NIS2 affects your company. Find out in 30 seconds.
And in 4 more seconds, see what is already exposed. From affected-check to live domain scan to verified compliance — in one flow.
Understanding NIS2
What is NIS2 and why does it matter?
The EU directive 2022/2555 creates binding cybersecurity requirements for thousands of companies in Germany.
What is NIS2?
NIS2 (EU Directive 2022/2555) is the most significant EU cybersecurity regulation to date. The German implementation (NIS2UmsuCG) requires affected companies to implement comprehensive security measures, report incidents within 24/72 hours, and demonstrate compliance to the BSI.
Who is affected?
Companies in 18 critical sectors with 50+ employees or €10M+ revenue. This includes energy, healthcare, transport, digital infrastructure, manufacturing, food, chemicals, and more. CEO personal liability applies.
Consequences
Fines up to €10M or 2% of global revenue for essential entities. Personal CEO liability for negligence. 24-hour initial notification, 72-hour incident report. BSI audits and supervision.
Interactive Check
Are you affected by NIS2?
Find out in under 60 seconds — anonymous, no personal data required.
Is your company a qualified trust service provider, TLD registry, or DNS service provider?
These roles are directly classified as essential entities regardless of company size.
Platform Capabilities
What Tinte automatically shows
Six intelligence modules that map to NIS2 Art. 21 requirements. No setup. No agent. One domain. 4 seconds.
Attack Surface Discovery
Every exposed subdomain, open port, and known vulnerability — mapped before an attacker finds them.
Credential Exposure
Breached employee passwords and stolen credentials linked to your domain, with breach source context.
Email Security Analysis
SPF, DKIM, DMARC assessment with clear risk grade and actionable findings against spoofing and phishing.
CVE Assessment
Known vulnerabilities on exposed services with CVSS scores, CISA KEV exploit status, and affected assets.
Attack Chain Analysis
MITRE ATT&CK mapping of findings to techniques and potential business impact — ransomware, takeover, lateral movement.
Industry Threat Landscape
How your sector is being targeted — with real attack trends and claims data from Coalition and Verizon DBIR.
No setup. No agent. One domain name. 4 seconds.
See what attackers see.
Get your Intelligence Report: exposed assets, leaked credentials, vulnerabilities, attack chains — from an attacker's perspective.
No subscription. Full report within 6 hours. Payment via Stripe.
Prefer a guided experience?
We scan for you — contact usNIS2 Compliance Mapping
How Tinte maps to NIS2 Art. 21
All 10 risk management requirements — and how our platform helps you demonstrate compliance.
| NIS2 Art. 21 Requirement | What Tinte Checks | How It Verifies |
|---|---|---|
| (a) Risk analysis & IT security policies | External attack surface assessment | Automated scan of all public-facing assets, ports, and services |
| (b) Incident handling | Breach & credential monitoring | Continuous monitoring of breach databases and dark web sources |
| (c) Business continuity & crisis management | Infrastructure resilience check | DNS redundancy, backup MX records, service availability assessment |
| (d) Supply chain security | Third-party exposure analysis | Scanning shared infrastructure, cloud services, and vendor domains |
| (e) Security in system procurement & development | CVE vulnerability assessment | Known CVEs on exposed services with CVSS scoring and exploit status |
| (f) Effectiveness assessment of measures | Continuous re-scanning & trending | Periodic automated scans with before/after comparison reports |
| (g) Cyber hygiene & training | Credential exposure & phishing readiness | Employee credential leak detection, email security posture (SPF/DKIM/DMARC) |
| (h) Cryptography & encryption policies | TLS/SSL certificate analysis | Certificate validity, protocol versions, cipher suite assessment |
| (i) HR security, access control, asset management | Exposed credential & access analysis | Breached passwords, exposed admin panels, unauthorized access points |
| (j) Multi-factor authentication & secured communications | Authentication & email security assessment | Email authentication checks (DMARC enforcement), exposed login portals |
The NIS2 Compliance Agent is live.
Automatic assessment against Art. 21(2) — all 10 technical and organisational measures — using your real Tinte scan data.
Breach Exposure
Incident & Vulnerability Handling
Art 21(2)(i)(j)
Email Posture
Human & Access Security
Art 21(2)(g)
Attack Surface
Risk & Asset Management
Art 21(2)(e)(d)
Vulnerabilities
Patch & Supply Chain Security
Art 21(2)(e)(f)
Evidence-based. Continuous. From your real scan data.
Start NIS2 AgentBeyond the Scan
Find it. Fix it. Proof it.
Three steps from exposure to compliance evidence — scan, remediate, prove.
Find It
Automated external scan: attack surface, breaches, email security, CVEs. Results in seconds.
Fix It
Internal assessment, penetration testing, and prioritized remediation with concrete timelines.
Proof It
AI compliance agents, retests, BSI registration, and audit-ready reports.
10-Week Plan
Your path to NIS2 compliance
What happens when you start — a concrete timeline from kickoff to BSI registration.
Kickoff & External Scan
Scoping call, domain scan, initial threat assessment. Identify immediate exposures.
Internal Assessment
Structured dialog or technical assessment: vulnerability scan, policy review, access controls.
Gap Analysis
Map findings to NIS2 Art. 21 requirements. Identify compliance gaps and priorities.
Remediation Planning
Prioritized action plan with concrete measures, responsible owners, and deadlines.
Implementation & BSI Registration
Execute critical remediations. Prepare documentation. Register with BSI. Ongoing monitoring begins.
Pricing
Plans built for NIS2
Start with automated scanning. Scale with consulting when you need it.
Team
External scanning and monitoring for small teams.
- ✓Up to 5 domains monitored
- ✓NIS2 compliance dashboard
- ✓Monthly threat briefings
Business
Full platform access with consulting support.
- ✓Up to 25 domains monitored
- ✓Priority consulting support
- ✓Quarterly compliance review
Enterprise
Tailored for large organizations with complex requirements.
- ✓Unlimited domains
- ✓Dedicated security advisor
- ✓Full NIS2 implementation support
FAQ
Frequently asked questions about NIS2
15 minutes. One conversation. We scan your domain live.
See what is exposed, understand your NIS2 obligations, and get a concrete action plan.
team@tinte.io · intel.tinte.io