CVE triage with exploitability scoring
Combines CVSS, EPSS and CISA KEV catalog to prioritize what matters now. Stops you from patching CVSS 9.8 theoretical issues while ignoring the CVSS 7.5 vuln being actively exploited.
Triage CVEs, reconstruct incidents and map findings to MITRE ATT&CK — without sending your security posture to a third-party model.
Pentest reports, vulnerability scans, SIEM logs and firewall configs are the most sensitive documents in any organization. A leak of this data is itself a security incident. This agent reads them inside an Intel TDX hardware enclave on European infrastructure, prioritizes findings by real-world exploitability, maps everything to MITRE ATT&CK and generates a P0-P3 remediation roadmap. Built for SOC teams and pentest firms that cannot tolerate exposure on shared inference clusters.
Built for: SOC managers, CISOs, MSP/MSSP teams, pentest firms, incident responders
Average pentest costs $30-150K. SOC analysts spend 70% of their time on triage, not investigation. Mean time to detect a breach is still 204 days. And the documents that drive remediation — pentest reports, scan output, incident artifacts — are the documents an attacker would most want to read.
Triage 100s of vulnerability findings by real-world exploitability (CVSS + EPSS + CISA KEV) in minutes, with the analysis sealed inside a CPU-encrypted enclave.
What the Cybersecurity Analyst does on every document, sealed inside an Intel TDX hardware enclave.
Combines CVSS, EPSS and CISA KEV catalog to prioritize what matters now. Stops you from patching CVSS 9.8 theoretical issues while ignoring the CVSS 7.5 vuln being actively exploited.
Every finding mapped to a specific ATT&CK technique (e.g., T1566.001 — Spearphishing Attachment). Coverage map highlights tactics with no detection — your real blind spots.
Chains individual findings into the highest-risk attack path a real adversary would follow. Quantifies time-to-compromise ("Domain Admin in ~3 steps, 2-4 hours from initial access").
Distinguishes validated findings (PoC demonstrated) from theoretical or false-positive findings. Tells you which 47 findings actually need work — and which are noise.
Reads SIEM logs and EDR alerts, rebuilds the timeline with ATT&CK techniques, IOCs and confidence scores. Useful for IR retrospectives and tabletop exercises.
Translates security findings into FAIR-methodology business risk: annualized loss expectancy, top three exposures, investment to reduce to acceptable level, peer comparison.
Four steps from upload to export. Your document is decrypted only inside the CPU-encrypted enclave.
Pentest report (PDF), Nessus / Qualys scan output, SIEM exports, firewall configs, cloud config snapshots. TLS in transit, decrypted only inside the Intel TDX enclave.
Vulnerability data is processed in CPU-encrypted memory. The cloud operator cannot access prompts or documents during analysis — neither can a compromised hypervisor.
Threat summary, finding-by-finding breakdown with ATT&CK mapping, attack-path diagram, P0-P3 roadmap, MITRE coverage map, executive risk summary.
Markdown for IR write-ups, JSON via API for Jira / ServiceNow / TheHive, ATT&CK Navigator layers for tabletop sessions.
Every output cites the specific article, section or control. The Intel TDX hardware boundary handles the data-protection side; the agent handles the analytical side.
Real prompts from cybersecurity teams.
Triage this vulnerability scan — prioritize by real-world exploitability, not just CVSS.
Map this pentest report to MITRE ATT&CK. What's the most dangerous attack chain?
Analyze these SIEM logs — reconstruct the incident timeline.
This pentest found 47 findings — which ones are false positives?
Prompt: Generate a P0-P3 remediation roadmap from this assessment.
Output: P0 (24h): CVE-2024-3094 xz utils backdoor on bastion host — in CISA KEV. CVE-2023-44487 HTTP/2 Rapid Reset on edge proxies — active exploitation. P1 (7d): 12 findings with EPSS >0.5 and no compensating control. P2 (30d): 38 findings with patches available but compensating controls in place. P3 (90d): 84 informational and hardening recommendations.
Prompt: Which 47 pentest findings are false positives?
Output: 14 false positives identified: 6 are network-level SSL ciphersuite findings mitigated by upstream load balancer (CONFIRMED via config review); 4 are theoretical XSS where input is server-side templated only; 2 are CVEs that do not apply to the specific minor version deployed; 2 are CVSS-by-policy findings (info disclosure of build numbers) you have explicitly accepted. Recommend marking these as risk-accepted in the report rather than re-litigating with the pentester.
Every tier runs inside Intel TDX hardware enclaves. Plans stay in sync with /pricing.
1,000 requests/month, 1 seat. For independent pentesters, blue-team consultants.
3 seats, 500 requests/month, 100 MB uploads, audit log. For small SOC teams and MSSPs.
10 seats, 5,000 requests/month, 500 MB uploads, API access for SIEM / SOAR integration, 12-month audit log.
Unlimited seats, fine-tuning on your internal IR playbook, SSO/SAML, dedicated TDX capacity, custom DPA, EU data residency.
Honest comparison. Hardware-rooted confidentiality is what most alternatives are missing.
| Alternative | Pros | Cons vs VoltageGPU |
|---|---|---|
| Dropzone AI |
|
|
| Charlotte AI (CrowdStrike) |
|
|
| ChatGPT Enterprise |
|
|
Only if the architecture prevents the model provider — and the cloud operator — from reading the data. Intel TDX encrypts memory in hardware so neither VoltageGPU nor a compromised hypervisor can access prompts or documents during inference. EU operator location adds no CLOUD Act exposure.
Local deployment requires GPU capex, ops headcount, model maintenance and patching. Intel TDX gives you the same isolation guarantee with operating-expense pricing and zero local infrastructure. The hardware boundary is what matters — and it is identical.
No. It removes the triage workload that consumes 70% of analyst time, so your team can focus on threat hunting, IR and detection engineering. Output is framed as analysis for trained security professionals, not autonomous response.
When SIEM/EDR logs are provided, the agent flags active threats with an explicit "ACTIVE THREAT DETECTED — escalate immediately" banner. It will not redact or downplay findings. It also redacts credentials, API keys and private keys that appear in source documents.
Yes, on the Pro tier via the OpenAI-compatible API. Customers pipe structured findings into ticket systems and ATT&CK Navigator layers into their detection engineering workflow.
The agent is current on MITRE ATT&CK v15, including ATT&CK for Containers and Cloud sub-techniques. Coverage maps include the relevant matrix for the artifact type (enterprise, mobile, ICS).
Yes. CIS Benchmarks for AWS, Azure and GCP, CSPM findings (Wiz, Prisma, Orca format), Kubernetes pentest output and IaC scan reports. Cloud config drift gets mapped to specific CIS controls and CSPM rule IDs.
External SOC-as-a-Service runs $50-200K/year for mid-sized orgs. The agent does not replace 24/7 monitoring — it accelerates the human work inside your team or your MSSP. Most customers pair it with their existing MSSP rather than replacing one.
Intel TDX attestation, EU jurisdiction, French operator (VOLTAGE EI). Cancel anytime.