DEMO ENVIRONMENT — All data is synthetic. No real systems are accessed.
Loading...
DEMO ENVIRONMENT — All data is synthetic. No real systems are accessed.
Ready to eliminate identity risk?
Start monitoring in 30 minutes. No credit card required.
Guided MRI demo
This demo uses representative data, but follows the same report structure, product model, and evidence approach used by the MRI board and technical outputs. Choose a company size, walk through the key screens in plain language, then finish on the generated report views.
MRI is the current public GA surface. The walkthrough shows what MRI can realistically demonstrate today: assessment-style posture, findings, and report outputs. Core is the next governed release path. Enhanced and AISF remain beta-only and should not be read as fully delivered public products.
Identity posture
47/100
Elevated risk, programme-level response required
Identities analysed
20,341
16 connected platforms
Telemetry streams
51
correlated in report output
Projected posture
62/100
after immediate remediation
Active profile
Workload identity sprawl, subsidiary trust, legacy authentication, and DevOps pipeline privilege require programme-level investment and governance.
Company profiles
200 users
SME
Concentrated risk in a smaller hybrid estate. The report highlights a few high-impact privilege and secrets issues that can be fixed in one focused sprint.
Posture
65/100
Platforms
10
Findings
23
Workloads
15
2,000 users
Mid-market
Cross-platform attack paths, service-account sprawl, and PAM friction require coordinated IAM, Cloud, AppOps, and SecOps ownership.
Posture
58/100
Platforms
11
Findings
43
Workloads
75
20,000 users
Enterprise
Workload identity sprawl, subsidiary trust, legacy authentication, and DevOps pipeline privilege require programme-level investment and governance.
Posture
47/100
Platforms
11
Findings
74
Workloads
412
Portal coverage
The MRI walkthrough still ends on report output, but it now exposes more of the actual portal surface: compliance, certification, connectors, alerts, and customer operations.
Risk operations
Command Center
Demo portalShared posture score, trend, priority queue, platform health, and Cognitia insight.
Identity Discovery
Demo portalSearch and pivot through the identities that feed posture, drift, and report output.
Assessments
Demo portalAssessment history, latest runs, and packaged outputs anchored to real execution.
Governance and assurance
Comply
Demo portalControls, evidence, incidents, DORA, Cyber Essentials, risk register, and crosswalks.
Certify
Portal moduleCertification projects, evidence vault, task workflows, and audit-readiness tracking.
MRI report outputs
Demo surfaceBoard, technical, and audit readiness report views with synthetic data.
Operations and automation
Connectors
Demo portalIntegration status, sync health, tiers, and data-source operational context.
Alerts and response
Demo portalThresholds, notifications, and operational response triggers for identity risk.
Admin surfaces
Portal moduleSettings, team, API keys, and webhooks for customer-installed operation.
Fidara advisor
A Fidara advisor launcher is mounted across the demo and app shells. It is available in environments where an advisor endpoint is configured and degrades honestly when it is not.
Current environment
Advisor UI integrated, endpoint not configured here
The launcher and availability handling are wired in. Set NEXT_PUBLIC_ADVISOR_API_URL or NEXT_PUBLIC_ADVISOR_ENABLED to activate it in deployment.
Product tier
MRI
Tour mode
MRI + portal coverage
What the report will show
Fix-first priorities
Scope Azure DevOps service connection acme-ado-pipeline-prod from subscription-level to resource-group Contributor; review all 12 ADO service connections against least-privilege baseline.
CloudEffort: medium
Add sts:SourceIdentity and aws:PrincipalTag[K8sNamespace] condition keys to all 89 IRSA role trust policies; prioritise the 23 roles with s3:* or dynamodb:* on Resource:*.
CloudEffort: high
Revoke and rotate all 12 GCP SA keys committed to version control repositories; immediately disable keys found in public-facing repos; initiate incident assessment for potential prior exposure.
CloudEffort: medium
Evidence snapshot
Entra ID
12 permanent Global Admin assignments; no PIM; 3 accounts inactive >45 days.
F-20K-001
Entra ID
340 accounts using legacy NTLM or Basic auth; bypass Conditional Access and MFA.
F-20K-002
Entra ID
2 vendor SAML federation trusts active with no sign-in in >180 days.
F-20K-003
AWS IAM
47 cross-account trust roles lack condition keys; compromise of shared-services propagates to all.
F-20K-004
AWS IAM
8 S3 buckets with internal data have public ACLs; 3 are publicly readable.
F-20K-005