Platform Features

Enterprise-grade cybersecurity,
built for growing businesses

The same security capabilities Fortune 500 companies rely on -- automated, affordable, and designed for teams without a dedicated security department.

Security Scanning

Know exactly where you stand

Korynthe scans your public-facing infrastructure the same way an attacker would -- then explains what it found in plain English.

DNS & Email Authentication Analysis

Checks your SPF, DKIM, and DMARC records to ensure outgoing email is authenticated and protected against spoofing. Misconfigured email authentication is the #1 reason phishing succeeds.

Why it matters

Email impersonation is the most common attack vector for small businesses. Proper authentication stops attackers from sending email that looks like it came from you.

Included in: Korynthe Insight and above

SSL/TLS Certificate Monitoring

Validates your certificates, checks expiration dates, cipher suites, and protocol versions. Alerts you before anything expires.

Why it matters

An expired or misconfigured certificate breaks customer trust and can expose data in transit.

Included in: Korynthe Insight and above

Security Header Assessment

Evaluates HTTP security headers including Content-Security-Policy, X-Frame-Options, HSTS, and more. Provides exact header values to add.

Why it matters

Security headers are free to implement and block entire categories of attacks like clickjacking and cross-site scripting.

Included in: Korynthe Insight and above

External Technology Fingerprinting & Likely Vulnerability Matching

Identifies the software, frameworks, and services running on your public-facing infrastructure so you can see what is externally exposed.

Why it matters

You can't patch what you don't know is running. Technology fingerprinting gives you visibility into your actual attack surface.

Included in: Korynthe Core and above

Email Platform Detection

Identifies your email platform (Microsoft 365, Google Workspace, on-premises Exchange, etc.) and tailors remediation guidance to your specific platform.

Why it matters

Generic security advice wastes time. Platform-specific guidance means you can fix issues in minutes, not hours.

Included in: Korynthe Core and above

Workspace Security

Secure your Microsoft 365 environment

Your productivity suite is your most sensitive system. Korynthe scans Microsoft 365 configurations that external scanners miss entirely. Google Workspace is coming soon.

Microsoft 365 Security Audit

Reviews Entra ID settings, conditional access policies, MFA enrollment, mailbox forwarding rules, admin role assignments, and SharePoint/OneDrive sharing permissions.

Why it matters

Most M365 tenants have dozens of misconfigurations out of the box. A single forwarding rule to an external address can exfiltrate months of email silently.

Included in: Korynthe Control and above

Google Workspace Security Audit

Planned coverage for 2-Step Verification enforcement, app passwords, third-party app access, Drive sharing settings, Gmail routing rules, and admin privileges.

Why it matters

Google Workspace defaults favor collaboration over security. This feature is on the roadmap, but it is not live today.

Included in: Coming soon

Auto-Remediation

For supported configurations, Korynthe can apply selected remediation actions with guided approval -- reducing the amount of manual PowerShell or admin console work needed.

Why it matters

Knowing about a problem is only half the battle. Automated fixes close the gap between detection and resolution from days to seconds.

Included in: Korynthe Command and above

Continuous Monitoring

Security doesn't stop after a scan

Korynthe re-checks your posture automatically and alerts you when something changes. Think of it as a security system that never sleeps.

Automated Re-Scanning (Every 6 Hours)

Your external security posture is continuously monitored. DNS changes, certificate expirations, new vulnerabilities, and configuration drift are caught automatically.

Why it matters

Security is not a one-time event. Configurations change, certificates expire, and new vulnerabilities are discovered daily.

Included in: Korynthe Control and above

Credential Breach Monitoring

Checks employee email addresses against known breach databases and dark web marketplaces. Alerts you when credentials appear in new data dumps.

Why it matters

Reused passwords from breached sites are the easiest way into your systems. Early detection lets you force password resets before attackers strike.

Included in: Korynthe Control and above

Brand Impersonation Monitoring

Monitors Certificate Transparency logs for certificates issued to domains that look like yours. Catches phishing sites and impersonation attempts early.

Why it matters

Attackers register look-alike domains to phish your customers and employees. Catching these early protects your brand and your people.

Included in: Korynthe Vanguard

Readiness Guidance

Meet requirements without hiring a consultant

Korynthe maps your security posture to industry frameworks and tells you exactly what's missing. No spreadsheets, no guesswork.

Framework Mapping (NIST CSF, SOC 2, HIPAA, CIS, ISO 27001)

Your scan results are automatically mapped to compliance framework controls. See which controls you satisfy, which need work, and exactly what to do.

Why it matters

Compliance frameworks are complex documents written for auditors. Korynthe translates them into actionable tasks for your team.

Included in: Korynthe Command and above

Framework Readiness Dashboard

A real-time view of your readiness across every framework. Filter by status, priority, or framework. Track progress over time.

Why it matters

When a customer or internal stakeholder asks how close you are, you need a clear answer in minutes, not weeks.

Included in: Korynthe Command and above

Gap Analysis by Framework

See which requirements are fully in place, which are partial, and which still need attention. Korynthe turns technical findings into an ordered readiness plan.

Why it matters

Small teams do not need another spreadsheet. They need to know what to work on next and why it matters.

Included in: Korynthe Command and above

Readiness Reports

Generate professional reports that explain your current posture, major gaps, and improvement priorities in language leadership can use.

Why it matters

Professional documentation helps you explain progress internally and prepare for outside reviews without overselling the product as a full audit system.

Included in: Korynthe Command and above

Risk Management

Understand your current risk picture

Risk management is about making informed decisions. Korynthe helps you identify and track the current risks showing up in your latest scans so you can prioritize what matters most.

Current Risks Workspace

See medium-and-above risks pulled directly from your latest scans across domain, workspace, and cloud. Create mitigation tasks from each risk without manually maintaining a separate register.

Why it matters

Small teams need a current view of what is exposed now, not a heavy governance workflow to maintain by hand.

Included in: Korynthe Command and above

Vendor Risk Tracking

Inventory your third-party vendors, track their security posture, and manage risk questionnaires. Surface hidden supply chain risks before they become incidents.

Why it matters

Your security is only as strong as your weakest vendor. Tracking vendor risk is essential for any compliance framework.

Included in: Korynthe Control and above

Security Health Score (0-100)

A composite score across email security, infrastructure security, and website security. Track your score over time like a credit score for cybersecurity.

Why it matters

A single number makes it easy to communicate security posture to leadership, boards, and customers.

Included in: Korynthe Insight and above

AI-Powered Policies & Roadmaps

Your AI security advisor

Korynthe uses Azure OpenAI to generate policies, roadmaps, and remediation guidance tailored to your specific business and scan results.

AI Policy Generator (8+ Templates)

Generate industry-specific security policies in minutes: Acceptable Use, Incident Response, Data Retention, Remote Work, BYOD, Password Policy, Vendor Management, and Data Classification.

Why it matters

Writing security policies from scratch takes weeks and usually requires a consultant. AI-generated policies give you a professional starting point instantly.

Included in: Korynthe Control and above

AI Security Roadmap (90-Day Plan)

Based on your scan results, Korynthe generates a prioritized 90-day security improvement plan with specific tasks, timelines, and expected impact.

Why it matters

Knowing your problems is only useful if you know what to fix first. A prioritized roadmap turns findings into action.

Included in: Korynthe Control and above

AI Budget Planner (12-Month)

Get a realistic 12-month security budget based on your organization size, industry, and current maturity level. Includes tool recommendations and ROI projections.

Why it matters

Security spending without a plan is guesswork. A data-driven budget helps you justify investment to leadership.

Included in: Korynthe Vanguard

Copy-Paste Remediation Configs

For every finding, Korynthe provides exact configuration snippets you can copy and paste -- DNS records, PowerShell commands, admin console settings, and more.

Why it matters

Generic advice like 'enable DMARC' wastes time. Exact configs like 'add this TXT record' save hours of research.

Included in: Korynthe Control and above

Reporting

Professional reports for every audience

Whether you're reporting to your team, your board, or your customers, Korynthe generates the right report for the right audience.

PDF Security Reports

Professional, branded PDF reports summarizing your security posture, findings, and recommendations. Perfect for sharing with leadership or clients.

Why it matters

A professional report communicates competence. It shows you take security seriously and have a system in place.

Included in: Korynthe Control and above

Executive Security Dashboard

A high-level view designed for non-technical leadership. Key metrics, trends, risk summary, and readiness status at a glance.

Why it matters

Executives don't need technical details -- they need to know if the organization is getting more or less secure over time.

Included in: Korynthe Vanguard

Scan History & Trend Tracking

Every scan is saved. Compare results over time to see progress, catch regressions, and demonstrate continuous improvement.

Why it matters

Trends matter more than snapshots. Showing improvement over time is the strongest evidence of a maturing security program.

Included in: Korynthe Core and above

MSP Tools

Built for managed service providers

If you manage security for multiple clients, Korynthe gives you the tools to scale your practice without scaling your team.

Multi-Client Management

Manage all your clients from a single dashboard. Switch between organizations, compare postures, and identify which clients need attention.

Why it matters

MSPs need efficiency. Managing clients one at a time doesn't scale. A unified view lets you prioritize across your entire portfolio.

Included in: Korynthe Vanguard

White-Label PDF Reports

Generate professional reports branded with your MSP's logo and identity. Deliver them to clients as your own work product.

Why it matters

White-label reports let you offer a premium security service without building the tooling yourself.

Included in: Korynthe Vanguard

Cloud Security Scanning

Extend scanning beyond domains and workspaces into cloud infrastructure. Azure is available now as read-only scanning for one subscription, with multi-subscription coverage available as an add-on. AWS and Google Cloud support are coming soon.

Why it matters

As businesses move to the cloud, misconfigured infrastructure becomes a major risk. Cloud scanning covers the full picture.

Included in: Korynthe Vanguard

Ready to see your security posture?

Start with a free scan. Verify your business email, see what attackers can already observe, and get a clear baseline in under two minutes.