Product

An integrated TrustOps platform for modern organizations.

Claryn turns scattered documents, spreadsheets, evidence requests, access reviews, vendor workflows, and sensitive exchanges into auditable operations across one platform.

Portfolio principles

The value is in the shared foundation, not in isolated modules.

One platform, not disconnected apps

Modules share identity, permissions, audit trails, evidence, workflows, tasks, AI, and compliance context.

Contractable modules

Organizations can adopt modules or bundles over the same operational foundation instead of rebuilding governance in each tool.

TrustOps for growing companies

Claryn turns governance, risk, security, privacy, compliance, and secure operations into continuous, auditable work.

Platform Core

The structural foundation for every module.

Platform Core is not sold as a separate module. It supports identity, authorization, tenant management, audit, integrations, automation, AI, notifications, and cross-cutting capabilities.

Platform Core

Shared foundation

Every product and domain reuses the same operational base to avoid duplicated workflows and disconnected experiences.

Identity

Users, authentication, MFA, sessions, passkeys, SSO, password policies, login history, and identity lifecycle.

Organization

Organizations, locations, departments, teams, employees, hierarchy, tenant structure, and organizational metadata.

RBAC and Scopes

Roles, permissions, scopes, memberships, delegations, allowed environments, and object-level authorization.

Base Audit Trail

User, admin, system, integration, workflow, and module events in a shared audit trail.

Module Activation

Module enablement by organization, plan, commercial package, feature flag, internal phase, or controlled rollout.

Billing and Usage Base

Usage by plan, modules, users, storage, signatures, scans, evidence, workflows, APIs, and other meters.

API Keys and Webhooks Base

Shared foundation for external integrations, API keys, webhook subscriptions, event delivery, and auditability.

AI Foundation

Foundation for contextual assistants, RAG, document analysis, classification, summarization, recommendations, and module support.

Notification Base

Email, in-app notifications, webhooks, scheduled reminders, planned chat integrations, and preferences.

Domains and modules

The product universe organized by commercial and narrative domains.

Domains help navigation, mental model, and commercial narrative. They do not impose rigid architecture boundaries.

Domain

GRC, Audit, and Assurance

Governance, risk, compliance, audit, policies, controls, evidence, objectives, management reviews, and continuous assurance.

Risk Management

Available

Records, assesses, treats, and monitors organizational, operational, security, privacy, third-party, and compliance risks.

Risk Treatment Plan

Available

Formalizes treatment decisions, selected controls, owners, deadlines, residual risk, acceptance, and evidence.

Controls

Available

Maintains controls, tests, implementation status, owners, evidence, mappings, maturity, and effectiveness.

Risk and Control Library

Available

Reusable library of controls, risk scenarios, guidance, tests, evidence, and framework mappings.

Control Testing and Effectiveness

Available

Plans, executes, evidences, and reviews control tests, including results, deficiencies, and corrective actions.

Policy Hub

Available

Manages policies, procedures, versions, approvals, distribution, acknowledgements, reviews, and links to risks and controls.

Documented Information Register

Available

Controls documents, records, templates, owners, versions, approval, retention, distribution, and evidence.

Audit Center

Available

Organizes internal audits, external audits, certifications, plans, scopes, checklists, evidence, findings, and remediation.

Evidence Repository

Available

Stores, classifies, links, approves, reuses, and expires evidence for controls, audits, risks, and obligations.

Evidence Requests

Available

Requests, collects, validates, and tracks evidence from internal users, third parties, auditors, consultants, and suppliers.

Governance Meetings

Available

Records meetings, agendas, decisions, participants, actions, risks, controls, auditable minutes, and follow-up.

Management Review

Available

Structures ISO-style reviews with metrics, audits, risks, objectives, incidents, decisions, and actions.

Framework Mapping

Available

Maps controls, evidence, risks, policies, and activities to ISO 27001, ISO 27701, LGPD, NIST, SOC 2, and others.

Statement of Applicability

Available

Manages applicability, exclusions, justifications, status, risks, controls, decisions, owners, and SoA evidence.

Nonconformities and Opportunities

Available

Records nonconformities, observations, root causes, corrective actions, improvements, and effectiveness checks.

Exceptions and Risk Acceptance

Available

Formalizes deviations from policies, controls, baselines, vulnerabilities, or rules with approval, expiration, and compensations.

Compliance Calendar

Available

Tracks recurring obligations such as reviews, audits, tests, evidence, reassessments, and exercises.

Requirements Register

Available

Records laws, regulations, clauses, customer requirements, certifications, owners, applicability, and evidence.

Management System Scope

Available

Defines scope, boundaries, exclusions, interfaces, locations, systems, processes, and assets for ISMS, PIMS, or integrated systems.

Organizational Context

Available

Records context, interested parties, internal and external factors, dependencies, and relevant assumptions.

Interested Parties and Requirements

Available

Maintains interested parties, requirements, applicability, owners, evidence, review, and links to obligations.

Security and Privacy Objectives

Available

Defines measurable objectives, metrics, owners, initiatives, deadlines, evidence, and performance status.

Communication Plan

Available

Plans internal and external ISMS/PIMS communications, audience, frequency, channels, owners, and evidence.

Action Plans

In progress

Tracks remediation and improvement work from risks, audits, incidents, vulnerabilities, meetings, and gaps.

Domain

Privacy and Data Protection

LGPD, privacy governance, personal data lifecycle, data subject rights, RoPA, sharing, retention, and PIMS.

Data Mapping

Available

Maps personal data categories, systems, flows, purposes, legal bases, processors, sharing, and retention.

RoPA

Available

Maintains the record of processing activities with traceability for systems, departments, purposes, data, subjects, and safeguards.

DPIA / RIPD

Available

Structures impact assessments with templates, risks, safeguards, approvals, versions, evidence, and plans.

LIA

Available

Documents legitimate interest assessments with balancing tests, safeguards, objections, approvals, risks, and evidence.

Data Subject Portal (DSAR)

Available

Receives, validates, responds to, and audits data subject requests with deadlines, evidence, history, and internal collaboration.

Consent Management

Available

Manages collection, preferences, withdrawal, proof of consent, versioning, and audit evidence.

Privacy Incident Management

Available

Manages privacy incidents, assessment, impact, notifications, communication with the ANPD, affected subjects, and actions.

Data Retention and Disposal

Available

Defines retention, disposal, anonymization, deletion, legal hold, approvals, and lifecycle evidence.

Data Classification

Available

Defines classification schemes, handling rules, owners, sensitivity, and treatment expectations.

Data Sharing Register

Available

Tracks personal data sharing with customers, suppliers, partners, processors, authorities, and internal departments.

Controller / Processor Role Register

Available

Classifies controller, processor, joint controller, or subprocessor roles by activity and contract.

Privacy Notice Management

Available

Manages privacy notices by audience, product, channel, purpose, version, publication, approval, and evidence.

International Transfer Assessment

Available

Records international transfers, countries, safeguards, contracts, risks, subprocessors, and approval.

Processing Instruction Register

Available

Tracks customer/controller instructions, authorized scope, deviations, approvals, evidence, and contracts.

Privacy by Design

Coming soon

Adds privacy review to projects, systems, suppliers, products, changes, AI, and data initiatives.

Regulatory Intelligence

Coming soon

Monitors regulatory changes and translates impacts into obligations, controls, assessments, and action recommendations.

Domain

Security Operations

Practical security operations, technical posture, assets, vulnerabilities, external exposure, monitoring, resilience, and incidents.

Asset Management

Available

Inventories physical, logical, cloud, SaaS, information, and critical process assets with owners, classification, and risks.

Internal Systems and Shadow IT

Available

Records formal and informal systems, automations, SaaS, low-code, scripts, integrations, spreadsheets, and AI tools.

Cloud Security

Available

Ingests and presents cloud posture findings, risk prioritization, ownership, remediation, and evidence.

Vulnerability Management

Available

Centralizes vulnerabilities, prioritization, ownership, SLA, remediation, exceptions, validation, and links to assets and controls.

Security Baselines

Available

Defines and tracks minimum baselines for servers, endpoints, SaaS, cloud, databases, containers, repositories, and networks.

Attack Surface Management

Available

Monitors domains, subdomains, public services, ports, TLS, DNS, exposed endpoints, and external signals.

Health Checks

Available

Monitors sites, APIs, DNS, SPF, DKIM, DMARC, TLS certificates, response status, and basic availability.

Incident Management

Available

Records, classifies, investigates, responds to, and closes incidents with timeline, evidence, decisions, and lessons learned.

Backup and Restore

Available

Tracks policies, executions, restore tests, failures, ownership, RPO, RTO, retention, and evidence.

BCP / DR / BIA

Available

Manages BIA, continuity, disaster recovery, dependencies, exercises, readiness, and improvement actions.

Certificate and Secret Inventory

Available

Inventories certificates, secrets, keys, owners, expiration, rotation, storage location, and exposure risks.

Change Management (GMUD)

Available

Controls the change lifecycle with embedded approvals, risk assessment, rollback plan, affected systems, and auditable history.

Synthetic Checks

Partial

Validates critical journeys and application flows through guided checks or external integrations.

Threat Intelligence

Coming soon

Tracks threats, campaigns, indicators, advisories, exploited vulnerabilities, and links to assets, risks, and incidents.

Log and Monitoring Governance

Coming soon

Organizes log policies, telemetry coverage, SIEM, alerts, retention, responsibilities, and evidence.

DLP Governance

Coming soon

Manages DLP policies, events, exceptions, investigations, data exposure, remediation, and privacy links.

Domain

Identity and People Security

People, responsibilities, access, organizational structure, onboarding, offboarding, competence, awareness, and human risk.

Organizational Structure

Available

Maintains org charts, directories, roles, companies, departments, teams, managers, assignments, and training requirements.

Accountability, RACI, and Authorities

Available

Defines responsibilities, RACI, approvers, delegations, backups, validity, and scope limits.

Access Management

Available

Manages requests, approvals, provisioning evidence, temporary access, revocations, and recertifications.

Onboarding and Offboarding

Available

Structures entry, transfer, and exit checklists connected to access, policies, assets, training, and evidence.

Competence Management

Available

Tracks competencies, training, certifications, role requirements, evidence, gaps, and improvement actions.

Awareness and Training

Available

Manages learning paths, quizzes, campaigns, completion evidence, and recurring training by risk or incident.

Phishing Campaigns

Coming soon

Runs phishing simulations, landing pages, target groups, risk scores, reports, trends, and evidence.

Domain

Secure Business Operations

Secure tools for daily operations involving data, documents, approvals, messages, files, signatures, and sensitive workflows.

Secure Exchange

Available

Exchanges files and messages with customers, suppliers, partners, and internal teams with OTP, expiration, and auditability.

Secure Forms

Available

Creates secure forms for suppliers, incidents, DPIAs, access, exceptions, evidence, and structured workflows.

Digital Signature - Claryn Sign

Available

Manages signatures with authentication, hashes, audit trail, and evidence certificates. Internal members sign inside the Portal; external parties use a public link with OTP. Recipient type is explicit on each signature request.

Privacy Pipeline

Available

Tokenizes, sanitizes, enriches, validates, and detokenizes structured files to reduce personal data exposure.

Vault

Available

Stores credentials, secrets, certificates, keys, recovery codes, and sensitive material with ownership and auditability.

Secure Approvals

Partial

Provides reusable approvals for documents, exceptions, access, suppliers, risks, contracts, changes, releases, and AI.

Secure Storage / Secure Drive

Coming soon

Stores sensitive files with encryption, access control, audit trails, expiration, retention, and BYO storage.

Domain

Third Parties and Contracts

Suppliers, partners, processors, contracts, DPAs, onboarding, third-party risk, subprocessors, and external assurance.

Third-Party Risk

Available

Assesses, classifies, monitors, and reassesses security, privacy, operational, financial, ESG, and compliance risks from third parties.

Contracts and DPA

Available

Manages contracts, DPAs, clauses, obligations, renewals, owners, approvals, risks, and evidence.

Supplier Onboarding

Coming soon

Structures intake, criticality, required documents, ownership, approvals, due diligence, and contractual requirements.

Third-Party Portal

Coming soon

Lets suppliers submit questionnaires, documents, evidence, attestations, remediation, and reassessment responses.

Customer Security Questionnaires

Coming soon

Helps answer customer questionnaires with reusable answers, evidence, AI, approvals, and trust center content.

ESG and Climate Signals

Coming soon

Tracks ESG, climate, resilience, reputation, sustainability, and continuity signals when relevant to risk.

Subprocessor Management

Coming soon

Maintains subprocessors, data categories, countries, DPAs, notifications, approvals, and customer disclosure.

Domain

Trust and External Surfaces

Public or controlled experiences for external trust, whistleblowing, audit rooms, trust center, status, and posture.

Whistleblowing Channel

Available

Supports anonymous or identified reports, protocol, triage, investigation, confidentiality, privacy, and auditability.

Trust Center

Available

Publishes security, privacy, compliance, certifications, documents, posture, and assurance content for customers.

Audit Room

Available

Provides temporary read-only access to selected evidence and documentation for auditors, customers, and consultants.

Security Posture

Available

Summarizes posture based on controls, findings, risks, evidence, operational signals, cloud, vulnerabilities, and incidents.

Public Status Page

Coming soon

Communicates availability, incidents, degradations, maintenance, updates, and uptime history.

Benchmark

Coming soon

Compares maturity, posture, or control adoption with anonymous peer groups by size, sector, region, or profile.

Domain

Secure Development, Product, and AI Governance

Security, privacy, compliance, architecture, secure development, AI governance, and product governance.

ADR

Available

Records architectural decisions with rationale, alternatives, impacts, risks, privacy, security, and approval.

Application Security and Privacy Scan

Available

Imports and normalizes scanner reports for code, dependencies, secrets, and IaC, with findings, evidence, ownership, and remediation.

Repository Security Posture

Available

Checks repository settings, rules, branch protection, access, and governance.

Threat Modeling

Available

Models systems, actors, trust boundaries, threats, mitigations, residual risks, and actions.

Product Risk Review

Available

Assesses features, products, changes, integrations, data, and AI from security, privacy, legal, and operational perspectives.

AI Use Register

Available

Inventories AI tools, uses, data permissions, owners, risk, approval, restrictions, and justification.

Compliance Snippets

Available

Provides approved snippets for authentication, cryptography, logs, validation, privacy, audit, and sensitive flows.

Cryptography Management

Partial

Documents cryptographic standards, algorithms, keys, certificates, rotation, ownership, storage, and vault integration.

SDLC Security Gates

Coming soon

Uses scan results and policies to approve or block PRs, releases, and deployments.

AI Governance

Coming soon

Records AI systems, tools, use cases, datasets, risks, owners, approvals, and controls.

AI Coding Guidelines

Coming soon

Generates and maintains instructions for coding assistants, secure development rules, and usage patterns.

Open Source and Dependency Governance

Coming soon

Tracks critical dependencies, licenses, vulnerabilities, ownership, approvals, remediation, and supply chain risk.

Operational Hub

Orchestration and execution for every module.

The Operational Hub is a navigation and operations area, not a separate commercial domain. It organizes workflows, tasks, jobs, integrations, notifications, and execution logs.

WorkflowAlerts and NotificationsIntegrationsExternal StorageScheduler and JobsTask CenterAPI & WebhooksExecution Logs

Cross-cutting capabilities

Global capabilities that increase the value of every module.

These capabilities run across the platform and are not contracted as separate modules.

Global AI Assistant

Contextual queries, risk and control suggestions, classification, evidence summarization, and recommendations based on organization data.

Document and Artifact Generator

Generation of policies, reports, DPIAs, treatment plans, minutes, incident reports, evidence, and questionnaire answers.

Impact and ROI Analysis

Estimates financial exposure, risk reduction, control value, initiative cost, and executive prioritization rationale.

Contextual Communication

Secure conversations anchored in risks, assets, incidents, audits, suppliers, policies, evidence, contracts, and sensitive exchanges.

Contextual Collaboration on Records

Unified timeline with comments, mentions, attachments, decisions, status changes, and audit events on each object.

Cross-References and Backlinks

Structured references across risks, controls, evidence, incidents, policies, vulnerabilities, suppliers, contracts, and actions.

Executive Dashboard

Consolidated view of maturity, exposure, risks, compliance, incidents, audits, privacy, security, and progress.

TrustOps

From reactive compliance to continuous, integrated, auditable operations.

Claryn is differentiated by unified identity, unified permissions, shared audit trails, shared evidence, workflows, tasks, AI, cross-references, and localized privacy and compliance context.