Trust add-on, each session is verified and limited to just what’s needed.
Result
You reduce the attack surface, make audits easier, and shorten procurement cycles.
Connectivity shouldn’t be the line on the invoice everyone dreads. You’re scaling; your contract should too.
Pooled pricing. One pot of data across your fleet, with sensible fair-use and clear, honest overage rules.
Sleep or park states. Pause costs for seasonal sites, demos and spare stock until they go live.
Easy geography. Add or remove countries without reopening the whole contract.
Watch-outs
No surprise text-message charges. Don’t pay over the odds for OTA updates or routine pings.
Long notice periods. Simple plan changes shouldn’t need months of notice or a fresh round of paperwork.
One SIM, global reach and pool. Multi-network access across regions with a single global data pool for predictable costs.
CMP with real-time control. See SIM health, routes and usage; integrate via API into your service tools.
SecureNet (optional). Private APN/VPN or direct-to-cloud paths to keep traffic off the public internet.
Zero Trust (optional). Per-device, per-session verification for fleets that need stricter controls.
Prefer to keep your current MQTT broker and cloud stack? No problem. We route directly to AWS, Azure or GCP and enforce policy at the edge.
Everything above also maps neatly to vending, water dispensers and ovens. They all meet much of the same challenges: tough sites, roaming nuances, private routing, pooled data and strong visibility.
Related articles
Effective NIS2 compliance for utilities: A practical checklist to secure and manage connected assets, focusing on identity, access control, monitoring, supply chain, and incident response.
Learn the most cost-efficient way to manage large IoT SIM fleets. Discover how data pooling, CMP tools, and multi-network SIMs cut costs and simplify global IoT deployments.
Learn how IoT eSIM (SGP.31/32) differs from consumer eSIM. A clear guide for technical decision-makers.