Eight modules. One platform.
ZeroJolt's internal modules work together through the Unified Exposure Graph to deliver verified actions
Pulse
Universal discovery across all environments
Pulse discovers and inventories every asset across IT, cloud, OT/IoT, and identity—passively and actively—creating a complete, real-time asset inventory.
Capabilities
- Agentless and agent-based discovery
- Protocol-aware OT/IoT detection
- Cloud API inventory (AWS, Azure, GCP)
- Identity directory sync (Entra, Okta, AD)
Example Output
Typical Integrations
Graph
Unified asset, identity, and exposure relationships
The Unified Exposure Graph connects assets, identities, vulnerabilities, configurations, and network paths into one queryable knowledge graph.
Capabilities
- Asset-to-identity relationships
- Exposure propagation paths
- Lateral movement risk analysis
- Real-time graph updates
Example Output
Typical Integrations
Radar
Continuous exposure monitoring
Radar continuously monitors for new exposures—vulnerabilities, misconfigurations, policy violations—and correlates them with asset context from the Graph.
Capabilities
- CVE and EPSS tracking
- Configuration baseline monitoring
- Real-time threat intelligence feeds
- Compliance policy checks
Example Output
Typical Integrations
Drift
Posture and configuration drift detection
Drift detects when systems deviate from known-good baselines or security policies, especially critical for OT environments and cloud infrastructure.
Capabilities
- Baseline snapshot and comparison
- Change attribution (who, when, why)
- Unauthorized change alerts
- Rollback recommendations
Example Output
Typical Integrations
Fuse
AI-powered risk prioritization engine
Fuse fuses exposure data, asset context, threat intelligence, and business impact to produce a prioritized list of actions that reduce real risk.
Capabilities
- Multi-factor risk scoring (EPSS, exploitability, asset criticality)
- Business context weighting
- Attack path simulation
- Actionable remediation tickets
Example Output
Typical Integrations
Flow
Orchestration and guardrailed remediation
Flow is the action engine. It orchestrates remediation workflows—tickets, patches, config changes—with approval policies, allowlists, and rollback plans.
Capabilities
- ITSM ticket creation (ServiceNow, Jira)
- Automated patching and config enforcement
- Guardrailed autopilot with approval gates
- Verification loop (proves action completed)
Example Output
Typical Integrations
Proof
Compliance evidence and audit trails
Proof maintains a full audit trail of every exposure, decision, and action—providing auditors and regulators with evidence that controls are working.
Capabilities
- Time-stamped evidence collection
- Compliance framework mapping (NIST, ISO, IEC 62443)
- Automated report generation
- Immutable audit log
Example Output
Typical Integrations
Copilot
AI assistant with evidence-linked answers
Copilot is an AI assistant that answers security questions with evidence from the Graph, Radar, and Proof—always showing its sources and reasoning.
Capabilities
- Natural language queries ("Show me critical OT risks")
- RAG-based answers with evidence links
- Explainable reasoning
- Suggested actions and workflows