THREAT INTELLIGENCE — LIVE

Network security
intelligence for the
enterprise.

Strix continuously monitors your network for threats, correlates against live CTI feeds, and executes automated remediation — giving security teams complete visibility and control.

SOC 2 Type II certified
14-day trial, no commitment
Deploys in under 10 minutes
HIPAA & GDPR ready
99.7%
Threat detection accuracy
2.3s
Mean time to detect
14K+
CVEs in live database
340+
Enterprise networks secured
Platform

One platform. Complete coverage.

From passive discovery to active remediation — unified in a single pane of glass designed for enterprise security operations.

app.strix.io — dashboard
Overview
Network scan
Threats
Remediation
Threat intel
Hosts
Reports
10
HOSTS
2
CRITICAL
3
HIGH
4
REMEDIATED
ACTIVE THREATS
CRITCVE-2024-38080 · 192.168.1.5
CRITMirai IOC · 192.168.1.22
HIGHCVE-2023-29357 · 192.168.1.8
HIGHSMBv1 risk · 192.168.1.5
MEDTLS 1.0 · 192.168.1.12
REMEDIATION QUEUE
DONETLS 1.3 enforcement
RUNDisable SMBv1
WAITIsolate IoT device
WAITPatch RDP CVE-2024-38080
Capabilities

Built for teams that can't afford gaps.

Strix combines continuous monitoring, real-time threat intelligence, and autonomous remediation into a single platform built for enterprise security operations.

01

Continuous discovery

Automatically discovers every host, service, and device on your network — including rogue devices and shadow IT — in real time.

02

Live CTI feeds

Updated threat intelligence from MITRE ATT&CK, NVD, AlienVault OTX, CISA KEV, and Strix's proprietary threat actor database — always current.

03

CVE matching

Every discovered service is cross-referenced against 14,000+ CVEs in real time, with CVSS v4 scoring adjusted to your environment's context.

04

AI threat analysis

AI generates executive-grade threat briefings, attack path modeling, and prioritized remediation recommendations in plain language for CISOs and boards.

05

Intrusion detection

Passive traffic analysis identifies C2 beacons, lateral movement, anomalous egress, and data exfiltration patterns across your entire perimeter.

06

Automated remediation

One-click or fully autonomous playbooks for patch deployment, firewall rules, credential rotation, and network isolation — with complete audit trails.

AUTOMATED REMEDIATION

Your threats don't wait for business hours.

Strix detects and responds to critical threats autonomously — executing approved playbooks, isolating compromised hosts, and patching vulnerabilities without manual intervention. Every action is logged, auditable, and reversible.

Automated patch deployment

Applies verified patches for CVEs across Windows, Linux, and network devices with rollback on failure.

Firewall rule generation

Generates and pushes ACL rules to Palo Alto, Fortinet, Cisco, pfSense, and cloud security groups.

Network isolation & quarantine

Moves compromised hosts to quarantine VLANs within seconds of detection — before lateral movement occurs.

Full audit trail & rollback

Every automated action is logged with before/after state. One-click rollback for any remediation step.

PLAYBOOK — CVE-2024-38080RUNNING
Verify patch KB5040442 signature (Microsoft)
Snapshot system state — rollback point created
Apply patch silently — workstation-01
Restrict RDP to management VLAN only
Enable Network Level Authentication
Verify — confirm CVE-2024-38080 closed
How it works

Deployed and securing your network in under an hour.

01 — DEPLOY

Connect your network

Enter your CIDR range or install the Strix agent. Supports cloud, on-prem, and hybrid environments out of the box.

02 — DISCOVER

Automated deep scan

Strix maps every host, service, and open port across your network, then correlates findings against live threat intelligence feeds.

03 — ANALYZE

AI risk prioritization

Every finding is severity-scored, contextualized to your environment, and tied to specific threat actor TTPs and attack paths.

04 — REMEDIATE

Approve and execute

Review AI-generated playbooks and approve with one click — or configure fully autonomous remediation with configurable guardrails.

INTEGRATES WITH YOUR EXISTING STACK
SPLUNK
PALO ALTO
CROWDSTRIKE
SERVICENOW
OKTA
AWS SECURITY HUB
MS DEFENDER
Pricing

Transparent pricing. No surprises.

All plans include a 14-day free trial. No credit card required to start.

STARTER
$49
per month, billed annually

  • Up to 25 hosts
  • Weekly automated scans
  • CVE matching and scoring
  • Manual remediation playbooks
  • Email and Slack alerts
  • 7-day report history
Start free trial
MOST POPULAR
PROFESSIONAL
$149
per month, billed annually

  • Up to 250 hosts
  • Continuous real-time scanning
  • Live CTI feeds (MITRE, NVD, AVX)
  • Automated remediation — 10 actions/mo
  • AI threat briefings and reports
  • REST API access
  • 90-day history & compliance exports
  • Priority support (4h SLA)
Start free trial
ENTERPRISE
Custom
contact our team

  • Unlimited hosts and networks
  • Dedicated scan infrastructure
  • Unlimited automated remediation
  • Custom CTI feed integration
  • SIEM / SOAR integration
  • White-label deployment
  • On-premises deployment option
  • Dedicated CSM & 1h SLA
Talk to sales
Customer stories

Trusted by enterprise security teams.

"Strix detected a Mirai-variant IoT infection and autonomously isolated the device before anyone on our team saw the alert. That kind of response time previously required a 3am page."


MR
Marcus Reid
VP Infrastructure — Northgate Technologies

"We replaced three separate point tools with Strix. The AI threat briefings are genuinely actionable, not just noise. Our mean time to remediate dropped from four hours to eighteen minutes."


JL
Jana Levesque
CISO — Vantara Group

"The automated remediation playbooks have transformed how we operate. I approve on my phone, they execute overnight, and I arrive every morning to a hardened network."


DK
David Kim
Director of IT Security — Cascade Health

Protect your network.
Start today.

14-day free trial. No credit card required. Deploys in under 10 minutes.

SOC 2 TYPE II · HIPAA READY · GDPR COMPLIANT