
VIPER
Security Operations Console - Powered by AI
The next-generation SOC console that unifies detection, investigation, and response—powered by AI and built for enterprise scale.
Key Features
Everything you need to run world-class security operations
AI-Powered Analysis
Advanced AI-powered threat analysis providing instant insights, severity assessment, and recommended actions. Get natural language summaries of complex threats in under 3 minutes.
Multi-Factor Authentication
Enterprise-grade TOTP authentication compatible with all major authenticator apps. Optional per user with encrypted secrets and backup codes for account recovery.
Role-Based Access Control
Granular permission management with Owner, Admin, Analyst, and Read Only roles. Control who can view, edit, and manage investigations across your organization.
60+ Security Integrations
Webhook-based integration with CrowdStrike, Microsoft Sentinel, Splunk, Palo Alto, AWS Security Hub, and 60+ security tools. Setup in minutes, not weeks.
MITRE ATT&CK Mapping
Automatic tactic and technique detection for every alert. Framework-aligned threat hunting with real-time visualization of attack patterns and TTPs.
Evidence & IOC Management
Secure evidence locker with automatic IOC extraction from alerts. Track IP addresses, domains, file hashes, and URLs with threat intelligence enrichment.
External Escalation
Share investigations securely with external parties via time-limited, password-protected links. Collaborate with clients, legal teams, or partners without requiring accounts.
Playbook Templates
10 pre-built investigation playbooks for phishing, malware, ransomware, and more. Step-by-step remediation guides with customizable workflows.
Asset Management
Automatic asset discovery from alerts. Track IP addresses, hostnames, user accounts, and device inventory with relationship mapping and risk scoring per asset.
Experience VIPER Console
Real-time visibility and AI-powered analysis at your fingertips

Alert Management & Triage Console

Analytics & Metrics Dashboard
Seamless Collaboration
Share investigations securely with clients, legal teams, and external stakeholders
External Escalation
Share investigation details with external parties without requiring them to create accounts. Perfect for client reporting, legal reviews, or partner collaboration.
- Secure Links: Time-limited, password-protected access links
- Granular Permissions: Control what external users can view and do
- No Account Required: Recipients access immediately via secure link
- Complete Audit Trail: All external actions logged in investigation changelog
Email Groups
Create reusable recipient groups for one-click escalation to multiple stakeholders simultaneously. Perfect for recurring collaboration needs.
- Reusable Groups: Legal Team, Executive Board, Client Contacts, Partner SOC
- One-Click Escalation: Send to entire group with single click
- Individual Links: Each recipient gets unique secure access link
- Centralized Management: Add, edit, or remove group members anytime
Customizable Email Templates
Account Activation
Welcome new team members with branded activation emails
Internal Escalation
Notify team members with customized alert notifications
External Sharing
Professional branded emails for external stakeholders
User Management & Onboarding
Streamlined user activation and enterprise-grade access control
Streamlined User Activation
Onboard new team members in minutes with our automated activation workflow
Automated Activation Emails
New users receive branded activation emails instantly
Self-Service Password Setup
Users set their own secure passwords on first login
Real-Time Password Validation
Enforce password strength requirements automatically
Email Verification
Verify user identity with secure email confirmation
Time-Limited Links
24-hour expiration on activation links for security
Customizable Templates
Brand activation emails with your logo and messaging
Granular Access Control (RBAC)
Control who can view, edit, and manage investigations with role-based permissions
Full access: manage users, settings, integrations, billing
Manage investigations, access all features, create users
View and work on investigations, add evidence, escalate
View-only access to investigations and dashboards
User Activation Flow
Admin Creates User
Add new user in Settings
Email Sent
Activation link sent automatically
User Sets Password
Secure password with validation
Account Active
Immediate access to VIPER
Advanced Investigation Tools
Everything you need for thorough, efficient threat investigations
Evidence Locker
Secure storage for investigation evidence with complete chain of custody tracking.
- • Upload files, screenshots, logs
- • Automatic versioning
- • Access control per file
- • Immutable audit logs
IOC Extraction
Automatic extraction of Indicators of Compromise from every alert.
- • IP addresses & domains
- • File hashes (MD5, SHA256)
- • URLs & email addresses
- • Threat intel enrichment
Playbook Templates
10 pre-built investigation playbooks with step-by-step remediation guides.
- • Phishing investigation
- • Malware analysis
- • Ransomware response
- • Data exfiltration
Technical Specifications
Enterprise-grade architecture built for security, scale, and compliance
Platform Architecture
- Next.js 14 with React 18 and TypeScript
- PostgreSQL database with Prisma ORM
- Cloudflare Workers for webhook ingestion
- Resend for transactional emails
- Serverless API architecture
- Advanced AI analysis engine
Security & Compliance
- TLS 1.3 end-to-end encryption
- AES-256 encryption for sensitive data
- Bcrypt password hashing
- TOTP Multi-Factor Authentication (MFA)
- Role-Based Access Control (RBAC)
- Webhook signature verification
- Rate limiting and DDoS protection
- GDPR compliant
Integration Methods
- 60+ pre-built security tool integrations
- Webhook-based real-time alert ingestion
- RESTful API for data access
- JSON payload format
- API key per-tenant authentication
- 24-hour complete setup time
Performance & Reliability
- 10,000+ alerts analyzed monthly
- < 3 min average AI analysis time
- 99% uptime SLA
- Real-time dashboard updates
- Sub-second alert ingestion
- Global CDN delivery
- Horizontal scaling
60+ Security Tool Integrations
Webhook-based integration with all major security platforms. Setup in minutes via webhooks.gardiensecurity.com
Plus 40+ more vendors across SIEM, EDR, cloud security, email security, network security, vulnerability management, and identity platforms.
Don't see your tool? We support custom integrations. Contact us to add your security vendor.
Request Custom IntegrationSeamless Setup & Integration
100% cloud-based SaaS. No deployment needed. Setup in 24 hours with simple webhook configuration.
How It Works
Sign Up
Create your organization account
Activate
Click activation link, set password
Integrate
Add security tools via webhooks
Configure
Set up users, roles, contacts
Go Live
Start receiving alerts instantly
Integration Process (Per Security Tool)
Go to Settings → Integrations
Select your security vendor (e.g., CrowdStrike, Sentinel, Splunk)
Copy your unique webhook URL
Add webhook in your security tool's alert settings
Paste authentication token
Test connection
Done! Alerts start flowing immediately
Integration complete!
Typical setup time: 5-10 minutes per tool
Webhook URL Format:
https://webhooks.gardiensecurity.com/webhook/[your-org]/collector100% Cloud-Based SaaS
No software to install. No infrastructure to manage. VIPER runs entirely in our secure cloud.
- Immediate access after signup
- No agents or sensors required
- Automatic updates (always latest version)
- Global CDN delivery
- 99% uptime SLA
Works with Any Environment
Connect your security tools regardless of where they're deployed—cloud, on-premises, or hybrid.
- AWS, Azure, GCP, or multi-cloud
- On-premises data centers
- Hybrid cloud environments
- SaaS security tools
- Complete data isolation per tenant
✕No Complex Setup Required
- ❌ No VPN configuration
- ❌ No firewall rules
- ❌ No IP whitelisting (unless you want it)
- ❌ No agent installation
- ❌ No software updates
- ❌ No infrastructure provisioning
✓Everything Just Works
- ✅ Automatic updates (always latest version)
- ✅ Automatic backups (hourly incremental)
- ✅ Automatic scaling (handles any load)
- ✅ 99% uptime SLA
- ✅ Global CDN delivery
- ✅ 24/7 monitoring and support
Ready to See VIPER in Action?
Schedule a personalized demo and discover how VIPER can transform your security operations.