Agents online · 2,847 CIs mapped

Automated IT discovery,
service & dependency mapping,
a live CMDB in fifteen minutes.

Tripl-i is the AI-native CMDB that discovers your infrastructure, maps service dependencies, and keeps compliance green — without endpoint agents, without firewall changes.

15min
Average time from install to first service map
2,847CIs
Median environment size discovered per customer
89% ↓
False-positive reduction on vuln triage (vs. scanner-only)
app.tripl-i.com / dependencies / prod-payments
Overview
Dependencies
Security
CMDB
Events
Reports
Compliance
Service dependency map · payments-prod
AI-enriched17 CIs2h ago
2,847
CIs
↑ 12 today
98.4%
Coverage
↑ 0.3%
23
Vulns
↓ 41
3
Criticals
↓ 2
payments-api
pg-primary
risk-scorer
queue
ledger-svc
s3-archive
waf
live · 4 scanners, 2,847 CIs v4.2.1 · scanned 14:32
ISO 27001 certified

Architecture Overview

The Complete Platform

Click any module to explore how it works and what it connects to.

Discovery & Infrastructure
Network Discovery Device Classification Software Inventory Hardware Tracking Database Discovery
ITSM Integrations
Xurrent Sync AI Change Manager Product Mapping Webhook Automation
AI-Powered Intelligence
AI Analysis Dependency Mapping Business Service Analyzer Auto-Tagging
Security & Compliance
Vulnerability Mgmt Software Policies Network IOC Detection Threat Intelligence
CMDB — System of Record
Configuration Items
Relationships
AI Relationships
Service Dependencies
Automation Engine
Rule Engine
Workflow Actions
Scheduled Tasks
API Integrations
Asset Management
Software Catalog License Management Warranty Tracking Monitor Tracking Peripheral Discovery
Reporting & Analytics
Executive Dashboards Custom Reports Compliance Reports Trend Analysis
Operations & Events
Event Management Change Risk Analysis Network Segmentation Zone Traffic Analysis
GRC & Compliance
Compliance Frameworks Control Assessment Attestation Lifecycle Risk Management
The four pillars · one living CMDB

Four jobs, one platform — and an outcome for each.

Most tools do one thing. Tripl-i covers the full lifecycle, from the moment a device appears on your network to the moment a compliance report lands on an auditor's desk.

PILLAR 01 — DISCOVER

Discover

Agentless, multi-protocol discovery — WMI, SSH, SNMP, VMware, databases — maps your infrastructure in minutes.

15 min
From one installer to your first complete subnet map.
What's found: servers, workstations, VMs, network gear, databases, peripherals, even monitor serials.
PILLAR 02 — ANALYZE

Analyze

AI classifies software down to CPE, maps service dependencies, and scores business impact — no manual modeling.

12× faster
Service-map authoring vs. manual CMDB population.
How it works: Instance → Product → Family → CPE classification, plus semantic search and auto-tagging across 12 dimensions.
PILLAR 03 — RESPOND

Respond

Ingest events from any monitoring stack, correlate them against dependency chains, and run automated remediation.

89%
Fewer false positives via version-aware CVE matching.
Sources covered: Nagios, Zabbix, Prometheus, CloudWatch, Azure Monitor, Syslog, SNMP — plus 51k+ live IOCs.
PILLAR 04 — SOLVE

Solve

Close the loop — vulnerability remediation, SOX/HIPAA/PCI frameworks, executive dashboards, license optimization.

SOX
HIPAA · PCI-DSS
Auditor-ready evidence pulled from live infrastructure.
Ships with: drag-and-drop dashboards, custom report builder, scheduled delivery, and full audit trail.
Time to value

From installer to first service map, in four steps.

No agents to push. No modeling. Deploy one scanner on a jump host and watch your CMDB build itself.

00:00 – 00:03

Deploy scanner

One installer on a jump host. No endpoint agents.

00:03 – 00:09

AI classifies

Devices typed, software normalized, processes matched.

00:09 – 00:13

Dependencies emerge

Network traffic becomes service maps. Business services get named.

00:13 – 00:15

Continuous intelligence

Scheduled scans keep it current. Compliance stays green.

AI-Powered Intelligence

AI that understands
your infrastructure.

Not pattern matching. Deep analysis that connects software to processes, processes to services, and services to business impact — with receipts.

Dependency mapping & classification

Every raw software install is normalized through a 4-stage AI pipeline and every network connection is scored for business impact — so you know exactly what breaks when you change anything.

Instance
Product
Family
CPE
Business Service Analyzer

14 built-in patterns + your own map infrastructure to the services it supports.

Auto-tagging

12 categories from hostname, OS, software, custom fields — no rules to maintain.

Risk & impact scoring

Every dependency gets a confidence score, impact analysis and recommended action.

Semantic search · live
Show me all production SQL Servers with critical vulnerabilities that touch a customer-facing service.
3 filters 8ms 12 matches
sql-prod-07 MSSQL 2019 · 15.0.4280
CVSS 9.8
→ Billing
sql-prod-02 MSSQL 2017 · 14.0.3465
CVSS 9.1
→ Checkout
sql-prod-11 MSSQL 2019 · 15.0.2104
CVSS 7.5
→ Account Mgmt
sql-prod-04 MSSQL 2016 · 13.0.6300
CVSS 7.2
→ Reporting
+ 8 more results Open in dependency graph →
Security & Compliance

Detect threats.
Enforce policies.
Stay compliant.

Security isn't a bolt-on. Every CI is continuously evaluated against CVE databases, threat feeds, and your own policies — scored, assigned, and tracked through resolution.

Vulnerability management

Version-aware CVE matching with hotfix detection, per-CI workflow.

NVD · MSRC
updated 4m ago
Network IOC & LOLBAS detection

ThreatFox + living-off-the-land signatures checked against every connection.

51,284 IOCs
160+ families
Network segmentation

Zone discovery, Sankey traffic, and cross-zone violation detection.

Auto-discovered
per-CI
Software policy enforcement

Regex-based blacklist / whitelist with automated severity-based actions.

Policy engine
v2 rules
Compliance frameworks

SOX, HIPAA, PCI-DSS with attestation lifecycle + control assessment.

3 frameworks
auto-checked
security-dashboard · prod
live · 00:04s ago
Open CVEs (critical)↑ 2
17
IOC hits · 24h↓ 3
4
CVE-2024-38063 web-prod-03 · kernel
9.8
IOC · Cobalt Strike beacon db-prod-02 → 185.14.x
TFX
Blacklisted · TeamViewer v12 laptop-fin-44
POL
Zone violation · DMZ → DB nginx-07
SEG
PCI-DSS · 94% SOX · 98% HIPAA · 87%
Integration Ecosystem

Connects to what you already use.

Tripl-i doesn't replace your monitoring stack — it correlates across it, so every ticket, CVE and alert lands on the right CI the first time.

Discovery · inputs
ITSM · outputs
Tripl-i correlation engine 12 integrations
Monitoring · inputs
Security feeds · inputs
Agentless REST & webhook API No firewall changes Self-hosted option
Why it matters

From chaos to clarity.

What changes when your CMDB builds itself, dependencies stay mapped, and compliance is always current.

Without Tripl-i

before
CMDB is 6 months staleOps fills it out by hand, so nobody trusts it.
Dependencies live in tribal knowledge"Ask Frank — he's been here 15 years."
Five tools, five truthsDiscovery, CMDB, vuln mgmt, SIEM, GRC — none agree on hostname.
Compliance is a quarterly scrambleWeeks of screenshots and spreadsheets to prove SOX / PCI.
Change reviews guess at blast radius"Probably fine" is the impact assessment.
Deploy · 15 min
Tripl-i

With Tripl-i

after
CMDB builds & maintains itselfEvery CI, relationship, tag — continuously refreshed.
Dependencies are scored and visible1–5 importance, type-classified, owner-tagged.
One source of truthDiscovery, CMDB, vuln + compliance in one correlation engine.
Compliance is always-onSOX · HIPAA · PCI scored continuously with attestation trail.
Change reviews preview impactAI change manager names every downstream service.
15min
Time to discovery

One jump-host install. No endpoint agents, no firewall changes.

0manual
CMDB updates

CIs, relationships, tags — created and maintained by AI.

51K+
IOCs monitored

ThreatFox · NVD · MSRC — every connection scored.

5→1tools
Consolidated

Discovery · CMDB · security · compliance · ITSM sync.

Start the trial

See your own
infrastructure
map itself.

Deploy the agent on one jump host. In fifteen minutes you'll have a service map of your entire environment — and the next steps to clean it up.

Full 30-day trial — not a demo sandboxYour real data. Deploy, scan, see.
A Tripl-i engineer on callNot a sales rep. They'll help you land your first scan.
Exportable results, always yoursCancel and keep the maps, the tags, the reports.
Trust SOC 2 Type II SSO · SAML US & EU residency VPC deploy
Start your 30-day trial

No credit card. We'll email you setup instructions within an hour.

You're in.

We'll get back to you shortly with access details.

No credit card· Full access· Cancel anytime