IdentityMRI™
Core assessment engine. Discovers identities across your estate, scores risk, and generates a board-ready report. No agents required.
- Identity discovery and graph
- Risk scoring (14 Beta connectors)
- Drift detection
- Board-ready PDF report
A unified Identity Fabric, Policy Engine, and Control Plane that connects across vendors — Active Directory, Entra ID, AWS, GCP, Okta, CrowdStrike, and 49+ more. Read-only by default. Board-ready report in hours.
Start with assessment. Add monitoring. Activate enforcement when ready. Each tier is fully functional standalone and more powerful together.
Core assessment engine. Discovers identities across your estate, scores risk, and generates a board-ready report. No agents required.
Full Identity Fabric. Continuous monitoring, anomaly detection, entitlement valuation, adaptive trust scoring, and policy enforcement across all connected vendors.
Active enforcement and incident response. Includes FortifyX™ — containment, blast radius analysis, forensic evidence, and zero-standing privilege enforcement.
Every design decision prioritises operational safety. Zero writes. Human approval for every enforcement action. Full rollback.
Assessment and monitoring phases make zero writes to target systems. No agents deployed. No changes to your identity stores.
Every remediation action requires explicit approval. Full approval chain recorded. Rollback available for every write.
Continuous identity graph across all connected sources. Drift detection compares snapshots over time.
14 Beta push-receivers (GCP, AWS, Okta, Azure AD, CrowdStrike, ServiceNow, and more) plus 35+ Experimental connectors across HRIS, PAM, IGA, SaaS, and LDAP.
HTML and PDF reports formatted for non-technical stakeholders and compliance evidence packages.
HMAC-SHA256 chained audit entries. Every event signed and verifiable via the chain integrity endpoint. Designed to satisfy SOC 2 CC7.2.
No agents. No firewall changes. Connect your identity sources via API or webhook push receiver and your first assessment runs within hours.
Configure connectors via the dashboard. Push receivers accept webhooks from Okta, AWS CloudTrail, GCP Audit Logs, and more. Pull connectors use read-only credentials only.
Trigger via the dashboard or POST to /api/runs.
The AISF pipeline ingests, normalises, graphs, scores,
and reports in a single read-only pass.
Findings surfaced with risk priority and remediation guidance. Enforcement actions require human approval and generate a complete forensic evidence package.
Anonymised, unedited. Collected during the January 2026 beta programme.
“Cut audit prep time significantly. Finally a tool that generates evidence rather than just alerting us to problems.”
“The read-only guarantee was the deciding factor. We ran it in production without a change request. That saved weeks.”
“We had no idea how many stale service accounts existed. The graph showed us in 20 minutes what two weeks of manual work had not surfaced.”
Book a 30-minute discovery call. No credit card. No sales pressure.
POC available for qualifying organisations over 2 months.