Unified Risk & Compliance · SaaS / On‑Prem / Hybrid

Your CISO and your auditor finally look at the same screen.

URIP is a multi-tenant platform that turns any company’s existing security tools into one live risk dashboard and one continuously audit-ready compliance dashboard — on the same data layer. Pick the tools you own. Enter API keys. Watch twenty-five consoles collapse into one pane.

Your tools · Your data · One pane · Audit-ready
URIP Risk Intelligence
Open Risks
2,847
12
Critical
38
+4
IOC Hits
17
3
CVE-2026-0142 · Tenable · T1 Asset9.7
APT41 · Zscaler C2 match9.4
Risky sign-in · MS Entra8.1
Endpoint quarantine · SentinelOne7.6
Policy drift · Netskope6.0
Compliance · Audit-Ready
89%
SOC 2 · TSC 2022
152 / 171 controls
77%
ISO 27001:2022
71 / 93 controls
62%
PCI DSS v4.0
155 / 250 controls
84%
HIPAA
42 / 50 safeguards
CC7.1 Threat Detection — FAIL (root: CVE-2026-0142)view
A.8.8 Vulnerability Mgmt — FAIL (3 CVEs)view
CC6.1 Logical Access — INCONCLUSIVEview
25
Production Connectors Live
25+
Source Categories Supported
15
Compliance Frameworks
16
License Modules (Core + 15)
4
Live Threat Feeds (EPSS·KEV·MITRE·OTX)
3
Deployment Modes (SaaS · On‑Prem · Hybrid)
2
Dashboards · 1 Data Layer
0
Sensitive Data Leaves Network*

No customer is ever told “we don’t support that tool.” They’re told “implement four methods, or we’ll build it for you.”

— The universal connector framework promise
What only URIP does

Eight things no other vendor can offer in one pane.

Point solutions run one layer well — compliance, threat intel, CSPM, endpoint. URIP is the cockpit on top of whatever stack you already own — unifying risk, compliance, auto-remediation, and vendor collaboration in one pane.

Risk ↔ Control Linkage
When a SOC 2 control fails, URIP already shows the CVE causing it, its EPSS exploit probability, the APT exploiting it, and which Tier‑1 asset is affected. No other platform joins risk intelligence and compliance control on the same data layer.
Native compliance automation
15 frameworks pre-seeded (SOC 2, ISO 27001:2022, GDPR, HIPAA, PCI DSS v4, India DPDP, NIST CSF 2.0 + ISO 42001, EU AI Act, DORA, NIS2, ISO 27017/18/701, CIS v8). Auditor portal with framework-scoped, time-bound, read-only invitations.
Closed-loop VAPT Vendor Portal
Pentest vendors log in via single-use JWT, upload findings, request re-tests. Auto-enrichment with EPSS + KEV. State machine: Open → Re-test → Pass/Fail → auto-close. No more PDF email chains.
Auto-Remediation pipeline
CrowdStrike RTR (OAuth2 Bearer), Ansible Tower, Fortinet REST, CyberArk REST executors. Implication-check + approval-gate + re-test. Per-tenant Fernet vault. Whitelist categories for zero-touch closure.
Hybrid-SaaS deployment
Docker agent on the customer's network. HMAC-signed reporter, anti-replay nonce, one-time drilldown tokens. Sensitive identifiers never leave the customer's perimeter — an architecture pure-cloud platforms structurally cannot match.
Trust Center / Sales acceleration
Public NDA-gated posture page. Time-bound SHA‑256-hashed access tokens. HTTP-206 Range streaming. Cuts security-questionnaire churn for B2B sales.
Bidirectional Jira / ServiceNow
Auto-create on risk assignment. HMAC-signed webhooks for close-loop sync. Pre-flight schema validation against the customer’s actual project key / table before save.
Module-pickable (16 capabilities)
CORE + VM, EDR, Network, Identity, Collab, ITSM, DAST, DLP, CSPM, Compliance, DSPM, AI Security, ZTNA, Attack Path, Risk Quant (FAIR). Subscribe to what you need. Disabled modules are dark in the UI and inactive in the backend.
What URIP Is

Two dashboards. One data layer. One pane.

URIP (Unified Risk Intelligence Platform) aggregates findings from your existing security stack, enriches every finding with live exploit and threat-actor intelligence, and renders the result as two linked dashboards on a single tenant.

CISO View

URIP Risk Intelligence

“Where am I most exposed today?”

  • Composite 0–10 risk score on every CVE
  • Live EPSS, KEV, MITRE ATT&CK and OTX enrichment
  • APT attribution and IOC matches per finding
  • Asset-tier weighting (T1–T4)
  • SLA timers, owner assignment, auto-ticket to ITSM
Compliance Officer View

Continuous Audit-Readiness

“If the audit landed next week, would we pass?”

  • Framework score widgets with trend arrows
  • Per-control drill-down with root-cause CVEs
  • Drag-drop evidence with SHA-256 integrity
  • Time-bound, framework-scoped auditor portal
  • Versioned policy templates with e-sign workflow
Both dashboards render from the same tenant data, share the same auth, the same audit log, and the same connector mesh. Critically, they are linked: when a SOC 2 control fails, you see the exact CVEs causing it. No other product does this.
What URIP Is Not

The competitive truth table.

URIP is not a point solution. It is an intelligence overlay. Here is how that changes every architectural assumption.

Assumption Vertically-Integrated Vendors URIP
Data ownership Findings live in the vendor’s cloud Sensitive data stays on your network (Hybrid-SaaS)
Tool coverage Only the vendor’s own agent or scanner Any tool with an API — 25+ categories today
Risk × Compliance linkage Risk and compliance are separate products with separate data One tenant. One schema. One pane.
Scoring transparency Opaque AI or black-box scoring Deterministic formula — CVSS × 0.55 + EPSS × 2.5 + KEV + tier
Vendor portal No dedicated vendor portal for external pentesters Scoped VAPT vendor login with auto-enrichment
Auto-remediation Auto-remediation limited to the vendor’s own ecosystem CrowdStrike RTR + Ansible + CyberArk — gated by safety checks
Deployment flexibility SaaS-only deployment; no on-prem or hybrid option SaaS / On-Prem / Hybrid — same codebase
Threat intel depth Proprietary threat feeds with no open-standard scoring EPSS + KEV + MITRE ATT&CK + OTX + CloudSEK — all live
Pricing model All-or-nothing platform licensing Per-module subscription — pay only for what you turn on
Connector extensibility “We don’t support that tool” — category gaps common “Implement four methods, or we’ll build it for you”
How a Customer Onboards

Three screens. No professional services.

The same flow runs for the 50-person SaaS startup chasing SOC 2 and the 1000-person manufacturer with eleven tools.

01

Sign up & brand

Tenant provisioned with its own slug, encryption key and database scope. Upload logo, pick colors, set the app name. Login pages, dashboards, exports and auditor invites carry your brand.

02

Pick from the catalog

A grid of every supported vendor — one-line description, setup difficulty, freshness target, and a status pill. Click each tool you own. Universal framework means every category is selectable.

03

Paste & test connection

Per-tool guided wizard with inline help and the vendor’s API doc link. Click Test Connection — in 2–4 seconds you see “Connected. Found 2,847 assets.” or the exact remediation step.

04

Watch it populate

Credentials saved to a per-tenant Fernet vault. The 15-minute poll cycle starts. Risk dashboard fills within minutes; compliance dashboard within an hour. Auditor invite can go out the same day.

Intelligence Overlay Architecture

An intelligence overlay, not a replacement.

URIP is a vendor-agnostic orchestration layer. It sits above your existing security stack — aggregating findings, normalising into one schema, scoring with the 5-lens engine, and routing to the consumers that matter.

25
Existing Sources
VM · OT · Cloud · SoC · EDR · CASB · PAM · NAC ...
Vulnerability Mgmt
EDR / EPP
CNAPP / Cloud
OT / IoT
SoC / SIEM
NAC / Network
PAM / Identity
Workspace / Email
+ 6 more categories
URIP
Normalisation
Scoring
Enrichment
One internal URIPRiskRecord schema
Vendor-agnostic. Read-only. Deterministic.
CISO Dashboards
25-column live risk register · SSVC tags · A–F posture grade
Auto-Remediation
Playbooks for the top 20 high-EPSS / KEV CVEs · one-click apply
Ticketing Integration
ManageEngine SDP / Jira bidirectional close-loop with SLA SLO
Implementation in 6 Waves

From kickoff to auto-remediation go-live.

A typical 7,000-endpoint enterprise rollout runs through six neutral waves — outcomes per wave, not calendar dates. A 50-person SaaS startup with 5 connectors completes Waves A–D in a fraction of the time.

A

Core Data Flowing

First two connectors stood up (typically VM + EDR). OT access pattern decided. Asset fingerprinting active. Managed / Unmanaged / Unknown classification engaged.

Live data from your two highest-volume sources landing in URIP.
B

Register Live with Remediation

Risk register populated. Composite scoring computing on every finding. Pending Days counters running. Remediation steps auto-fetched from NVD. VAPT Vendor Portal stood up.

The IT team works the URIP register instead of Excel.
C

Full Workflow Live

Risk Acceptance Workflow with HoD digital sign-off. Jira / ServiceNow bidirectional ticketing wired. Advisory Applicability Engine classifying every advisory.

Risk lifecycle fully owned inside URIP — no parallel Excel.
D

Demo Ready

Executive Security Posture Dashboard. Board + CERT-In compliance reports. APT tagging + IOC matching active on every applicable risk. Role-based access tightened.

Customer can present URIP to their board and to CERT-In auditors.
E

Full System Live

Long-tail tools connected (PAM, NAC, DLP, DAST). UAT cycle with the IT team. Auto-Remediation script library piloted on a controlled set of CVE classes.

Your full stack feeding URIP. Auto-Remediation pilot proven safe.
F

Auto-Remediation Go-Live

Auto-Remediation pipeline goes live (gated by Implication Check + Approval Gate). Performance testing under load. Ops handover documentation.

URIP operationally owned by your team. We move to support mode.
End-to-End Orchestration Pipeline

Six stages from a raw API pull to a closed risk.

Every finding moves through the same six-stage pipeline — deterministic, auditable, and re-runnable. No black boxes.

01 · DETECT

Detect

Pull live feeds from 25 disparate risk sources via read-only APIs and webhooks.

02 · AGGREGATE

Aggregate

Deduplicate via asset fingerprinting (MAC + Hostname + IP) and normalize to a 0–10 scale.

03 · PRIORITISE

Prioritise

Apply the 5-layer filter — CVSS, EPSS, CISA KEV, Asset Tier, MITRE ATT&CK / OTX.

04 · ASSIGN

Assign

Auto-route to the named domain owner (Network / Cloud / Identity) and trigger SLA timers.

05 · REMEDIATE

Remediate

Attach mitigation steps. Push automated playbooks via CrowdStrike RTR / Ansible / CyberArk API.

06 · REPORT

Report

Generate clean CISO dashboards, framework score snapshots and audit-ready board packs.

Intelligence Engine

Five services that turn raw feeds into actionable intelligence.

Behind every scored risk is a deterministic engine that normalises, fingerprints, matches, fetches and orchestrates — no black boxes, no opaque ML.

Vendor-Agnostic · Same engine runs under every connector
01

Severity Normalisation

Maps every vendor’s severity vocabulary — Tenable’s CVSS, SentinelOne’s threat level, CrowdStrike’s criticality — into one unified 0–10 scale before scoring begins.

Deterministic mapping table per connector
02

Asset Fingerprinting

Correlates MAC + hostname + IP + cloud instance ID to deduplicate findings across overlapping tools. One asset, one truth — no phantom duplicates inflating your register.

Cross-connector identity resolution
03

Advisory Applicability

Classifies every CERT-In / US-CERT / ENISA advisory against your live asset inventory. “Does this advisory apply to anything we actually own?” Answered automatically.

Inventory-matched advisory routing
04

Remediation Fetcher

Auto-fetches vendor patches, workarounds and configuration steps from NVD and vendor KBs for every scored CVE. Remediation steps arrive with the risk, not two days later.

NVD + vendor KB aggregation
05

Connector Runner

Orchestrates the poll cycle, health checks, drift detection and credential rotation for all 25+ connectors. If a connector goes silent, the engine escalates — never hides.

15-min / 60-min / 4-hr staggered cycles
Risk Score Enrichment

5 lenses turn raw CVSS into a score that actually matters.

A theoretical CVSS 9.8 means nothing if no exploit exists. URIP layers exploit probability, federal exploitation status, business-asset criticality, and threat-actor context. The output is one ranked priority score per finding — ACT NOW / ACT / ATTEND / TRACK.

01
Raw CVSS
Theoretical base severity from NVD (e.g., CVSS 10.0).
Source · NVD
02
EPSS
Live ML model dictating exploit probability over the next 30 days (e.g., 97% chance).
Source · FIRST.org
03
CISA KEV
Federal catalog confirming active exploitation in the wild — the "weaponised" badge.
Source · CISA
04
Asset Criticality
Business-context mapping — Tier-1 Payment Gateway behaves nothing like a Lobby Kiosk.
Source · URIP CMDB
05
Threat Intel
Actor context — who, where, and how. APT28 / Lazarus / Sandworm mapping with MITRE ATT&CK.
Source · MITRE · OTX · CloudSEK
How We Calculate Risk

URIP doesn’t invent severity. It composes it.

Every CVE that lands in URIP is run through a four-input formula plus an enrichment layer, producing a single 0–10 composite score.

URIP Risk Score = clamp[0, 10] ( (CVSS × 0.55) // theoretical severity + (EPSS × 2.5) // 30-day exploit probability + (KEV ? +2.0 : 0) // actively exploited now + (asset_tier_bonus) // T1:+1.0 T2:+0.5 T3:0 T4:−0.5 )
CVSS Base Score
The public NVD severity anchor
× 0.55
EPSS Probability
Will this CVE be exploited in the wild in 30 days?
× 2.5
KEV Bonus
CISA Known Exploited Vulnerabilities flag
+ 2.0
Asset Tier Multiplier
Tenant-configurable T1–T4 criticality
± 1.0

Plus two enrichment layers no formula captures.

APT attribution — MITRE ATT&CK CVE-to-group mapping. “This CVE is exploited by APT41 (T1190 Exploit Public-Facing Application). You are in their target sector. Treat as Critical.”

IOC matches — AlienVault OTX pulses. “This C2 IP from your Zscaler logs matches an active OTX pulse from yesterday.”

EPSS · FIRST.org KEV · CISA MITRE ATT&CK AlienVault OTX
The unique edge. When a SOC 2 control fails, URIP already knows which CVE caused it, its exploit probability, the APT exploiting it, and which Tier-1 asset is affected. Compliance-only platforms lack CVE-level threat enrichment. Threat-intel platforms lack compliance scaffolding. URIP has both, joined inside one tenant.
Threat Intelligence Overlay

Contextual intelligence layered on top of every risk row.

Who is attacking, how, and are they targeting your specific sector? URIP joins live geo-cluster activity, APT actor mapping, and industry-vertical filtering against the CVEs already alive in your environment.

ENTERPRISE TARGET ZONE

Geo Threat Map

Live visualisation of global attack clusters

LIVE
412
active pulses
38
origin countries
9
cluster regions

APT Overlays

Actor groups mapped to active CVEs in your environment

APT28 (RU) HIGH
CVE-2024-3400 PAN-OS
Lazarus (KP) HIGH
CVE-2023-20198 Cisco IOS
Sandworm (RU) MEDIUM
CVE-2024-31497 PuTTY

Sector Focus

Threats actively targeting your industry vertical

Industry VerticalFinancial Services
Targeted Threats14 Active Pulses
Top ActorAPT33 (IR) · Energy / Finance
Ingestion · Taming Disparate Risk Sources

29 production connectors live. 25+ source categories supported.

Every input maps into one of two layers — 9 Core Risk Inputs that produce findings, and 5 Contextual Security Connectors that enrich them with business context. The universal four-method framework + simulator means every category is selectable today — even before the real connector is configured.

9

Core Risk Inputs

Primary findings · CVEs, exploits, attacker activity

Vulnerability Mgmt & EDR
Tenable · Qualys · Rapid7 · SentinelOne · CrowdStrike · Defender · ManageEngine
EASM
External attack surface · CrowdStrike External · CloudSEK
CNAPP · Cloud Posture
CrowdStrike Cloud · AWS · Azure · GCP misconfig feeds
OT Environments
Operational technology · Armis
Threat Intelligence
EPSS · CISA KEV · MITRE ATT&CK · AlienVault OTX · CloudSEK
Govt Advisories
CERT-In · US-CERT · ENISA RSS / API
Bug Bounty
HackerOne · BugCrowd · Internal program webhook
SoC Alerts
SIEM webhooks · Splunk · ELK · Sentinel · ManageEngine
5

Contextual Security Connectors

Context that turns CVEs into composite scores

Network Access Control
Forescout · Cisco ISE
Privileged Access (PAM)
CyberArk
Cloud / CASB / SWG
Zscaler · Netskope
Firewall · Network
Fortinet / Fortigate · Palo Alto
Workspace · Email Security
Microsoft 365 (Entra · SharePoint · OneDrive · Teams) · Google Workspace
Takeaway: All feeds connect via read-only APIs or webhooks. Zero manual data entry. Drift detection escalates silently-failing connectors so a “green-but-blind” source never goes unnoticed.

The Normalization Engine

Every tool’s raw output — a Tenable scan blob, a SentinelOne threat record, a Zscaler URL block, an Entra riskEventType — maps to one internal URIPRiskRecord schema before scoring. The risk register, the dashboard, the workflow, the SLA service, the audit log all consume the same shape.

This is the difference between “we built 29 connectors” and “we built one connector the same way — and 25+ source categories ride the same rails.”

  • Per-tenant Fernet-encrypted credential vault
  • 15-min / 60-min / 4-hr staggered poll cycles
  • Drift detection → DEGRADED state (no silent failure)
  • Auto-discovered into the catalog wizard
connectors/base/connector.py
class Connector:
    def authenticate() -> AuthState
    def fetch_findings(since: datetime) -> list[RawFinding]
    def normalize(raw: RawFinding) -> URIPRiskRecord
    def health_check() -> ConnectorHealth

Implement four methods. Provide a severity mapping. Register in the catalog. Ship. The plumbing — encrypted credentials, scheduling, normalization, scoring, audit logging — is already done.

The Two Dashboards

Both run from the same tenant. Both share the same auth.

The Compliance dashboard runs as a separate FastAPI service on port 8001 with its own database — and can also run standalone for prospects who want only audit-readiness.

URIP · The CISO Pane

URIP Risk Intelligence Dashboard

  • Top KPI strip — 5 click-through tiles (Open / Critical / High / Accepted / IOC Matches)
  • 25-column live risk register — auto-populated from every connector, every column drillable
  • SSVC decision label per finding — ACT NOW / ACT / ATTEND / TRACK
  • Pending Days counter on every row · configurable escalation thresholds
  • Threat intel panel — active APTs targeting your sector, MITRE techniques, IOC pulses
  • Connector health board with drift detection (no “green-but-blind” failures)
  • HoD risk-acceptance workflow with digital sign-off · 90-day re-review reminder
  • Auto-ticket to ManageEngine SDP · bidirectional close-loop
  • Immutable, tenant-scoped audit log (every action recorded)
  • Executive Security Posture dashboard — A–F grade, week-over-week trend
Compliance · The DPO Pane

Compliance Dashboard

  • 15 framework score widgets with trend arrows · controls passing / total
  • Per-framework drill-down (SOC 2 CC1–CC9 + A1 + PI1 + C1 + P1–P8)
  • Single ranked list across ~895 controls by remedy_priority_score
  • Drag-drop evidence with SHA-256 integrity hash · bundle export
  • 9 versioned policy templates · e-sign workflow · bulk-remind
  • Vendor risk — questionnaires, criticality, contract / DPA / BAA expiry alerts
  • Time-bound, framework-scoped, read-only auditor portal with full activity trail
VAPT Vendor Portal · Eradicating Manual Parsing

Your pentesters get a scoped login. URIP gets the data automatically.

Stop receiving 60-page PDFs. External VAPT vendors log in to a sandboxed portal, submit findings via a structured form, and URIP enriches every finding with EPSS / KEV / asset-tier context before it lands in your SPOC’s queue.

Legacy Workflow

The 60-page PDF problem

Vendor emails a PDF report. Internal team manually parses every finding. Re-keyed into Excel with formatting errors. Two-week lag before the CISO sees the first risk — by which point the EPSS score has already shifted.

60-page PDF Manual parse Excel rekey 2-week lag
URIP Collaboration Module

Real-time scoped submissions

Your vendor logs in to a sandboxed portal at vapt-portal-login.html. Submits findings through a real-time validated form. URIP auto-enriches and assigns to the right internal SPOC within seconds.

Scoped login Structured form Auto-enrichment Routed in seconds
01

Scoped Vendor Login

External pentester logs in to a sandboxed environment with time-bound access tied to the engagement window.

  • Sees only their own submissions
  • No access to internal network data
  • Cannot see other vendors’ findings
  • Auto-expires at engagement end
02

Structured Submission Form

Real-time validated fields. Vendor inputs the finding once — URIP captures every field needed for scoring.

  • CVE ID auto-suggested from NVD
  • CVSS vector calculator built in
  • Affected asset selector from your inventory
  • PoC artifact upload (zip / screenshots)
03

Auto-Enrichment & Routing

Submission triggers the URIP scoring engine instantly — same formula, same enrichment as native connector findings.

  • EPSS / KEV / MITRE / OTX overlay
  • Composite 0–10 score computed
  • Auto-assigned to internal SPOC
  • Re-test loop with closure status

How clients invite vendors

The full vendor lifecycle — invite to closure — lives inside the URIP admin console.

01 · ADMIN
Open Vendor Access

Settings → Vendor Access → Invite VAPT Vendor. Enter the vendor’s name and contact email.

02 · SCOPE
Configure scope

Pick the asset tiers in scope, the engagement window (start / end), permitted CVE classes, and re-test allowance.

03 · INVITE
One-time signup link

Vendor receives a signed email link. Sets a password. Lands in the sandboxed vendor portal — nothing else of yours visible.

04 · LIVE
Findings flow in

Each submission is enriched and routed. Your SPOC sees a normal Risk Register row. Vendor sees only the closure status.

Already have an invitation?

Sign in to the scoped vendor sandbox — you’ll see only your own submissions and re-test requests.

Vendor Portal Login Customer Login
Auto-Remediation Engine · Phase 2 Live

From insight to execution in one click.

Weaponised risks with available patches don’t sit in queues. URIP’s gated automation checks implications, gets approval, executes the fix, and re-tests — closing the loop without manual handoff.

Risk Registered
Patch Available?
Implication Check
Script Executed
Re-test Runs
Risk Closed

Execution Hubs

CrowdStrike RTR

Real-time response patching endpoints remotely. Isolates, patches, and releases without agent re-deployment.

Ansible Playbooks

Server configuration fixes and firewall rule adjustments pushed through your existing automation mesh.

CyberArk API

Auto-resetting compromised admin credentials and rotating secrets the moment a PAM breach is detected.

Safety Callout

The ‘Implication Check’ ensures expected downtime and rollback plans are verified before any script executes. Low-impact assets auto-execute. Tier-1 assets trigger a “Require SPOC Approval” button.

Role-Based Governance & Visibility

Four roles. Strict access boundaries. No data leakage.

The same multi-tenant isolation that keeps Customer A invisible to Customer B keeps your VAPT vendor invisible to your network internals.

Tenant Owner

CISO · Admin

Full unrestricted access within their own tenant boundary.

Can see
  • All 25 risk source feeds (9 Core + 5 Contextual + 11 Module expansions)
  • Full Risk Register · 25 columns · every drill-down
  • Unmitigated vs. accepted risks split
  • Every connector’s live health & drift status
Cannot see
  • Other tenants’ data — multi-tenant isolation enforced at every query
Domain SPOC

IT Team · SPOC

Domain-scoped operator who owns remediation for their assigned slice.

Can see
  • Only risks strictly assigned to their domain
  • SLA countdowns & pending-day escalations
  • Their own remediation queue & ticket lineage
Cannot see
  • Other domains’ queues or workload
  • External vendor identity / commercial details
External Guest · Scoped Login

VAPT Vendor

External pentester or auditor with sandboxed access — cannot see the network they’re testing.

Can see
  • Only their own submitted findings
  • Re-test request status & closure verdict
  • Their assigned scope & engagement timeline
Cannot see
  • Internal enterprise network data
  • Other vendor’s findings or reports
  • Full Risk Register or native connector outputs
  • Other tenants — ever
Executive Read-Only

Executive · Board

Posture-level visibility for governance reporting — no operational raw data.

Can see
  • High-level KPI dashboards (A–F grade, week-over-week)
  • Framework trend charts & coverage heatmap
  • Overall posture & risk acceptance rollup
Cannot see
  • Raw finding details & individual exploit strings
  • Low-level operational ticket data
Acceptance Workflow: Risk acceptance requires digital sign-off from the Head of Department. Accepted risks are automatically excluded from Board dashboards to prevent artificial inflation of the security posture — honest results, not vanity numbers.
Trust Center

Procurement-grade security posture — self-serve.

Enterprise buyers no longer email security@ with 80-question worksheets. Your Trust Center publishes live posture evidence, compliance certifications, penetration-test summaries and data-processing agreements — all kept current by URIP itself.

Live Posture Widgets

Real-time control-pass rates, open-critical-risk counts and framework grades update automatically as your URIP tenant evolves. No stale PDFs.

Compliance Certifications

SOC 2 Type 2, ISO 27001, PCI DSS and HIPAA attestation documents with expiry tracking and automatic re-validation reminders.

Pen-Test Summaries

Scoped, anonymised VAPT results with remediation status and re-test closure. Buyers see proof, not promises.

Data Processing Agreements

Auto-generated DPA / BAA documents mapped to the actual sub-processors and data flows in your deployment mode.

Sub-Processor Registry

Complete list of every third-party service URIP touches, with geo-location, data-classification and opt-out paths where applicable.

Self-Serve NDA & Access

Prospects sign an e-NDA and get time-bounded, read-only access to your Trust Center — zero sales-engineer friction.

Fully integrated, not bolted on. URIP’s Trust Center draws live data from the same compliance engine your auditor sees. When a control fails, the Trust Center reflects it honestly — no vanity metrics.
The Module Catalog

10 capability modules + a mandatory Core. Pick what you need.

Disabled modules are dark in the UI (route guards) and inactive in the backend (decorator checks). Three-layer enforcement: UI, API, connector data plane.

Mandatory

CORE

Risk register, scoring engine, dashboard, workflow, audit log, reports, EPSS + KEV + MITRE + OTX enrichment, multi-tenancy, white-label theming.

Always-on for every tenant.
For every tenant

VM · Vulnerability Management

Tenable + Qualys + Rapid7 + CrowdStrike Spotlight connectors for full vulnerability scan ingestion.

Tenable · Qualys · Rapid7 · CrowdStrike Spotlight
Anyone running scanners

EDR · Endpoint Detection

SentinelOne + CrowdStrike Falcon + Defender for Endpoint + ManageEngine EC + MDM.

SentinelOne · Falcon · Defender · ManageEngine EC · MDM
Anyone with endpoint security

NETWORK

Zscaler + Netskope + Palo Alto + Fortigate + CloudSEK external threat surface.

Zscaler · Netskope · Palo Alto · Fortigate · CloudSEK
Cloud-first orgs

IDENTITY

Microsoft Entra + Okta + Google Workspace identity-risk telemetry.

Entra · Okta · Google Workspace
Anyone with SSO

COLLABORATION

SharePoint + OneDrive + Teams + Slack + Confluence sharing & data-loss signals.

SharePoint · OneDrive · Teams · Slack · Confluence
Knowledge-work orgs

ITSM

ServiceNow + Jira + ManageEngine SDP — bidirectional ticketing for active remediation.

ServiceNow · Jira · ManageEngine SDP
Anyone with formal ticketing

DAST

Burp Suite Enterprise + OWASP ZAP + Acunetix — dynamic application security testing.

Burp Enterprise · OWASP ZAP · Acunetix
App-heavy orgs

DLP · Data Loss Prevention

GTB + Forcepoint + Symantec DLP — data-exfiltration and insider-risk telemetry.

GTB · Forcepoint · Symantec DLP
Compliance-driven orgs

CSPM · Cloud Security Posture

AWS CSPM + Azure CSPM + GCP CSPM connectors live in production. Continuous misconfig detection across every cloud account.

AWS · Azure Defender · GCP SCC · Native rule engine
Multi-cloud orgs

COMPLIANCE & AUDIT-READINESS

7-framework engine, control monitoring, evidence automation, policy management, access reviews, vendor risk, incident lifecycle, asset inventory, auditor portal, framework-specific reports.

SOC 2 · ISO 27001 · GDPR · HIPAA · PCI DSS · DPDP · NIST CSF
Anyone facing audits
Architecture

Same code. Three deployment topologies. Your choice.

Pure SaaS for fastest time-to-value. On-Premise for maximum sovereignty. Hybrid-SaaS for the best of both.

Pure SaaS

We host everything. The customer logs in to their tenant.urip.io subdomain. Fastest time-to-value, standard SaaS commercial model.

Quickest deployment

On-Premise Licensed

The customer hosts everything. Maximum data sovereignty. Same codebase, same UX. Zero operational burden on us.

Air-gap compatible

The Hybrid-SaaS trust boundary

The only thing crossing from your network to our cloud is a tiny JSON envelope of summary metrics — risk scores, control pass/fail counts, compliance percentages, connector heartbeats. Same architectural pattern CrowdStrike Falcon, Tenable Nessus Agent and Splunk Forwarder use to clear procurement at regulated buyers.

SEMANTIC GRAVITY CLOUD Frontend Portal Dashboard UI · Auditor portal · Reports Cloud Backend · Intelligence Engine EPSS / KEV / MITRE / OTX feeds · Compliance scoring Aggregate metadata only · HMAC-signed ingest HTTPS · HMAC-signed scores + counts only CUSTOMER NETWORK URIP Agent · Docker container All Connectors · Normalizer · Local Vault Encrypted Reporter · Drill-down Tunnel (60s tokens) Local Postgres · customer-owned IPs · Hostnames · Usernames · Evidence files STAYS ON CUSTOMER NETWORK FOREVER
The Technology Stack

Deliberately small. Opinionated. Operationally simple.

Boring tech where it counts — so the smart stuff (scoring, enrichment, linkage) gets all the attention.

Backend
Python 3.13 / 3.11, FastAPI, SQLAlchemy 2.x async, Alembic, Pydantic v2.
Database
Postgres (Neon in cloud, customer-managed in Hybrid-SaaS), per-tenant scope.
Frontend
Vanilla HTML / JS / CSS for the URIP shell · Next.js option for compliance UI.
Auth & Crypto
PyJWT tokens · Fernet-encrypted per-tenant vault · SHA-256 evidence integrity.
Connectors
HTTPX + Pydantic v2 with a plugin registry. Auto-discovered into the catalog wizard.
Eventing & Async
Redis pub/sub event bus + Celery workers for heavy connector pulls.
Hybrid Agent
Docker + HMAC-signed reporter + reverse-WebSocket drill-down tunnel.
External Feeds
EPSS · CISA KEV · MITRE ATT&CK · AlienVault OTX — all four live.
Object Storage
S3-compatible — R2 in cloud, customer-local in Hybrid-SaaS.
Observability
Structured JSON logs · Sentry for errors · Better Stack for metrics.
What Sets URIP Apart

Three moats. Each individually meaningful. Together, decisive.

01

Risk × Control linkage

URIP is the only platform that says “this CVE is what’s breaking your SOC 2 control CC7.1, on this Tier-1 asset, owned by this person, with EPSS 0.92 and KEV-active.”

Compliance-only platforms see the control failure but lack CVE-level threat enrichment. Threat-intel platforms see the vulnerability but lack compliance scaffolding. URIP has both.
02

Universal connector framework

Bring any tool. Implement four methods. Auto-register in the catalog. The plumbing — encrypted credentials, polling, normalization, scoring, audit logging, health monitoring — is done.

No custom integration project. No professional services engagement. Same wizard for the 50-person startup and the 1000-person enterprise.
03

Hybrid-SaaS data sovereignty

Sensitive vulnerability data — IP addresses, hostnames, usernames, evidence files — stays on your network. The cloud only ever sees summary scores.

A proven enterprise agent pattern that clears procurement at regulated buyers — structurally unavailable to platforms that ship cloud-only.
Structural Edge

Seven architectural advantages no vertically-integrated vendor can copy.

Single-vendor platforms optimise for lock-in. URIP optimises for the customer’s existing stack.

01

Best-of-Breed Preservation

You already bought Tenable, CrowdStrike and Zscaler for a reason. URIP unifies them instead of replacing them. No rip-and-replace. No sunk-cost waste.

02

Data Sovereignty by Design

Hybrid-SaaS keeps IPs, hostnames and evidence on your network. Vertically-integrated vendors force everything into their cloud to train their models.

03

Deterministic Scoring

Our composite score is a formula you can audit. No opaque “AI risk rating” that changes overnight with no explanation.

04

Universal Connector Framework

Four methods. One registry. Any tool. A vendor with its own scanner has zero incentive to support competitors’ data feeds.

05

Risk × Control Linkage

When a control fails, URIP shows the exact CVE, its EPSS, the APT exploiting it, and the Tier-1 asset affected. No competitor has both sides.

06

Modular Pricing

Subscribe to Core + Compliance only, or run all eleven modules. You are not taxed for capabilities you will never use.

07

Vendor-Agnostic Remediation

Auto-remediation playbooks target CrowdStrike, Ansible and CyberArk — whichever tool the customer already owns. No forced ecosystem.

Who It’s For

Built for orgs already running a security stack — tired of switching between consoles.

Mid-market SaaS (50–1000 employees)

Customer security questionnaires. SOC 2 Type 2 / ISO 27001. 5–15 security tools, no dedicated SOC.

Manufacturing, robotics, regulated industries

Multi-customer audit pressure, on-prem OT, procurement requirement that vendor data not leave the customer network — the Hybrid-SaaS sweet spot.

Any org with 5+ security tools

Wants ONE pane — risk register, threat intelligence, compliance status, evidence, auditor portal — without rebuilding the data layer themselves.

Compliance-first prospects

DPO buyer, no CISO involvement, want only audit-readiness. Buy the standalone Compliance Module without the URIP risk layer.

What You Bring

Three things to get started. No professional services required.

The same onboarding flow runs for the 50-person startup and the 1,000-person enterprise.

  API credentials per tool

Read-only is fine for almost everything. ManageEngine SDP needs write for bidirectional ticketing. Vendor-published scopes only.

  One tenant admin

Configures the workspace — brand, frameworks, module subscriptions, user invitations.

  Network allowlist

Pure SaaS — allowlist our cloud IP at egress. Hybrid-SaaS — allow the Docker agent’s outbound HTTPS to our cloud.

  MS Entra admin consent

Required if Identity / Collaboration modules are subscribed. Least-privilege scopes documented in the per-tool wizard.

  Burp Suite Enterprise license

If DAST module is subscribed — Burp Pro alone does not expose the full programmatic API.

What URIP Delivers Today

A complete, working platform — not a roadmap promise.

Every capability listed below runs against the real upstream API in production today.

29 production connectors live + 25+ source categories supported via universal framework
15 pre-seeded compliance frameworks (~895 controls — 7 audit-grade + 8 scaffold-grade)
Both dashboards — full end-to-end UI
Auditor portal with framework-scoped, time-bound, read-only access
Hybrid-SaaS Docker agent with HMAC-signed reporter
Drill-down reverse-WebSocket tunnel with 60s tokens
Multi-tenant data plane with cross-tenant isolation tests
White-label per-tenant theming end-to-end
Composite scoring engine (CVSS · EPSS · KEV · tier)
4 live external intelligence feeds
SHA-256 evidence integrity hash on every artifact
Per-tenant Fernet-encrypted credential vault
16 license modules (Core + 15 capability), with three-layer enforcement
Standalone Compliance deployment — runs without the URIP risk layer
Risk acceptance workflow with HoD approval
Bidirectional ticketing into ManageEngine SDP, Jira and ServiceNow
Intelligence Engine — 5 live services (normalisation, fingerprinting, applicability, remediation fetch, connector runner)
Auto-Remediation Phase 2 — gated execution via CrowdStrike RTR (OAuth2 Bearer), Ansible, Fortinet, CyberArk
Trust Center — public NDA-gated posture page with time-bound, hashed access tokens and self-serve procurement access
VAPT Vendor Portal — closed-loop pentest workflow with single-use JWT invitations
DSPM, AI Security, ZTNA, Attack Path Prediction, Cyber Risk Quantification (FAIR) — 5 strategic modules at MVP-scaffold depth
6 framework PDF report templates — SOC 2 management, ISO 27001 SoA, HIPAA risk analysis, GDPR Article 30 register, PCI DSS AOC inputs, India DPDP DPIA
LMS connectors — security-awareness-training telemetry surfaces as compliance evidence (ISO 27001 A.6.3 + SOC 2 CC1.4)
BGV connectors — background-verification status surfaces in HIPAA / India DPDP evidence (HIPAA §164.308(a)(3))
Auditor activity heatmap — GitHub-style 4-level grid showing every auditor action with calendar-day buckets
Word Cloud Threat Map — board-friendly D3 visualisation of top APTs, TTPs, and targeted sectors
Async task queue — Celery + Redis beat schedule (connector-pull 15min, scoring 60min, control-check 6h)
Risk ↔ Control event bus — compliance.control.failed auto-creates linked URIP risks
Immutable per-tenant audit log on every action
9 versioned policy templates with e-sign workflow
Vendor risk — questionnaires, criticality, contract alerts
Drift detection on connectors (no silent failure)
The Pricing Story

Per-module subscription. Pay only for what you turn on.

Disabled modules are dark in the UI and inactive in the backend. A startup might subscribe to Core + Compliance only. An enterprise might run all sixteen.

Per-module licensing

Each tenant subscribes to exactly the capability modules they need. Core is always-on and bundled. Compliance is the strategic upsell that moves the conversation from operational tooling to board-level GRC.

Cost-consolidation pitch

One subscription replaces a typical bundle of compliance automation, external threat intel, manual audit-prep consultants, and the operational overhead of managing multiple dashboards — while adding the Risk × Control linkage neither vendor in your existing stack offers.

Hybrid-SaaS baseline

A modest VPS on the customer side runs the on-prem Docker agent (a 2 vCPU / 4 GB instance is enough for most tenants). The cloud portal is included in the URIP subscription — no extra hosting line item.

Honest Limitations

What URIP is — and isn’t.

URIP is a unifier and a scaffold, not a do-everything platform. Six things URIP explicitly does not do:

We don’t crawl the dark web

We integrate with CloudSEK — they run the crawler infrastructure (Tor, residential proxies, Telegram scraping, paid DNS feeds). We surface their alerts inside the unified URIP dashboard with EPSS + KEV + asset-tier prioritisation on top.

We don’t run a SOC

URIP surfaces and prioritises risks. It does not respond to incidents. Your security team or SOC vendor still owns response. URIP is the unified pane on which they triage.

We don’t author training videos

We do not build security training content. Training-completion telemetry from KnowBe4, Hoxhunt or Cybeready can be ingested via the universal connector framework when those modules are enabled.

We don’t run BGV

We do not perform background verification. BGV status from AuthBridge or OnGrid can be ingested as compliance evidence via the connector framework.

We are not the auditor

We make audits easy — automated evidence collection, control monitoring, policy tracking, reporting, the auditor portal. The customer still owns control design, policy approvals, vendor selection and the audit engagement itself.

We are not legal counsel

Framework templates and policies are starting points. Your legal / compliance counsel must review and tailor them for your jurisdiction and customer contracts.

One cockpit for your entire security stack.

See one number. Drill to one CVE. Fix one ticket. Both dashboards on one screen.

Your tools · Your data · One pane · Audit-ready