Products
NIS2 Core
Controls • Gap • Reporting
Central view for NIS2 / NKI compliance: control catalog, gap status, and executive reporting. Designed to sit on top of live operational data (assets, risk, incidents, identity, vulnerability).
Risk Manager
Risk register, risk matrix, and treatment planning for security and operational exposure. Owners, deadlines, mitigation steps — all tracked in one place.
Referenced in “AI TPM Security Handbook” and earlier material as “LumenGuard.AI”.
Incident & Ticketing
Incident response workflow with SLA tracking and remediation follow-up. Clear accountability from first alert to closure.
DEVHoneypot Intelligence
AI-powered Indicators of Compromise (IOC) feed generated from attacker behavior captured by controlled decoy services.
Correlates related activity into actionable clusters for faster response.
Identity and Access Management / URAMS
Identity and role mapping for access governance: who has access to what, and why. Supports audit and entitlement review.
Referenced in “AI TPM Security Handbook” and earlier material as “BrightPathID.AI”.
Log Tokenizer
Transforms raw logs into structured security events and timelines for investigation and reporting.
Referenced in “AI TPM Security Handbook” and earlier material as “PathLensX.AI”.
Asset / CMDB
Asset inventory with owner, business criticality, and operational context. Keeps critical systems visible to compliance, risk, and operations.
Vulnerability Management
Vulnerability intake (CVEs), severity scoring, and remediation SLA tracking. Links fixes to accountable owners.