Skip to content

Features

Overview of Lorika's capabilities.

Asset Management

  • Devices — full inventory, OS details, check results
  • Software — catalog with risk scoring, EOL detection
  • Browsers — fleet-wide browser + extension inventory
  • Network Services — open ports, listening services
  • Storage Devices — USB/removable media tracking

Security Analysis

  • Vulnerabilities — CVE detection, KEV, EPSS, exploit intel
  • Threat Model — STRIDE + MITRE ATT&CK mapping
  • Risk Matrix — 5×5 likelihood × impact visualization
  • User Risk — endpoint-level user behavior signals

Compliance

  • Compliance — 20+ frameworks (NIST, CIS, ISO 27001, DORA, PCI DSS, HIPAA)
  • Maturity — 5-level cybersecurity maturity assessment
  • Manual Attestation — procedural controls with TTL

AI-Powered Planning

  • AI Recommendations — prioritized actions in EN + UK
  • Roadmap — quarterly implementation plan
  • Budget — ROI-based spending estimates
  • Workforce — capacity gap analysis

Cloud Integrations

  • Cloud Security — Google Workspace + Microsoft 365 audits
  • OSINT — DNS, WHOIS, TLS, DMARC, SPF, DKIM analysis