NIS2 Compliance &
Security Operations

We deploy, configure, and manage the security platform — from vulnerability scanning to compliance reporting. AI-driven automation keeps you protected around the clock. Our team is there when you need us.

6,000+
Organisations in NIS2 scope
2026
Enforcement audits begin
24/7
Platform always available

NIS2 is Danish law. Here's what that means for you.

Since July 2025, the NIS2 directive is transposed into Danish law. If your organisation operates in a critical or important sector with 50+ employees or over €10M in revenue, you are in scope — and registration was required by October 2025.

The requirements are concrete: implement appropriate risk management measures, report significant incidents within 24 hours (with full reports in 72), manage supply chain security, and maintain documented evidence of compliance.

The threat landscape underscores why this matters. Denmark's Centre for Cybersecurity (CFCS) has elevated the threat level for critical sectors, and state-sponsored activity targeting Nordic infrastructure continues to increase. These are facts, not forecasts — and they are exactly the kind of risks NIS2 was designed to address.

We deploy and configure the platform for you, and scale our involvement to match your needs — from initial setup and training through to ongoing managed operations.

Energy Water & Wastewater Healthcare Transport Digital Infrastructure Manufacturing Food Production Public Administration Financial Services

What NIS2 requires

Risk management measures — Technical, operational, and organisational controls proportionate to your risk profile

Incident reporting — Early warning within 24 hours, full incident report within 72 hours, final report within one month

Supply chain security — Assess and manage risks from suppliers and service providers

Documented evidence — Demonstrate compliance with audit-ready documentation and evidence trails

Management accountability — Executive liability for gross negligence in security governance (Art. 20)

Non-compliance penalties: Up to €10M or 2% of global revenue for essential entities. Up to €7M or 1.4% for important entities.

The full security operations stack

From threat detection to compliance reporting. We deploy and configure it all — you choose how much ongoing management you need from us.

AI-Powered Threat Detection

Alerts from CheckMK, Wazuh, and other sources are ingested and analysed by AI. Severity scoring, remediation proposals, and MFA-gated execution — with full audit trail.

Network Discovery & Scanning

Automated attack surface discovery with Nmap. Continuous scanning with OpenVAS, ZAProxy, and Nuclei. Findings tracked over time with prioritised remediation guidance.

Security Hardening

Evaluate systems against CIS Benchmarks, NIST CSF 2.0, ISO 27001 Annex A, and PCI DSS. Track maturity progression from baseline to optimised.

Infrastructure Automation

Git-synced playbooks for Linux and Windows. Scheduled execution, tag-based targeting, real-time monitoring — all GPG-signed and fully auditable.

NIS2 Compliance Management

Article-by-article tracking mapped to NIST CSF and ISO 27001. Automated gap analysis, continuous evidence collection, and export-ready audit reports.

Unified Monitoring

Single pane of glass across your CheckMK instances. Alert correlation, ad-hoc investigation queries, and event-driven escalation across your entire estate.

From zero to audit-ready

A structured approach to NIS2 compliance that integrates into your daily operations — not a one-off project that gathers dust.

Article-by-Article Tracking

Map your controls directly to NIS2 articles 20–23. See exactly where you stand on each requirement.

Automated Evidence Collection

Agents continuously collect compliance data from your infrastructure. Evidence is always current, never stale.

AI-Powered Gap Analysis

Identify gaps between your current posture and NIS2 requirements. Get prioritised recommendations for remediation.

Export-Ready Reports

Generate audit-ready compliance reports for your sector authority. Formatted, complete, and backed by evidence.

Framework Mapping

Cross-reference NIS2 requirements with NIST CSF, ISO 27001, and CIS controls. One assessment, multiple frameworks.

Continuous Compliance

Not a one-time checkbox. We continuously monitor and maintain your compliance posture as your infrastructure evolves.

Maps to industry frameworks

NIS2 Directive NIST CSF 2.0 ISO 27001 CIS Benchmarks PCI DSS

Every engagement starts with deployment

We handle setup and configuration on every plan. From there, you choose how much ongoing support you need — from self-service to fully managed.

1

We Deploy & Configure

We deploy agents across your infrastructure — Linux, Windows, or pre-built OVA appliances. Scanners, integrations, and policies configured for your environment.

2

Discover & Baseline

Network discovery, vulnerability scans, and security hardening assessments run automatically. You get a complete picture of your estate and compliance posture.

3

Operate & Scale

AI-driven automation monitors and responds around the clock. Your team has full dashboard access. Scale up our involvement as your needs grow.

Enterprise-grade platform, operational simplicity

Purpose-built for security, auditability, and transparency. You always have full visibility into what the platform is doing.

AI Analysis

Claude and GPT integration for alert analysis, playbook explanation, and compliance recommendations.

MFA-Gated Actions

Remediation actions require Duo MFA approval. No automated change happens without human confirmation.

GPG-Signed Playbooks

Every playbook is cryptographically signed before execution. Agents verify signatures — tampered payloads are rejected.

1Password Integration

Credentials managed through 1Password Connect. Zero secrets in configuration files or environment variables.

Role-Based Access

Microsoft Entra ID integration with 15+ granular permission categories. Read, Write, and Admin per resource type.

Git-Based Configuration

Playbooks and security policies synced from GitHub or GitLab. Version-controlled, reviewable, auditable.

Cloud, on-premise, or both

We deploy where your infrastructure lives. Cloud, on-premise, or both — included on every plan.

Cloud

Dashboard and API run on Cloudflare's global edge network. Zero infrastructure to manage, automatic scaling, built-in DDoS protection.

  • Global edge deployment (Cloudflare Workers)
  • D1 database with automatic backups
  • Zero-trust networking via Cloudflare Tunnels
  • Automatic TLS and DNS management

Hybrid / On-Premise

Pre-built OVA appliances deploy to VMware ESXi in minutes. Purpose-built for environments that require on-premise scanning or air-gapped operation.

  • OVA appliances (Operations, Security, Infrastructure)
  • Air-gapped environment support
  • Pre-installed scanners (OpenVAS, Nmap, Nuclei, ZAProxy)
  • Automatic registration and secure key exchange
100%
Setup Included
18
NIS2 Sectors Covered
4
Scanner Types Integrated
24/7
AI-Powered Analysis

Managed security, clear pricing

Every plan includes full platform access, agent deployment, and our team managing your security operations. Choose the scope that fits.

Essentials

We deploy and configure the platform. Your team operates it day-to-day with our support.

  • Full deployment & configuration
  • Alert monitoring & AI analysis
  • Up to 10 agents
  • Basic hardening benchmarks
  • 24/7 platform access
  • Email support

Enterprise

Full managed operations. We run your security programme end-to-end with dedicated resources.

  • Everything in Professional
  • Unlimited agents
  • On-premise OVA appliances
  • Air-gapped deployment support
  • Custom branding & white-labelling
  • Dedicated account manager
  • SLA-backed support

See how it works for your environment

Book a 30-minute call. We'll look at your infrastructure, discuss your compliance requirements, and show you the platform.