Tripl-i is the AI-native CMDB that discovers your infrastructure, maps service dependencies, and keeps compliance green — without endpoint agents, without firewall changes.
Architecture Overview
Click any module to explore how it works and what it connects to.
Most tools do one thing. Tripl-i covers the full lifecycle, from the moment a device appears on your network to the moment a compliance report lands on an auditor's desk.
Agentless, multi-protocol discovery — WMI, SSH, SNMP, VMware, databases — maps your infrastructure in minutes.
AI classifies software down to CPE, maps service dependencies, and scores business impact — no manual modeling.
Ingest events from any monitoring stack, correlate them against dependency chains, and run automated remediation.
Close the loop — vulnerability remediation, SOX/HIPAA/PCI frameworks, executive dashboards, license optimization.
No agents to push. No modeling. Deploy one scanner on a jump host and watch your CMDB build itself.
One installer on a jump host. No endpoint agents.
Devices typed, software normalized, processes matched.
Network traffic becomes service maps. Business services get named.
Scheduled scans keep it current. Compliance stays green.
Not pattern matching. Deep analysis that connects software to processes, processes to services, and services to business impact — with receipts.
Every raw software install is normalized through a 4-stage AI pipeline and every network connection is scored for business impact — so you know exactly what breaks when you change anything.
14 built-in patterns + your own map infrastructure to the services it supports.
12 categories from hostname, OS, software, custom fields — no rules to maintain.
Every dependency gets a confidence score, impact analysis and recommended action.
Security isn't a bolt-on. Every CI is continuously evaluated against CVE databases, threat feeds, and your own policies — scored, assigned, and tracked through resolution.
Version-aware CVE matching with hotfix detection, per-CI workflow.
ThreatFox + living-off-the-land signatures checked against every connection.
Zone discovery, Sankey traffic, and cross-zone violation detection.
Regex-based blacklist / whitelist with automated severity-based actions.
SOX, HIPAA, PCI-DSS with attestation lifecycle + control assessment.
Tripl-i doesn't replace your monitoring stack — it correlates across it, so every ticket, CVE and alert lands on the right CI the first time.
What changes when your CMDB builds itself, dependencies stay mapped, and compliance is always current.
One jump-host install. No endpoint agents, no firewall changes.
CIs, relationships, tags — created and maintained by AI.
ThreatFox · NVD · MSRC — every connection scored.
Discovery · CMDB · security · compliance · ITSM sync.
Deploy the agent on one jump host. In fifteen minutes you'll have a service map of your entire environment — and the next steps to clean it up.
No credit card. We'll email you setup instructions within an hour.
We'll get back to you shortly with access details.