Every security tool above Layer 2 reads what the device claims to be. We read what it is.
CybrIQ polls your managed switches in read-only mode every 30 seconds, resolves every observed device against a reference database of 750 million-plus device fingerprints, and emits a deterministic identity called Device DNA. The path is deterministic end to end: a database lookup, not a model. The inventory comes from the switches, not from an agent on the device or a tap on the wire. (One narrow exception: a small optional agent on workstations covers USB-threat detection; see below.) The audit teams call it "the only inventory I haven't had to argue with."
One External Scan Engine (ESE) software install per up to 500 switches. No SPAN, no mirror, no traffic capture. (Optional USB-threat agent on workstations; everything else is switch-derived.)
Where this fits in your stack
Every existing tool reads from Layer 2 up. CybrIQ adds the floor. That's the whole story.
If your NAC, EDR, and CMDB are returning three different device counts (and mine usually were), you already have direct experience with the visibility ceiling. The tools aren't broken. They were built for the layers above. Nobody was watching what's on the wire.
What every pilot turns up.
The validation loop, simplified
Continuous polling across in-scope switches; sub-minute end-to-end. If you've ever wished the asset register would update itself, this is what that actually looks like in implementation.
What a swap actually looks like in your SIEM
Someone replaces a device on port 47. Same MAC, same VLAN. Above L2, the swap is invisible. On the next switch poll, the structured signal set shifts enough that the 750M+ reference-database lookup resolves to a different device. Here's what shows up in your SIEM moments later.
{
"event": "device-substituted",
"severity": "high",
"timestamp": "2026-05-10T17:08:12Z",
"port": "sw-bldg-3-fl-2/port-47",
"previous_dna": "dna:7a4f-1c91...",
"current_dna": "dna:5b8e-2a4f...",
"similarity": 0.31,
"previous_vendor_hint": "Crestron DM-MD8x8",
"current_vendor_hint": "unknown (.41 confidence)",
"mitre": ["T1200", "T1556"],
"controls": ["PCI-4.0/12.5.1", "SOC2/CC6.1"]
}
Your correlation rule looks at similarity below 0.5 plus the absence of an open change ticket. No ticket, 0.31 similarity, that goes straight to the on-call analyst. The MITRE tags are there so the SOC manager's metrics roll up cleanly. The control mappings are there so when the auditor asks about PCI 12.5.1 next quarter, you've got the event history queryable.
Where this won't help you
Vendors regularly oversell tools into roles they can't fill. The list below keeps this product from doing the same.
That's a WAF problem. We're at L1; the application layer is six layers above us.
EDR's job. We see the device is the device. What it's running is somebody else's view.
Email security gateway. None of this touches the inbox.
IAM and UEBA. We don't watch authentication events.
NDR with cert visibility. We see the link is live, not what's flowing through it.
CSPM or CASB. Different planet from where we operate.
CybrIQ closes one specific gap: Layer 1 inventory accuracy and continuous device validation. Nothing else covers that gap. Everything in your stack covers something else, and you still need most of it.
A note on AI, because every security tool has to have one now
There's no model in our detection path. There's no LLM in the analysis pipeline. The decision was made for boring reasons in 2017, before any of the current AI-attack literature existed. We wanted auditors to accept the signature as evidence, and "the SHA hash of these five observations" is auditable in a way that "the model classified it as a Crestron with 92 percent confidence" is not.
The side effect, six years later: the design is structurally immune to adversarial ML evasion, training-data poisoning, model supply-chain attacks, prompt injection, and the hallucinated-triage failure modes that newer tools are starting to learn about the hard way. That immunity wasn't planned; it falls out of the architecture.
Where to read next
Pick what you actually need to know first. Each link is five to ten minutes of reading.
The pipeline, step by step
Eight stages from physical wire to SIEM event. Includes the part where I explain why we did the SHA-of-SHAs instead of something more sophisticated.
EvaluationCybrIQ vs Forescout, Armis, Asimily, Claroty, Nozomi
Where each tool wins, where each misses. Includes the cases where one of the others is the right answer and CybrIQ isn't.
ScenariosSix problems we built this to solve
Each scenario in three parts: the gap, what you're doing today, what changes after deployment.
AI & riskThe AI-threat exposure matrix
Nine AI-class attacks mapped against ML-EDR, LLM-SOC, signature-AV, NAC, and us. Most tools have at least one red column.
The pilot ships three artifacts. You keep all three.
A Layer 1 inventory of the piloted environment. A 30-day drift report. A framework-mapped evidence pack. Yours whether you go forward or not. Replaces the kind of six-week manual reconstruction most security teams have repeated more times than they want to count.
Start a pilot