Threat Event Lifecycle & Handling System

AI-Powered SOC
Automation.

Automated L1/L2 AI triage with 12 parallel threat intelligence sources. Full MITRE ATT&CK coverage across 14 tactics and 216 techniques. MSSP-grade multi-tenancy with complete data isolation.

Explore Platform

// ALERT PROCESSING PIPELINE

Inbound
SIEM Alert
Parse
Ingest
Schema
Normalize
Decide
L1 AI Triage
Create
Incident
Review
SOC Analyst
Learn
Feedback
AI Routing Decision
Threat Confirmed
Deep Analysis
False Positive
<0Seconds Avg Triagefrom alert to AI decision
0+Enrichment APIsqueried in parallel
0MITRE Techniques14 tactics · 475 sub-techniques
0Report TypesPDF + Excel · on-demand
0Notification ChannelsEmail · Teams · Slack · PD · SMS
0.9%SLA Uptimeacross all deployments
How It Works

From Alert to Action in Milliseconds

A fully automated pipeline — triage, enrichment, AI decision-making, and response — no manual intervention required.

01

Ingest & Normalise

Alerts arrive via HMAC-validated webhooks from any SIEM. Deduplicated within 5-minute windows and normalised into a unified schema within milliseconds.

Webhook IngestHMAC ValidationDedup EngineUnified Schema
02

Enrich in Parallel

12 threat intelligence sources queried simultaneously. IP reputation, malware databases, domain history, sandbox results — all aggregated and scored within the same request cycle.

12 Intel SourcesParallel QueryThreat ScoringCached Results
03

AI Decision — L1 & L2

L1 AI engine applies rule gates + 8-signal confidence scoring. Auto-routes confirmed threats (≥80%) and false positives (≤25%). Ambiguous alerts escalate to L2 with RAG context.

Rule GatesConfidence ScoreMITRE TaggingRAG Escalation
04

Act, Notify & Learn

Incident created with SLA clock started. Multi-channel notifications dispatched instantly. Analyst feedback continuously improves AI accuracy via vector store updates.

Multi-channel AlertsSLA EngineAnalyst FeedbackAI Learning
AI Decision Engine

Two-Tier AI Triage — L1 & L2 Bots

L1 handles high-volume triage with confidence-gated routing. L2 deep-dives ambiguous cases using vector memory and analyst-learned precedents via RAG.

13 Graph Nodes12 Enrichment APIs8-Signal Confidence Score216 MITRE Techniques
01

Load Alert

Validate & load raw alert data

02

FP Cache

Check false-positive pattern cache

03

Enrich ×12

Parallel threat intelligence APIs

04

Aggregate

Merge & score enrichment results

05

Confidence Score

8-signal weighted confidence scoring

06

MITRE Tag

216 techniques auto-tagged

07

LLM Analyse

AI decision with full context

08

Route Decision

TP / L2 escalate / FP

Threat Intelligence

12 APIs Queried Simultaneously

Every alert is enriched by 12 threat intelligence sources in parallel — IP reputation, malware databases, domain history, sandbox detonation, and more — all within milliseconds.

VirusTotal

IP / Threat

AbuseIPDB

IP / Threat

GreyNoise

IP / Threat

IPInfo

IP / Threat

IPQualityScore

IP / Threat

Shodan

IP / Threat

URLScan.io

Domain / URL

AlienVault OTX

Domain / URL

WHOIS

Domain / URL

IBM X-Force

Domain / URL

Hybrid Analysis

File / Hash

MalwareBazaar

File / Hash

All parallel — Promise.allSettled
Results cached per org
10s timeout per source
Free-tier API key compatible
Platform Modules

Six Modules. Complete SOC Coverage.

THELS ships as an integrated suite — each module purpose-built for a critical SOC function, all sharing a unified incident context.

INC

Incident Management

Incident Management & Analyst Workspace

End-to-end incident lifecycle with real-time activity feed, SLA clock, MITRE context, email threading, bot review, and workflow actions.

State MachineSLA EngineEmail ThreadingWorkflow ActionsActivity Log
SHF

Shift Handover

Shift Handover & Roster Intelligence

Automated shift handover reports, carry-over tracking, live roster view, shift comparison analytics, and per-analyst performance metrics.

Handover ReportsCarry-overLive RosterShift Analytics
ANL

Analytics Engine

MTTD · MTTA · MTTR · MITRE Heatmap

Real-time SOC KPI dashboards — MTTD/MTTA/MTTR trending, SLA compliance, MITRE ATT&CK coverage map, bot accuracy, and per-analyst performance.

MITRE HeatmapBot AnalyticsSLA ComplianceAnalyst Perf
RPT

Reports Engine

9 Report Types — PDF & Excel

Scheduled and on-demand reports: Daily Summary, Weekly Executive, Monthly Compliance, MITRE Coverage, Bot Performance, Team Performance, SLA Trend, and more.

9 Report TypesPDF + ExcelScheduledCloud Storage
TKT

Ticketing System

Enterprise Ticket Workflow

Jira-grade ticketing with templates, watchers, time tracking, tags, bulk actions, kanban board, and workflow automation.

TemplatesWatchersTime TrackingKanban Board
ADM

Platform Admin

Multi-Tenant Configuration & Governance

White-label config, BYOK LLM keys, SIEM integration management, rule gate builder, org feature flags, custom role profiles, and platform health.

White-labelBYOK LLMRule GatesRole ProfilesBackup
Notifications

5 Channels. Never Miss a Critical Alert.

Communication groups route notifications by incident type and severity. PagerDuty triggers automatically for Critical/P1. Smart email threading attaches analyst replies directly to incident activity logs.

Email

10 Handlebars templates per incident type

Microsoft Teams

Adaptive Cards with action buttons

Slack

Rich block messages with incident context

PagerDuty

Auto-triggered for Critical / P1 incidents

SMS

Twilio fallback for unreachable responders

// 10 INCIDENT TEMPLATES

Brute ForcePhishingMalwareRansomwareData ExfiltrationC2 BeaconDDoSPrivilege EscalationLateral MovementInsider Threat

// EMAIL THREADING

BotIncident INC-2847 created — Brute Force detected on dc0114:32
AnalystConfirmed. Blocking source IP and resetting credentials.14:38
SOC LeadEscalating to IR team. Adding to watchlist.14:41
Core Features

Built for Enterprise Security

Every feature designed for production SOC environments — not prototypes.

Isolated Tenant Environments

Dedicated data environment per organisation. Complete separation — zero cross-tenant data leakage.

AES-256-GCM BYOK Encryption

Bring your own LLM API keys. Encrypted at rest with customer-controlled key material.

HMAC Webhook Validation

Every inbound SIEM webhook validated with HMAC-SHA256. Replay attacks rejected at the perimeter.

Append-only Audit Log

Immutable incident activity trail. Every state change, comment, and decision preserved forever.

RBAC — 6 Role Profiles

Super Admin → MSSP Admin → Org Admin → SOC Manager → SOC Lead → SOC Analyst. Customisable.

Hybrid AI Rule Engine

Deterministic hard rules bypass AI for certainty. Confidence gates prevent false escalation.

Full MITRE ATT&CK Coverage

14 tactics, 216 techniques, 475 sub-techniques. Auto-tagged on every incident in real time.

Smart Email Engine

Thread-based analyst emails. Inbound replies auto-attach to incident activity via SES inbound.

SLA Tracking & Escalation

Per-severity SLA deadlines auto-calculated. Pause/resume during hold. Multi-channel breach alerts.

Vector Memory & RAG

L2 bot learns from analyst feedback. Past verdicts retrieved via semantic similarity search.

MSSP Org Context-Switch

MSSP users pivot between client tenants via scoped JWT. Every switch audit-logged.

Org Backup & Restore

Per-org schema snapshots. Full restore to any point-in-time with zero cross-tenant impact.

SIEM Integrations

Connect Any SIEM. Day One.

Splunk
Microsoft Sentinel
Wazuh
IBM QRadar
CrowdStrike
Elastic SIEM
Google Chronicle
ArcSight
Generic Webhook
Splunk
Microsoft Sentinel
Wazuh
IBM QRadar
CrowdStrike
Elastic SIEM
Google Chronicle
ArcSight
Generic Webhook

Webhook + REST API polling methods · HMAC-SHA256 validation · Dedup and normalisation built in

Pricing

Start Free. Scale When You're Ready.

No per-alert fees. Predictable monthly billing. Cancel any time.

Coming Soon

Pricing Plans are Restructuring

We are currently optimizing our infrastructure to provide you with the best enterprise SOC automation at the most competitive price. Our new pricing tiers will be available shortly.

Free plan onboards instantly via the platform console · No credit card required

Security & Compliance

Security is the Foundation, Not a Feature

Every architectural decision is made with the threat model of a tier-1 SOC in mind.

Isolated Tenant Environments

Dedicated data environment per org. Complete separation — zero cross-tenant data leakage by design.

Zero-Trust RBAC

6-role model with JWT authentication and TOTP/Email MFA enforcement on every privileged route.

AES-256-GCM Encryption

BYOK API keys and sensitive configuration encrypted at rest with customer-controlled key material.

HMAC Webhook Auth

Inbound SIEM webhooks validated with HMAC-SHA256 shared secrets. Replay attacks rejected.

Append-only Audit Trail

Immutable log of every incident state change, comment, and AI decision — forever.

SOC 2 Readiness

Audit exports, access logs, org backup snapshots, and compliance controls built into every deployment.

// START FOR FREE — UPGRADE WHEN YOU SCALE

Your SOC Deserves
Better Automation.

Start with the Free plan — full L1 bot, 1,000 alerts/day, 3 seats, zero credit card required. Upgrade to Professional when your team is ready.

View All Plans