SPNT

The Unified European Security Platform

Your security stack is fragmented.Serpentine replaces it.

One platform unifying eight modules — detection, hardening, exploit verification, governance, investigation, identity oversight, data classification, and AI-security — on a single substrate, so every security signal shares one source of truth. Eight modules. Six intelligence layers. One substrate.

Sovereign EU infrastructure · No customer data used for training. · SOC 2 Type II: In progress

OSINT
Telemetry
Decision
Threat
Exposure
Behavioral
Detect
Enforce
Challenge
Govern
Investigate
Oversee
Classify
AI-Secure
SerpentineSubstrate

8

modules

6

intelligence layers

9

OSINT sources

35

compliance frameworks

3,144

mapped obligations

Follow a Finding

One finding, eight modules, complete coverage

Watch how a single vulnerability flows through the entire platform — from detection to investigation to compliance evidence.

Finding lifecycle

Active finding

Exposed admin endpoint

Administrative access exposed without authentication

High risk

NAPAD

Automated exploit confirmed unauthenticated access. Data exfiltration possible.

Output

PoC captured • Impact assessed

Substrate

Updates exploitability status

Detect
Enforce
Challenge
Govern
Investigate
Oversee
Classify
AI-Secure
Investigation reasons across all stages

The Problem

Security stacks were not built to work together.

Most teams run separate systems for audit, testing, hardening, and compliance. Each system creates its own output. None of those outputs become a shared operating state.

Your controls are declared, not verified.
Your audit evidence is not defensible.
Your security state is fragmented across tools.

Fragmented operating model

DetectionFindings listSeparate context
HardeningConfig changesNo evidence reuse
OffenseExploit notesManual validation
GovernanceCompliance foldersDuplicated evidence
InvestigationSIEM queriesNo adversary context
IdentityIAM consolesNo risk correlation
DataData catalogsNo security context
AI-SecurityManual reviewNo coverage

Result: manual correlation, delayed validation, duplicated work across 8 disciplines

The Shift

From fragmented tools to one unified platform.

Serpentine does not add another dashboard. It changes where security work lives: one substrate across findings, validation, remediation, identity, data, AI-risk, and evidence.

FragmentedSerpentine

Current State: Fragmented Tools

Detection

Vulnerability scanners

No validation

Hardening

Configuration scripts

No monitoring

Offense

Manual pentest

No remediation link

Governance

Spreadsheets

No automation

Investigation

SIEM queries

No adversary context

Identity

IAM consoles

No risk correlation

Data

Data catalogs

No security context

AI-Security

Manual review

No coverage

With Serpentine: Unified System

Detection

ODBRANA

Normalized findings

Hardening

POSTAVA

Policy deployed

Offense

NAPAD

Exploitability confirmed

Governance

REGULATIVA

Evidence mapped

Investigation

ISTRAGA

Attack paths validated

Identity

NADZOR

Identity risks surfaced

Data

PODATOCI

Data classified

AI-Security

PROTIVAI

AI risks monitored

Reality Check

Security posture is often wrong.

Most systems claim controls are in place. Serpentine shows where reality breaks them.

Most security platforms tell you what you've declared. Serpentine tells you what's actually true.

Control State Contradictions
2 UNRESOLVED

Declared control state

All production access requires MFA

Policy assertion dated Jan 2024

Observed enforcement state

2 production systems have no MFA enforcement evidence

Detected by Detection (ODBRANA) scan + Governance (REGULATIVA) mapping + Oversight (NADZOR) identity analysis

Why this matters: Breaks SOC 2 attestation · Invalidates ISO control A.5.15

SOC 2 CC6.1ISO A.5.15

Declared control state

All critical findings are resolved

Based on ticket status in ticketing system

Observed enforcement state

Exploitability was never validated

3 findings closed without Offense (NAPAD) validation

Why this matters: Creates unverified risk exposure · False closure masks active vulnerabilities

Vuln Mgmt

Breaks SOC 2 attestation. Invalidates ISO A.5.15.

This is what Serpentine actually produces

Detection (ODBRANA)CRITICAL

XXE Injection — External Entity Processing

POST/catalog/product/stock

Content-Type: application/xml

<!DOCTYPE root [

<!ENTITY xxe SYSTEM

"http://oast.attacker.pro">

]>

...

DNS callback received from target infrastructure

CVSS 9.1 · CWE-611 · Evidence captured

Offense (NAPAD)VALIDATED

Exploit Confirmed

Out-of-band DNS callback received

oast.attacker.pro → 203.0.113.42

Reproduction

Send XML payload to endpoint. Observe callback on controlled DNS server.

Proof

External entity resolution confirmed. SSRF to internal network possible.

Linked to finding ODB-2024-0847

Governance (REGULATIVA)GAP

Control Contradiction

ControlISO 27001 A.8.8
AssertionInput validation enforced
EvidenceContradicted by ODB-2024-0847

Audit assertion invalidated. Control requires remediation evidence before re-attestation.

Investigation (ISTRAGA)PREDICTED

Adversarial Context

This XXE pattern matches campaign cluster NS-A7 TTPs (T1190 → T1059 → T1041). 12 documented exploitations in public threat research. Estimated attacker dwell time post-exploitation: 4-11 days.

Chained risk

If combined with weak egress filtering (detected on adjacent asset), enables out-of-band exfiltration of internal service map.

Recommended priority elevation: validate against authenticated paths within 72h.

Hardening (POSTAVA)DEPLOYED

Policy Applied

PolicyXML Entity Parsing
ActionDisabled external entities
Scopecatalog-api-prod-01

Configuration hardened. Drift monitoring enabled.

Oversight (NADZOR)ENRICHED

Identity Context

Service accountsvc-catalog-api
PrivilegesOver-permissioned
Last review186 days ago

Identity risk elevates finding priority. Access review triggered.

Classification (PODATOCI)PII

Data Sensitivity

ClassificationPII · Customer Data
Records at risk~47,000 customer profiles
RegulationsGDPR Art. 32, 33

Data classification elevates breach scope. Notification timeline: 72h.

AI-Security (PROTIVAI)CLEAR

AI Risk Assessment

AI workloadsNone detected
LLM exposureNot applicable
Model supply chainNo dependencies

No AI-specific risks identified for this finding scope.

See what your system gets wrong

We'll show real contradictions in your environment.

Book a Demo

30-minute technical walkthrough · No slides, real system

The Architecture

Inside the substrate.

Serpentine does not move data between disconnected tools. It stores findings, validation, remediation, evidence, controls, assets, identity, classification, AI-incidents, and research in one operating state.

Inputs
Scanner output
Attack validation
Hardening actions
Compliance requirements
Identity signals
Data classification
AI-risk signals
The SubstrateSingle source of truth
Assets

W: POSTAVA

R: All

Findings

W: ODBRANA

R: NAPAD, REGULATIVA

Validation

W: NAPAD

R: POSTAVA, REGULATIVA

Remediation

W: POSTAVA

R: REGULATIVA

Evidence

W: All

R: REGULATIVA

Controls

W: REGULATIVA

R: All

Identity

W: NADZOR

R: All

Classification

W: PODATOCI

R: ODBRANA, ISTRAGA

AI-Incidents

W: PROTIVAI

R: ISTRAGA, REGULATIVA

Research

W: ISTRAGA

R: All

Hover any entity to see which modules write and read it

Outputs
Validated risk
Remediation path
Audit evidence
Executive reporting

This is not a dashboard aggregating external data. This is one substrate where every action updates the same state.

The Platform

One substrate. Eight modules.

Detect · Enforce · Challenge · Govern · Investigate · Oversee · Classify · AI-Secure — all on a single data layer.

DetectEnforceChallengeGovernInvestigateOverseeClassifyAI-Secure

All modules read and write to the same substrate. Every finding, identity signal, data classification, and compliance obligation shares one source of truth.

The Mechanism

How Serpentine turns findings into evidence.

1

Normalize

Detection (ODBRANA)

Turns scanner output into structured findings.

Updates the same operating state

2

Validate

Offense (NAPAD)

Confirms whether the risk is exploitable.

Updates the same operating state

3

Remediate

Hardening (POSTAVA)

Creates or applies hardening policy.

Updates the same operating state

4

Prove

Governance (REGULATIVA)

Maps the outcome to controls and evidence.

Updates the same operating state

Reason

Investigation (ISTRAGA)

Synthesises across all steps. Validates attack paths, predicts emerging risk.

Reads from all

The value is not the steps.

The value is that every step updates one system. Oversight (NADZOR), Classification (PODATOCI), and AI-Security (PROTIVAI) write into the same substrate continuously — so every step reflects identity, data, and AI-risk context.

Use Cases

Built for the teams responsible for proving security.

CISO

  • Risk visibility across all domains
  • Board-ready security posture
  • Audit-ready evidence on demand
Explore use case

CTO / Engineering

  • Fewer tools to manage
  • Faster remediation cycles
  • Less security debt
Explore use case

MSSP / Security Firm

  • Repeatable delivery model
  • Client-ready reporting
  • Multi-tenant workflows
Explore use case

Trust

Trust, published.

Security platforms cannot ask for trust while hiding their own controls. SPNT publishes its security posture, subprocessors, responsible disclosure policy, and data handling documentation.

Systems in EU DatacentersZero Training: Customer data never usedSOC 2 Type II: In progress

What Serpentine is not

Honest boundaries

Serpentine does not try to replace everything. These are the systems it complements.

Not an EDR

Serpentine does not deploy endpoint agents. Host-level process forensics, real-time syscall monitoring, and post-compromise endpoint hunting require a dedicated endpoint platform. Serpentine handles cloud, identity, and attack-surface coverage. The two are complementary.

Not a SIEM

Serpentine does not retain raw logs. The telemetry layer normalises cloud-audit and identity events into structured graph records — useful for correlation and reasoning, not for petabyte-scale search or custom rule authoring. Organisations needing full raw-log retention should run Serpentine alongside a dedicated SIEM.

Not a CSPM

A dedicated cloud-posture platform may have broader inventory coverage across dozens of cloud accounts. Serpentine prioritises depth over breadth: every finding it surfaces is graph-grounded, exploit-validated, and tied to a compliance obligation. For "which of these actually matters today?" rather than "how many misconfigs do we have?", Serpentine's model is the right one.

The Pilot

30 / 60 / 90 day framework

A structured pilot that proves value before commitment.

Day 30 — Coverage

  • Detection module connected to production assets
  • First OSINT enrichment loop running
  • Initial finding register delivered

Day 60 — Validation

  • Offensive validation on highest-priority findings
  • Hardening policy generated for two control gaps
  • First control-contradiction report delivered to your CISO

Day 90 — Evidence

  • Compliance mapping complete for chosen framework (SOC 2 / ISO 27001 / NIS2 / DORA)
  • First Investigation (ISTRAGA) consequence analysis published
  • Pilot decision: continue, expand, or stop — your call

Pilot guarantee — if at day 90 the pilot has not produced audit-ready evidence on at least one framework, the pilot fee is refunded in full. Refund applies to the pilot engagement only; does not extend to subsequent commercial contracts.

This is not a demo environment. This is how your system will be evaluated.

One finding. Full lifecycle. Real validation.

See what your current stack misses.

Book a live walkthrough. We will show how one finding exposes gaps in validation, remediation, evidence, and adversarial context that most teams never see.

30-minute technical walkthroughNo slides, real systemWe use your use case or ours