kinetic8
The CAASM Platform

See Everything.
Secure Everything.

The CAASM platform that unifies every asset, every vulnerability, and every risk — across your entire security ecosystem.

Connect 173+ security tools in minutes and get a single source of truth your board, auditors, and SOC team can trust.

SOC 2 Type II Ready
ISO 27001 Compliant
GDPR & HIPAA Support
GA: May 2026
173+
Pre-Built Integrations
across 19 categories
100+
Asset Types
across 11 categories
18+
Vulnerability Scanners
Tenable, Qualys, Wiz & more
5 min
Connector Setup
fastest in market
150+
Fine-Grained Permissions
30 modules × 5 actions

Why Security Teams Choose kinetic8

One platform. Every answer.

Universal Visibility

Connect 173+ security tools with pre-built adapters. AI builds custom integrations through conversation. See every asset across every source — in one place.

Learn More

Risk Intelligence

Trust-weighted risk scoring from all sources. Visibility gap detection catches blind spots. Know your real risk posture — not what your tools want you to think.

Learn More

Automated Compliance

13 professional reports with automated scheduling. Real compliance scoring from live data. Audit-ready evidence generated hands-free, not from checklists.

Learn More

Integrates with the tools your team already uses

CrowdStrike
Tenable
Qualys
Microsoft Defender
Splunk
AWS Security Hub
Wiz
SentinelOne
Rapid7
Palo Alto Networks
Cisco
ServiceNow
Okta
Azure
Google Cloud
Snyk
Veracode
Zscaler
Tanium
Carbon Black
CrowdStrike
Tenable
Qualys
Microsoft Defender
Splunk
AWS Security Hub
Wiz
SentinelOne
Rapid7
Palo Alto Networks

How It Works

From tool sprawl to total visibility
in days, not months.

1
01

Connect

Link your security tools with pre-built adapters. QR-code connector setup for on-premises systems. No inbound firewall rules. No agents to deploy.

2
02

Correlate

kinetic8 automatically deduplicates assets across sources using 5 correlation key types. One canonical record per asset, every source preserved.

3
03

Act

Prioritize risk with trust-weighted scoring. Generate board-ready reports on schedule. Get AI-powered insights in plain English. Close gaps before they become breaches.

Platform Capabilities

Everything security teams need.
Nothing they don't.

19 integrated modules built for security, IT, and GRC teams — from asset discovery to compliance reporting.

Single source of truth for every asset

One canonical record per asset, automatically correlated from 173+ adapters. Covers 100+ asset types — devices, users, cloud resources, containers, certificates, OT/ICS, and more.

  • Multi-source evidence with per-source raw attributes
  • Intelligent orphan detection with 5 lifecycle states
  • Dynamic and curated asset groups with hierarchical nesting
  • Real-time risk scoring from vulnerability, event, and trust data
kinetic8 — Asset Management

Feature Highlights

Security, from surface
to remediation.

Discover how kinetic8's integrated modules give you complete visibility, precise risk prioritization, and the workflows to act.

Adapter Framework & Correlation Engine

Unified asset inventory. Zero blind spots.

173+ pre-built adapters automatically correlate into one canonical record per asset. Multi-source evidence is preserved per-source, so you can compare attributes across tools and track observation history.

  • Average adapter setup under 5 minutes — EDR, SIEM, cloud, IAM, OT/ICS, and more
  • 5 correlation key types: email, serial number, MAC, hostname, IP
  • Trust-weighted deduplication with ranked candidate scoring
  • "Why correlated" explainability — see exactly which keys matched
Asset Visualizer
server-01usercloudappcritcert
Risk Management & AI Features

Risk intelligence that actually drives action.

Vulnerability-focused scoring model (50% vulns, 25% assets, 25% alerts) with configurable per-source trust weighting. AI-powered change analysis tells you exactly why your risk score moved.

  • 4 aggregation strategies — choose what fits your risk appetite
  • AI anomaly detection and root cause analysis on every risk change
  • Daily automated snapshots with custom date range support
  • Executive AI summaries for leadership and board presentations
Risk Dashboard
Risk Score
72
Critical
14
Trend
↑ 5%
Risk by Category
Vulnerabilities
78%
Alerts
45%
Assets
62%
Coverage
88%

AI Insight: Risk increased 5% due to 3 new CISA KEV vulnerabilities on production servers.

Vulnerability Insights

Every scanner. Every CVE. One deduplicated view.

Aggregate from 18+ scanners — Tenable, Qualys, Rapid7, Wiz, Snyk, Trivy, and more. Cross-source CVE deduplication, CISA KEV prioritization, and EPSS exploit probability in a single dashboard.

  • CISA KEV banner with automatic highest-priority remediation
  • CISA BOD 22-01 aligned deadlines: KEV 7d, Critical 14d, High 30d
  • EPSS exploit probability alongside CVSS for combined prioritization
  • Auto-generated remediation actions with risk reduction estimates
Vulnerability Insights
3 CISA KEV vulnerabilities detected — immediate action required
14
Critical
38
High
91
Medium
3
KEV
Active Scanners
Tenable.io4,200 assetsHealthy
Qualys VMDR3,800 assetsHealthy
Wiz1,200 assetsHealthy
Snyk890 assetsStale
Connector Gateway

Connect on-premises systems. No firewall rules needed.

Single Docker command, outbound-only connections, zero-knowledge credential encryption. The cloud never sees plaintext credentials — private key stays on your network, always.

  • Deployed in under 5 minutes via QR code self-registration
  • Outbound-only — works in 100% of network environments
  • Mutual TLS with automated certificate renewal
  • All 173+ adapters run on-premises with no feature limitations
Connector Gateway
$ docker run kinetic8/connector
Pulling image... done
Registering connector...
✓ Connected in 4m 47s
prod-connector-01
12 adaptersHealthy
dmz-connector-02
7 adaptersHealthy
cloud-connector-03
23 adaptersHealthy

Zero-Knowledge: Cloud never sees plaintext credentials.

Multi-Tenancy, RBAC & Compliance

Enterprise-grade from day one.

True schema-per-tenant isolation, 150 fine-grained permissions, immutable audit trails, and 13 professional report types. Built for MSSPs, MDRs, and enterprise security programs with real compliance requirements.

  • Schema-per-tenant isolation satisfies SOC 2, ISO 27001, FedRAMP
  • 47 tracked action types across 10 audit categories — tamper-proof
  • 13 report types including Compliance Posture, AI Governance, Identity & Access
  • New tenants fully operational in seconds — no manual database work
Compliance Report
Compliance Posture
NIST CSF 2.082%
ISO 27001:202276%
CIS Controls v888%
PCI DSS 4.071%
47 Tracked Event Types
Immutable audit trail for SOC 2, ISO 27001, GDPR, HIPAA, PCI DSS
Dashboards & Visualization

Real-time dashboards. Built your way.

Gain complete visibility with real-time dashboards tailored to different teams. kinetic8 combines operational metrics, risk trends, and AI-driven insights with a flexible no-code builder.

  • 9 widget types: KPI cards, pie/bar/line/area charts, tables, heatmaps, trend sparklines
  • Drag-and-drop builder — no technical complexity required
  • AI dashboard assistant — describe what you need, get widgets instantly
  • Interactive asset topology graph with natural-language query-to-graph
Risk Dashboard
Risk Score
72
Critical
14
Trend
↑ 5%
Risk by Category
Vulnerabilities
78%
Alerts
45%
Assets
62%
Coverage
88%

AI Insight: Risk increased 5% due to 3 new CISA KEV vulnerabilities on production servers.

Identity & Access

Understand your users. Secure every identity.

Centralize identity data from multiple sources, highlight risks, and monitor user access in real time. One unified directory for every user across every system.

  • Unified user directory aggregated from all identity sources (Okta, AD, CyberArk & more)
  • MFA coverage monitoring — identify users without proper controls
  • Access & privilege insights across all systems and applications
  • Identity correlation across sources into one accurate user profile
Compliance Report
Compliance Posture
NIST CSF 2.082%
ISO 27001:202276%
CIS Controls v888%
PCI DSS 4.071%
47 Tracked Event Types
Immutable audit trail for SOC 2, ISO 27001, GDPR, HIPAA, PCI DSS

By the Numbers

Built for enterprise scale.
Designed for speed.

173+
Pre-Built Integrations
EDR, SIEM, cloud, IAM, OT/ICS, AI/ML, and more across 19 categories
< 5 min
Connector Setup
Single Docker command. Self-service QR code registration. Fastest in market.
100+
Asset Types
Devices, users, cloud, containers, certificates, OT/ICS, AI agents, and more
18+
Vulnerability Scanners
Tenable, Qualys, Rapid7, Wiz, Snyk, Trivy, and more — all deduplicated
13
Report Types
Asset Risk, Compliance, Vulnerability, Cloud, Identity, AI Governance, and more
150
Fine-Grained Permissions
30 modules × 5 actions. 6 pre-configured roles + unlimited custom roles.

What Sets Us Apart

Capabilities no one else has.
We checked.

kinetic8 ships features that no other CAASM platform offers — built from the lessons of securing real enterprise environments.

Industry First

Visibility Gap Detection

When scannable assets exist but no vulnerability scanner is connected, kinetic8 applies a 60/100 risk penalty — preventing a false sense of security. No other CAASM platform does this.

Industry First

Proactive Orphan Asset Warnings

Pre-deletion warnings sent to Slack and Teams 24-72 hours before assets are removed — with breakdown by source, criticality, and type. Eliminate surprise blind spots before they happen.

Zero-Knowledge

Connector Gateway Encryption

The cloud never sees plaintext credentials. Public key encryption with the private key stored only on-premises. Works with outbound-only connections — no inbound firewall rules ever required.

AI-Powered

Natural Language Asset Queries

Ask questions like "Show me critical servers with unpatched CVEs and no EDR" in plain English. 95%+ accuracy, under 3 seconds. Supports Anthropic API or AWS Bedrock for data residency control.

Customer Stories

Trusted by security teams worldwide

Placeholder quotes — replace with real customer testimonials before launch.

Before kinetic8, our team spent 8+ hours compiling quarterly security reports. Now we generate executive-ready PDFs in under a minute.

8 hours → under a minute
CISO
Financial Services · 500+ employees

We connected 30 security tools in a single afternoon. The correlation engine immediately found 2,400 duplicate assets we didn't know existed.

2,400 hidden duplicates found
Director of Security Operations
Healthcare · Enterprise

The visibility gap detection caught a blind spot our vulnerability scanners had missed for months. That alone justified the investment.

Blind spot caught immediately
VP Security
Technology Company · Mid-Market

Release Schedule

From early access
to GA in 90 days.

kinetic8 ships fast. Early Access is live — General Availability lands May 2026.

March 2026
Early Access

Core platform: 173+ integrations, Asset Management, Vulnerability Insights, Risk Management, Audit Trail, Connector Gateway, Multi-Tenancy, Notification System, Reporting.

2
April 2026
Feature Complete

AI Features, Asset Visualizer, Custom Dashboards, Correlation Engine (merge/split), Query System AI, Network Config Drift, Risk Change Intelligence.

May 2026
General Availability

Full platform GA with production cloud HA, 24/7 support, enterprise SLAs. All critical features production-ready.

Early Access Available Now

See kinetic8
in action.

Get a personalized demo and see how kinetic8 gives your security team a single source of truth for every asset, every vulnerability, and every risk — in minutes.

No credit card required
Dedicated onboarding
Setup in under 30 minutes
SOC 2 compliant