Skip to main content
platform

Every machine. One dashboard.

Manage Quint daemons, policies, and agent activity across your entire fleet from a single control plane. Deploy in one command and integrate with your existing stack.

GET STARTED
0
Command Install
0
Deploy Modes
OCSF
Event Format
0
Runtime Dependencies
Fleet management
Fleet Overview9/12 healthy
eng-mbp-01
macOS4 agents
eng-mbp-02
macOS3 agents
ci-runner-01
Ubuntu2 agents
ci-runner-02
Ubuntu1 agents
staging-01
Debian3 agents
eng-dell-03
Ubuntu5 agents
ops-mbp-01
macOS2 agents
ci-runner-03
Ubuntu1 agents
eng-thinkpad-01
Fedora3 agents
prod-gateway-01
Alpine0 agents
eng-mbp-04
macOS4 agents
dev-vm-01
Ubuntu2 agents
One-command install
$

Centralized Control Plane

Single view across every machine. See agent activity by machine, team, or environment. Roll out policy changes fleet-wide.

  • One-line install: `curl -fsSL https://get.quintai.dev | sh`
  • Single Go binary, ~15MB, zero dependencies, zero CGO
  • Installs as launchd (macOS) or systemd (Linux). Auto-updates via GitHub releases
  • Policy propagation without daemon restart

Multi-Tenant Architecture

Built multi-tenant from the ground up with complete data isolation between customers and teams. Every query and API call is scoped to the correct tenant.

  • Row-level security + application-level isolation
  • Integration-tested tenant isolation

Deployment Modes for Every Environment

Developer laptops (launchd on macOS, systemd on Linux), cloud VMs (EC2, GCE, Azure), Kubernetes clusters (DaemonSet + Helm chart), and CI/CD pipelines. Same policies, same enforcement everywhere.

  • Stdio Relay, Gateway, and Watch modes
  • One-line curl install with deploy token
  • Kubernetes DaemonSet + Helm chart for cluster-wide rollout
  • Single line in GitHub Actions or GitLab CI for pipeline coverage

Edge-First Architecture

ALL security-critical operations run locally on the machine — scoring, enforcement, and audit logging. Source code, credentials, and secrets never leave the device. The cloud handles fleet management and behavioral intelligence only.

  • Sub-5ms scoring on typical developer hardware
  • 100MB local buffer for full offline operation
  • Zero cloud dependency for security-critical ops
  • Structured event metadata only — no source code or secrets transmitted
Integrations
QuintQUINT
Slack
Sentinel
Chronicle
GitHub
AWS
Docker
Available today

API-First Architecture

Everything accessible via REST API. Score events, query history, manage policies, export audit bundles programmatically.

  • RESTful API with ES256 JWT auth
  • Webhook event delivery with configurable retry
  • OCSF-formatted events for vendor-neutral compatibility

SIEM-Ready Event Format

All events emitted in OCSF format, ready to ingest into any SIEM. Export audit bundles on demand or stream via webhooks.

  • OCSF v1.1 compliance
  • Bulk export and real-time webhook delivery

Webhook Events

Subscribe to scoring events, policy violations, and audit completions. Route to any HTTP endpoint with HMAC-signed payloads.

  • Configurable event filters by risk level
  • Automatic retry with exponential backoff

Slack & PagerDuty Alerts

Alert routing to Slack and PagerDuty with threshold-based triggers. Configure alerts by risk level, framework, or agent type.

  • Route high-risk events to PagerDuty, medium-risk to Slack
  • Filter by compliance framework, agent identity, or action type

Microservice Architecture

Three independent microservices handle ingestion, session processing, and alert evaluation. The Ingest Service is stateless and horizontally scalable. The Session Processor maintains real-time session state. The Alert Processor evaluates rules and delivers webhooks.

  • Ingest Service: stateless, horizontally scalable event ingestion
  • Session Processor: real-time session state and behavioral analysis
  • Alert Processor: rule evaluation and webhook delivery
Coming soon

SIEM Connectors

Native push to Splunk HEC, Microsoft Sentinel, and Google Chronicle.

GraphQL API

Flexible querying for dashboards, reporting, and custom tooling.

Identity Providers

Okta, Microsoft Entra ID, and CyberArk for agent identity mapping.

Secure your agents.
Ship with confidence.

One install. Every agent. Deploy in under 2 minutes. Free for your first two machines.

GET STARTED FREE