✓ Phase 1 · Live Now
🛡️
The Auditor — Security Foundation
Know what’s wrong. Prove what’s right.
210+ security checks, 18 compliance frameworks, delta scans, software inventory, resource monitoring, multi-provider SSO (Google, Microsoft, GitHub, X, Apple), multi-tenant organisations, guided onboarding, and a full dashboard — deployed and running.
- 210+ checks across 13 categories (macOS/Win/Linux)
- 18 frameworks: CIS, NIST, ISO, SOC 2, PCI DSS, NIS2, DORA & more
- Token rotation & 30-min idle timeout
- Infrastructure health monitoring
- Automated fleet lifecycle management
✓ Phase 2 · Partial
🔬
The Analyst — Vulnerability & Risk Intelligence
More than auditing — continuous risk control.
Every installed package is cross-referenced against OSV.dev vulnerability databases. Severity breakdown, fix availability tracking, fleet vulnerability dashboard, and exposed services detection — deployed and running.
- ✓ CVE matching against OSV.dev feeds
- ✓ Severity tiers (Critical/High/Medium/Low)
- ✓ Fix availability tracking
- ✓ Network services & NAT detection
- Coming: Security Risk Score (CVSS + CIS deviation)
- Coming: SIEM export to Elastic/Splunk
Coming · Phase 2
🔧
Active Remediation
Don’t just detect — fix automatically.
In paid tiers, the agent applies security fixes: enable firewalls, harden SSH, configure screen lock, deploy unattended upgrades. All actions logged, admin-approved, with dry-run preview.
- One-click fix for detected issues
- Admin approval workflow
- Dry-run preview before apply
- Full audit trail of all changes
Coming · Phase 3 · The Controller
🔑
Adaptive Conditional Access
Trust, but verify the device state.
Integrate with your Identity Provider. If a device’s Risk Score drops below the threshold — access to corporate systems is blocked until issues are resolved.
- Okta, Google Workspace, JumpCloud, Azure AD
- Three-tier trust: compliant / limited / blocked
- Real-time enforcement on score change
- Automatic access restoration after fix
Coming · Phase 3
📱
Mobile Agent — Read-Only Advisor
BYOD-friendly. Privacy-first. No MDM required.
A lightweight iOS & Android app that checks device security (OS version, passcode, encryption, jailbreak) and calculates a Security Score — without invasive MDM permissions. Non-compliant devices are blocked from corporate resources via Conditional Access.
- No wipe, no surveillance — advisory only
- Standard App Store / Google Play distribution
- Push notifications with remediation guidance
- Conditional Access enforcement (Okta/Google)
Coming · Phase 3
☁️
Cloud & SaaS Security (CSPM)
Protection beyond the perimeter.
Automatic audit of cloud service configurations: AWS, Azure, GCP, and Google Workspace. Detect open S3 buckets, excessive IAM permissions, and non-compliance — no agents needed in the cloud.
- AWS, Azure, GCP, Google Workspace checks
- Open storage & IAM overpermission alerts
- Compliance mapping to CIS, SOC 2, PCI DSS
- Scheduled & on-demand cloud scans
Coming · Phase 4 · The Guardian
🔒
ZTNA & Endpoint Defense
Zero Trust from agent to resource.
The agent evolves into a network access gateway. Every connection is verified against the device’s live Risk Score, with EDR integration and DNS filtering for malicious domains.
- ZTNA — per-connection trust verification
- EDR integration (Elastic/Endgame)
- DNS filtering & domain blocking
- Real-time anomaly detection
Coming · Phase 5 · The Ecosystem
🏢
IT Lifecycle & HRM
Single window for IT and HR.
From laptop issuance to digital offboarding checklist. Manage IT budgets, track licence costs, and automate identity lifecycle — all integrated with device security data.
- IT asset registry with financial tracking
- Software licence utilisation reports
- Onboarding / offboarding automation
- NFC badge + Geo-fencing mobile access