Products

AI Governance & Compliance

AI Governance Engine

AI asset inventory • use case governance • policy templates • audit log • risk register

Central control plane for your AI landscape: models, datasets, prompts, and data flows in one governed inventory. Map use cases to policies and AI regulations, keep a living risk register, and maintain an audit-ready log of decisions, approvals, and exceptions.

Designed to sit on top of existing AI infrastructure and tooling, providing the governance, evidence, and accountability layer that boards, regulators, and customers increasingly expect.

Compliance & Executive Reporting

NIS2 Core

Controls • Gap • Reporting

Central view for NIS2 / NKI compliance: control catalog, gap status, and executive reporting. Designed to sit on top of live operational data (assets, risk, incidents, identity, vulnerability).

Risk & Operations Management

Risk Manager

Risk register, risk matrix, and treatment planning for security and operational exposure. Owners, deadlines, mitigation steps — all tracked in one place.

Referenced in “AI TPM Security Handbook” and earlier material as “LumenGuard.AI”.

Risk & Operations Management

Incident & Ticketing

Incident response workflow with SLA tracking and remediation follow-up. Clear accountability from first alert to closure.

Threat Intelligence

DEVHoneypot Intelligence

AI-powered Indicators of Compromise (IOC) feed generated from attacker behavior captured by controlled decoy services.

Correlates related activity into actionable clusters for faster response.

Identity & Security Evidence

Identity and Access Management / URAMS

Identity and role mapping for access governance: who has access to what, and why. Supports audit and entitlement review.

Referenced in “AI TPM Security Handbook” and earlier material as “BrightPathID.AI”.

Identity & Security Evidence

Log Tokenizer

Transforms raw logs into structured security events and timelines for investigation and reporting.

Referenced in “AI TPM Security Handbook” and earlier material as “PathLensX.AI”.

Asset & Exposure Visibility

Asset / CMDB

Asset inventory with owner, business criticality, and operational context. Keeps critical systems visible to compliance, risk, and operations.

Asset & Exposure Visibility

Vulnerability Management

Vulnerability intake (CVEs), severity scoring, and remediation SLA tracking. Links fixes to accountable owners.