Artificial Intelligence to Anticipate
and Combat Threats.
Viriatus uses AI to unify ASM, GRC, and vCISO in a single platform. External reconnaissance, endpoints, firewall, vulnerabilities, incidents, and compliance — with an intelligent vCISO grounded in your real data.
Sectors we protect
Everything you need. In one platform.
Nine integrated modules covering your entire attack surface management, autonomous pentesting, incident response, and governance needs.
External Surface
Discover and monitor your complete digital footprint exposed to the internet.
ExploreInternal Surface
Complete visibility of your IT estate with multi-vendor XDR/EDR integration.
ExploreFirewall
Real-time visibility into network traffic, threats, and user behavior.
ExploreVulnerabilities
Unified, prioritized vulnerability tracking across your entire infrastructure.
ExploreIncidents
Complete incident lifecycle management with built-in NIS2 compliance.
ExploreGRC
Translate technical security into business language and manage compliance obligations.
ExplorevCISO
Your virtual CISO, powered by your real data.
ExploreCases
Remediation tracking and management with SLAs and automatic escalation.
ExploreProbus
Autonomous penetration testing with AI. 100% Portuguese engineering, European infrastructure.
ExploreWithout Viriatus vs With Viriatus
SIEM, scanner, antivirus, firewall, GRC — no correlation
Manual detection, no playbooks, no automation
"High/Medium/Low" — the board doesn't understand
One snapshot per year — outdated in weeks
No CNCS workflow, no evidence for the regulator
Correlated data, unified dashboard, integrated AI
Automatic detection, integrated playbooks, real-time war room
FAIR + Monte Carlo — VaR 95, what-if scenarios, business language
Autonomous, no false positives, €0 extra
Automatic CNCS workflow, 4 phases, deadlines, evidence
Your virtual CISO. Powered by your data.
The Viriatus vCISO doesn't give generic advice. It uses RAG (Retrieval-Augmented Generation) over your organization's vulnerabilities, incidents, risks, and compliance data for contextual, actionable responses.
- Frameworks: NIST CSF, MITRE ATT&CK, FAIR, ISO 27001, CIS Controls
- Structured responses: Executive Summary → Analysis → Business Risk → Prioritized Recommendations → Success Metrics
- Automatic daily executive summary
- Sources cited in every response (document type, relevance)
Analyze CVE-2024-3400 in the context of our infrastructure
Executive Summary
Critical PAN-OS vulnerability (CVSS 10.0) affecting 3 of your firewalls. Active exploitation confirmed by CISA KEV.
Business Risk
Estimated impact: full perimeter compromise. Priority P1 — immediate action recommended.
Recommendation
Apply hotfix PAN-OS 11.1.2-h3. Isolate affected segments until patched.
Translate technical risk into business language.
Viriatus quantifies risk with FAIR and Monte Carlo, giving you values in euros that the board understands. Not estimates — simulations with 10,000 iterations.
- Complete FAIR methodology (TEF, TCap, RS, Primary/Secondary Loss)
- Monte Carlo simulation: loss distribution, VaR 95, CVaR 95
- Sensitivity analysis (which parameters drive risk the most)
- What-if scenarios: compare baseline vs modified scenario
NIS2 isn't a problem. It's a workflow.
Viriatus has the complete CNCS notification workflow built into incident management. From detection to final report — with automatic deadlines and status tracking.
- 4 notification phases: Initial Alert → Detailed Notification → End of Impact → Final Report
- Automatic deadline calculation from detection
- IoCs embedded in notification (root cause, effects, measures)
- Approval workflow (Draft → Pending → Approved → Sent)
CNCS notified within 24h of detection
IoCs, root cause and measures documented
Awaiting containment confirmation
Complete post-mortem for CNCS
How Viriatus works
From configuration to continuous monitoring in 4 simple steps.
Configure
Define your organization, integrate your security tools, and configure scanning parameters.
Map your assets
Viriatus automatically discovers and maps your entire attack surface — external and internal.
Identify vulnerabilities
Automatic vulnerability detection with CVSS + EPSS + CISA KEV scoring and intelligent prioritization.
Continuous monitoring
Automatic scans every 10 minutes, real-time alerts, and unified dashboard with temporal evolution.
What happens when you activate Viriatus
From deployment to full visibility in less than a day.
Deploy
Docker + PM2 + Nginx installation. VPN configured. Platform operational.
Organization setup
Name, domains, XDR/EDR and firewall integrations configured.
47 subdomains discovered
Complete automatic external surface scan. 12 with critical vulnerabilities identified.
423 endpoints inventoried
XDR/EDR integration synced. Software, hardware, health scores imported.
First vulnerability scan
34 CVEs correlated with CVSS + EPSS + CISA KEV. 8 classified P1 (critical).
NIS2 workflow configured
4 CNCS notification phases ready. Templates filled. Automatic deadlines activated.
First vCISO report
Executive summary with 3 priority recommendations. Security score: 67%. FAIR risk: €234,000 VaR 95.
Probus starts autonomous pentest
First autonomous intrusion test cycle. 3 attack vectors identified and validated with evidence.
Full operational visibility
Unified dashboard active. Scans every 10 minutes. Real-time alerts. NIS2 compliance active. Team with full access.
Connections that make a difference.
Universal integration with the platforms you already use.
Sophos
Endpoints, alerts, software, hardware
CrowdStrike
XDR, threat hunting, Falcon
SentinelOne
Autonomous XDR, automated response
Microsoft
Azure AD, Defender, Microsoft 365
Palo Alto Networks
Traffic, threats, users
Fortinet
FortiGate, FortiAnalyzer, FortiClient
Check Point
Firewalls, VPN, Threat Prevention
Cisco
Firewall, ISE, SecureX
Google Workspace, Chronicle SIEM
AWS
CloudTrail, GuardDuty, Security Hub
Splunk
SIEM, log analysis, correlation
Elastic
Elastic SIEM, observability
Wazuh
Open-source SIEM, intrusion detection
Darktrace
AI-powered threat detection
CVE Radar
CVE vulnerability database
CISA KEV
Actively exploited vulnerabilities
EPSS
Exploitation probability
VirIAtus LLM
Local AI engine for vCISO
Frequently Asked Questions
Does Viriatus replace a SIEM?
No. Viriatus complements your SIEM by focusing on attack surface management, vulnerabilities, and GRC. It integrates with data you already have (XDR/EDR, firewalls, SIEM) for context and prioritization.
Do I need a specific XDR/EDR solution to use Viriatus?
Viriatus integrates with XDR/EDR solutions from any vendor (Sophos, Microsoft Defender, CrowdStrike, SentinelOne, and others) for the internal surface. You can also use Viriatus with just the external surface, firewall, and GRC modules.
Where does my data stay?
Viriatus runs on controlled infrastructure — either on CyberS3C's infrastructure (accessed via VPN) or on your own. In both cases, data stays in European territory and is never shared with third parties.
What's the difference between Essencial and Enterprise?
Essencial covers external surface and vulnerabilities (up to 50 assets). Avancado adds internal surface (XDR/EDR) and incidents (up to 100 assets). Enterprise includes everything: firewall, full GRC, AI vCISO, and Monte Carlo, with unlimited assets.
Does the vCISO use my data to train AI models?
No. The vCISO uses RAG (Retrieval-Augmented Generation) — your data is searched and included in the query context, but never used to train models. The AI engine runs locally on controlled infrastructure and does not retain data.
Do you support NIS2?
Yes. Viriatus has the complete CNCS notification workflow for NIS2 built into incident management, with automatic deadline calculation, 4 notification phases, and status tracking.
How does deployment work?
Viriatus can run on CyberS3C's infrastructure (with VPN access) or be deployed on your own infrastructure. We use Docker + PM2 + Nginx. Typical setup takes less than one hour.
Which firewall integrations are supported?
Viriatus integrates with firewalls from any vendor, including Palo Alto, Fortinet, Check Point, Cisco, pfSense and Sophos XG, through log ingestion and APIs.
Ready to know your entire attack surface?
Request a demo and see how Viriatus can unify your organization's security management.
Setup in under 1 hour · CyberS3C or your own infrastructure · Data in the EU