kinetic8
The CAASM Platform

See Everything.
Secure Everything.

Security, Powered by AI.

You can't defend what you can't see.
We make sure you see everything.

Unlimited adapters. 30+ report types. 360° AI-scored risk correlation. Any deployment mode — SaaS, on-premises, hybrid, or air-gapped.

SOC 2 Type II Ready
ISO 27001 Compliant
GDPR & HIPAA Support
GA: May 2026

The kinetic8 Theorem

P(breach)> 0if and only if|Unknown Assets|> 0

kinetic8 continuously solves: Unknown Assets = 0P(breach) → minimum

Q.E.D.

You cannot be breached through an asset you know about and have secured. Every unknown asset is a potential breach. kinetic8 eliminates the unknown.

Unlimited
Adapters
Built-in + AI-generated on demand
30+
Report Types
Compliance · Risk · Custom
360°
Risk Correlation
Multi-source · AI-scored
Any
Deployment Mode
SaaS · On-Prem · Hybrid · Air-Gapped
100+
Asset Types
across 11 categories
5 min
Connector Setup
fastest in market

Why Security Teams Choose kinetic8

One platform. Every answer.

Universal Visibility

Connect unlimited security tools with pre-built adapters. AI builds custom integrations through conversation. See every asset across every source — in one place.

Learn More

Risk Intelligence

Trust-weighted risk scoring from all sources. Visibility gap detection catches blind spots. Know your real risk posture — not what your tools want you to think.

Learn More

Automated Compliance

30+ professional reports with automated scheduling. Real compliance scoring from live data. Audit-ready evidence generated hands-free, not from checklists.

Learn More

Integrates with the tools your team already uses

Unlimited pre-built adapters · AI-generated on demand · across 8 categories

Endpoint & EDR
CrowdStrikeSentinelOneMicrosoft DefenderCarbon BlackTaniumCybereason
Vulnerability
Tenable NessusQualys VMDRRapid7 InsightVMWizSnykTrivy
Cloud & Infrastructure
AWS Security HubAzure Security CenterGCP Security CommandLaceworkOrcaPrisma Cloud
Identity & IAM
OktaMicrosoft Active DirectoryCyberArkBeyondTrustPing IdentitySailPoint
SIEM & Analytics
SplunkMicrosoft SentinelIBM QRadarElastic SIEMLogRhythmSumo Logic
Network Security
Palo Alto NetworksCisco SecureXZscalerFortinetCheck PointJuniper
IT Service Mgmt
ServiceNowJiraFreshserviceBMC RemedyIvantiCherwell
Compliance
Tenable.scQualys PCRapid7 ComplianceTugboat LogicDrataVanta

Don't see your tool? Describe it — our AI builds the adapter for you →

How It Works

From tool sprawl to total visibility
in days, not months.

1
01

Connect

Link your security tools with pre-built adapters. QR-code connector setup for on-premises systems. No inbound firewall rules. No agents to deploy.

2
02

Correlate

kinetic8 automatically deduplicates assets across sources using 5 correlation key types. One canonical record per asset, every source preserved.

3
03

Act

Prioritize risk with trust-weighted scoring. Generate board-ready reports on schedule. Get AI-powered insights in plain English. Close gaps before they become breaches.

Platform Capabilities

Everything security teams need.
Nothing they don't.

19 integrated modules built for security, IT, and GRC teams — from asset discovery to compliance reporting.

Single source of truth for every asset

One canonical record per asset, automatically correlated from 173+ adapters. Covers 100+ asset types — devices, users, cloud resources, containers, certificates, OT/ICS, and more.

  • Multi-source evidence with per-source raw attributes
  • Intelligent orphan detection with 5 lifecycle states
  • Dynamic and curated asset groups with hierarchical nesting
  • Real-time risk scoring from vulnerability, event, and trust data
kinetic8 — Asset Management

Feature Highlights

Security, from surface
to remediation.

Discover how kinetic8's integrated modules give you complete visibility, precise risk prioritization, and the workflows to act.

Adapter Framework & Correlation Engine

Unified asset inventory. Zero blind spots.

Unlimited pre-built and AI-generated adapters automatically correlate into one canonical record per asset. Multi-source evidence is preserved per-source, so you can compare attributes across tools and track observation history.

  • Average adapter setup under 5 minutes — EDR, SIEM, cloud, IAM, OT/ICS, and more
  • No adapter? Describe the tool in plain English — kinetic8 AI builds it automatically
  • 5 correlation key types: email, serial number, MAC, hostname, IP
  • Trust-weighted deduplication — "Why correlated" explainability included
Asset Visualizer
server-01usercloudappcritcert
Risk Management & AI Features

Risk intelligence that actually drives action.

Vulnerability-focused scoring model (50% vulns, 25% assets, 25% alerts) with configurable per-source trust weighting. AI-powered change analysis tells you exactly why your risk score moved.

  • 4 aggregation strategies — choose what fits your risk appetite
  • AI anomaly detection and root cause analysis on every risk change
  • Daily automated snapshots with custom date range support
  • Executive AI summaries for leadership and board presentations
Risk Dashboard
Risk Score
72
Critical
14
Trend
↑ 5%
Risk by Category
Vulnerabilities
78%
Alerts
45%
Assets
62%
Coverage
88%

AI Insight: Risk increased 5% due to 3 new CISA KEV vulnerabilities on production servers.

Vulnerability Insights

Every scanner. Every CVE. One deduplicated view.

Aggregate from 18+ scanners — Tenable, Qualys, Rapid7, Wiz, Snyk, Trivy, and more. Cross-source CVE deduplication, CISA KEV prioritization, and EPSS exploit probability in a single dashboard.

  • CISA KEV banner with automatic highest-priority remediation
  • CISA BOD 22-01 aligned deadlines: KEV 7d, Critical 14d, High 30d
  • EPSS exploit probability alongside CVSS for combined prioritization
  • Auto-generated remediation actions with risk reduction estimates
Vulnerability Insights
3 CISA KEV vulnerabilities detected — immediate action required
14
Critical
38
High
91
Medium
3
KEV
Active Scanners
Tenable.io4,200 assetsHealthy
Qualys VMDR3,800 assetsHealthy
Wiz1,200 assetsHealthy
Snyk890 assetsStale
Connector Gateway

Connect on-premises systems. No firewall rules needed.

Single Docker command, outbound-only connections, zero-knowledge credential encryption. The cloud never sees plaintext credentials — private key stays on your network, always.

  • Deployed in under 5 minutes via QR code self-registration
  • Outbound-only — works in 100% of network environments
  • Mutual TLS with automated certificate renewal
  • All adapters run on-premises with no feature limitations — including AI-generated ones
Connector Gateway
$ docker run kinetic8/connector
Pulling image... done
Registering connector...
✓ Connected in 4m 47s
prod-connector-01
12 adaptersHealthy
dmz-connector-02
7 adaptersHealthy
cloud-connector-03
23 adaptersHealthy

Zero-Knowledge: Cloud never sees plaintext credentials.

Multi-Tenancy, RBAC & Compliance

Enterprise-grade from day one.

True schema-per-tenant isolation, 150 fine-grained permissions, immutable audit trails, and 30+ professional report types. Built for MSSPs, MDRs, and enterprise security programs with real compliance requirements.

  • SOC 2, ISO 27001, FedRAMP, NCA ECC, NCA CBB, PDPL compliance frameworks
  • 47 tracked action types across 10 audit categories — tamper-proof
  • 30+ report types including Compliance Posture, AI Governance, Identity & Access
  • New tenants fully operational in seconds — no manual database work
Compliance Report
Compliance Posture
NIST CSF 2.082%
ISO 27001:202276%
CIS Controls v888%
PCI DSS 4.071%
47 Tracked Event Types
Immutable audit trail for SOC 2, ISO 27001, GDPR, HIPAA, PCI DSS
Dashboards & Visualization

Real-time dashboards. Built your way.

Gain complete visibility with real-time dashboards tailored to different teams. kinetic8 combines operational metrics, risk trends, and AI-driven insights with a flexible no-code builder.

  • 9 widget types: KPI cards, pie/bar/line/area charts, tables, heatmaps, trend sparklines
  • Drag-and-drop builder — no technical complexity required
  • AI dashboard assistant — describe what you need, get widgets instantly
  • Interactive asset topology graph with natural-language query-to-graph
Risk Dashboard
Risk Score
72
Critical
14
Trend
↑ 5%
Risk by Category
Vulnerabilities
78%
Alerts
45%
Assets
62%
Coverage
88%

AI Insight: Risk increased 5% due to 3 new CISA KEV vulnerabilities on production servers.

Identity & Access

Understand your users. Secure every identity.

Centralize identity data from multiple sources, highlight risks, and monitor user access in real time. One unified directory for every user across every system.

  • Unified user directory aggregated from all identity sources (Okta, AD, CyberArk & more)
  • MFA coverage monitoring — identify users without proper controls
  • Access & privilege insights across all systems and applications
  • Identity correlation across sources into one accurate user profile
Compliance Report
Compliance Posture
NIST CSF 2.082%
ISO 27001:202276%
CIS Controls v888%
PCI DSS 4.071%
47 Tracked Event Types
Immutable audit trail for SOC 2, ISO 27001, GDPR, HIPAA, PCI DSS

By the Numbers

Built for enterprise scale.
Designed for speed.

Unlimited
Adapters
Pre-built + AI-generated on demand. EDR, SIEM, cloud, IAM, OT/ICS, AI/ML, and more
< 5 min
Connector Setup
Single Docker command. Self-service QR code registration. Fastest in market.
100+
Asset Types
Devices, users, cloud, containers, certificates, OT/ICS, AI agents, and more
18+
Vulnerability Scanners
Tenable, Qualys, Rapid7, Wiz, Snyk, Trivy, and more — all deduplicated
30+
Report Types
Asset Risk, Compliance, Vulnerability, Cloud, Identity, AI Governance, NCA ECC, and more
150
Fine-Grained Permissions
30 modules × 5 actions. 6 pre-configured roles + unlimited custom roles.

What Sets Us Apart

Capabilities no one else has.
We checked.

kinetic8 ships features that no other CAASM platform offers — built from the lessons of securing real enterprise environments.

Industry First

Visibility Gap Detection

When scannable assets exist but no vulnerability scanner is connected, kinetic8 applies a 60/100 risk penalty — preventing a false sense of security. No other CAASM platform does this.

Industry First

Proactive Orphan Asset Warnings

Pre-deletion warnings sent to Slack and Teams 24-72 hours before assets are removed — with breakdown by source, criticality, and type. Eliminate surprise blind spots before they happen.

Zero-Knowledge

Connector Gateway Encryption

The cloud never sees plaintext credentials. Public key encryption with the private key stored only on-premises. Works with outbound-only connections — no inbound firewall rules ever required.

AI-Powered

Natural Language Asset Queries

Ask questions like "Show me critical servers with unpatched CVEs and no EDR" in plain English. 95%+ accuracy, under 3 seconds. Supports Anthropic API or AWS Bedrock for data residency control.

Air-Gapped

True Air-Gapped Deployment

kinetic8 runs fully offline in SaaS, on-premises, or completely air-gapped environments — no internet egress required. Deploy in classified, regulated, or high-security networks with zero cloud dependency.

Customer Stories

Trusted by security teams worldwide

Placeholder quotes — replace with real customer testimonials before launch.

Before kinetic8, our team spent 8+ hours compiling quarterly security reports. Now we generate executive-ready PDFs in under a minute.

8 hours → under a minute
CISO
Financial Services · 500+ employees

We connected 30 security tools in a single afternoon. The correlation engine immediately found 2,400 duplicate assets we didn't know existed.

2,400 hidden duplicates found
Director of Security Operations
Healthcare · Enterprise

The visibility gap detection caught a blind spot our vulnerability scanners had missed for months. That alone justified the investment.

Blind spot caught immediately
VP Security
Technology Company · Mid-Market

Release Schedule

From early access
to GA in 90 days.

kinetic8 ships fast. Early Access is live — General Availability lands May 2026.

March 2026
Early Access

Core platform: 173+ integrations, Asset Management, Vulnerability Insights, Risk Management, Audit Trail, Connector Gateway, Multi-Tenancy, Notification System, Reporting.

2
April 2026
Feature Complete

AI Features, Asset Visualizer, Custom Dashboards, Correlation Engine (merge/split), Query System AI, Network Config Drift, Risk Change Intelligence.

May 2026
General Availability

Full platform GA with production cloud HA, 24/7 support, enterprise SLAs. All critical features production-ready.

Early Access Available Now

Ready to see your
entire attack surface?

Request a live demo — we'll map your attack surface live, in the session.

No credit card required
Dedicated onboarding
Setup in under 30 minutes
SOC 2 compliant