Products

Compliance & Executive Reporting

NIS2 Core

Controls • Gap • Reporting

Central view for NIS2 / NKI compliance: control catalog, gap status, and executive reporting. Designed to sit on top of live operational data (assets, risk, incidents, identity, vulnerability).

Risk & Operations Management

Risk Manager

Risk register, risk matrix, and treatment planning for security and operational exposure. Owners, deadlines, mitigation steps — all tracked in one place.

Referenced in “AI TPM Security Handbook” and earlier material as “LumenGuard.AI”.

Risk & Operations Management

Incident & Ticketing

Incident response workflow with SLA tracking and remediation follow-up. Clear accountability from first alert to closure.

Threat Intelligence

DEVHoneypot Intelligence

AI-powered Indicators of Compromise (IOC) feed generated from attacker behavior captured by controlled decoy services.

Correlates related activity into actionable clusters for faster response.

Identity & Security Evidence

Identity and Access Management / URAMS

Identity and role mapping for access governance: who has access to what, and why. Supports audit and entitlement review.

Referenced in “AI TPM Security Handbook” and earlier material as “BrightPathID.AI”.

Identity & Security Evidence

Log Tokenizer

Transforms raw logs into structured security events and timelines for investigation and reporting.

Referenced in “AI TPM Security Handbook” and earlier material as “PathLensX.AI”.

Asset & Exposure Visibility

Asset / CMDB

Asset inventory with owner, business criticality, and operational context. Keeps critical systems visible to compliance, risk, and operations.

Asset & Exposure Visibility

Vulnerability Management

Vulnerability intake (CVEs), severity scoring, and remediation SLA tracking. Links fixes to accountable owners.