Compliance hub

Enterprise compliance, startup speed

One platform replaces your fragmented tool stack. Dedicated infrastructure, 24/7 monitoring, compliance controls, and premium engagement services — built for organizations where downtime is not an option.

SOC 2 Type II

GDPR

PCI DSS

OWASP Top 10

Compliance hub

Enterprise compliance, startup speed

One platform replaces your fragmented tool stack. Dedicated infrastructure, 24/7 monitoring, compliance controls, and premium engagement services — built for organizations where downtime is not an option.

SOC 2 Type II

GDPR

PCI DSS

OWASP Top 10

Compliance hub

Enterprise compliance, startup speed

One platform replaces your fragmented tool stack. Dedicated infrastructure, 24/7 monitoring, compliance controls, and premium engagement services — built for organizations where downtime is not an option.

SOC 2 Type II

GDPR

PCI DSS

OWASP Top 10

Compliance hub

Enterprise compliance, startup speed

One platform replaces your fragmented tool stack. Dedicated infrastructure, 24/7 monitoring, compliance controls, and premium engagement services — built for organizations where downtime is not an option.

  • SOC 2 Type II

  • GDPR

  • PCI DSS

  • OWASP Top 10

SOC 2 Type II

Trust service criteria, mapped to real controls

Lyrie maps to SOC 2 trust service criteria across security, availability, and confidentiality. When your auditor asks “show me the control,” you open the dashboard — not a spreadsheet.

Access control

Role-based permissions, MFA enforcement, and session management across dashboard and API access.

Audit logging

Every authentication event, configuration change, and security action logged with timestamps and actor identity.

Encryption in transit

TLS 1.2+ enforced across all connections. WAF proxy, API endpoints, and agent communication — no exceptions.

Encryption at rest

Database encryption, scan result storage, and backup volumes protected with AES-256.

Incident response

Real-time alerting, correlated findings, and guided remediation workflows for rapid containment.

Change management

Version-tracked policy changes, configuration history, and rollback capability for every security control.

Availability monitoring

Uptime monitoring, health checks, and redundancy across platform components.

Vendor management

Minimal third-party dependencies. No data sharing with external model training pipelines.

SOC 2 Type II

Trust service criteria, mapped to real controls

Lyrie maps to SOC 2 trust service criteria across security, availability, and confidentiality. When your auditor asks “show me the control,” you open the dashboard — not a spreadsheet.

Access control

Role-based permissions, MFA enforcement, and session management across dashboard and API access.

Audit logging

Every authentication event, configuration change, and security action logged with timestamps and actor identity.

Encryption in transit

TLS 1.2+ enforced across all connections. WAF proxy, API endpoints, and agent communication — no exceptions.

Encryption at rest

Database encryption, scan result storage, and backup volumes protected with AES-256.

Incident response

Real-time alerting, correlated findings, and guided remediation workflows for rapid containment.

Change management

Version-tracked policy changes, configuration history, and rollback capability for every security control.

Availability monitoring

Uptime monitoring, health checks, and redundancy across platform components.

Vendor management

Minimal third-party dependencies. No data sharing with external model training pipelines.

SOC 2 Type II

Trust service criteria, mapped to real controls

Lyrie maps to SOC 2 trust service criteria across security, availability, and confidentiality. When your auditor asks “show me the control,” you open the dashboard — not a spreadsheet.

Access control

Role-based permissions, MFA enforcement, and session management across dashboard and API access.

Audit logging

Every authentication event, configuration change, and security action logged with timestamps and actor identity.

Encryption in transit

TLS 1.2+ enforced across all connections. WAF proxy, API endpoints, and agent communication — no exceptions.

Encryption at rest

Database encryption, scan result storage, and backup volumes protected with AES-256.

Incident response

Real-time alerting, correlated findings, and guided remediation workflows for rapid containment.

Change management

Version-tracked policy changes, configuration history, and rollback capability for every security control.

Availability monitoring

Uptime monitoring, health checks, and redundancy across platform components.

Vendor management

Minimal third-party dependencies. No data sharing with external model training pipelines.

Data subject
rights are not
a feature request
— they are built in

Access, deletion, portability, and consent management are native dashboard controls. Your users exercise their rights. You stay compliant. No engineering tickets required.

Right of access

Users can view and export all personal data stored by Lyrie through the dashboard Data Controls panel.

Right to deletion

Request account deletion from your profile. After email and 2FA verification, all data is permanently wiped within 7 days.

Data minimization

IP truncation, configurable retention windows, and region lock ensure you collect only what you need.

Consent management

Granular opt-in controls for telemetry, notifications, and data processing — revocable at any time.

Data portability

Export your security data, scan reports, and audit logs in standard formats through the API or dashboard.

No-training guarantee

Contractual commitment: your data is never used to train AI models. Period.

  • Right of access

    Users can view and export all personal data stored by Lyrie through the dashboard Data Controls panel.

  • Right to deletion

    Request account deletion from your profile. After email and 2FA verification, all data is permanently wiped within 7 days.

  • Data minimization

    IP truncation, configurable retention windows, and region lock ensure you collect only what you need.

  • Consent management

    Granular opt-in controls for telemetry, notifications, and data processing — revocable at any time.

  • Data portability

    Export your security data, scan reports, and audit logs in standard formats through the API or dashboard.

  • No-training guarantee

    Contractual commitment: your data is never used to train AI models. Period.

Data subject
rights are not
a feature request
— they are built in

Access, deletion, portability, and consent management are native dashboard controls. Your users exercise their rights. You stay compliant. No engineering tickets required.

Right of access

Users can view and export all personal data stored by Lyrie through the dashboard Data Controls panel.

Right to deletion

Request account deletion from your profile. After email and 2FA verification, all data is permanently wiped within 7 days.

Data minimization

IP truncation, configurable retention windows, and region lock ensure you collect only what you need.

Consent management

Granular opt-in controls for telemetry, notifications, and data processing — revocable at any time.

Data portability

Export your security data, scan reports, and audit logs in standard formats through the API or dashboard.

No-training guarantee

Contractual commitment: your data is never used to train AI models. Period.

  • Right of access

    Users can view and export all personal data stored by Lyrie through the dashboard Data Controls panel.

  • Right to deletion

    Request account deletion from your profile. After email and 2FA verification, all data is permanently wiped within 7 days.

  • Data minimization

    IP truncation, configurable retention windows, and region lock ensure you collect only what you need.

  • Consent management

    Granular opt-in controls for telemetry, notifications, and data processing — revocable at any time.

  • Data portability

    Export your security data, scan reports, and audit logs in standard formats through the API or dashboard.

  • No-training guarantee

    Contractual commitment: your data is never used to train AI models. Period.

PCI DSS

PCI DSS

Requirement mapping for payment security

One platform replaces your fragmented tool stack. Dedicated infrastructure, 24/7 monitoring, compliance controls, and premium engagement services — built for organizations where downtime is not an option.

REQ

6.6

WAF Protection

One platform replaces your fragmented tool stack. Dedicated infrastructure, 24/7 monitoring, compliance controls, and premium engagement services — built for organizations where downtime is not an option.

REQ

10.1

Audit Trail

All access to system components logged with user identity, timestamps, and action details.

REQ

10.2

Event Logging

Security events, authentication attempts, and configuration changes recorded and searchable.

REQ

10.6

Log Review

Dashboard analytics and alerting enable daily review of security events and anomalies.

REQ

11.2

Vulnerability Scanning

Scheduled and on-demand scans with professional reports for quarterly ASV validation support.

REQ

12.10

Incident Response

Real-time detection, correlated findings, and remediation workflows for rapid response.

  • REQ

    6.6

    WAF Protection

    One platform replaces your fragmented tool stack. Dedicated infrastructure, 24/7 monitoring, compliance controls, and premium engagement services — built for organizations where downtime is not an option.

  • REQ

    10.1

    Audit Trail

    All access to system components logged with user identity, timestamps, and action details.

  • REQ

    10.2

    Event Logging

    Security events, authentication attempts, and configuration changes recorded and searchable.

  • REQ

    10.6

    Log Review

    Dashboard analytics and alerting enable daily review of security events and anomalies.

  • REQ

    11.2

    Vulnerability Scanning

    Scheduled and on-demand scans with professional reports for quarterly ASV validation support.

  • REQ

    12.10

    Incident Response

    Real-time detection, correlated findings, and remediation workflows for rapid response.

Our data handling commitment

Encryption everywhere

TLS 1.2+ in transit, AES-256 at rest. Every data path is encrypted — dashboard, API, agent sync, scan storage.

No model training

Your data protects you and only you. Contractual guarantee that no request data, scan results, or telemetry feeds any training pipeline.

Region awareness

Region lock controls keep your data in the geography your compliance framework requires.

Configurable retention

Set how long data lives — 7, 30, 90, 180, or 365 days. When the window closes, data is deleted permanently.

Exportable audit logs

Export your security data, scan reports, and audit logs in standard formats through the API or dashboard.

Least-privilege access

Role-based permissions, MFA enforcement, and session controls limit exposure surface inside the platform.

Our data handling commitment

  • Encryption everywhere

    TLS 1.2+ in transit, AES-256 at rest. Every data path is encrypted — dashboard, API, agent sync, scan storage.

    No model training

    Your data protects you and only you. Contractual guarantee that no request data, scan results, or telemetry feeds any training pipeline.

    Region awareness

    Region lock controls keep your data in the geography your compliance framework requires.

  • Configurable retention

    Set how long data lives — 7, 30, 90, 180, or 365 days. When the window closes, data is deleted permanently.

    Exportable audit logs

    Export your security data, scan reports, and audit logs in standard formats through the API or dashboard.

    Least-privilege access

    Role-based permissions, MFA enforcement, and session controls limit exposure surface inside the platform.

Ready to simplify your next audit?

Start with the free tier and explore every compliance control first-hand. When you are ready for production, the platform scales with you.

Ready to simplify your next audit?

Start with the free tier and explore every compliance control first-hand. When you are ready for production, the platform scales with you.

Ready to simplify your next audit?

Start with the free tier and explore every compliance control first-hand. When you are ready for production, the platform scales with you.

Ready to simplify your next audit?

Start with the free tier and explore every compliance control first-hand. When you are ready for production, the platform scales with you.

Security platform for teams that need serious protection across web applications, infrastructure, and endpoint fleets.

All Systems Operational

Platform

Features

Pricing

Enterprise

Desktop App

Anti-Malware

API

Integrations

Resources

Documentation

Blog

Security Reports

Case Studies

Company

About

Careers

Contact

Legal

Privacy Policy

Terms of Service

Legal

SOC 2 Type II

GDPR

PCI DSS

OWASP Top 10

© 2026 LYRIE.AI — OTT Cybersecurity LLC. All rights reserved.

Security platform for teams that need serious protection across web applications, infrastructure, and endpoint fleets.

All Systems Operational

Platform

Features

Pricing

Enterprise

Desktop App

Anti-Malware

API

Integrations

Resources

Documentation

Blog

Security Reports

Case Studies

Company

About

Careers

Contact

Legal

Privacy Policy

Terms of Service

Legal

SOC 2 Type II

GDPR

PCI DSS

OWASP Top 10

© 2026 LYRIE.AI — OTT Cybersecurity LLC. All rights reserved.

Security platform for teams that need serious protection across web applications, infrastructure, and endpoint fleets.

All Systems Operational

Platform

Features

Pricing

Enterprise

Desktop App

Anti-Malware

API

Integrations

Resources

Documentation

Blog

Security Reports

Case Studies

Company

About

Careers

Contact

Legal

Privacy Policy

Terms of Service

Legal

SOC 2 Type II

GDPR

PCI DSS

OWASP Top 10

© 2026 LYRIE.AI — OTT Cybersecurity LLC. All rights reserved.