Shared Platform Core
Identity, organizations, RBAC, scopes, audit trail, module activation, usage, API keys, webhooks, AI foundation, and notifications.
GRC is one domain, not the boundary
Risks, controls, policies, evidence, audits, requirements, management reviews, SoA, exceptions, action plans, and compliance calendar stay connected to the rest of the operation.
Privacy and data protection operations
LGPD/DSAR workflows, data mapping, RoPA, DPIA/RIPD, consent, breaches, privacy notices, sharing, retention, and regulatory intelligence.
Security operations
Assets, shadow IT, cloud security, vulnerabilities, baselines, attack surface, health checks, logging, DLP, incidents, backup, and continuity.
Third parties and external trust
Supplier risk, contracts, DPAs, third-party portals, customer security questionnaires, Trust Center, Audit Room, status page, and whistleblowing.
Secure business operations
Secure Exchange, Secure Drive, Secure Forms, Claryn Sign, Privacy Pipeline, Vault, and reusable secure approvals.