Essential sectors (mandatory)
Energy, transport, banking and financial services, healthcare, drinking-water supply, digital infrastructure (DNS, IXP, TLD), public administration, space.
NIS2 directive compliance for medium and large enterprises in Hungary and across the EU. Audit, risk management, incident handling, technical controls, training. Fines reach up to EUR 10 million or 2% of annual turnover - with personal liability for executive officers. NIS2 audit from HUF 1,500,000 (~€3,800), full programme in 6-9 months.
Proud to work with leading companies
If you are a medium-sized or large company in one of the 18 named sectors - it is mandatory. If you are a supplier to one of them - it is contractually mandatory.
Energy, transport, banking and financial services, healthcare, drinking-water supply, digital infrastructure (DNS, IXP, TLD), public administration, space.
Postal services, waste management, chemical manufacturing, food, manufacturing (medical devices, vehicles, machinery), digital service providers (online marketplace, search engine, social media), research.
Medium-sized companies (50+ employees OR EUR 10M annual turnover) and large enterprises. Authority in Hungary: National Cyber Defence Authority (NKH), formerly NBSZ NKI.
The directive prescribes controls in 6 areas. All six must be addressed together - none of them is optional.
Cybersecurity risk analysis, threat modelling, business continuity plan. Identification and prioritisation of the company's critical systems.
Incident reporting workflow: 24-hour early warning, 72-hour detailed report, 1-month closing report to the National Cyber Defence Authority (NKH, formerly NBSZ NKI in Hungary).
Backup, disaster recovery, crisis communication. RTO and RPO defined and tested. Standby systems documented.
Supplier and service-provider security audit. Assessment of cloud providers, SaaS tools, and third-party access - with contractual coverage.
Access control (SSO, MFA), encryption (TLS, at-rest encryption), patch management, security monitoring (SIEM), logging, and audit log.
Regular cybersecurity training for staff, phishing simulation, documented cybersecurity responsibility for executives.
The point of NIS2 is not to encourage "nice-to-have" cybersecurity - it is to penalise its absence with extreme amounts.
EUR 10 million or 2% of global annual turnover (whichever is higher)
EUR 7 million or 1.4% of global annual turnover (whichever is higher)
Personal liability of executive officers - possible disqualification from management positions in case of non-compliance
Meticulous planning, seamless execution, and creative problem-solving -- that's how we achieve remarkable results.
No cookie-cutter solutions here. We map out your business goals, market landscape, and competition, then build a strategy designed to deliver measurable results.
No cookie-cutter solutions here. We map out your business goals, market landscape, and competition, then build a strategy designed to deliver measurable results.
No cookie-cutter solutions here. We map out your business goals, market landscape, and competition, then build a strategy designed to deliver measurable results.
Wireframes, prototypes, and UI/UX designs built on real user insights. Every click, every layout is engineered to maximize conversions and engagement.
Wireframes, prototypes, and UI/UX designs built on real user insights. Every click, every layout is engineered to maximize conversions and engagement.
Wireframes, prototypes, and UI/UX designs built on real user insights. Every click, every layout is engineered to maximize conversions and engagement.
Agile development with cutting-edge technologies, weekly demos, and full transparency. You'll always know exactly where your project stands.
Agile development with cutting-edge technologies, weekly demos, and full transparency. You'll always know exactly where your project stands.
Agile development with cutting-edge technologies, weekly demos, and full transparency. You'll always know exactly where your project stands.
Automated and manual testing across every platform and browser. Nothing goes live until it's been tested to the breaking point and passed with flying colors.
Automated and manual testing across every platform and browser. Nothing goes live until it's been tested to the breaking point and passed with flying colors.
Automated and manual testing across every platform and browser. Nothing goes live until it's been tested to the breaking point and passed with flying colors.
Launch day is just the beginning. Monitoring, performance optimization, and ongoing support ensure your solution gets better every single day.
Launch day is just the beginning. Monitoring, performance optimization, and ongoing support ensure your solution gets better every single day.
Launch day is just the beginning. Monitoring, performance optimization, and ongoing support ensure your solution gets better every single day.
4 phases over 6-9 months. From audit to ongoing CISO-as-a-Service - individually or as a package.
Gap analysis: where you stand today against NIS2 requirements. Risk assessment, map of critical systems, list of missing controls. Output: NIS2 compliance roadmap.
SSO, MFA, security monitoring (SIEM - e.g. Wazuh / Splunk / Elastic Security), patch management, audit logging, backup and DR systems. WAF, DDoS protection, endpoint security.
Incident response procedure (IR playbook), business continuity plan (BCP), disaster recovery plan (DRP), supplier audit process, training materials.
Monthly SIEM monitoring, quarterly penetration testing, annual audit refresh, regulatory tracking. External CISO-as-a-Service available.
What AI can do, how to integrate it, what to comply with - and how to keep your data on-prem.
Log analysis (SIEM-AI)
AI-driven log analysis: unusual logins, privilege escalation, lateral movement detected.
Incident classification
Supports NIS2 reporting deadlines (24/72h): automatic severity scoring and report draft generation.
Phishing filter
AI email classifier trained on your own patterns - higher hit rate than generic filters.
Vulnerability prioritisation
CVE lists weighted by AI against your infrastructure context.
AI on local data only
Under NIS2 security data must not leave to a third-party cloud - every AI feature runs on-prem or in sovereign cloud.
Human in the loop
Critical actions (block, revoke) are only suggested by AI; SOC analyst approves.
Audit trail
Every AI decision and its inputs logged, traceable during NIS2 audit.
GDPR
Personal data is processed only on a documented legal basis. Data minimisation, purpose limitation, and audit trail enforced by design.
EU AI Act
Risk-based classification of every AI use case (minimal / limited / high risk). Mandatory transparency, human oversight, and CE-style conformity for high-risk systems.
NIS2
In essential and important sectors AI must follow security-by-design: access control, logging, incident reporting, supply-chain risk for any model provider.
ISO 27001 / SOC 2
When required: ISO 27001 / SOC 2-aligned controls, including key management, RBAC, audit, vulnerability management.
Ollama / llama.cpp
Open-weight models (Llama 3.x, Mistral, Qwen, Gemma) running on your own GPU server or even CPU. Zero data sent to third parties.
vLLM / TGI
Production-grade inference servers for self-hosted endpoints. Concurrent users, streaming, function calling supported.
Sovereign cloud
For organisations without on-prem GPU: deployment on EU / Hungarian sovereign cloud (e.g. dedicated tenant), with data residency contracts.
Hybrid
Sensitive content always local; for non-sensitive batch tasks frontier models (Claude, GPT) via DPA-backed API where allowed.
No training on your data
Whether self-hosted or vendor API, we contractually exclude your data from any training set.
PII redaction before prompt
Automatic PII detection and masking before any prompt leaves your perimeter - pseudonymisation as a hard rule.
Per-role access
Every AI surface uses your existing IAM (Entra ID / Keycloak / Okta) - the AI only sees what the user is allowed to see.
Full audit
Every prompt, response, and tool call logged with user, time, and source - replayable on demand.
NIS2 is not paperwork - it touches IT architecture, logging, AI use, and access control.
SIEM, logging, and anomaly detection are typically built using AI development and local LLMs on locally-run models. For industrial organisations, NIS2 also extends to the MES / SCADA system, where shop-floor controller security is a priority.
Reporting obligations and audit trails are implemented as part of a system integration project, so every integration in/out data is logged. The full cyber roadmap is part of a digital transformation programme.
You might also want - different angles of the same digital transformation.
Enterprise resource planning as a SAP / Dynamics / NetSuite alternative - no per-user licence.
Learn more →Enterprise CRM as a Salesforce alternative - AI lead scoring, pipeline assistant, fully custom-coded.
Learn more →Python + LangChain + LangGraph + FastAPI agentic stack. Custom codebase, not a no-code platform.
Learn more →ERP ↔ CRM ↔ shop ↔ bank ↔ tax - custom Python integration layer, not a rented iPaaS.
Learn more →Tell us about your project and we'll respond within 24 hours!
Book a free 30-minute consultation where we discuss the details of your project.
Book a Call