{"id":36714,"date":"2025-04-01T00:29:00","date_gmt":"2025-04-01T04:29:00","guid":{"rendered":"https:\/\/www.eginnovations.com\/blog\/?p=36714"},"modified":"2025-04-16T03:53:36","modified_gmt":"2025-04-16T07:53:36","slug":"what-is-nis2-compliance-and-how-to-use-proactive-monitoring-to-automate-compliance","status":"publish","type":"post","link":"https:\/\/www.eginnovations.com\/blog\/what-is-nis2-compliance-and-how-to-use-proactive-monitoring-to-automate-compliance\/","title":{"rendered":"What is NIS2 Compliance? And How to Use Proactive Monitoring to Automate Compliance"},"content":{"rendered":"<div class=\"inner_content\">\n<p><a class=\"link\" href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/nis2-directive\" target=\"blank\" rel=\"noopener\">NIS2 (Network and Information Security Directive 2)<\/a> is the European Union&#8217;s updated cybersecurity directive, replacing the original NIS Directive (2016), often referenced to as NIS1. NIS2 was adopted in December 2022 and the deadline for implementation by EU member states was October 17, 2024. NIS2 strengthens cybersecurity requirements across essential and important sectors to enhance cyber resilience and response capabilities.<\/p>\n<p>The full text of the NIS2 Directive can be found, here: <a class=\"link\" href=\"https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX:32022L2555\" target=\"lank\" rel=\"noopener\">Directive &#8211; 2022\/2555 &#8211; EN &#8211; EUR-Lex<\/a>.<\/p>\n<h2>Short Overview of Key Requirements of NIS2<\/h2>\n<p>The NIS2 Directive outlines several key requirements for organizations to improve their cybersecurity and resilience. Here are the main key requirements of the NIS2 Directive:<\/p>\n<h3>1. Expanded Scope and Coverage<\/h3>\n<ul>\n<li>NIS2 broadens the scope of the original NIS Directive (NIS1) by covering a wider range of sectors and entities, including energy, transport, health, digital infrastructure, and other essential services.<\/li>\n<li>It also extends compliance requirements to medium and large enterprises in both the public and private sectors that provide critical infrastructure or services.<\/li>\n<li>This requirement ensures that organizations in both traditional and digital sectors, such as cloud providers and data centers, are included in the cybersecurity framework.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-36847 size-full\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/03\/NIS2-extended.webp\" alt=\"Diagram showing essential entities regulated by original NIS regulation includes Healthcare, Banking, Finance, Energy and then those added in NIS2 (known as important entities) and they include manufacturing, waste management, research, post and so on...\" width=\"1200\" height=\"427\" \/><\/p>\n<div class=\"img_caption\">NIS2 extended those sectors covered be NIS as \u201cessential\u201d as well as added additional sectors to be covered by the directive and categorized as \u201cImportant entities\u201d.<\/div>\n<div style=\"padding: 20px; border: 1px solid #ffd392; background: #fcf8ef; text-align: justify; margin-bottom: 30px;\">\n<p style=\"margin-bottom: 15px; font-weight: bold; font-size: 22px;\">What is a \u201cmedium\u201d sized enterprise in the context of NIS2?<\/p>\n<p style=\"margin-bottom: 5px;\">In the European Union, a &#8220;medium\u201d enterprise refers to an organization that employs at least 50 people and has an annual turnover or balance sheet total exceeding 10 million euros, essentially meaning it falls within the size range where the NIS2 regulations apply to them, requiring them to implement specific cybersecurity measures; smaller businesses are generally excluded from the full scope of NIS2 regulations.<\/p>\n<\/div>\n<h3>2. Cybersecurity Risk Management and Governance<\/h3>\n<ul>\n<li>NIS2 mandates that organizations implement robust cybersecurity risk management measures to protect their networks and systems. This includes the need for a proactive approach to cybersecurity, covering areas such as:\n<ul>\n<li>Risk assessments and the implementation of appropriate security controls<\/li>\n<li>Incident response plans<\/li>\n<li>Business continuity measures to ensure critical services remain operational<\/li>\n<\/ul>\n<\/li>\n<li>It also requires senior management to take responsibility for cybersecurity, making them accountable for the implementation of appropriate security measures and policies.<\/li>\n<\/ul>\n<h3>3. Incident Reporting<\/h3>\n<ul>\n<li>One of the most specific and stringent requirements of NIS2 is timely incident reporting. Organizations must report significant security incidents to national authorities within 24 hours of becoming aware of them and provide a detailed report within 72 hours.<\/li>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-36813 size-full\" style=\"width: 600px; margin-top: 20px;\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/03\/clock.webp\" alt=\"decorative image of an alarm clock and a warning sign - to represent that timely response and reporting of IT incidents is part of the criteria NIS2 covers\" width=\"750\" height=\"440\" \/><\/p>\n<li>The directive emphasizes the need for a quick response to cybersecurity breaches to minimize impact, enable coordinated responses, and ensure relevant authorities are informed promptly.<\/li>\n<\/ul>\n<h3>4. Supply Chain and Third-Party Security<\/h3>\n<ul>\n<li>NIS2 stresses the importance of managing cybersecurity risks across supply chains and third-party services. Organizations must assess and ensure that their suppliers and service providers meet cybersecurity standards.<\/li>\n<li>This is increasingly important as attacks often target vulnerabilities in third-party systems. Companies are required to ensure that their suppliers implement appropriate risk management practices to mitigate potential cyber risks.<\/li>\n<\/ul>\n<h3>5. Enhanced Cooperation and Information Sharing<\/h3>\n<ul>\n<li>NIS2 promotes cooperation and information-sharing among EU member states, national authorities, and private-sector organizations.<\/li>\n<li>Member states are required to establish cybersecurity incident response teams and <a class=\"link\" href=\"https:\/\/csirtsnetwork.eu\/\" target=\"blank\" rel=\"noopener\">Computer Security Incident Response Teams (CIRTs)<\/a> at the national level. These teams help facilitate collaboration, share threat intelligence, and manage cross-border cybersecurity incidents, ensuring that information about potential or active threats is shared quickly to minimize risks across the EU.<\/li>\n<\/ul>\n<h2>Key Differences Between NIS1 and NIS2<\/h2>\n<table class=\"table_design numbers\" style=\"width: 100%;\">\n<tbody>\n<tr class=\"head_table\">\n<td style=\"width: 28%;\"><\/td>\n<td><strong>NIS1 (2016)<\/strong><\/td>\n<td><strong>NIS2 (2022)<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>Scope<\/strong><\/td>\n<td>Focused on essential services (utilities, energy, healthcare, finance, etc.)<\/td>\n<td>Expands to important sectors (e.g., drug research, space industry, public administration, ICT services).<\/td>\n<\/tr>\n<tr>\n<td><strong>Security Requirements<\/strong><\/td>\n<td>Basic cybersecurity measures without strict specifications.<\/td>\n<td>More detailed risk management, including supply chain security, multi-factor authentication (MFA), and business continuity plans.<\/td>\n<\/tr>\n<tr>\n<td><strong>Incident Reporting<\/strong><\/td>\n<td>Organizations must report significant incidents to national authorities.<\/td>\n<td>Stricter 24-hour early warning and full 72-hour incident reporting requirements.<\/td>\n<\/tr>\n<tr>\n<td><strong>Enforcement &amp; Penalties<\/strong><\/td>\n<td>Limited enforcement, with fines varying by country.<\/td>\n<td>Fines up to \u20ac10 million or 2% of global turnover, and personal liability for executives. For details, see: <a class=\"link\" href=\"https:\/\/nis2directive.eu\/nis2-fines\/\" target=\"blank\" rel=\"noopener\">NIS2 Fines &amp; Consequences | Huge Penalties for Violations<\/a>.<\/td>\n<\/tr>\n<tr>\n<td><strong>Regulatory Oversight<\/strong><\/td>\n<td>Each EU country had different enforcement mechanisms, creating inconsistencies.<\/td>\n<td>Harmonized rules across the EU, reducing discrepancies between member states.<\/td>\n<\/tr>\n<tr>\n<td><strong>Supply Chain Security<\/strong><\/td>\n<td>Not explicitly covered.<\/td>\n<td>Organizations must ensure third-party risk management and assess vendor security.<\/td>\n<\/tr>\n<tr>\n<td><strong>Management Accountability<\/strong><\/td>\n<td>Limited responsibility for senior executives.<\/td>\n<td>Company executives can be held personally liable for non-compliance.<\/td>\n<\/tr>\n<tr>\n<td><strong>Cooperation Between Member States<\/strong><\/td>\n<td>Limited cooperation framework.<\/td>\n<td>Enhanced EU-wide collaboration, with a Cyber Crisis Response Framework for coordinated actions.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>NIS2 vs DORA<\/h2>\n<p>NIS2 and <a class=\"link\" href=\"https:\/\/www.eginnovations.com\/blog\/what-is-the-digital-operational-resilience-act-dora-everything-you-need-to-know-about-dora-compliance\/\">DORA<\/a> are both EU regulations enhancing cybersecurity and resilience but cover different sectors. NIS2 targets essential industries like energy, healthcare, telecom, and IT, focusing on risk management, supply chain security, and incident reporting. DORA is specific to the <a href=\"https:\/\/www.eginnovations.com\/industry\/finance-it-management\">financial sector<\/a>, ensuring operational resilience for banks, insurers, and investment firms while directly regulating ICT providers serving them. DORA places particular focus on critical third-party suppliers such as cloud providers and was conceived to handle scenarios where ICT failures at a few critical suppliers could effectively cripple a country\u2019s banking and financial services ecosystem. For more information on DORA, please see: <a class=\"link\" href=\"https:\/\/www.eginnovations.com\/blog\/what-is-the-digital-operational-resilience-act-dora-everything-you-need-to-know-about-dora-compliance\/\">What is the Digital Operational Resilience Act (DORA)? Everything you need to know about DORA compliance. | eG Innovations<\/a>.<\/p>\n<p>Both mandate cybersecurity measures but differ in oversight\u2014NIS2 is enforced by national cybersecurity agencies, while DORA falls under financial regulators including the European Supervisory Authorities (ESAs), comprising the European Banking Authority (EBA), the European Insurance and Occupational Pensions Authority (EIOPA), and the European Securities and Markets Authority (ESMA). Financial institutions may need to comply with both, especially if they rely on IT and telecom providers. Together, they support the EU\u2019s goal of a unified cybersecurity framework, requiring businesses to align security and compliance strategies.<\/p>\n<h2>Can ISO 27000 Help You Achieve NIS2 Compliance?<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-36788 size-full\" style=\"margin-top: -10px;\" src=\"https:\/\/www.eginnovations.com\/images\/ISO-27001.webp?new\" alt=\"ISO 27001:2022\" width=\"170\" height=\"170\" \/>Yes, the ISO\/IEC 27000 series (particularly <a class=\"link\" href=\"https:\/\/en.wikipedia.org\/wiki\/ISO\/IEC_27001\" target=\"blank\" rel=\"noopener\">ISO\/IEC 27001<\/a>) can significantly aid organizations in aligning their cybersecurity practices with the NIS2 Directive, ensuring compliance with key provisions. While ISO 27001 is a broad information security management framework, it shares many similarities with the requirements of NIS2, making it an excellent tool for achieving compliance.<\/p>\n<p>ISO 27001 and NIS2 both emphasize cybersecurity risk management, requiring organizations to assess and mitigate threats to critical infrastructure. ISO 27001\u2019s Information Security Management System (ISMS) provides a structured approach that aligns with NIS2\u2019s expectations. Both frameworks mandate incident detection and reporting, ensuring timely responses to security breaches. ISO 27001\u2019s controls help meet NIS2\u2019s 24-hour and 72-hour reporting requirements.<\/p>\n<p>NIS2 also stresses <a class=\"link\" href=\"https:\/\/outshift.cisco.com\/blog\/top-10-supply-chain-attacks\" target=\"blank\" rel=\"noopener\">supply chain security<\/a>, which ISO 27001 supports by requiring organizations to assess third-party risks. For information on eG Innovations\u2019 certification for ISO:27001 and similar, see: <a class=\"link\" href=\"https:\/\/www.eginnovations.com\/information-security\">Information Security and Compliance | eG Innovations<\/a>.<\/p>\n<p>Continuous monitoring and governance are also key in both frameworks, reinforcing accountability and proactive cybersecurity measures.<\/p>\n<p>Many useful third-party tools are available to map ISO 27001 to DORA, such as &#8211; <a class=\"link\" href=\"https:\/\/www.bsigroup.com\/globalassets\/localfiles\/de-de\/isoiec-27001\/ressourcen\/bsi-ce-nis2-mapping-tool-25-en-de.pdf\" target=\"blank\" rel=\"noopener\">bsi-ce-nis2-mapping-tool-25-en-de.pdf<\/a>.<\/p>\n<h2>How eG Enterprise Helps You Achieve NIS2 Compliance<\/h2>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-36818 size-full\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/03\/deployed-applications-monitoring.webp\" alt=\"image showing eG Enterprise's scope - On-prem, cloud, hybrid IT.... plus End user experience, service performance, IT Infra performance... some sectors e.g. eCommerce, finance, healthcare, government plus some features e.g. transaction tracing and automated diagnostics\" \/><\/p>\n<p>eG Enterprise, with its comprehensive AI-powered, automated monitoring and observability platform, can help organizations meet the key tenets of NIS2 compliance. Here&#8217;s how some of eG Enterprise\u2019s features align with the core requirements of the NIS2 Directive:<\/p>\n<h3>1. Expanded Scope and Coverage<\/h3>\n<p>eG Enterprise provides end-to-end observability across a wide range of IT environments, including SaaS, applications, cloud-native infrastructure, multi-cloud and hybrid environments, and traditional data centers. With converged digital experience, application and infrastructure monitoring, eG Enterprise can proactively monitor not only services but the impacts of issues on users, whether delivered via <a class=\"link\" href=\"https:\/\/www.eginnovations.com\/glossary\/on-premises\">on-premises<\/a> or cloud application delivery chains. In practice, this requires automatically monitoring tens of thousands or even millions of metrics, logs and traces in real-time, learn more: <a class=\"link\" href=\"https:\/\/www.eginnovations.com\/blog\/designing-for-scale-how-eg-enterprise-manages-millions-of-metrics-with-aiops-driven-self-monitoring\/\">Designing for Scale: How eG Enterprise Manages Millions of Metrics with AIOps-driven Self-Monitoring | eG Innovations<\/a>.<\/p>\n<p>For details of the 650+ application and infrastructure stacks and technologies supported, see: <a class=\"link\" href=\"https:\/\/www.eginnovations.com\/product\/technologies-list-view\">End-to-End Monitoring: Applications, Cloud, Containers<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-36819 size-full\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/03\/covereged-APM.webp\" alt=\"Image showing eG Enterprise is a converged application and IT Infrastructure monitoring tool\" width=\"800\" height=\"408\" \/><\/p>\n<h3>2. Cybersecurity Risk Management<\/h3>\n<p>eG Enterprise helps organizations implement continuous risk management through its AI-powered anomaly detection and real-time monitoring capabilities. It can automatically detect potential security vulnerabilities and threats across an organization&#8217;s IT environment, including application performance and infrastructure.<\/p>\n<p>A rich suite of <a class=\"link\" href=\"https:\/\/www.eginnovations.com\/synthetic-monitoring\">synthetic monitoring tools<\/a> allows organizations to continually probe systems with \u201crobot users\u201d to test the availability and performance of systems even when no real users are accessing services and in pre-production before real users are exposed to new systems.<\/p>\n<p>The platform allows businesses to take proactive action by identifying areas of concern and ensuring that risk management measures are in place. This helps meet NIS2&#8217;s emphasis on assessing and managing cybersecurity risks to protect critical infrastructure.<\/p>\n<p><a href=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/Modern-APM-zoom.jpg\" data-rel=\"lightbox-image-0\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-37089\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/03\/Modern-APM.webp?new\" alt=\"\" width=\"750\" height=\"263\" \/><\/a><\/p>\n<div class=\"img_caption\">Figure 1: Modern APM observability tools such as eG Enterprise will continuously monitor application processes for unusual or suspicious activity and trigger automated alerts pre-emptively to help avoid incidents.<\/div>\n<p>Fundamentally every organization who needs to comply with NIS2 should be focused on ensuring that they <strong>avoid<\/strong> incidents. Robust monitoring is essential in any business continuity strategy. See: <a class=\"link\" href=\"https:\/\/www.eginnovations.com\/blog\/business-continuity-strategy\/\">Protect Your Organization with the Ideal Business Continuity Strategy | eG Innovations Establishing a Business Continuity Strategy | eG Innovations<\/a>.<\/p>\n<p><a href=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/infrastructure-health-measure-zoom.jpg\" data-rel=\"lightbox-image-1\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-36821 size-full\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/infrastructure-health-measure.webp\" alt=\"Image of eG Enterprise web console monitoring lots of different technologies and vendor IT stacks\" width=\"750\" height=\"425\" srcset=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/infrastructure-health-measure.webp 750w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/infrastructure-health-measure-300x170.webp 300w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/infrastructure-health-measure-310x176.webp 310w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/infrastructure-health-measure-140x79.webp 140w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><\/a><\/p>\n<div class=\"img_caption\">Figure 2: Proactive comprehensive coverage of your application and IT infrastructure landscape within a single secure console.<\/div>\n<p><a href=\"https:\/\/www.eginnovations.com\/ebooks\/aiops-solutions-strategies\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-36822 size-full\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/AIOps-Solutions-ebook.jpg\" alt=\"Banner to link to download a free eBook explaining the benefits of AIOps monitoring features\" width=\"850\" height=\"180\" srcset=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/AIOps-Solutions-ebook.jpg 850w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/AIOps-Solutions-ebook-300x64.jpg 300w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/AIOps-Solutions-ebook-768x163.jpg 768w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/AIOps-Solutions-ebook-800x169.jpg 800w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/AIOps-Solutions-ebook-310x66.jpg 310w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/AIOps-Solutions-ebook-140x30.jpg 140w\" sizes=\"auto, (max-width: 850px) 100vw, 850px\" \/><\/a><\/p>\n<h3>3. Incident Reporting<\/h3>\n<p>eG Enterprise\u2019s automated alerting, incident detection and reporting capabilities support NIS2\u2019s incident reporting requirement. The platform continuously monitors the health of applications, infrastructure, and services, detecting issues in real time. Moreover, AIOps-powered auto-detection\/deploy and auto-baselining coupled with out-of-the-box alert thresholds and <a class=\"link\" href=\"https:\/\/www.eginnovations.com\/blog\/what-is-event-correlation-and-why-does-event-correlation-matter-when-monitoring\/-and-why-does-event-correlation-matter-when-monitoring\/\">alert correlation<\/a> ensure automated day-0 coverage without alarm storms (see: <a class=\"link\" href=\"https:\/\/www.eginnovations.com\/blog\/what-is-event-correlation-and-why-does-event-correlation-matter-when-monitoring\/-and-why-does-event-correlation-matter-when-monitoring\/\">What is Event Correlation? And Why Does Event Correlation Matter when Monitoring? | eG Innovations<\/a>).<\/p>\n<p><a href=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/topological-zoom-map.jpg\" data-rel=\"lightbox-image-2\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-36825 size-full\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/topological-maps.webp\" alt=\"A topology map where eG Enterprise shows the dependencies between components including the relationships between applications and infrastructure - colored overlays highlight the root cause of application slowness (a faulty Java application) - the error on the IIS Web server is simply a secondary effect so is coded less severe\" width=\"750\" height=\"413\" srcset=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/topological-maps.webp 750w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/topological-maps-300x165.webp 300w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/topological-maps-310x171.webp 310w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/topological-maps-140x77.webp 140w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><\/a><\/p>\n<div class=\"img_caption\">Figure 3: If incidents occur, eG Enterprise pinpoints the root cause of the problem and provides topological maps of dependencies to evaluate impacts and secondary consequences.<\/div>\n<p>When incidents or breaches occur, eG Enterprise provides detailed diagnostics and real-time insights into the root cause, helping organizations meet the 24-hour reporting requirement of NIS2. It also helps generate reports, track incidents, and document resolution activities, enabling organizations to meet the 72-hour follow-up deadline.<\/p>\n<p><a href=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/alarm-history-zoom.jpg\" data-rel=\"lightbox-image-3\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-36852 size-full\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/alarm-history.webp\" alt=\"Diagram showing &quot;History of Alarms&quot; window in eG Enterprise\" width=\"750\" height=\"397\" srcset=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/alarm-history.webp 750w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/alarm-history-300x159.webp 300w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/alarm-history-310x164.webp 310w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/alarm-history-140x74.webp 140w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><\/a><\/p>\n<div class=\"img_caption\">Figure 4: Smart alarm tracking and acknowledgments along with the alarm history database ensure that incidents are continuously tracked \u2013 with live reports instantly available.<\/div>\n<p style=\"margin-bottom: 15px;\">NIS2 also places great weight on governance and responsibility. Centralized dashboards and a wealth of pre-built reports enable organizations to maintain oversight and accountability, a key requirement in NIS2. Senior management can track performance and overview incidents. Built-in audits and change and configuration tracking provide further compliance records. Learn more:<\/p>\n<ul>\n<li><a class=\"link\" href=\"https:\/\/www.eginnovations.com\/blog\/configuration-change-tracking\/\">Configuration Management &amp; Change Tracking for Observability<\/a><\/li>\n<li><a class=\"link\" href=\"https:\/\/www.eginnovations.com\/blog\/auditing-capabilities-in-it-monitoring-tools-for-security-and-compliance\/\/\">Auditing Capabilities in IT Monitoring Tools | eG Innovations<\/a><\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.eginnovations.com\/white-paper\/make-it-service-monitoring-simple-and-proactive-with-aiops-powered-intelligent-thresholding-and-alerting\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-36828 size-full\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/Proactive-with-AIOps-whitepaper.jpg\" alt=\"Banner to click on to download a free whitepaper explaining how AIOps automated thresholding and alerting works and provides anomaly detection for the eG Enterprise monitoring platform\" width=\"850\" height=\"180\" srcset=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/Proactive-with-AIOps-whitepaper.jpg 850w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/Proactive-with-AIOps-whitepaper-300x64.jpg 300w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/Proactive-with-AIOps-whitepaper-768x163.jpg 768w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/Proactive-with-AIOps-whitepaper-800x169.jpg 800w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/Proactive-with-AIOps-whitepaper-310x66.jpg 310w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/Proactive-with-AIOps-whitepaper-140x30.jpg 140w\" sizes=\"auto, (max-width: 850px) 100vw, 850px\" \/><\/a><\/p>\n<h3>4. Supply Chain Security<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-36829 size-full\" style=\"width: 350px;\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/03\/lock.webp\" alt=\"Two pieces of chain joined by a padlock as a decorative image to represent the Secure supply chain requirements of NIS2 and DORA type regulations\" width=\"750\" height=\"453\" \/><\/p>\n<p style=\"margin-bottom: 15px;\">eG Enterprise enhances supply chain security by offering deep insights into the performance and security posture of third-party services and components. Its third-party risk monitoring tracks external dependencies and ensures that any issues within the supply chain are detected and managed proactively. A few thoughts:<\/p>\n<ul>\n<li>The platform helps organizations ensure that their third-party service providers and integrated systems are scrutinized, and inter-dependencies are understood, which aligns with NIS2\u2019s requirement to assess and mitigate risks from third-party suppliers.<\/li>\n<li>SaaS and open-source solutions will come under increased scrutiny. For some considerations on these see: <a class=\"link\" href=\"https:\/\/www.eginnovations.com\/blog\/should-i-trust-a-saas-vendor-or-product\/\">Should I Trust a SaaS Vendor or Product? | eG Innovations<\/a> and <a class=\"link\" href=\"https:\/\/www.eginnovations.com\/blog\/top-freeware-and-open-source-it-monitoring-tools\/\">Open-source IT Monitoring Tools | eG Innovations<\/a>.<\/li>\n<li>The increasing reliance of many sectors upon a few significant hyperscaler cloud providers (Google GCP, Microsoft Azure, Amazon AWS and a few others) is of particular concern and strong monitoring tooling is needed for organizations leveraging such clouds to handle events such as cloud outages especially if an organization\u2019s internal communication tools (Outlook, MS Teams, email systems and so on) have cloud dependencies. See: <a class=\"link\" href=\"https:\/\/www.eginnovations.com\/blog\/how-to-protect-your-it-ops-from-cloud-outages\/\">How to Protect your IT Ops from Cloud Outages<\/a>.<\/li>\n<li>We take the responsibility for our own product development processes and supply chain very seriously and partake in several externally scrutinized\/audited certification programs, see: <a class=\"link\" href=\"https:\/\/www.eginnovations.com\/information-security\">Information Security and Compliance | eG Innovations<\/a>.<\/li>\n<\/ul>\n<p>A brief overview of supply-chain risks is covered, here: <a class=\"link\" href=\"https:\/\/www.techtarget.com\/whatis\/definition\/supply-chain-risk-management-SCRM\">What is supply chain risk management (SCRM)? | Definition by TechTarget<\/a>.<\/p>\n<h3>5. Enhanced Cooperation and Information Sharing<\/h3>\n<p>eG Enterprise supports cross-team collaboration and information sharing through its centralized platform, which provides a unified view of system health and security data. Teams across different departments (IT, AppDev, security, compliance, management) can collaborate and access real-time insights, enabling better incident management and faster resolution.<\/p>\n<p><a href=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/ eG-deep-analysis-zoom.jpeg\" data-rel=\"lightbox-image-4\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-36831 size-full\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/eG-deep-analysis.webp\" alt=\"Image of the AVD Connection failure report in the eG Enterprise console's &quot;Reporter&quot; tab\" width=\"750\" height=\"631\" srcset=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/eG-deep-analysis.webp 750w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/eG-deep-analysis-300x252.webp 300w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/eG-deep-analysis-310x261.webp 310w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/eG-deep-analysis-140x118.webp 140w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><\/a><\/p>\n<div class=\"img_caption\">Figure 5: Built-in reports from eG Enterprise allow deep analysis of recurrent issues allowing organizations to prioritize long term solutions to improve operational uptime and availability essential for business continuity.<\/div>\n<p>By integrating with existing Security Information and Event Management (SIEM) and <a class=\"link\" href=\"https:\/\/www.eginnovations.com\/blog\/integrate-eg-enterprise-with-itsm-tools\/\">Information Technology Service Management (ITSM) tools<\/a> and facilitating cross-functional workflows, eG Enterprise contributes to the cooperation and information sharing aspect of NIS2. It ensures that cybersecurity teams and external authorities can be informed and collaborate efficiently when needed.<\/p>\n<p><a href=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/Brute-force-zoom.jpg\" data-rel=\"lightbox-image-5\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-36833 size-full\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/Brute-force.jpg\" alt=\"The eG Enterprise sign in reports including details of password spray attacks \" width=\"1200\" height=\"2156\" srcset=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/Brute-force.jpg 1200w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/Brute-force-167x300.jpg 167w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/Brute-force-570x1024.jpg 570w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/Brute-force-768x1380.jpg 768w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/Brute-force-855x1536.jpg 855w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/Brute-force-1140x2048.jpg 1140w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/Brute-force-800x1437.jpg 800w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/Brute-force-310x557.jpg 310w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/Brute-force-140x252.jpg 140w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/a><\/p>\n<div class=\"img_caption\">Figure 6: Brute force and password spraying attacks can be easily identified via proactive monitoring of authentication technologies and the details examined via built-in reports.<\/div>\n<h2>Conclusions<\/h2>\n<p>eG Enterprise\u2019s features, including AI-driven monitoring, real-time incident detection, supply chain monitoring, and cross-team collaboration tools, align closely with the core tenets of NIS2. By leveraging eG Enterprise organizations can streamline their compliance efforts while improving cybersecurity and resilience across critical services.<\/p>\n<p><a href=\"https:\/\/www.eginnovations.com\/product\/application-performance-monitoring\/free-trial\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-36834 size-full\" src=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/free-trial-banner.jpg\" alt=\"Banner to click on to access a free trial of eG Enterprise\" width=\"850\" height=\"180\" srcset=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/free-trial-banner.jpg 850w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/free-trial-banner-300x64.jpg 300w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/free-trial-banner-768x163.jpg 768w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/free-trial-banner-800x169.jpg 800w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/free-trial-banner-310x66.jpg 310w, https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/free-trial-banner-140x30.jpg 140w\" sizes=\"auto, (max-width: 850px) 100vw, 850px\" \/><\/a><\/p>\n<div class=\"containers mb-4\" style=\"clear:both\">\n \t<div class=\"fixed-free-trial-div mb-3\" id=\"fixedsectioninfo_blog_btn\">\n \t\n \t<style>.containers_hide_row,.all_blogs_bottom{\n \tdisplay:none;\n   \n}\t<\/style>\n                <div class=\"box-style container row pt-4 pb-4  animatedParent animateOnce\" data-sequence=\"100\" style=\"border-bottom: 1px solid #ddd;border-top: 1px solid #ddd;background: #4b4b4b;padding: 15px 15px 0 15px;border-radius: 12px;\">\n                \n                <div class=\"text-center animated fadeIn go\"> \n                <p class=\"text-center mb-4\" style=\"    color: #fff;\">\n\neG Enterprise is an Observability solution for Modern IT. Monitor digital workspaces, <br\/>web applications, SaaS services, cloud and containers from a single pane of glass.\n<\/p>\n                <\/div>\n                    <div class=\"text-center pb-1 animated fadeIn go\" data-id=\"8\">\n                        <a class=\"border-btnhead-eg\"  href=\"https:\/\/www.eginnovations.com\/it-monitoring\/free-trial\"> <span style=\"font-family: GraphikMedium!important;color: #fff;\">Free Trial<\/span><\/a>\n                        <a href=\"https:\/\/www.eginnovations.com\/product\/it-infrastructure-monitoring\" class=\" border-btnhead-eg\" style=\"width:230px;   \"> <svg width=\"24\" height=\"24\" style=\"margin-top:-3px\" version=\"1.1\" id=\"Layer_1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\"\n\t viewBox=\"0 0 26.5 26.5\" style=\"enable-background:new 0 0 26.5 26.5;\" xml:space=\"preserve\">\n<style type=\"text\/css\">\n\t.st2{fill:#fff !important;stroke:#fff !important;stroke-miterlimit:10;}\n\t\n\t\t.border-btnhead:hover .st2 {\n  fill: #ffffff !important;\n  stroke: #ffffff;\n}\n<\/style>\n<g>\n\t<g>\n\t\t<path class=\"st2\" d=\"M13.3,25.8c-6.9,0-12.5-5.6-12.5-12.5S6.4,0.8,13.3,0.8s12.5,5.6,12.5,12.5S20.2,25.8,13.3,25.8z M13.3,1.8\n\t\t\tC6.9,1.8,1.8,6.9,1.8,13.3S7,24.8,13.3,24.8s11.5-5.2,11.5-11.5S19.6,1.8,13.3,1.8z M11.2,18.1c-0.2,0-0.4-0.1-0.6-0.2\n\t\t\tc-0.3-0.2-0.6-0.6-0.6-1V9.7c0-0.4,0.2-0.8,0.6-1c0.3-0.2,0.8-0.2,1.2,0l6.2,3.6c0.3,0.2,0.6,0.6,0.6,1s-0.2,0.8-0.6,1l-6.2,3.6\n\t\t\tC11.6,18,11.4,18.1,11.2,18.1z\"\/>\n\t<\/g>\n<\/g>\n<\/svg> <span style=\"font-family: GraphikMedium!important;color: #fff;\">&nbsp;See the platform<\/span><\/a>\n                    <\/div>\n                <\/div>\n                \n                 <\/div>\n            <\/div>\n<h2>Related Information<\/h2>\n<p style=\"margin-bottom: 15px;\">If you enjoyed this article you may like to explore these articles that cover overlapping themes:<\/p>\n<ul>\n<li><a class=\"link\" href=\"https:\/\/www.eginnovations.com\/blog\/what-is-the-digital-operational-resilience-act-dora-everything-you-need-to-know-about-dora-compliance\/\">What is the Digital Operational Resilience Act (DORA)? Everything you need to know about DORA compliance. | eG Innovations<\/a><\/li>\n<li><a class=\"link\" href=\"https:\/\/www.eginnovations.com\/blog\/what-is-shadow-it-will-ai-make-this-more-challenging\/\">What is Shadow IT? Will AI make this more challenging? | eG Innovations<\/a><\/li>\n<li><a class=\"link\" href=\"https:\/\/www.eginnovations.com\/blog\/how-to-protect-your-it-ops-from-cloud-outages\/\">How to Protect your IT Ops from Cloud Outages<\/a><\/li>\n<li><a class=\"link\" href=\"https:\/\/www.eginnovations.com\/blog\/business-continuity-strategy\/\">Protect Your Organization with the Ideal Business Continuity Strategy | eG Innovations Establishing a Business Continuity Strategy | eG Innovations<\/a><\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>NIS2 (Network and Information Security Directive 2) is the European Union&#8217;s updated cybersecurity directive, replacing the original NIS Directive (2016), often referenced to as NIS1. NIS2 was adopted in December 2022 and the deadline for implementation by EU member states was October 17, 2024. NIS2 strengthens cybersecurity requirements across essential and important sectors to enhance [&hellip;]<\/p>\n","protected":false},"author":59,"featured_media":36836,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_lmt_disableupdate":"no","_lmt_disable":"","footnotes":""},"categories":[383],"tags":[416,546,1561,2273,1874,2283,2079,384,165,437,2282],"class_list":["post-36714","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-infrastructure-monitoring","tag-aiops","tag-anomaly-detection","tag-artificial-intelligence-for-it-operations","tag-dora","tag-incident-management","tag-iso27001","tag-it-incident","tag-it-infrastructure-monitoring","tag-it-security-and-compliance","tag-network-monitoring","tag-nis2"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is NIS2 Compliance? And How to Use Proactive Monitoring to Automate Compliance | eG Innovations<\/title>\n<meta name=\"description\" content=\"NIS2 is the EU\u2019s updated cybersecurity directive, strengthening resilience for key sectors. Learn its scope, requirements &amp; business impact!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eginnovations.com\/blog\/what-is-nis2-compliance-and-how-to-use-proactive-monitoring-to-automate-compliance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is NIS2 Compliance? And How to Use Proactive Monitoring to Automate Compliance | eG Innovations\" \/>\n<meta property=\"og:description\" content=\"NIS2 is the EU\u2019s updated cybersecurity directive, strengthening resilience for key sectors. Learn its scope, requirements &amp; business impact!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eginnovations.com\/blog\/what-is-nis2-compliance-and-how-to-use-proactive-monitoring-to-automate-compliance\/\" \/>\n<meta property=\"og:site_name\" content=\"eG Innovations\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/eGInnovations\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-01T04:29:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-16T07:53:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/NIS2-social-banner.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1201\" \/>\n\t<meta property=\"og:image:height\" content=\"629\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Erik van Veenendaal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eginnovations\" \/>\n<meta name=\"twitter:site\" content=\"@eginnovations\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Erik van Veenendaal\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"14 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is NIS2 Compliance? And How to Use Proactive Monitoring to Automate Compliance | eG Innovations","description":"NIS2 is the EU\u2019s updated cybersecurity directive, strengthening resilience for key sectors. Learn its scope, requirements & business impact!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eginnovations.com\/blog\/what-is-nis2-compliance-and-how-to-use-proactive-monitoring-to-automate-compliance\/","og_locale":"en_US","og_type":"article","og_title":"What is NIS2 Compliance? And How to Use Proactive Monitoring to Automate Compliance | eG Innovations","og_description":"NIS2 is the EU\u2019s updated cybersecurity directive, strengthening resilience for key sectors. Learn its scope, requirements & business impact!","og_url":"https:\/\/www.eginnovations.com\/blog\/what-is-nis2-compliance-and-how-to-use-proactive-monitoring-to-automate-compliance\/","og_site_name":"eG Innovations","article_publisher":"https:\/\/www.facebook.com\/eGInnovations","article_published_time":"2025-04-01T04:29:00+00:00","article_modified_time":"2025-04-16T07:53:36+00:00","og_image":[{"width":1201,"height":629,"url":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/NIS2-social-banner.jpg","type":"image\/jpeg"}],"author":"Erik van Veenendaal","twitter_card":"summary_large_image","twitter_creator":"@eginnovations","twitter_site":"@eginnovations","twitter_misc":{"Written by":"Erik van Veenendaal","Est. reading time":"14 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eginnovations.com\/blog\/what-is-nis2-compliance-and-how-to-use-proactive-monitoring-to-automate-compliance\/#article","isPartOf":{"@id":"https:\/\/www.eginnovations.com\/blog\/what-is-nis2-compliance-and-how-to-use-proactive-monitoring-to-automate-compliance\/"},"author":{"name":"Erik van Veenendaal","@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/person\/24fb6dad95984d6acecc985344777259"},"headline":"What is NIS2 Compliance? And How to Use Proactive Monitoring to Automate Compliance","datePublished":"2025-04-01T04:29:00+00:00","dateModified":"2025-04-16T07:53:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eginnovations.com\/blog\/what-is-nis2-compliance-and-how-to-use-proactive-monitoring-to-automate-compliance\/"},"wordCount":2254,"publisher":{"@id":"https:\/\/www.eginnovations.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.eginnovations.com\/blog\/what-is-nis2-compliance-and-how-to-use-proactive-monitoring-to-automate-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/NIS2-Thumbnail-banner.jpg","keywords":["AIOps","Anomaly Detection","artificial intelligence for it operations","DORA","incident management","ISO27001","IT incident","IT Infrastructure Monitoring","IT Security and Compliance","Network Monitoring","NIS2"],"articleSection":["IT Infrastructure Monitoring"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eginnovations.com\/blog\/what-is-nis2-compliance-and-how-to-use-proactive-monitoring-to-automate-compliance\/","url":"https:\/\/www.eginnovations.com\/blog\/what-is-nis2-compliance-and-how-to-use-proactive-monitoring-to-automate-compliance\/","name":"What is NIS2 Compliance? And How to Use Proactive Monitoring to Automate Compliance | eG Innovations","isPartOf":{"@id":"https:\/\/www.eginnovations.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eginnovations.com\/blog\/what-is-nis2-compliance-and-how-to-use-proactive-monitoring-to-automate-compliance\/#primaryimage"},"image":{"@id":"https:\/\/www.eginnovations.com\/blog\/what-is-nis2-compliance-and-how-to-use-proactive-monitoring-to-automate-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/NIS2-Thumbnail-banner.jpg","datePublished":"2025-04-01T04:29:00+00:00","dateModified":"2025-04-16T07:53:36+00:00","description":"NIS2 is the EU\u2019s updated cybersecurity directive, strengthening resilience for key sectors. Learn its scope, requirements & business impact!","breadcrumb":{"@id":"https:\/\/www.eginnovations.com\/blog\/what-is-nis2-compliance-and-how-to-use-proactive-monitoring-to-automate-compliance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eginnovations.com\/blog\/what-is-nis2-compliance-and-how-to-use-proactive-monitoring-to-automate-compliance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eginnovations.com\/blog\/what-is-nis2-compliance-and-how-to-use-proactive-monitoring-to-automate-compliance\/#primaryimage","url":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/NIS2-Thumbnail-banner.jpg","contentUrl":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2025\/02\/NIS2-Thumbnail-banner.jpg","width":363,"height":236},{"@type":"BreadcrumbList","@id":"https:\/\/www.eginnovations.com\/blog\/what-is-nis2-compliance-and-how-to-use-proactive-monitoring-to-automate-compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eginnovations.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What is NIS2 Compliance? And How to Use Proactive Monitoring to Automate Compliance"}]},{"@type":"WebSite","@id":"https:\/\/www.eginnovations.com\/blog\/#website","url":"https:\/\/www.eginnovations.com\/blog\/","name":"eG Innovations","description":"IT Performance Monitoring Insights","publisher":{"@id":"https:\/\/www.eginnovations.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eginnovations.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eginnovations.com\/blog\/#organization","name":"eG Innovations","alternateName":"eg innovations","url":"https:\/\/www.eginnovations.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2014\/07\/eg-logo-dark-gray1_new.jpg","contentUrl":"https:\/\/www.eginnovations.com\/blog\/wp-content\/uploads\/2014\/07\/eg-logo-dark-gray1_new.jpg","width":362,"height":235,"caption":"eG Innovations"},"image":{"@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/eGInnovations","https:\/\/x.com\/eginnovations"]},{"@type":"Person","@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/person\/24fb6dad95984d6acecc985344777259","name":"Erik van Veenendaal","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eginnovations.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/251d1e9347d3889d7068dccbf9b683e9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/251d1e9347d3889d7068dccbf9b683e9?s=96&d=mm&r=g","caption":"Erik van Veenendaal"},"url":"https:\/\/www.eginnovations.com\/blog\/author\/erik-van-veenendaal\/"}]}},"modified_by":"eG Innovations","_links":{"self":[{"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/posts\/36714","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/users\/59"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/comments?post=36714"}],"version-history":[{"count":0,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/posts\/36714\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/media\/36836"}],"wp:attachment":[{"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/media?parent=36714"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/categories?post=36714"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eginnovations.com\/blog\/wp-json\/wp\/v2\/tags?post=36714"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}