IT examination
One solution - legally, organizationally and technically secure.
IT sampling
Contact our experts directly. The first step in IT security is always to get started!
This event has passed!
*Promotional price for IT-examination still applies
00
days
00
Hours
00
minutes
00
Seconds
RED Skull Vulnerability Test
Individual vulnerability test of your IT infrastructure
€ 7.995
one-off
Our RED Skull vulnerability scan is a non-disruptive, automated testing process in which your IT infrastructure is thoroughly analyzed - without interfering with existing systems or disrupting ongoing operations. We rely on:
- State-of-the-art scanning technology
- A preconfigured hardware appliance
- A streamlined procedure from preparation to final evaluation
- Highlight report for presentation to company management, including a clear explanation of the weaknesses found and recommendations for action
- Detailed report with a complete list of all vulnerabilities (broken down by severity level)
The goal is to identify and prioritize network vulnerabilities and provide specific action recommendations. Additionally, it helps explain these issues to those without IT expertise.
This is the one you want.
IT examination*
Vulnerability testing & legal verification of NIS-2 compliance
€ 7.495
one-off
Our IT examination includes a complete RED Skull vulnerability scan and the legal NIS-2 compliance check by our partner CLARIUS.LEGAL. Incl. certificate and specifications.
- All components of the RED Skull vulnerability test
- All components of the NIS-2 compliance check
- Certificate with overall and partial assessment of checked areas for submission to cyberrisk insurers
- Creditable towards the initial costs of setting up the RIEDEL Enterprise Defense [R.E.D.] security suite
The goal: Complete security audit of the IT infrastructure for companies.
Together with your IT and compliance team, we go through a structured audit process that covers all relevant areas of NIS-2 - from technical protection measures to legal processes.
Once the IT audit is complete, you will have a complete overview of the status of your company and thus contribute to improving your security strategy.
NIS-2 compliance check
Legal review of NIS-2 conformity incl. advice
€ 4.800
one-off
The NIS-2 Compliance Check from our partner Clarius.Legal includes a legal review of your company with regard to the requirements of the Network and Information Security Directive 2.
- Preparation of an audit plan
- Implementation of the audit &
Development of a risk management system - Support with implementation (e.g. setting up the contact point)
- Adaptation of contracts and evaluation of partners
- Training and sensitization of employees
The goal: Obtaining an overview of the organizational and legal status quo with regard to the NIS-2 requirements.
These customers (and many more) already rely on RIEDEL Networks.
RED-Skull
Our RED Skull vulnerability scan is a non-disruptive, automated testing process in which your IT infrastructure is thoroughly analyzed - without interfering with existing systems or disrupting ongoing operations. We rely on:
-
state-of-the-art scanning technology
-
a preconfigured hardware appliance
-
a streamlined procedure from preparation to final evaluation

Reporting
Once the scan is complete, you will receive comprehensive documentation from us, divided into two parts:
- 📕 Highlight report - clearly and comprehensibly prepared, with a focus on the most critical vulnerabilities and clear recommendations for immediate implementation.
- 🔬 Detail Report - the complete technical report for your IT department, with an IP-based list of the scanned network area and a detailed presentation of all identified vulnerabilities, including severity, CVSS rating and proposed solutions.
Our structured assessment process analyzes which security gaps exist, how serious they are and in what order they should be rectified. This results in a clear roadmap for hardening your infrastructure.

Certificate
After completing the IT examination, companies receive a complete overview of the status of their security strategy. The detailed certificate with an overall and partial assessment of the audited areas forms a sound basis for the ongoing optimization of security measures and also serves as recognized proof for cyber risk insurers.
Through the targeted identification and assessment of vulnerabilities, the service helps to avoid legal violations and minimizes the risk of fines and liability claims.

Frequently Asked Questions
The questions we are asked most frequently about IT examination.
About IT examination as a package
-
What does IT examination mean? Why this name?
The term IT examination was deliberately chosen in reference to the military examination - a procedure that describes a structured, in-depth and comprehensive examination of a person's suitability. Just as a military examination is not just based on superficial impressions, but on a holistic and standardized assessment, the IT examination does not focus on a single aspect of the IT or legal landscape, but on the overall picture of corporate IT-security.
As part of the IT examination by RIEDEL Networks:
-
a systematic vulnerability scan of the entire IT infrastructure - not just selectively, but comprehensively and in depth,
-
as well as a legal screening of the legal attack surfaces, particularly with regard to NIS-2, by the legal tech partner Clarius.Legal.
Differentiation from conventional audits or NIS-2 checks
Unlike many existing "NIS-2 checks" or selective audits, the IT examination is not limited to individual technical components or a superficial legal assessment. It is:
-
standardized and comprehensive,
-
transparently documented,
-
integrated both technically and legally.
The name "Examination" underlines the holistic nature of the process and is deliberately intended to convey:
"This is not just a superficial check - this is a screening, assessment and clarification of what your digital and regulatory defense capabilities really are."
-
-
Does the IT examination replace my requirements in the KRITIS area?
No, the IT examination does not relieve companies of their responsibility to proactively deal with legal requirements or anything similar. However, the IT examination helps companies to gain an overview of their own status quo and makes it easier to work through and implement the requirements in a structured manner. -
What is the difference to a normal vulnerability scan or an NIS-2 audit?
A conventional scan usually only checks technical components, while an audit often focuses on individual legal aspects.
The IT examination combines both - in a standardized, documented and practical procedure:-
Complete vulnerability scan of the IT infrastructure
-
Legal NIS-2 check by our legal tech partner Clarius.Legal
-
Clear, comprehensible recommendations for action
-
-
Who carries out the IT examination?
The IT examination is a joint offer from:
-
RIEDEL Networks (technical analysis & IT security assessment)
-
Clarius.Legal (legal review of NIS-2 compliance, incl. documentation)
-
-
For which companies is IT examination relevant?
The IT examination is aimed at:
-
Companies affected by the NIS-2 Directive
-
Companies that want to gain a clear overview of their IT security status and their legal attack surface
-
Organizations that want more than a superficial audit - namely real screening
-
-
Is the whole thing a one-off or can it be repeated?
The IT examination can be carried out as a one-off status assessment - but it is also suitable as a regular measure to review and improve your IT and compliance structure. However, it is advisable not to view IT security as a "sprint", but rather as a "marathon" and to equip yourself for the endurance run with solutions such as the RIEDEL Enterprise Defense [R.E.D.] Cybersecurity Suite.
-
What requirements must be fulfilled?
Nothing special - just:
-
Access to the relevant IT infrastructure (for the vulnerability scan)
-
Willingness to cooperate with internal contacts (e.g. IT management, data protection, legal)
-
-
What concrete benefits (monetary) do I gain from this?
The results of the IT examination are recorded and made available in various documents, reports and a test certificate. Experience has shown that this provides you with sufficient "food in hand" to prioritize the issue internally and thus prevent possible damage caused by cybercrime. On the other hand, cyberrisk insurers are also grateful for the detailed investigations and offer companies better conditions as a result. We are happy to help you find suitable insurance products from our partners.
About the NIS-2 compliance check
-
What does the NIS-2 Compliance Check from CLARIUS.LEGAL include?
Clarius.legal analyzes your existing security structure using a structured audit. This involves checking how well your technical and organizational measures already meet the NIS 2 requirements - based on the specifications of the BSI IT baseline protection.
-
What specific benefit do I receive?
- Creation of an individual audit plan
- Implementation of a compliance audit
- Development of a risk management system
- Adaptation of contracts with partners and service providers
- Training for management and employees
- Development of a legally compliant reporting chain
-
How long does the NIS-2 compliance check take?
The implementation of the individual points is spread over several appointments, each lasting between 1 - 3 hours. Depending on the flexibility of the contact person's schedule, the legal review and preparation can be completed in a good month.
-
What is the advantage of working with CLARIUS.LEGAL?
Clarius.legal combines legal expertise with technical cyber security. This provides you with a complete solution from a single source - legally compliant, efficient and cost-optimized. This allows you to reduce liability risks and ensure real protection at the same time. -
How does the collaboration actually work?
- Audit planning & preparation
- Implementation of the compliance check
- Assessment and prioritization of risks
- Implementation of organizational & technical measures
- Continuous support from experts
-
Who in the company is actually responsible for this?
The management bears overall responsibility and can be held liable in the event of breaches. In practice, IT, compliance, data protection and external consultants (such as CLARIUS.LEGAL) work together on implementation.
-
Do all IT systems now have to be adapted?
Not necessarily all, but all security-relevant systems must undergo a risk assessment and, if necessary, be secured by technical or organizational measures. These include firewalls, backup systems, VPNs, access controls, etc.
-
How often do risk analyses need to be carried out?
At least annually or in the event of major changes to the IT infrastructure. We help you set up a standardized risk management process. In addition, technical monitoring of the IT infrastructure, e.g. by the RIEDEL Enterprise Defense [R.E.D.] managed security service, is helpful in maintaining an overview.
-
Which documents need to be created or adapted?
- Security guidelines and concepts
- Contracts with service providers (e.g. order processing, security requirements)
- Emergency plans and reporting processes
- Training certificates
- Risk assessments & technical reports
Clarius.legal is happy to provide templates!
Provided by our partner Clarius.Legal
About the RED-Skull vulnerability scan
-
What is the RED SKULL Vulnerability Test?
The RED SKULL Vulnerability Test is an automated vulnerability scan of your IT infrastructure. Using a preconfigured hardware appliance, we analyze your networks for potential security vulnerabilities - quickly, securely and without interrupting your operations.
-
How does the vulnerability scan work?
1. dispatch of the preconfigured test kit
2. execution of the scan by our Security Operations Center (SOC)
3. return of the device
4. evaluation of the results
5. discussion and delivery of a detailed report with recommendations for action
-
Does my IT team have to actively intervene?
No. Once the test kit has been connected, our SOC takes care of the entire process remotely. All your team has to do is prepare the network infrastructure and connect the device.
-
Will the scan affect our ongoing operations?
No. The scan is non-disruptive. No systems are attacked or changed, so your operations can continue undisturbed.
-
How long does the scan take?
Depending on the size and complexity of your network, the scan takes between a few hours and up to a week. The report is then generated within about a week.
-
What data is collected and how is data protection guaranteed?
No system data is changed. All information collected is transmitted in encrypted form, processed in accordance with GDPR and ISO 27001 standards and can be deleted or archived on request.
-
What technical requirements must be met?
The scanner is a miniserver that is preconfigured on receipt and you will receive specific instructions on how to carry out the scan and integrate the device in consultation with our SOC.
You simply mount the supplied LTE antennas on the connections provided. The device starts as soon as it is connected to the power supply.
Our SOC manages the scanner remotely and makes the necessary configurations.
You simply ensure that routing, firewall rules, VLAN, VPN access and Internet connectivity are configured. But our colleagues are happy to help!
-
What happens after the scan?
You will receive a comprehensive report on all weaknesses found, including prioritization and specific recommendations for action. We will discuss the results with you in a personal meeting.
About the NIS-2 directive
-
What is NIS-2 supposed to do?
The NIS-2 Directive aims to strengthen cybersecurity in the European Union by introducing higher security standards and reporting obligations for companies. It aims to increase the resilience of critical infrastructures and improve cooperation between member states.
-
When does NIS-2 come into force?
The deadline for national implementation of the NIS 2 Directive expired in October 2024. Germany is currently lagging behind this requirement - but implementation is planned in the near future.
-
Which companies are affected?
Companies operating in critical sectors, including energy, transport, banking, financial market infrastructure, healthcare, drinking water supply and distribution, digital infrastructure, public administration and space, are affected by compliance with the NIS 2 Directive. In addition, the directive now also covers digital service providers such as cloud services, online marketplaces and search engines to ensure more comprehensive coverage of cybersecurity requirements.
-
What measures do companies need to take?
To comply with the NIS 2 directive, companies must take several measures:
-
Implement robust security measures: companies must protect their networks and information systems with appropriate technical and organizational measures to prevent and defend against cyberattacks.
-
Regular risk analyses: Companies must carry out regular risk assessments to identify potential vulnerabilities and implement appropriate protective measures.
-
Security incident reporting: Companies are obliged to report serious security incidents to the relevant authorities immediately to enable a rapid response and cooperation.
-
Training and awareness: Employees must be regularly trained and made aware of cybersecurity risks in order to promote security-conscious behaviour and minimize human error.
-
Contingency plans and crisis management: Companies must establish contingency plans and crisis management processes in order to be able to react quickly and effectively in the event of a cyber attack.
-
-
What needs to happen if a security incident occurs?
Within 24 hours:
You must provide an initial assessment to the relevant national authority or the CSIRT (Computer Security Incident Response Team) within the first 24 hours of detecting a security incident. If applicable, indicate whether the incident may be the result of illegal or malicious activity and provide initial information on the potential impact on systems and security of supply.Within 72 hours:
You must prepare and submit a detailed report with the so-called Indicators of Compromise (IoCs) to the competent authority no later than 72 hours after the discovery of the incident. These IoCs, such as IP addresses, malware signatures or unusual network activity, are used to identify the threat. Supplement the report with an initial assessment of the impact on affected services and customers.After one month:
You must submit a comprehensive final report no later than one month after the incident. This report must describe the security incident in detail, analyze the causes, assess the severity and document the impact. In addition, you must explain the type of threat (e.g. ransomware, DDoS attack), describe the remedial measures taken and evaluate their effectiveness. Finally, you should formulate specific recommendations to prevent similar incidents in the future and improve the cyber security situation. -
What are the sanctions for violations?
Companies that violate the NIS 2 Directive face significant sanctions. Depending on the severity of the breach and the national legislation of the EU member states, these may include the following measures:
- Management liability
The NIS 2 Directive introduces extended management liability, which means that managers can be held personally responsible for compliance with cybersecurity requirements. - Heavy fines:
Companies can be subject to heavy fines, which in severe cases can be up to €10 million or 2% of annual global turnover, whichever is higher. - Public disclosure:
Violations can be made public, which can cause considerable damage to the company's reputation.
- Management liability
-
Who bears responsibility in the company?
The responsibility for implementing the NIS 2 Directive in companies lies with the top management level, in particular the managing directors and board members. These managers are responsible for ensuring that their company takes and maintains the necessary measures to comply with the directive.
They must independently check at an early stage whether the company is covered by the directive. A special feature is that the Directive provides for the personal liability of the management if necessary measures are not implemented.
-
How can companies efficiently implement the requirements of the NIS-2 directive?
The requirements for companies include various to-do's from different fields. Software-based solutions help you to comply with all obligations and, in particular, simplify the fulfillment of the obligation to provide evidence.
The NIS-2 directive should not be seen as a static requirement, but aims to motivate companies to continuously manage risk.
Provided by our partner Clarius.Legal