svCompliance — Regulatory Intelligence

Automate adverse media screening, AML checks, and supply chain compliance under DORA, NIS2, CER, and CSDDD

Do you need to meet regulatory requirements that include adverse media search, open-source data lookup, or ESG due diligence across your supplier and counterparty network — without adding 10 analysts?

2M+

Articles/day monitored

12

Languages natively

720+

Event types classified

10+ yrs

Historical screening

Global Regulatory Coverage

One platform. Five major regulatory frameworks.

Select a regulation to see how svCompliance automates the required screening, monitoring, and evidence generation — including national implementations for your jurisdiction.

Click any card to load its details below
AML / KYC

Anti-Money Laundering (AMLD6+)

Onboarding and ongoing due diligence for companies, individuals, and PEPs — automated adverse media with full evidence pack.

View details
DORA

Digital Operational Resilience Act

ICT third-party risk monitoring and concentration risk for EU financial entities — mandatory from Jan 2025.

View details
NIS2

Network & Information Security

Supply chain cyber risk monitoring with ripple-effect detection across ICT supplier networks. CZ zákon 264/2025 Sb.

View details
CER

Critical Entities Resilience

Concentration and disruption monitoring for critical infrastructure entities. CZ zákon 266/2025 Sb.

View details
CSDDD / ESG

Corporate Sustainability Due Diligence

Forced labor, deforestation, child labor, and ESG risk across multi-tier supply chains. German Supply Chain Act.

View details
Coming

CSRD & EU Taxonomy

ESG reporting data intelligence layer — in roadmap for Q3 2026.

NOW SHOWING
AML / KYC
AML / KYC — how svCompliance works

Automated adverse media for onboarding and ongoing due diligence

For both initial onboarding KYC and continuous ongoing due diligence (ODD), our OSINT platform automates adverse media checks across companies, beneficial owners, and PEPs in 12 languages — with a full traceable evidence pack for regulators.

What does "adverse media check" under AMLD6 actually require?

AMLD6 mandates risk-sensitive screening of customers against negative news — including corruption, fraud, sanctions, and tax crimes — at both onboarding and throughout the relationship. Manual searches are no longer sufficient for high-volume portfolios.

1

Upload your watchlist or entity list

Paste or upload companies, individuals, or PEPs. Supports CSV, API push, or direct integration into your existing workflow.

2

One-time onboarding check or continuous ODD alerting

Point-in-time screening (results within 24h, 10 years historical) or automated ongoing monitoring with hourly alerts when new adverse signals emerge.

3

Compliance report with full evidence pack

Each flagged entity receives a structured report with source articles, event classification, severity score, and direct source links — audit-ready for regulators.

Sample adverse media report — ABC Holding s.r.o.
Generated: Apr 2026
Overall risk score
High — 78/100
Corruption & bribery signals
3 events (2022–2024)
Sanctions proximity
Indirect (2nd degree)
Financial crime events
2 events (2021)
ESG / labor violations
None detected
Beneficial owner screening
PEP flagged — Jan 2023
NOW SHOWING
DORA
DORA — how svCompliance works

ICT third-party risk monitoring and concentration risk under DORA

DORA (EU Regulation 2022/2554) requires EU financial entities to continuously monitor ICT third-party service providers — including sub-contractors — for operational risks, incidents, and concentration exposure.

What ICT third-party monitoring does DORA actually require?

DORA mandates that financial entities maintain a register of ICT third-party providers, perform ongoing monitoring for operational disruptions, and identify concentration risk where multiple entities depend on the same critical provider.

1

Upload your ICT supplier register

Import your ICT third-party provider list — cloud, SaaS, data, and network providers. Map each to your critical functions as required by DORA Article 28.

2

Automated risk monitoring and alerting

Continuous monitoring of all ICT providers for adverse events: security incidents, regulatory sanctions, financial distress — with hourly updates and severity scoring.

3

Concentration risk dashboard

Identify which functions rely on a single critical provider. Visualize exposure and generate DORA-compliant concentration risk reports automatically.

Sample DORA ICT risk report — Cloud Provider portfolio
Generated: Apr 2026
Critical ICT providers monitored
47 entities
High-risk alerts (last 30 days)
3 events
Concentration risk detected
2 providers — >40% overlap
Incident reports generated
12 automated reports
Sub-contractor mapping
2 tiers mapped, 1 pending
DORA register completeness
94%
NOW SHOWING
NIS2
NIS2 — how svCompliance works

Supply chain cyber risk and ripple-effect detection under NIS2

NIS2 (Directive EU 2022/2555, CZ law 264/2025 Sb.) extends cybersecurity obligations to supply chains. svCompliance monitors your ICT and critical suppliers for security incidents and detects how vulnerabilities propagate across interconnected networks.

What supply chain obligations does NIS2 create?

NIS2 requires essential and important entities to assess and manage cybersecurity risks in their supply chains — including software vendors, hardware providers, and managed service providers. Incidents at a supplier that affect your operations must be managed and reported within 24–72 hours.

1

Map your ICT and critical supplier network

Upload tier-1 suppliers. svChain automatically expands the map to tier-2 and tier-3 — including shared infrastructure providers that create systemic vulnerability exposure.

2

Real-time incident detection with ripple-effect alerting

When a supplier suffers a security incident, the system immediately flags all your functions that depend on that supplier — direct and indirect — showing potential cascade impact.

3

NIS2 supplier cockpit and reporting

A live dashboard showing supplier health scores, incident history, dependency mapping, and automated monthly compliance reports.

Sample NIS2 supply chain risk map — ICT portfolio
Generated: Apr 2026
Suppliers mapped (all tiers)
183 entities
Critical path vulnerabilities
2 nodes — systemic risk
Active incidents flagged
1 ongoing — cascade watch
Ripple effect score
High — 4 functions affected
Avg. alert lead time vs public news
+6.2 hours earlier
Reporting period compliance
100% within 24h window
NOW SHOWING
CER
CER — how svCompliance works

Critical entity resilience monitoring for infrastructure operators

The CER Directive (EU 2022/2557, CZ law 266/2025 Sb.) requires critical infrastructure operators to assess and manage risks to their physical and operational resilience — including their supplier and partner ecosystem.

What does the CER directive require from critical entities?

Critical entities (energy, transport, health, water, digital infrastructure, finance) must perform risk assessments, monitor for disruptive events, and report significant incidents. The Czech national implementation requires regular supply chain risk assessments and demonstrable monitoring capabilities.

1

Define your critical operations and supply chain

Upload tier-1 suppliers relevant to your critical functions. The platform maps concentration risks and interdependencies across your operational ecosystem.

2

Generate supply chain health map with scoring

Each supplier receives a live SV Health Score — a 180-day rolling signal aggregated from 1.9M daily media sources. Concentration risk and geographic exposure are visualized on an interactive map.

3

Automated resilience reporting

Regular reports on supplier health, disruption alerts, and concentration risk — formatted for submission to national competent authorities.

Sample CER supply chain health map — Energy sector
Generated: Apr 2026
Critical suppliers monitored
34 entities
Concentration risk: geography
High — 3 regions >60% share
Disruption alerts (90 days)
7 events flagged
Avg. SV Health Score — portfolio
62/100 — moderate risk
Supply chain map depth
3 tiers mapped
CER report generated
Quarterly — automated
NOW SHOWING
CSDDD / ESG
CSDDD / ESG — how svCompliance works

ESG and human rights due diligence across multi-tier supply chains

CSDDD, the German Lieferkettensorgfaltspflichtengesetz, and related regulations require companies to identify and address human rights and environmental risks across their entire supply chain — not just tier-1 suppliers.

What ESG risks must CSDDD due diligence cover?

CSDDD requires companies to identify, prevent, and mitigate adverse impacts on human rights (forced labor, child labor, unsafe working conditions) and the environment (deforestation, pollution, biodiversity loss) across their supply chain. This must be a continuous process, not a one-time audit.

1

Map multi-tier supply chain for ESG exposure

Upload tier-1 suppliers. svChain expands to tier-2 and tier-3, identifying production locations, commodities, and regions with elevated ESG risk.

2

Continuous ESG event monitoring and alerting

Real-time monitoring of all mapped suppliers for ESG-relevant events: labor protests, environmental violations, deforestation reports, sanctions for human rights abuses — across 1.9M daily sources in 12 languages.

3

Supply chain ESG risk report with drilldown

A visual supply chain map with ESG health scores per node, geographic risk overlays, and supplier-level drilldown showing the specific events that triggered risk flags.

Sample CSDDD ESG risk report — Apparel supply chain
Generated: Apr 2026
Suppliers mapped (tier 1–3)
142 entities
High ESG risk nodes
8 suppliers flagged
Forced labor risk signals
3 events — Bangladesh, Myanmar
Deforestation alerts
2 sourcing regions flagged
Environmental violation events
4 events (12 months)
ESG score — portfolio avg.
54/100 — elevated risk
Value proposition

Why svCompliance outperforms manual screening and basic tools

Semantic understanding, not keywords

An article about "alleged misconduct by the CEO of Company X" is caught even when "fraud" is never mentioned. Keyword-based tools miss this.

Multi-language adverse media

Corruption in a Slovenian-language article about a Czech subsidiary is detected, classified, and translated automatically.

Corporate structure & language variants expansion

Screening "ABC Holding" automatically screens for its name variations in other languages and optionally includes subsidiaries, sister companies, and beneficial owners — no manual lookup required.

Full audit trail

Every alert links to the original source article, timestamp, and classification rationale — ready for regulatory audit or internal compliance review.

Deployment options

Access your intelligence the way your team works

svEye application

A full browser-based workspace. Search entities, run screening, explorethe knowledge graph, review alerts, and download evidence packs — noinstallation required. Ideal for compliance analysts and risk teamsworking hands-on with the data.

Custom dashboard

A branded, role-specific view of your compliance intelligence —configured to your entity list, regulatory scope, and alert thresholds. Builtfor management reporting, operational oversight, or integration into anexisting risk cockpit. Updated hourly.

Scheduled reports by email

Structured compliance reports delivered directly to your inbox — or yourclient's. Set the frequency (daily, weekly, monthly), the entity scope, andthe output format. Each report includes a full evidence pack with sourcearticles and risk classification, ready for record-keeping.

API

Push entity lists, pull risk scores, and stream alerts programmatically intoyour GRC platform, ERP, data warehouse, or any system with an HTTPclient. Enriched data feeds are also available via cloud storageconnectors — AWS S3, Azure Blob, GCP.

Talk to compliance experts

Tell us which regulation you need to solve — get a tailored demo

Share a few details and our team will prepare a live walkthrough using your regulatory scope, jurisdiction, and a sample of your entity list.

Response within 1 business day
A data specialist — not a sales bot — gets back to you personally.
Confidential by default
Your entity list and regulatory scope stay private. NDA available on request.
Live tailored demo
We pre-configure svEye to your jurisdiction and show real evidence packs.

Request a tailored compliance demo

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.