Median dwell time when external entities notify the organization
When attackers are not caught fast, the post-confirmation work starts cold and stretches across weeks of fragmented evidence. Source: Mandiant M-Trends 2025.
Identity-first incident response
InaiSec is the identity-first IR layer for everything after an alert is confirmed: collect evidence, trace the compromised credential, map blast radius, and prepare who must be notified.
Built by a founding security engineer from Databricks. Previously Capital One. Co-inventor of 4 security patents.
The problem
SIEM, XDR, EDR, and AI analyst tools help teams find and validate threats. But a credential incident rarely stays in one system. Analysts still collect evidence by hand, trace access paths across disconnected systems, and pull legal into the conversation before the real blast radius is clear.
When attackers are not caught fast, the post-confirmation work starts cold and stretches across weeks of fragmented evidence. Source: Mandiant M-Trends 2025.
Of 12 platforms analyzed, none can investigate systems they were not pre-configured for and map findings to notification obligations during the investigation.
Of 20 IR practitioners interviewed, all 20 ranked cross-environment evidence stitching and customer-impact analysis as the most expensive parts of the response.
Run real incidents through InaiSec as a design partner.
Apply nowThe platform
InaiSec converges evidence retrieval, attack-chain reconstruction, blast-radius analysis, and notification readiness into one operational surface. No data lake. No log-forwarding retrofit. No compliance afterthought.
Retrieve the records needed for an active investigation from cloud, SaaS, identity, and data systems without pre-ingesting every log.
Map every identity, role, session, and system touched by the compromised credential as the investigation unfolds.
Turn blast-radius findings into live obligation timers and draft notification packets during the investigation, not after it.
Before InaiSec
InaiSec workflow
Why now
Credential incidents span identity, cloud, SaaS, and data stores. At the same time, DORA, NIS2, GDPR, and SEC rules put disclosure clocks on work that still depends on manual evidence stitching. InaiSec is built for investigation-time clarity when the clock is already running.
Initial notification to supervisory authority.
Early warning to national CSIRT.
Notification to supervisory authority.
Form 8-K material cybersecurity incident.
About the founder
Across more than a decade of security engineering at Capital One and Databricks, including building the multi-cloud SIEM and IR infrastructure that ran through Databricks’ hypergrowth, one pattern stayed constant: IR teams doing world-class work on top of fragmented evidence and manual correlation.
InaiSec is built for that gap. It provides the speed and precision of automated identity tracing combined with the flexibility required for complex, modern environments.
FAQ
It is incident response that starts from the credential, account, role, and access path. The goal is to answer what the identity touched, what data may be affected, and who must be notified.
ITDR and AI SOC tools help detect and validate identity threats. InaiSec is focused on the work after validation: evidence retrieval, cross-system attack-chain tracing, blast radius, and disclosure readiness.
No. The product direction is on-demand evidence collection at investigation time. InaiSec should not require pre-ingesting every log into a new lake before it can produce value.
InaiSec is designed around scoped, read-only access, revocable connectors, audit logs, and investigation-bounded retrieval.
The current design center is identity, cloud, SaaS, and data systems such as Okta, Entra ID, Google Workspace, AWS, and Snowflake.
Join the design partner program
InaiSec is looking for 3 to 5 paid design partners running real investigations against the systems they already use. Send a short note with your role, company, current IR tools, and the incidents you want InaiSec to help scope.