● Built for security engineers, SOC analysts, and detection-engineering teams.
Engineering site For your team Product tour
Product tour

Six screens. The same screens I open every shift.

A walk through the per-port dashboard, drift-event console, device detail, evidence export, SIEM view, and admin operations. The screens below are the ones a security engineer actually lives in. I'll tell you what I look for on each one and what changes when something is wrong.

1 · Per-port dashboard 2 · Drift events 3 · Device detail 4 · Evidence export 5 · SIEM ingest 6 · Admin
STOP 1 of 6

Per-port dashboard: where the shift starts

One row per port, filterable by building, floor, site, VLAN. Each row shows current Device DNA, vendor hint with confidence, last-seen timestamp, and the framework controls the port satisfies right now. I open this first every morning. If it's quiet, the day starts quiet.

PORT INVENTORY · NYC-HQ · Building 3 · Floor 2 · 47 ports live PORT DEVICE DNA VENDOR HINT (CONF) LAST CONTROLS sw3-fl2/port-1 dna:7a4f-1c91 Crestron DM-MD8x8 (.92) 12s PCI/SOC2/HIPAA sw3-fl2/port-2 dna:5b2a-9c4f Cisco IP-Phone 8841 (.96) 18s PCI sw3-fl2/port-3 dna:8d3e-7b21 Unknown (.41) 4m - sw3-fl2/port-4 dna:4f5c-2a91 Polycom Studio X70 (.88) 6s SOC2 sw3-fl2/port-5 empty - - - sw3-fl2/port-6 dna:2b91-4d8a Hikvision DS-2CD2T (.91) 14s NDAA-FAIL sw3-fl2/port-7 dna:9c4e-1a2f HP LaserJet M607 (.95) 42s SOC2 40 more rows below · refresh every 30s · filter: building 3 / fl2 page 1 of 7
What I do here. Scan the color column. One red (Hikvision, NDAA-prohibited) and one yellow (unknown at 0.41 confidence). The red is a compliance hit, not an active attack; the yellow is investigative. Everything else is the boring green that means the day stays normal.
STOP 2 of 6

Drift events: the queue I actually triage

Events fire when the inventory changes. Each carries event type, severity, port, MITRE technique, and the underlying observations. The queue is the second thing I open after the dashboard. If anything fired overnight, this is where I see it.

DRIFT EVENTS · LAST 24H · 8 total · 2 P1 · 2 P2 · 4 P3 TIME SEV EVENT PORT MITRE 17:08:12 P1 device-substituted sw3-fl2/port-47 T1200, T1556 similarity 0.31 · Crestron → unknown 15:42:09 P2 port-topology-changed sw2-fl1/port-23 T1200 unmanaged hop detected (hop-count 1 → 2) 14:08:33 P1 ndaa-prohibited sw3-fl2/port-6 T1199 Hikvision DS-2CD2T detected (0.91 confidence) 10:22:18 P2 device-appeared sw1-fl1/port-19 T1078 unenrolled device · 4h grace expired 09:14:55 P3 device-firmware-shift sw3-fl2/port-12 T1542 03:11:02 P3 device-silent-extended sw3-fl2/port-31 -
What I do here. The 17:08 P1 is the one that gets my attention. Similarity 0.31 against a known Crestron means something else is plugged in. That goes straight to the on-call playbook. The 14:08 NDAA hit is a different escalation: compliance flow, not incident response. The P3s wait for the morning standup.
STOP 3 of 6

Device detail: the marker breakdown

Click any event or port to get the full record. Current and prior Device DNA. The five underlying markers, side by side. Framework controls. Recommended response, with the link to the runbook.

PORT sw3-fl2/port-47 · DEVICE-SUBSTITUTED · 2026-05-10 17:08:12 CURRENT (since 17:08) PREVIOUS (Feb 12 → 17:08) DNA: dna:5b8e-2a4f DNA: dna:7a4f-1c91 Vendor: unknown (.41) Vendor: Crestron DM-MD8x8 (.92) Link: 1G full duplex Link: 1G full duplex MAC: a0:11:b9:5e:8a:** MAC: a0:11:b9:5e:8a:** (same) DB match: no record DB match: Crestron DM-MD8x8 Signal set: shifted (see below) Signal set: stable baseline Similarity score 0.31 threshold: 0.65 MITRE TECHNIQUES T1200 Hardware additions T1556 Modify auth process FRAMEWORK CONTROLS PCI 4.0/12.5.1 SOC 2/CC6.1, NIST 800-171/3.4.1 CHANGE TICKET no match RECOMMENDED → quarantine via NAC · page IR on-call · see playbook.html#device-substituted
What I see. Same MAC, different everything else. Power dropped 2.2W. Link characteristics shifted. The reference-database lookup now resolves to a different device record. This is a real swap, not a firmware update. The marker comparison is the part that closes the argument when someone on the team says "are we sure?"
STOP 4 of 6

Evidence export: the part that used to take six weeks

For audit cycles. Pre-mapped to controls across the major frameworks. Auditor asks "show me your network inventory for PCI 12.5.1", you query, you export. Signed and timestamped at the control plane.

EVIDENCE EXPORT · PCI 4.0 / 12.5.1 · inventory of system components Control PCI-DSS 4.0 / 12.5.1 Scope all ports tagged PCI-CDE As of 2026-05-10 17:30 UTC In scope 247 devices EXPORT FORMATS CSV JSON PDF (auditor) signed PDF+JSON sample CSV row sw3-fl2/port-1,dna:7a4f-1c91,Crestron DM-MD8x8,2026-02-12,2026-05-10,1.00,"PCI-4.0/12.5.1,SOC2/CC6.1" audit hash (SHA-256): 9c4e1a2f8d3e7b21... · signed by control plane 2026-05-10T17:30:00Z
What changes. Audit prep stops being a six-week reconstruction project. The export is what the auditor asked for, signed and timestamped. At one customer, the auditor ran the query themselves during the walk-through; that was the moment the audit conversation changed shape.
STOP 5 of 6

SIEM ingest: what shows up in Splunk, Sentinel, Chronicle

The data the SOC analyst consumes inside their existing tool. Same payload across all ingest channels; only the transport changes.

SPLUNK · index=cybriq · last 1h 17:08:12 sourcetype=cybriq:event severity=high event=device-substituted port=sw3-fl2/port-47 site=NYC-HQ similarity=0.31 previous_vendor="Crestron DM-MD8x8" current_vendor="unknown" mitre="T1200,T1556" controls="PCI-4.0/12.5.1,SOC2/CC6.1" 15:42:09 sourcetype=cybriq:event severity=medium event=port-topology-changed port=sw2-fl1/port-23 new_hop_dna="dna:1a8f-3c91" hop_count=1→2 mitre="T1200" SAMPLE SPL: substitutions without matching change tickets index=cybriq event=device-substituted similarity<0.5 | join port [search index=ticketing change_window="open"] | where NOT match | stats count by site, current_vendor
What I wire up. The substitution event becomes a high-fidelity SIEM source. The SPL above is the one I run nightly: any port where the device got swapped and there was no open change ticket. That query alone has surfaced two real findings in the install base I've watched.
STOP 6 of 6

Admin: operational status and tuning

The ops view. External Scan Engine (ESE) health, tracker success rate, similarity-threshold tuning per environment, change-management lookback window, audit log of admin actions. The screen the operator opens when someone asks "is this thing still working?"

ADMIN · OPERATIONAL STATUS ESE health all 3 online tracker success (24h) 99.97% data freshness 22s ago DETECTION TUNING (per site) similarity_threshold 0.65 (default) firmware_shift_tolerance 0.85 unenrolled_grace_h 4 ndaa_confidence_min 0.85 change_window_lookback_h 24 RECENT ADMIN ACTIONS 2026-05-09 14:22 dcase reset meta.log 2026-05-08 03:00 cron backup 2.1MB 2026-05-07 11:14 dcase retune 0.65 → 0.70 (lab VLAN) 2026-05-05 09:01 smoshe syslog-rotate splunk-prod 2026-05-01 17:40 dcase policy-edit ndaa allowlist control plane uptime 99.94% rolling 90d last backup 2 days ago · 2026-05-08 03:00 UTC
What I check. ESE health and data freshness. If data freshness is over 90 seconds, something is wrong with the tracker. If a tracker is down, the validation loop is silent on the ports it covers. That's the failure mode the threat-model page walks through.

Want to see these screens with your own data?

30-day pilot. We deploy the ESE, ingest your Layer 1 observations, and walk through every screen on this tour using your devices and your events. Our engineering team on the call.

Walk through it with our team