DEMO ENVIRONMENT — All data is synthetic. No real systems are accessed.
Loading...
DEMO ENVIRONMENT — All data is synthetic. No real systems are accessed.
Ready to eliminate identity risk?
Start monitoring in 30 minutes. No credit card required.
Guided MRI demo
This demo uses representative data, but follows the same report structure, product model, and evidence approach used by the MRI board and technical outputs. Choose a company size, walk through the key screens in plain language, then finish on the generated report views.
MRI is the current public GA surface. The walkthrough shows what MRI can realistically demonstrate today: assessment-style posture, findings, and report outputs. Core is the next governed release path. Enhanced and AISF remain beta-only and should not be read as fully delivered public products.
Identity posture
58/100
Moderate-elevated risk, coordinated remediation required
Identities analysed
2,014
13 connected platforms
Telemetry streams
27
correlated in report output
Projected posture
71/100
after immediate remediation
Active profile
Cross-platform attack paths, service-account sprawl, and PAM friction require coordinated IAM, Cloud, AppOps, and SecOps ownership.
Company profiles
200 users
SME
Concentrated risk in a smaller hybrid estate. The report highlights a few high-impact privilege and secrets issues that can be fixed in one focused sprint.
Posture
65/100
Platforms
10
Findings
23
Workloads
15
2,000 users
Mid-market
Cross-platform attack paths, service-account sprawl, and PAM friction require coordinated IAM, Cloud, AppOps, and SecOps ownership.
Posture
58/100
Platforms
11
Findings
43
Workloads
75
20,000 users
Enterprise
Workload identity sprawl, subsidiary trust, legacy authentication, and DevOps pipeline privilege require programme-level investment and governance.
Posture
47/100
Platforms
11
Findings
74
Workloads
412
Portal coverage
The MRI walkthrough still ends on report output, but it now exposes more of the actual portal surface: compliance, certification, connectors, alerts, and customer operations.
Risk operations
Command Center
Demo portalShared posture score, trend, priority queue, platform health, and Cognitia insight.
Identity Discovery
Demo portalSearch and pivot through the identities that feed posture, drift, and report output.
Assessments
Demo portalAssessment history, latest runs, and packaged outputs anchored to real execution.
Governance and assurance
Comply
Demo portalControls, evidence, incidents, DORA, Cyber Essentials, risk register, and crosswalks.
Certify
Portal moduleCertification projects, evidence vault, task workflows, and audit-readiness tracking.
MRI report outputs
Demo surfaceBoard, technical, and audit readiness report views with synthetic data.
Operations and automation
Connectors
Demo portalIntegration status, sync health, tiers, and data-source operational context.
Alerts and response
Demo portalThresholds, notifications, and operational response triggers for identity risk.
Admin surfaces
Portal moduleSettings, team, API keys, and webhooks for customer-installed operation.
Fidara advisor
A Fidara advisor launcher is mounted across the demo and app shells. It is available in environments where an advisor endpoint is configured and degrades honestly when it is not.
Current environment
Advisor UI integrated, endpoint not configured here
The launcher and availability handling are wired in. Set NEXT_PUBLIC_ADVISOR_API_URL or NEXT_PUBLIC_ADVISOR_ENABLED to activate it in deployment.
Product tier
MRI
Tour mode
MRI + portal coverage
What the report will show
Fix-first priorities
Add aws:MultiFactorAuthPresent and aws:RequestedRegion condition keys to acme.role.cloud-admin SAML trust policy; restrict session duration to 1 hour.
CloudEffort: low
Revoke all 3 GCP service-account keys committed to acme-ci-pipeline repository; rotate immediately; migrate to Workload Identity Federation for CI/CD GCP access.
CloudEffort: medium
Disable the 2 Okta API tokens owned by deprovisioned users (acme.user.former.employee1, acme.user.former.employee2); audit all API tokens against active user list.
IAMEffort: low
Evidence snapshot
Entra ID
6 permanent Global Admin assignments; 0 PIM eligible schedules.
F-2K-001
AWS IAM
SAML trust role acme.role.cloud-admin has AdministratorAccess and no condition keys.
F-2K-002
Okta
4 Okta super-admins authenticate from named network zone without FIDO2.
F-2K-003
Google Cloud IAM
3 SA keys committed to CI/CD repo; all unrotated >90 days.
F-2K-004
Kubernetes
4 cluster-admin ClusterRoleBindings to workload service accounts across 4 namespaces.
F-2K-005