Skip to main content
Platform 23 Modules

The Complete Identity
Security Platform

23 modules. 14 Beta connectors. One platform to discover, monitor, govern, and respond to identity risk across your entire estate.

23 Platform Modules
14 Beta Connectors
35+ Experimental
0 Writes Without Approval

Built on Four Principles

Read-Only by Default

All connectors operate in discovery mode. Zero writes to target systems without explicit approval.

Human-in-the-Loop

Every write action requires explicit human approval. No automated changes to production systems.

Deploy in Days

No agents, no infrastructure changes. Push-connector architecture means you're live in 1–3 days.

Tamper-Evident Audit

HMAC-SHA256 hash chain per tenant. Every action is journaled, verifiable, and reversible.

23 Platform Modules

Every module ships as a standalone C# project with its own tests. No monolith.

01

Core

Canonical identity model, audit logging, capability gates, module registry

02

Governance

Drift engine, risk scoring engine, identity snapshots, DriftFinding

03

Approval Workflow

Human-in-the-loop write control, policy-based approval, timeout escalation

04

Rollback & Recovery

Write journal, rollback service, change reversal with full audit trail

05

OpenView

Identity view collection, change detection, Channel-based streaming

06

Data Normalisation

Source normalisation rules, 5 built-in rules, pluggable engine

07

Connector Framework

Registry, Polly-backed orchestrator, hosted service

08

IntelliCore

Governance intelligence, adaptive trust scoring, ReformationX, CognitiaEngine

09

Entitlement Valuation

Entitlement risk scoring, privilege-weighted valuation reports

10

Health Check Report

Board-ready PDF/HTML report generation with ICR score

11

Webhook Event Bus

Outbound webhook bridge for SIEM/SOAR integration (fabric.* events)

12

Anomaly Detection

Behavioural anomaly detection engine, fires into FabricAgents pipeline

13

Fabric Event Pipeline

Intra-process Channel-based event bus (no external dependencies)

14

Fabric Agents

30 AISF orchestration agents — the assessment intelligence layer

15

Session Capture

Session identity recording, chain resolution, graph projection

16

FortifyX™

Containment, blast radius modelling, forensic evidence, identity twin simulation

17

Lifecycle Management

SCIM 2.0 provisioning — joiner, mover, leaver automation

18

Access Review

Campaign lifecycle, reviewer assignment, decision recording

19

Policy Engine

SoD rules registry, 5 built-in conflict rules, ISoDPolicyEvaluator

20

Privileged Access

JIT elevation service, zero standing privilege cycle (request→approve→elevate→expire)

21

Audit Correlation

Cross-source event correlation engine — correlates events by identity across all connectors

22

Tenant Bootstrap

ZSP defaults, tenant initialisation pipeline

23

ICR (Coverage Ratio)

Identity Coverage Ratio: Discovery(30%) + Monitoring(25%) + Governance(25%) + Protection(15%) + Confidence(5%)

Connector Transparency

We publish our connector tier status. No inflated claims.

Tier 1 — GA

0

Real-tenant validated, load-tested, SLA-backed. We don’t have any yet. We’ll say so when we do.

Tier 2 — Beta

14

Parser + unit tests exist. Push-receiver architecture. Actively seeking live-tenant validation. Suitable for POC.

Tier 3 — Experimental

35+

Smoke-tested adapters. Available for custom scoping. No production claim made.

Ready to See the Platform?

Book a demo or enquire about a 2-month Proof of Concept for your organisation.

Book a Demo View All Connectors