The same security capabilities Fortune 500 companies rely on -- automated, affordable, and designed for teams without a dedicated security department.
Korynthe scans your public-facing infrastructure the same way an attacker would -- then explains what it found in plain English.
Checks your SPF, DKIM, and DMARC records to ensure outgoing email is authenticated and protected against spoofing. Misconfigured email authentication is the #1 reason phishing succeeds.
Why it matters
Email impersonation is the most common attack vector for small businesses. Proper authentication stops attackers from sending email that looks like it came from you.
Included in: Korynthe Insight and above
Validates your certificates, checks expiration dates, cipher suites, and protocol versions. Alerts you before anything expires.
Why it matters
An expired or misconfigured certificate breaks customer trust and can expose data in transit.
Included in: Korynthe Insight and above
Evaluates HTTP security headers including Content-Security-Policy, X-Frame-Options, HSTS, and more. Provides exact header values to add.
Why it matters
Security headers are free to implement and block entire categories of attacks like clickjacking and cross-site scripting.
Included in: Korynthe Insight and above
Identifies the software, frameworks, and services running on your public-facing infrastructure so you can see what is externally exposed.
Why it matters
You can't patch what you don't know is running. Technology fingerprinting gives you visibility into your actual attack surface.
Included in: Korynthe Core and above
Identifies your email platform (Microsoft 365, Google Workspace, on-premises Exchange, etc.) and tailors remediation guidance to your specific platform.
Why it matters
Generic security advice wastes time. Platform-specific guidance means you can fix issues in minutes, not hours.
Included in: Korynthe Core and above
Your productivity suite is your most sensitive system. Korynthe scans Microsoft 365 configurations that external scanners miss entirely. Google Workspace is coming soon.
Reviews Entra ID settings, conditional access policies, MFA enrollment, mailbox forwarding rules, admin role assignments, and SharePoint/OneDrive sharing permissions.
Why it matters
Most M365 tenants have dozens of misconfigurations out of the box. A single forwarding rule to an external address can exfiltrate months of email silently.
Included in: Korynthe Control and above
Planned coverage for 2-Step Verification enforcement, app passwords, third-party app access, Drive sharing settings, Gmail routing rules, and admin privileges.
Why it matters
Google Workspace defaults favor collaboration over security. This feature is on the roadmap, but it is not live today.
Included in: Coming soon
For supported configurations, Korynthe can apply selected remediation actions with guided approval -- reducing the amount of manual PowerShell or admin console work needed.
Why it matters
Knowing about a problem is only half the battle. Automated fixes close the gap between detection and resolution from days to seconds.
Included in: Korynthe Command and above
Korynthe re-checks your posture automatically and alerts you when something changes. Think of it as a security system that never sleeps.
Your external security posture is continuously monitored. DNS changes, certificate expirations, new vulnerabilities, and configuration drift are caught automatically.
Why it matters
Security is not a one-time event. Configurations change, certificates expire, and new vulnerabilities are discovered daily.
Included in: Korynthe Control and above
Checks employee email addresses against known breach databases and dark web marketplaces. Alerts you when credentials appear in new data dumps.
Why it matters
Reused passwords from breached sites are the easiest way into your systems. Early detection lets you force password resets before attackers strike.
Included in: Korynthe Control and above
Monitors Certificate Transparency logs for certificates issued to domains that look like yours. Catches phishing sites and impersonation attempts early.
Why it matters
Attackers register look-alike domains to phish your customers and employees. Catching these early protects your brand and your people.
Included in: Korynthe Vanguard
Korynthe maps your security posture to industry frameworks and tells you exactly what's missing. No spreadsheets, no guesswork.
Your scan results are automatically mapped to compliance framework controls. See which controls you satisfy, which need work, and exactly what to do.
Why it matters
Compliance frameworks are complex documents written for auditors. Korynthe translates them into actionable tasks for your team.
Included in: Korynthe Command and above
A real-time view of your readiness across every framework. Filter by status, priority, or framework. Track progress over time.
Why it matters
When a customer or internal stakeholder asks how close you are, you need a clear answer in minutes, not weeks.
Included in: Korynthe Command and above
See which requirements are fully in place, which are partial, and which still need attention. Korynthe turns technical findings into an ordered readiness plan.
Why it matters
Small teams do not need another spreadsheet. They need to know what to work on next and why it matters.
Included in: Korynthe Command and above
Generate professional reports that explain your current posture, major gaps, and improvement priorities in language leadership can use.
Why it matters
Professional documentation helps you explain progress internally and prepare for outside reviews without overselling the product as a full audit system.
Included in: Korynthe Command and above
Risk management is about making informed decisions. Korynthe helps you identify and track the current risks showing up in your latest scans so you can prioritize what matters most.
See medium-and-above risks pulled directly from your latest scans across domain, workspace, and cloud. Create mitigation tasks from each risk without manually maintaining a separate register.
Why it matters
Small teams need a current view of what is exposed now, not a heavy governance workflow to maintain by hand.
Included in: Korynthe Command and above
Inventory your third-party vendors, track their security posture, and manage risk questionnaires. Surface hidden supply chain risks before they become incidents.
Why it matters
Your security is only as strong as your weakest vendor. Tracking vendor risk is essential for any compliance framework.
Included in: Korynthe Control and above
A composite score across email security, infrastructure security, and website security. Track your score over time like a credit score for cybersecurity.
Why it matters
A single number makes it easy to communicate security posture to leadership, boards, and customers.
Included in: Korynthe Insight and above
Korynthe uses Azure OpenAI to generate policies, roadmaps, and remediation guidance tailored to your specific business and scan results.
Generate industry-specific security policies in minutes: Acceptable Use, Incident Response, Data Retention, Remote Work, BYOD, Password Policy, Vendor Management, and Data Classification.
Why it matters
Writing security policies from scratch takes weeks and usually requires a consultant. AI-generated policies give you a professional starting point instantly.
Included in: Korynthe Control and above
Based on your scan results, Korynthe generates a prioritized 90-day security improvement plan with specific tasks, timelines, and expected impact.
Why it matters
Knowing your problems is only useful if you know what to fix first. A prioritized roadmap turns findings into action.
Included in: Korynthe Control and above
Get a realistic 12-month security budget based on your organization size, industry, and current maturity level. Includes tool recommendations and ROI projections.
Why it matters
Security spending without a plan is guesswork. A data-driven budget helps you justify investment to leadership.
Included in: Korynthe Vanguard
For every finding, Korynthe provides exact configuration snippets you can copy and paste -- DNS records, PowerShell commands, admin console settings, and more.
Why it matters
Generic advice like 'enable DMARC' wastes time. Exact configs like 'add this TXT record' save hours of research.
Included in: Korynthe Control and above
Whether you're reporting to your team, your board, or your customers, Korynthe generates the right report for the right audience.
Professional, branded PDF reports summarizing your security posture, findings, and recommendations. Perfect for sharing with leadership or clients.
Why it matters
A professional report communicates competence. It shows you take security seriously and have a system in place.
Included in: Korynthe Control and above
A high-level view designed for non-technical leadership. Key metrics, trends, risk summary, and readiness status at a glance.
Why it matters
Executives don't need technical details -- they need to know if the organization is getting more or less secure over time.
Included in: Korynthe Vanguard
Every scan is saved. Compare results over time to see progress, catch regressions, and demonstrate continuous improvement.
Why it matters
Trends matter more than snapshots. Showing improvement over time is the strongest evidence of a maturing security program.
Included in: Korynthe Core and above
If you manage security for multiple clients, Korynthe gives you the tools to scale your practice without scaling your team.
Manage all your clients from a single dashboard. Switch between organizations, compare postures, and identify which clients need attention.
Why it matters
MSPs need efficiency. Managing clients one at a time doesn't scale. A unified view lets you prioritize across your entire portfolio.
Included in: Korynthe Vanguard
Generate professional reports branded with your MSP's logo and identity. Deliver them to clients as your own work product.
Why it matters
White-label reports let you offer a premium security service without building the tooling yourself.
Included in: Korynthe Vanguard
Extend scanning beyond domains and workspaces into cloud infrastructure. Azure is available now as read-only scanning for one subscription, with multi-subscription coverage available as an add-on. AWS and Google Cloud support are coming soon.
Why it matters
As businesses move to the cloud, misconfigured infrastructure becomes a major risk. Cloud scanning covers the full picture.
Included in: Korynthe Vanguard
Start with a free scan. Verify your business email, see what attackers can already observe, and get a clear baseline in under two minutes.