One platform, not disconnected apps
Modules share identity, permissions, audit trails, evidence, workflows, tasks, AI, and compliance context.
Product
Claryn turns scattered documents, spreadsheets, evidence requests, access reviews, vendor workflows, and sensitive exchanges into auditable operations across one platform.
Portfolio principles
Modules share identity, permissions, audit trails, evidence, workflows, tasks, AI, and compliance context.
Organizations can adopt modules or bundles over the same operational foundation instead of rebuilding governance in each tool.
Claryn turns governance, risk, security, privacy, compliance, and secure operations into continuous, auditable work.
Platform Core
Platform Core is not sold as a separate module. It supports identity, authorization, tenant management, audit, integrations, automation, AI, notifications, and cross-cutting capabilities.
Platform Core
Every product and domain reuses the same operational base to avoid duplicated workflows and disconnected experiences.
Users, authentication, MFA, sessions, passkeys, SSO, password policies, login history, and identity lifecycle.
Organizations, locations, departments, teams, employees, hierarchy, tenant structure, and organizational metadata.
Roles, permissions, scopes, memberships, delegations, allowed environments, and object-level authorization.
User, admin, system, integration, workflow, and module events in a shared audit trail.
Module enablement by organization, plan, commercial package, feature flag, internal phase, or controlled rollout.
Usage by plan, modules, users, storage, signatures, scans, evidence, workflows, APIs, and other meters.
Shared foundation for external integrations, API keys, webhook subscriptions, event delivery, and auditability.
Foundation for contextual assistants, RAG, document analysis, classification, summarization, recommendations, and module support.
Email, in-app notifications, webhooks, scheduled reminders, planned chat integrations, and preferences.
Domains and modules
Domains help navigation, mental model, and commercial narrative. They do not impose rigid architecture boundaries.
Domain
Governance, risk, compliance, audit, policies, controls, evidence, objectives, management reviews, and continuous assurance.
Records, assesses, treats, and monitors organizational, operational, security, privacy, third-party, and compliance risks.
Formalizes treatment decisions, selected controls, owners, deadlines, residual risk, acceptance, and evidence.
Maintains controls, tests, implementation status, owners, evidence, mappings, maturity, and effectiveness.
Reusable library of controls, risk scenarios, guidance, tests, evidence, and framework mappings.
Plans, executes, evidences, and reviews control tests, including results, deficiencies, and corrective actions.
Manages policies, procedures, versions, approvals, distribution, acknowledgements, reviews, and links to risks and controls.
Controls documents, records, templates, owners, versions, approval, retention, distribution, and evidence.
Organizes internal audits, external audits, certifications, plans, scopes, checklists, evidence, findings, and remediation.
Stores, classifies, links, approves, reuses, and expires evidence for controls, audits, risks, and obligations.
Requests, collects, validates, and tracks evidence from internal users, third parties, auditors, consultants, and suppliers.
Records meetings, agendas, decisions, participants, actions, risks, controls, auditable minutes, and follow-up.
Structures ISO-style reviews with metrics, audits, risks, objectives, incidents, decisions, and actions.
Maps controls, evidence, risks, policies, and activities to ISO 27001, ISO 27701, LGPD, NIST, SOC 2, and others.
Manages applicability, exclusions, justifications, status, risks, controls, decisions, owners, and SoA evidence.
Records nonconformities, observations, root causes, corrective actions, improvements, and effectiveness checks.
Formalizes deviations from policies, controls, baselines, vulnerabilities, or rules with approval, expiration, and compensations.
Tracks recurring obligations such as reviews, audits, tests, evidence, reassessments, and exercises.
Records laws, regulations, clauses, customer requirements, certifications, owners, applicability, and evidence.
Defines scope, boundaries, exclusions, interfaces, locations, systems, processes, and assets for ISMS, PIMS, or integrated systems.
Records context, interested parties, internal and external factors, dependencies, and relevant assumptions.
Maintains interested parties, requirements, applicability, owners, evidence, review, and links to obligations.
Defines measurable objectives, metrics, owners, initiatives, deadlines, evidence, and performance status.
Plans internal and external ISMS/PIMS communications, audience, frequency, channels, owners, and evidence.
Tracks remediation and improvement work from risks, audits, incidents, vulnerabilities, meetings, and gaps.
Domain
LGPD, privacy governance, personal data lifecycle, data subject rights, RoPA, sharing, retention, and PIMS.
Maps personal data categories, systems, flows, purposes, legal bases, processors, sharing, and retention.
Maintains the record of processing activities with traceability for systems, departments, purposes, data, subjects, and safeguards.
Structures impact assessments with templates, risks, safeguards, approvals, versions, evidence, and plans.
Documents legitimate interest assessments with balancing tests, safeguards, objections, approvals, risks, and evidence.
Receives, validates, responds to, and audits data subject requests with deadlines, evidence, history, and internal collaboration.
Manages collection, preferences, withdrawal, proof of consent, versioning, and audit evidence.
Manages privacy incidents, assessment, impact, notifications, communication with the ANPD, affected subjects, and actions.
Defines retention, disposal, anonymization, deletion, legal hold, approvals, and lifecycle evidence.
Defines classification schemes, handling rules, owners, sensitivity, and treatment expectations.
Tracks personal data sharing with customers, suppliers, partners, processors, authorities, and internal departments.
Classifies controller, processor, joint controller, or subprocessor roles by activity and contract.
Manages privacy notices by audience, product, channel, purpose, version, publication, approval, and evidence.
Records international transfers, countries, safeguards, contracts, risks, subprocessors, and approval.
Tracks customer/controller instructions, authorized scope, deviations, approvals, evidence, and contracts.
Adds privacy review to projects, systems, suppliers, products, changes, AI, and data initiatives.
Monitors regulatory changes and translates impacts into obligations, controls, assessments, and action recommendations.
Domain
Practical security operations, technical posture, assets, vulnerabilities, external exposure, monitoring, resilience, and incidents.
Inventories physical, logical, cloud, SaaS, information, and critical process assets with owners, classification, and risks.
Records formal and informal systems, automations, SaaS, low-code, scripts, integrations, spreadsheets, and AI tools.
Ingests and presents cloud posture findings, risk prioritization, ownership, remediation, and evidence.
Centralizes vulnerabilities, prioritization, ownership, SLA, remediation, exceptions, validation, and links to assets and controls.
Defines and tracks minimum baselines for servers, endpoints, SaaS, cloud, databases, containers, repositories, and networks.
Monitors domains, subdomains, public services, ports, TLS, DNS, exposed endpoints, and external signals.
Monitors sites, APIs, DNS, SPF, DKIM, DMARC, TLS certificates, response status, and basic availability.
Records, classifies, investigates, responds to, and closes incidents with timeline, evidence, decisions, and lessons learned.
Tracks policies, executions, restore tests, failures, ownership, RPO, RTO, retention, and evidence.
Manages BIA, continuity, disaster recovery, dependencies, exercises, readiness, and improvement actions.
Inventories certificates, secrets, keys, owners, expiration, rotation, storage location, and exposure risks.
Controls the change lifecycle with embedded approvals, risk assessment, rollback plan, affected systems, and auditable history.
Validates critical journeys and application flows through guided checks or external integrations.
Tracks threats, campaigns, indicators, advisories, exploited vulnerabilities, and links to assets, risks, and incidents.
Organizes log policies, telemetry coverage, SIEM, alerts, retention, responsibilities, and evidence.
Manages DLP policies, events, exceptions, investigations, data exposure, remediation, and privacy links.
Domain
People, responsibilities, access, organizational structure, onboarding, offboarding, competence, awareness, and human risk.
Maintains org charts, directories, roles, companies, departments, teams, managers, assignments, and training requirements.
Defines responsibilities, RACI, approvers, delegations, backups, validity, and scope limits.
Manages requests, approvals, provisioning evidence, temporary access, revocations, and recertifications.
Structures entry, transfer, and exit checklists connected to access, policies, assets, training, and evidence.
Tracks competencies, training, certifications, role requirements, evidence, gaps, and improvement actions.
Manages learning paths, quizzes, campaigns, completion evidence, and recurring training by risk or incident.
Runs phishing simulations, landing pages, target groups, risk scores, reports, trends, and evidence.
Domain
Secure tools for daily operations involving data, documents, approvals, messages, files, signatures, and sensitive workflows.
Exchanges files and messages with customers, suppliers, partners, and internal teams with OTP, expiration, and auditability.
Creates secure forms for suppliers, incidents, DPIAs, access, exceptions, evidence, and structured workflows.
Manages signatures with authentication, hashes, audit trail, and evidence certificates. Internal members sign inside the Portal; external parties use a public link with OTP. Recipient type is explicit on each signature request.
Tokenizes, sanitizes, enriches, validates, and detokenizes structured files to reduce personal data exposure.
Stores credentials, secrets, certificates, keys, recovery codes, and sensitive material with ownership and auditability.
Provides reusable approvals for documents, exceptions, access, suppliers, risks, contracts, changes, releases, and AI.
Stores sensitive files with encryption, access control, audit trails, expiration, retention, and BYO storage.
Domain
Suppliers, partners, processors, contracts, DPAs, onboarding, third-party risk, subprocessors, and external assurance.
Assesses, classifies, monitors, and reassesses security, privacy, operational, financial, ESG, and compliance risks from third parties.
Manages contracts, DPAs, clauses, obligations, renewals, owners, approvals, risks, and evidence.
Structures intake, criticality, required documents, ownership, approvals, due diligence, and contractual requirements.
Lets suppliers submit questionnaires, documents, evidence, attestations, remediation, and reassessment responses.
Helps answer customer questionnaires with reusable answers, evidence, AI, approvals, and trust center content.
Tracks ESG, climate, resilience, reputation, sustainability, and continuity signals when relevant to risk.
Maintains subprocessors, data categories, countries, DPAs, notifications, approvals, and customer disclosure.
Domain
Public or controlled experiences for external trust, whistleblowing, audit rooms, trust center, status, and posture.
Supports anonymous or identified reports, protocol, triage, investigation, confidentiality, privacy, and auditability.
Publishes security, privacy, compliance, certifications, documents, posture, and assurance content for customers.
Provides temporary read-only access to selected evidence and documentation for auditors, customers, and consultants.
Summarizes posture based on controls, findings, risks, evidence, operational signals, cloud, vulnerabilities, and incidents.
Communicates availability, incidents, degradations, maintenance, updates, and uptime history.
Compares maturity, posture, or control adoption with anonymous peer groups by size, sector, region, or profile.
Domain
Security, privacy, compliance, architecture, secure development, AI governance, and product governance.
Records architectural decisions with rationale, alternatives, impacts, risks, privacy, security, and approval.
Imports and normalizes scanner reports for code, dependencies, secrets, and IaC, with findings, evidence, ownership, and remediation.
Checks repository settings, rules, branch protection, access, and governance.
Models systems, actors, trust boundaries, threats, mitigations, residual risks, and actions.
Assesses features, products, changes, integrations, data, and AI from security, privacy, legal, and operational perspectives.
Inventories AI tools, uses, data permissions, owners, risk, approval, restrictions, and justification.
Provides approved snippets for authentication, cryptography, logs, validation, privacy, audit, and sensitive flows.
Documents cryptographic standards, algorithms, keys, certificates, rotation, ownership, storage, and vault integration.
Uses scan results and policies to approve or block PRs, releases, and deployments.
Records AI systems, tools, use cases, datasets, risks, owners, approvals, and controls.
Generates and maintains instructions for coding assistants, secure development rules, and usage patterns.
Tracks critical dependencies, licenses, vulnerabilities, ownership, approvals, remediation, and supply chain risk.
Operational Hub
The Operational Hub is a navigation and operations area, not a separate commercial domain. It organizes workflows, tasks, jobs, integrations, notifications, and execution logs.
Cross-cutting capabilities
These capabilities run across the platform and are not contracted as separate modules.
Contextual queries, risk and control suggestions, classification, evidence summarization, and recommendations based on organization data.
Generation of policies, reports, DPIAs, treatment plans, minutes, incident reports, evidence, and questionnaire answers.
Estimates financial exposure, risk reduction, control value, initiative cost, and executive prioritization rationale.
Secure conversations anchored in risks, assets, incidents, audits, suppliers, policies, evidence, contracts, and sensitive exchanges.
Unified timeline with comments, mentions, attachments, decisions, status changes, and audit events on each object.
Structured references across risks, controls, evidence, incidents, policies, vulnerabilities, suppliers, contracts, and actions.
Consolidated view of maturity, exposure, risks, compliance, incidents, audits, privacy, security, and progress.
TrustOps
Claryn is differentiated by unified identity, unified permissions, shared audit trails, shared evidence, workflows, tasks, AI, cross-references, and localized privacy and compliance context.