Scan → Monitor → Prove → Share

Track what changed. Prove it improved. Stay protected.

Get alerted when your exposure changes. Track risk over time. Show proof with client-ready reports.

Most tools show a snapshot. We show what changed. — For small businesses and operators who need to track exposure and prove improvements.

No agents. No installs.5-minute setupClient-ready reportsBefore/after proof
Security Intelligence Score
Good shape
Combined score
81/100
↑ +8 pts this week
Internet exposure72/100
Internal network81/100
What to fix now
  • 1 unrecognized device appeared overnighthigh
  • Medical and office devices share a networkmedium
  • Remote access port visible from internetlow
From exposure → change → action
↑ Improving
14
Threats blocked
2
New devices
3
Ports closed
+8
Score change

See the difference

See what changed between scans — not just a snapshot.

Before
60
Medium risk
↓ 30
points reduced
After
30
Low risk

Most users reduce risk within minutes of applying their first fix.

Why it matters now

Exposure doesn't stay static.

New ports open. Configs drift. Services change without warning.
If you're not tracking it, you're blind to it.

📱
2.3 unmanaged devices appear each week
Untracked devices create blind spots and increase risk on small business networks. Most are never inventoried or monitored.
🔓
New exposed service detected within 10 minutes of appearing
A new internet-facing port or service can appear between scans and go undetected for days. VigilantAI flags it within the next monitoring cycle.
📋
Every client report includes an evidence-backed audit trail
Every scan, change, and remediation action is logged with timestamps. When an auditor or insurer asks, the trail is already there.
Security Intelligence

From exposure → change → action

VigilantAI doesn't just score your environment — it shows what changed, what increased risk, and what needs action now. This is the difference between a scanner and continuous security intelligence.

📱
2 new unmanaged devices detected
Appeared on the network since your last check. One connected after hours.
🛡️
14 risky DNS requests blocked
Attacker servers and malware domains — stopped before any device connected.
🔓
1 port newly exposed
A remote access service became visible from the internet since last scan.
🔀
Flat network risk found
Medical and office devices share the same segment — your biggest internal risk.

Updated automatically. Emailed to you weekly. No dashboard required.

See a real report →
Who it's for

Built for teams who need clarity, not complexity.

🏢
Small Business
See your risk. Fix it fast.

Understand what's exposed and what changed — without needing a security team. Every fix becomes measurable, shareable proof.

  • Instant external exposure scan
  • Clear, prioritized fixes
  • Before/after proof of improvement
  • Downloadable report for audits
🔒
Managed Service Provider
Used by operators to deliver client reports and prove improvement.
Turn every scan into a client-ready report.

Deliver proof, not guesses. Show before/after risk changes. Keep clients informed automatically.

  • Multi-client exposure tracking
  • Change detection across environments
  • Client-ready reports with verification
  • Share links for instant delivery
How it works

From detection to action in minutes

From detection to action in minutes.

1
Run a snapshot
Scan any public IP or domain. See all internet-facing services instantly.
2
See what changed
New exposures and risk increases are flagged immediately. No noise — just what matters.
3
Fix the right things
Follow clear, prioritized remediation steps. No guessing, no CVE lists — just the actions that reduce risk.
4
Prove the result
Re-scan and see measurable improvement. Generate a client-ready report with before/after proof.
Compliance & Insurance

Evidence-backed reports for auditors and underwriters.

Every scan and monitoring event becomes timestamped evidence you can export for auditors, cyber insurers, and internal reviews. HIPAA, PCI-DSS, SOC 2, and cyber insurance requirements — mapped automatically.

HIPAA §164.308HIPAA §164.312PCI-DSS Req. 1PCI-DSS Req. 11SOC 2 CC6.1Cyber Insurance
Compliance mapping (example)
HIPAA§164.308(a)(1)
Satisfied
PCI-DSSReq. 11
Satisfied
SOC 2CC6.1
Satisfied
Cyber InsuranceUnderwriter Q
Satisfied

Timestamped evidence entries created automatically on every scan and monitoring event.

Pricing

Start with visibility. Stay ahead of change.

Free gives you a baseline. Paid plans add continuous monitoring, internal security, change intelligence, and compliance outputs.

Most teams start with monitoring to track exposure changes.

Free Snapshot
$0 No credit card required
  • 1 external scan per month
  • Exposure score + risk findings
  • Prioritized fixes in plain English
  • PDF report download
Best for: first-time visibility
Popular
MSP Starter
$99 /mo · cancel anytime
  • Automatic exposure monitoring (no setup)
  • Alerts when risk increases
  • Before/after proof of fixes
  • Client-ready reports you can share
  • Up to 5 clients
No agents. No access required. External-only visibility.
MSP Growth
$199 /mo · cancel anytime
  • Everything in MSP Starter
  • Up to 10 clients
  • Portfolio-level reporting
  • Remediation proof workflow
  • Evidence timeline with timestamps
For teams managing multiple client environments.
Need more? Auditor Pro and Business Pro available.
100–500 assets, consultant workflows, enterprise evidence packages, volume MSP pricing.

Start monitoring now.

Know what changed before it becomes a problem.

Scope note: internet exposure scans are point-in-time snapshots of public-facing assets. Internal monitoring requires DNS configuration on your router. Absence of findings does not guarantee absence of risk.

VigilantAI is operated by INSPIRE SOLUTIONS GROUP LLC, Maryland, USA. © 2026 INSPIRE SOLUTIONS GROUP LLC. All rights reserved. Privacy · Terms · Contact