Tripl-i is the consolidated IT intelligence platform that discovers your infrastructure, analyzes dependencies, responds to threats, and solves compliance — all from a single pane of glass.
Architecture Overview
Click any module to explore how it works and what it connects to.
The Four Pillars
Most tools do one thing. Tripl-i covers the entire lifecycle — from the moment a device appears on your network to the moment a compliance report lands on an auditor's desk.
Pillar 01
Agentless, multi-protocol discovery that maps your entire infrastructure in minutes.
Pillar 02
AI maps dependencies, classifies software, scores business impact, and enables natural language search.
CMDB
Your Living
System of Record
Continuously updated
by every pillar
CMDB — System of Record
Configuration items, relationships, AI-enriched dependencies — continuously updated by every pillar.
Pillar 03
Ingest events from any monitoring source, detect threats in real-time, and trigger automated workflows.
Pillar 04
Close the loop with vulnerability remediation, compliance frameworks, and executive dashboards.
How it works
No agents to install on every machine. No complex configuration. Deploy once, and the platform builds your CMDB automatically.
Step 01
One installer on a jump host. It scans your subnets using WMI, SSH, SNMP, and VMware APIs. No software pushed to endpoints.
Step 02
Devices are typed (server/workstation/network), software is normalized into product families, and processes are matched to applications — automatically.
Step 03
Network connections become dependency maps. AI identifies business services, scores criticality, and flags risks you didn't know existed.
Step 04
Scheduled scans keep your CMDB current. Events flow in from monitoring tools. Vulnerabilities are tracked and remediated. Compliance stays green.
AI-Powered Intelligence
Not just pattern matching — deep analysis that connects software to processes, processes to services, and services to business impact.
AI analyzes network connections to identify service-level dependencies. Each relationship is scored for importance (1–5) and classified by type.
Raw installed software is normalized into products, grouped into families, and matched to CPE identifiers for vulnerability tracking.
Pattern-based service identification maps infrastructure to the business services it supports. Understand cascading impact before changes are made.
AI analyzes hostname, OS, software, and custom fields to automatically apply tags across 12 categories — environment, criticality, compliance, lifecycle, and more.
Ask questions in plain English. "Show me all production servers running SQL Server with critical vulnerabilities" returns exactly what you'd expect.
Every dependency gets an AI-generated risk assessment: confidence score, business impact analysis, and recommended actions. Know exactly what's at stake before you change anything.
Security & Compliance
Security isn't a bolt-on. Every CI is continuously evaluated against vulnerability databases, threat intelligence feeds, and your own policies.
Version-aware CVE matching with hotfix detection. Per-CI tracking with assignment, due dates, and status workflow.
Blacklist and whitelist policies with regex pattern matching. Severity levels trigger automated response actions.
ThreatFox integration scans connections against 51,000+ IOCs from 160+ malware families. LOLBAS detection for living-off-the-land attacks.
Automatic zone discovery, cross-zone traffic analysis with Sankey diagrams, and policy violation detection with remediation guidance.
SOX, HIPAA, PCI-DSS — automated compliance checking with attestation lifecycle management and control assessment.
Integration Ecosystem
Tripl-i doesn't replace your monitoring stack — it makes it smarter by correlating data across all your tools.
Discovery
Monitoring
ITSM
Security Feeds
Why it matters
What changes when your CMDB builds itself, your dependencies are always mapped, and your compliance is always current.
Time to Discovery
Deploy once, discover 1,000+ devices. No endpoint agents, no firewall changes.
CMDB Updates
Every CI, relationship, and tag is created and maintained automatically by AI.
IOCs Monitored
Continuous threat detection against ThreatFox, NVD, and MSRC feeds.
Not Five Tools
Discovery, CMDB, security, compliance, and ITSM integration — consolidated.
No credit card. No sales call. Deploy the agent, and watch your infrastructure map itself.