Lorika Systems is a Ukrainian SaaS company. Our Device Trust Platform runs continuous endpoint security posture assessment, maps it to 18 compliance frameworks, and gives Zero Trust gateways a real-time signal: is this device safe to grant access to?
For 15+ years our team built and operated security inside Ukrainian banks and IT-services companies. Every place we worked, the same pattern repeated: the network got attention, the endpoint got a hope-and-prayer antivirus and a yearly compliance checklist. EDR vendors solved one slice (active threats). MDM vendors solved another (configuration push). Nobody answered the question every CISO actually asks at 2 a.m.: "What is the security posture of every device that connected to our systems today, and is it good enough for the data it touched?"
Lorika is our answer. A lightweight agent on every device, 210+ automated checks, a Security Score that updates in real time, and a mapping to the 18 frameworks our customers actually get audited against — ISO 27001, SOC 2, NIST CSF 2.0, CIS Controls, PCI DSS v4, NIS2, DORA, Ukrainian NBU №143/№95, and more.
Lorica is the Latin word for the body armour of a Roman legionary — and the most precise metaphor we found for what a Device Trust Platform actually does. The classical Lorica Hamata wasn't a single plate; it was thousands of interlocking iron rings. If one ring failed, the next one held. That's defense in depth — the same principle every modern security architecture is built on, just expressed seventeen centuries earlier.
A device today carries the same role the legionary's body did: it walks into hostile territory carrying valuable cargo, and it needs continuous, layered protection — not a single perimeter wall miles behind it. Hence Lorika.
Two co-founders with combined 30+ years in Ukrainian banking and enterprise cybersecurity — Raiffeisen Bank Aval, Ukrgasbank, multiple CISO seats, and security consulting across Ukraine and Azerbaijan. We've been on the buyer side of every endpoint security tool you can name; Lorika is the product we wanted to buy and couldn't.
Sales, partnerships, or just want to ask about the architecture — we read every email.