NIS2 / NIS2-aligned
CYSECWATCH
Continuous cybersecurity compliance for organisations in scope of the NIS2 directive: evidence collection, deterministic risk derivation, and regulator-ready reporting.
Evidence ingest
Tenant-scoped Collector pipeline turns asset, identity, exposure and configuration signals into auditable runs.
Deterministic findings
Discovery, identity, vulnerability and configuration analyzers produce findings without LLM-driven compliance decisions.
Regulator output
Versioned Markdown reports and an immutable audit log for every assessment run.
Access
This is the public landing for the platform. Tenant workspaces live on their own hostnames — sign in via the URL provided to your organisation.