Skip to main content
Identity Fabric · Policy Engine · Control Plane

Stop identity breaches
before they start

A unified Identity Fabric, Policy Engine, and Control Plane that connects across vendors — Active Directory, Entra ID, AWS, GCP, Okta, CrowdStrike, and 49+ more. Read-only by default. Board-ready report in hours.

Cyber Essentials Certified ICO Registered (ZC031428) Read-only by default SOC 2 Type II In Progress

Three tiers. One fabric.

Start with assessment. Add monitoring. Activate enforcement when ready. Each tier is fully functional standalone and more powerful together.

Entry · from £5/user/mo

IdentityMRI™

Core assessment engine. Discovers identities across your estate, scores risk, and generates a board-ready report. No agents required.

  • Identity discovery and graph
  • Risk scoring (14 Beta connectors)
  • Drift detection
  • Board-ready PDF report
Learn more
Standard · from £9/user/mo

IdentityFirst™

Full Identity Fabric. Continuous monitoring, anomaly detection, entitlement valuation, adaptive trust scoring, and policy enforcement across all connected vendors.

  • Everything in IdentityMRI™
  • Continuous monitoring
  • Anomaly detection
  • Identity Coverage Ratio score
Learn more
Enterprise · from £14/user/mo

IdentityFirst™ Enhanced

Active enforcement and incident response. Includes FortifyX™ — containment, blast radius analysis, forensic evidence, and zero-standing privilege enforcement.

  • Everything in IdentityFirst™
  • Active containment engine
  • Blast radius modelling
  • Forensic evidence packages
Learn more

Built for regulated environments

Every design decision prioritises operational safety. Zero writes. Human approval for every enforcement action. Full rollback.

Read-only by default

Assessment and monitoring phases make zero writes to target systems. No agents deployed. No changes to your identity stores.

Human-in-the-loop enforcement

Every remediation action requires explicit approval. Full approval chain recorded. Rollback available for every write.

Temporal identity graph

Continuous identity graph across all connected sources. Drift detection compares snapshots over time.

49+ connectors

14 Beta push-receivers (GCP, AWS, Okta, Azure AD, CrowdStrike, ServiceNow, and more) plus 35+ Experimental connectors across HRIS, PAM, IGA, SaaS, and LDAP.

Board-ready reporting

HTML and PDF reports formatted for non-technical stakeholders and compliance evidence packages.

Tamper-evident audit log

HMAC-SHA256 chained audit entries. Every event signed and verifiable via the chain integrity endpoint. Designed to satisfy SOC 2 CC7.2.

Deploy in days, not months

No agents. No firewall changes. Connect your identity sources via API or webhook push receiver and your first assessment runs within hours.

  1. Connect your sources

    Configure connectors via the dashboard. Push receivers accept webhooks from Okta, AWS CloudTrail, GCP Audit Logs, and more. Pull connectors use read-only credentials only.

  2. Run an assessment

    Trigger via the dashboard or POST to /api/runs. The AISF pipeline ingests, normalises, graphs, scores, and reports in a single read-only pass.

  3. Act on findings

    Findings surfaced with risk priority and remediation guidance. Enforcement actions require human approval and generate a complete forensic evidence package.

What early adopters said

Anonymised, unedited. Collected during the January 2026 beta programme.

“Cut audit prep time significantly. Finally a tool that generates evidence rather than just alerting us to problems.”

Head of Information Security Financial Services · 250–500 employees

“The read-only guarantee was the deciding factor. We ran it in production without a change request. That saved weeks.”

IT Director Healthcare · NHS-adjacent

“We had no idea how many stale service accounts existed. The graph showed us in 20 minutes what two weeks of manual work had not surfaced.”

Security Operations Lead Legal Services · 100–250 employees

Ready to map your identity risk?

Book a 30-minute discovery call. No credit card. No sales pressure.

POC available for qualifying organisations over 2 months.