Defense behind your firewall.
The same engine that protects individual users, with an admin layer above it. SSO. SCIM. MDM. SIEM. Self-hosted where you need it. WARDEN as standard. Built for CISOs who already know AI agents are inside their perimeter and cannot find a defense layer that speaks their language.
Consumer and enterprise
Audit trail shipped
Docket NIST-2025-0035
Airgapped deployment
Your perimeter is not the agent's perimeter.
You can harden the network. You can SSO the logins. You can SIEM the logs. None of that inspects what an AI agent is about to do on behalf of your employees, in real time, at the action layer. That gap is where every enterprise AI incident lives.
McKinsey's Lilli. Prompt-layer breach at one of the most security-mature firms in the world.
Lilli is McKinsey's internal AI agent. The firm has world-class endpoint detection, data loss prevention, and mature security operations. The prompt layer was still compromised.
The lesson is not that McKinsey got unlucky. The lesson is that existing enterprise security cannot defend agents from inside the perimeter it was designed to protect. The agent is already past every control that matters. The only remaining layer is between the agent and the AI provider, and that is exactly where Vigil sits.
One engine. Admin layer above.
The binary running on a Fortune 500 CISO's endpoint is the same binary running on a solo user's laptop. Enterprise is not a fork. It is the same engine with a policy server, admin console, and enterprise integrations layered on top. That is what keeps the defense capability identical across consumer and enterprise.
Policy server, admin console, identity and compliance integrations.
Everything the CISO needs to govern Vigil across an organization. Central policy authoring. Tiered access. Audit export. SIEM forwarding. Compliance reporting. Self-hosted where regulation requires it.
The same 11-crate Rust engine. Same detection. Same Gate. Same Kill Switch.
Two-surface pipeline. Four-model ensemble. Execution Gate. VOAF-sealed evidence. TAP and VARP. Every capability on the consumer product is available to the enterprise, because it is the same code.
No forks. No lite versions. What your CISO ships is what the engineers ship. What the engineers ship is what the founder runs on his laptop.
What the admin layer actually does.
Enterprise buyers do not need a new product. They need the governance, compliance, and integration surface that turns an endpoint tool into an enterprise deployment. These are the capabilities the admin layer adds above the defense engine.
- Policy-as-code
- Tiered roles
- Simulation mode
- Version history
- SAML and OIDC
- SCIM 2.0
- Group-based policy
- JIT provisioning
- VOAF native
- CEF, LEEF, JSON
- Real-time streaming
- Retention controls
- Managed install
- Policy lock
- Update control
- Offboarding wipe
- VPC deployment
- Airgap profile
- Cloud option
- Hybrid path
- ServiceNow ticketing
- PagerDuty routing
- Jira integration
- VOAF attachment
Fits the stack you already run.
Vigil does not ask you to replace anything. It sits in the gap every other tool leaves, and forwards its signal into the tools your SOC, compliance, and IT teams already use.
- Okta
- Azure AD / Entra
- Google Workspace
- Ping Identity
- JumpCloud
- OneLogin
- Splunk
- Datadog
- Sumo Logic
- Elastic / ELK
- Chronicle
- Sentinel
- Jamf
- Kandji
- Intune
- Workspace ONE
- Mosyle
- Addigy
- ServiceNow
- PagerDuty
- Jira / Atlassian
- Opsgenie
- Slack / Teams
- Zendesk
Three models. Your choice.
Regulated firms need airgap. Fast-moving firms need cloud. Most firms need something in between. Vigil ships all three from the same codebase, priced on scale rather than model.
- SOC 2 Type II (in scope)
- Singapore, US, EU regions
- Same-day provisioning
- Standard SLA
- AWS, GCP, Azure
- Customer-managed keys
- Region-locked data residency
- Dedicated SLA
- Airgap install
- Offline threat intel
- On-prem or VPC
- Custom SLA
Built for audit from the binary up.
VOAF sealing is not a compliance feature bolted on top. It is the default output of every action Vigil processes. Your auditor does not need to ask for evidence. It already exists, cryptographically, for every decision the engine has made.
Ship Vigil inside your firm before your CISO has to ask.
Our 2026 design partners get direct engineering access, custom policy development, early access to Sentinel and WARDEN for internal deployments, and pricing locked at pre-GA rates for 24 months.
In exchange, we ask for one thing: a reference conversation with another CISO once you are in production.
Your agents are already inside. Ours is the layer that watches.
Schedule a 30-minute architecture review. We walk your team through the engine, the admin layer, and the deployment path that fits your regulatory profile.