Detective Kit
AI Agents that continuously scan and correlate behaviors across the enterprise.
Detective Kit
AI agents patrolling your cyber ontology.
Detectives are AI-driven agents that continuously scan IAM, endpoint, cloud, DLP, vendor, and SIEM data – similar to killer T-cells patrolling the body.
Detective Library
IAM Patrol Detective
Patrols IAM telemetry for unusual MFA patterns, privilege escalations, and impossible travel. Monitors identity and access management platforms for suspicious logins.
Endpoint Hunter
Scans endpoint detection and response platforms for malware, lateral movement, and suspicious process activity.
Cloud Guardian
Watches cloud security platforms for misconfigurations, exposed buckets, and risky IAM roles.
Encryption Guardian
Monitors encryption and key management systems for unauthorized key access, key rotation failures, and encryption policy violations.
Network Sentinel
Analyzes network security platforms for suspicious traffic patterns, unauthorized access attempts, and lateral movement indicators.
Email Phishing Detective
Analyzes email security platforms for phishing campaigns and credential theft patterns.
DLP Watcher
Monitors data loss prevention tools for sensitive data exfiltration, large exports, and external sharing.
AppSec Scanner
Scans application security platforms for vulnerabilities, code flaws, and security misconfigurations in applications.
CI/CD Guardian
Monitors CI/CD pipelines for security misconfigurations, unauthorized deployments, and supply chain attacks.
CSPM Sentinel
Watches cloud security posture management platforms for misconfigurations, compliance violations, and cloud-native threats.
Threat Intel Hunter
Correlates threat intelligence feeds to identify known malicious indicators, IOCs, and emerging threat patterns.
UEBA Analyst
Analyzes user and entity behavior analytics to detect anomalous user activities and insider threats.
SIEM Correlator
Correlates events across SIEM platforms to identify cross-domain attack patterns and multi-stage incidents.
GRC Auditor
Monitors governance, risk, and compliance platforms for policy violations, control gaps, and regulatory non-compliance.
Vendor Sentinel
Tracks vendor risk platforms for rating drops and high-risk vendor activity across the supply chain.
HRIS Monitor
Monitors HRIS platforms for employee lifecycle changes, access provisioning anomalies, and termination access risks.
MDM Enforcer
Enforces mobile device management policies and monitors for device compliance violations and unauthorized device access.
Secrets Guardian
Monitors secrets management platforms for unauthorized secret access, secret rotation failures, and credential exposure.
Data Protector
Monitors data security platforms for sensitive data discovery, classification anomalies, and data access patterns.
ASM Scanner
Scans external attack surface for exposed assets, misconfigurations, and potential entry points for attackers.
Detective Flow
Design how your Detectives patrol the enterprise — similar to killer T-cells scouring the body.