The forensics module is what insurance and counsel actually want during a breach: cryptographically hashed evidence, named chain of custody, role-based access lists, and an audit trail every action writes to automatically.
Continue exploring
Stakeholders
Everyone who matters, organized
Internal + external + 22 IR-vendor categories with onboarding readiness scoring.
Policies
Policies that don't just live in a binder
Eight templates rendered to your stack and brand. Exportable. Auditable.
Communications
Privileged. Confidential. Logged.
Out-of-band channel inventory with privilege-by-default classification.
