Skip to content
NIS2 Compliance

NIS2 affects your company. Find out in 30 seconds.

And in 4 more seconds, see what is already exposed. From affected-check to live domain scan to verified compliance — in one flow.

Based on BSI decision tree·GDPR compliant·Hosted in Frankfurt

Understanding NIS2

What is NIS2 and why does it matter?

The EU directive 2022/2555 creates binding cybersecurity requirements for thousands of companies in Germany.

What is NIS2?

NIS2 (EU Directive 2022/2555) is the most significant EU cybersecurity regulation to date. The German implementation (NIS2UmsuCG) requires affected companies to implement comprehensive security measures, report incidents within 24/72 hours, and demonstrate compliance to the BSI.

Who is affected?

Companies in 18 critical sectors with 50+ employees or €10M+ revenue. This includes energy, healthcare, transport, digital infrastructure, manufacturing, food, chemicals, and more. CEO personal liability applies.

Consequences

Fines up to €10M or 2% of global revenue for essential entities. Personal CEO liability for negligence. 24-hour initial notification, 72-hour incident report. BSI audits and supervision.

Interactive Check

Are you affected by NIS2?

Find out in under 60 seconds — anonymous, no personal data required.

Step 120%

Is your company a qualified trust service provider, TLD registry, or DNS service provider?

These roles are directly classified as essential entities regardless of company size.

Platform Capabilities

What Tinte automatically shows

Six intelligence modules that map to NIS2 Art. 21 requirements. No setup. No agent. One domain. 4 seconds.

ATTACK SURFACE

Attack Surface Discovery

Every exposed subdomain, open port, and known vulnerability — mapped before an attacker finds them.

CREDENTIALS

Credential Exposure

Breached employee passwords and stolen credentials linked to your domain, with breach source context.

EMAIL SECURITY

Email Security Analysis

SPF, DKIM, DMARC assessment with clear risk grade and actionable findings against spoofing and phishing.

VULNERABILITIES

CVE Assessment

Known vulnerabilities on exposed services with CVSS scores, CISA KEV exploit status, and affected assets.

ATTACK CHAIN

Attack Chain Analysis

MITRE ATT&CK mapping of findings to techniques and potential business impact — ransomware, takeover, lateral movement.

INDUSTRY DATA

Industry Threat Landscape

How your sector is being targeted — with real attack trends and claims data from Coalition and Verizon DBIR.

No setup. No agent. One domain name. 4 seconds.

See what attackers see.

Get your Intelligence Report: exposed assets, leaked credentials, vulnerabilities, attack chains — from an attacker's perspective.

10 €one-time payment
Get Your Report — €10

No subscription. Full report within 6 hours. Payment via Stripe.

Prefer a guided experience?

We scan for you — contact us

NIS2 Compliance Mapping

How Tinte maps to NIS2 Art. 21

All 10 risk management requirements — and how our platform helps you demonstrate compliance.

NIS2 Art. 21 RequirementWhat Tinte ChecksHow It Verifies
(a) Risk analysis & IT security policiesExternal attack surface assessmentAutomated scan of all public-facing assets, ports, and services
(b) Incident handlingBreach & credential monitoringContinuous monitoring of breach databases and dark web sources
(c) Business continuity & crisis managementInfrastructure resilience checkDNS redundancy, backup MX records, service availability assessment
(d) Supply chain securityThird-party exposure analysisScanning shared infrastructure, cloud services, and vendor domains
(e) Security in system procurement & developmentCVE vulnerability assessmentKnown CVEs on exposed services with CVSS scoring and exploit status
(f) Effectiveness assessment of measuresContinuous re-scanning & trendingPeriodic automated scans with before/after comparison reports
(g) Cyber hygiene & trainingCredential exposure & phishing readinessEmployee credential leak detection, email security posture (SPF/DKIM/DMARC)
(h) Cryptography & encryption policiesTLS/SSL certificate analysisCertificate validity, protocol versions, cipher suite assessment
(i) HR security, access control, asset managementExposed credential & access analysisBreached passwords, exposed admin panels, unauthorized access points
(j) Multi-factor authentication & secured communicationsAuthentication & email security assessmentEmail authentication checks (DMARC enforcement), exposed login portals
AI-POWERED COMPLIANCE

The NIS2 Compliance Agent is live.

Automatic assessment against Art. 21(2) — all 10 technical and organisational measures — using your real Tinte scan data.

Breach Exposure

Incident & Vulnerability Handling

Art 21(2)(i)(j)

Email Posture

Human & Access Security

Art 21(2)(g)

Attack Surface

Risk & Asset Management

Art 21(2)(e)(d)

Vulnerabilities

Patch & Supply Chain Security

Art 21(2)(e)(f)

Evidence-based. Continuous. From your real scan data.

Start NIS2 Agent

Beyond the Scan

Find it. Fix it. Proof it.

Three steps from exposure to compliance evidence — scan, remediate, prove.

01

Find It

Automated external scan: attack surface, breaches, email security, CVEs. Results in seconds.

02

Fix It

Internal assessment, penetration testing, and prioritized remediation with concrete timelines.

03

Proof It

AI compliance agents, retests, BSI registration, and audit-ready reports.

10-Week Plan

Your path to NIS2 compliance

What happens when you start — a concrete timeline from kickoff to BSI registration.

Week 1–2

Kickoff & External Scan

Scoping call, domain scan, initial threat assessment. Identify immediate exposures.

Week 3–4

Internal Assessment

Structured dialog or technical assessment: vulnerability scan, policy review, access controls.

Week 5–6

Gap Analysis

Map findings to NIS2 Art. 21 requirements. Identify compliance gaps and priorities.

Week 7–8

Remediation Planning

Prioritized action plan with concrete measures, responsible owners, and deadlines.

Week 9–10

Implementation & BSI Registration

Execute critical remediations. Prepare documentation. Register with BSI. Ongoing monitoring begins.

Pricing

Plans built for NIS2

Start with automated scanning. Scale with consulting when you need it.

Team

€650/month

External scanning and monitoring for small teams.

  • Up to 5 domains monitored
  • NIS2 compliance dashboard
  • Monthly threat briefings
Get Started
Most Popular

Business

€1,000/month

Full platform access with consulting support.

  • Up to 25 domains monitored
  • Priority consulting support
  • Quarterly compliance review
Get Started

Enterprise

Custom

Tailored for large organizations with complex requirements.

  • Unlimited domains
  • Dedicated security advisor
  • Full NIS2 implementation support
Get Started
NIS2 Workflow Add-on: €200/month (included in Team & Business)

FAQ

Frequently asked questions about NIS2

15 minutes. One conversation. We scan your domain live.

See what is exposed, understand your NIS2 obligations, and get a concrete action plan.

team@tinte.io · intel.tinte.io

We use cookies and similar technologies to analyze site usage and improve your experience. Privacy Policy