DEMO ENVIRONMENT — All data is synthetic. No real systems are accessed.
Loading...
DEMO ENVIRONMENT — All data is synthetic. No real systems are accessed.
Ready to eliminate identity risk?
Start monitoring in 30 minutes. No credit card required.
Guided MRI demo
This demo uses representative data, but follows the same report structure, product model, and evidence approach used by the MRI board and technical outputs. Choose a company size, walk through the key screens in plain language, then finish on the generated report views.
MRI is the current public GA surface. The walkthrough shows what MRI can realistically demonstrate today: assessment-style posture, findings, and report outputs. Core is the next governed release path. Enhanced and AISF remain beta-only and should not be read as fully delivered public products.
Identity posture
65/100
Moderate risk, high remediation leverage
Identities analysed
247
10 connected platforms
Telemetry streams
22
correlated in report output
Projected posture
77/100
after immediate remediation
Active profile
Concentrated risk in a smaller hybrid estate. The report highlights a few high-impact privilege and secrets issues that can be fixed in one focused sprint.
Company profiles
200 users
SME
Concentrated risk in a smaller hybrid estate. The report highlights a few high-impact privilege and secrets issues that can be fixed in one focused sprint.
Posture
65/100
Platforms
10
Findings
23
Workloads
15
2,000 users
Mid-market
Cross-platform attack paths, service-account sprawl, and PAM friction require coordinated IAM, Cloud, AppOps, and SecOps ownership.
Posture
58/100
Platforms
11
Findings
43
Workloads
75
20,000 users
Enterprise
Workload identity sprawl, subsidiary trust, legacy authentication, and DevOps pipeline privilege require programme-level investment and governance.
Posture
47/100
Platforms
11
Findings
74
Workloads
412
Portal coverage
The MRI walkthrough still ends on report output, but it now exposes more of the actual portal surface: compliance, certification, connectors, alerts, and customer operations.
Risk operations
Command Center
Demo portalShared posture score, trend, priority queue, platform health, and Cognitia insight.
Identity Discovery
Demo portalSearch and pivot through the identities that feed posture, drift, and report output.
Assessments
Demo portalAssessment history, latest runs, and packaged outputs anchored to real execution.
Governance and assurance
Comply
Demo portalControls, evidence, incidents, DORA, Cyber Essentials, risk register, and crosswalks.
Certify
Portal moduleCertification projects, evidence vault, task workflows, and audit-readiness tracking.
MRI report outputs
Demo surfaceBoard, technical, and audit readiness report views with synthetic data.
Operations and automation
Connectors
Demo portalIntegration status, sync health, tiers, and data-source operational context.
Alerts and response
Demo portalThresholds, notifications, and operational response triggers for identity risk.
Admin surfaces
Portal moduleSettings, team, API keys, and webhooks for customer-installed operation.
Fidara advisor
A Fidara advisor launcher is mounted across the demo and app shells. It is available in environments where an advisor endpoint is configured and degrades honestly when it is not.
Current environment
Advisor UI integrated, endpoint not configured here
The launcher and availability handling are wired in. Set NEXT_PUBLIC_ADVISOR_API_URL or NEXT_PUBLIC_ADVISOR_ENABLED to activate it in deployment.
Product tier
MRI
Tour mode
MRI + portal coverage
What the report will show
Fix-first priorities
Remove acme.user.alex.johnson and acme.user.bob.smith from permanent Global Administrator; convert to PIM-eligible with Privileged Authentication Administrator as approver.
IAMEffort: low
Scope Kubernetes ClusterRoleBinding 'acme-admin' to payment-processing namespace only; replace with a namespace-scoped RoleBinding.
AppOpsEffort: low
Disable CA-LegacySMTP-Exception after coordinating alternative auth flow with 14 affected accounts; document business justification or set a 30-day mandatory review date.
IAMEffort: medium
Evidence snapshot
Entra ID
Three user accounts hold permanent Global Administrator role assignments without PIM activation gate.
F-200-001
AWS IAM
Lambda execution role acme.role.lambda-processor has wildcard action and resource in inline policy.
F-200-002
Okta
34 finance user accounts enrolled with SMS OTP only; no phishing-resistant factor available.
F-200-003
Google Cloud IAM
Service account acme.service.data-pipeline has project-level Editor role with 183-day-old unrotated key.
F-200-004
Kubernetes
ClusterRoleBinding 'acme-admin' binds cluster-admin to acme.service.payment-processor at cluster scope.
F-200-005