Knowledge Platform

A low-code platform for knowledge-driven cybersecurity applications

Brinqa Knowledge Platform is a collection of shared capabilities for creating, managing, and operating enterprise-grade knowledge graphs. Design and develop low-code cybersecurity applications for a variety of use-cases while leveraging the power of a unified, dynamic, and robust knowledge source.

Data Design Studio
Implement a dynamic knowledge architecture with semantic data models that represent complex, context-rich information. Create entities and interconnects with hierarchical modeling of business functions, processes, infrastructure and apps.
Data Connector Framework
The assessment framework supports intelligent assessments that evolve with changing scope and state of analysis to reduce responder fatigue and ensure the highest quality of manual data collection possible. Assessments make extensive use of Brinqa Risk and Control Framework to go beyond static data collection and provide powerful control evaluation and gap identification.
Intelligence Engine
Develop new knowledge by applying automated reasoning to semantic data models, across massive volumes of data from diverse sources - enabling new and meaningful insights and driving desired outcomes.
Automation Engine
Increase productivity with efficient, automated data collection, normalization, correlation, analytics, response and reporting. Streamline remediation processes with automated creation, tracking and escalation of tickets and tasks.
Analytics Interface
Visualize and communicate knowledge and insights easily through self-service, user friendly metrics, reports and executive dashboards.
Big Data Graph Backend
Engage the power of the leading graph database - Neo4J - along with built-in load balancing, distributed processing and data recovery for true big data graph analysis.
Tailored User Experience
Easily customize application menus, views, navigation, facets, and almost every other UI element through code-less UI-based configuration.
Custom Application Development
Build new and extend existing applications to solve even the most complex data analysis problems with full control over every aspect of application design.

Interested in Trying it Out?

Experience the power of Brinqa Risk Platform with a free trial - discover unparalleled risk visibility and improved security posture within minutes.

Apple users should immediately update all their devices – iPhones, iPads, Macs and Apple Watches – to install an emergency patch for a zero-click zero-day exploited by NSO Group to install spyware.

Google has addressed two zero-day security bugs that are being actively exploited in the wild. The two zero days are tracked as CVE-2021-30632 and CVE-2021-30633.

Both Microsoft and federal cybersecurity officials are urging organizations to use mitigations to combat a zero-day remote control execution (RCE) vulnerability in Windows that allows attackers to craft malicious Microsoft Office documents.

Cisco Systems released six security patches tied to its high-end 9000 series networking gear ranging in importance from critical, high and medium severity.

In the last half of 2020, 449 vulnerabilities were disclosed. During the first half of 2021, more than 600 ICS vulnerabilities were disclosed, impacting 76 vendors.

Apple patched a zero-day flaw on Monday, found in both its iOS and macOS platforms that’s being actively exploited in the wild and can allow attackers to take over an affected system.

Brinqa today announced that the current CEO of Tricentis & former CEO of SolarWinds, Kevin Thompson, has been appointed as Executive Chairman of the Board. The company also announced it has named former HP executive Brian Moriarty as new CFO.

Microsoft has released an emergency patch for the PrintNightmare, a set of two critical remote code-execution (RCE) vulnerabilities in the Windows Print Spooler service that hackers can use to take over an infected system.

Multiple critical vulnerabilities in Philips Clinical Collaboration Platform Portal could enable an attacker to take control over an affected system, according to a recent Department of Homeland Security Cybersecurity and Infrastructure Agency alert.

The latest zero-day entails an attack chain that allows an unauthenticated intruder to execute code as root and install a permanent backdoor on the vendor’s network-attached storage (NAS) devices.

Apple users should immediately update all their devices – iPhones, iPads, Macs and Apple Watches – to install an emergency patch for a zero-click zero-day exploited by NSO Group to install spyware.

Google has addressed two zero-day security bugs that are being actively exploited in the wild. The two zero days are tracked as CVE-2021-30632 and CVE-2021-30633.

Both Microsoft and federal cybersecurity officials are urging organizations to use mitigations to combat a zero-day remote control execution (RCE) vulnerability in Windows that allows attackers to craft malicious Microsoft Office documents.

Cisco Systems released six security patches tied to its high-end 9000 series networking gear ranging in importance from critical, high and medium severity.

In the last half of 2020, 449 vulnerabilities were disclosed. During the first half of 2021, more than 600 ICS vulnerabilities were disclosed, impacting 76 vendors.

Apple patched a zero-day flaw on Monday, found in both its iOS and macOS platforms that’s being actively exploited in the wild and can allow attackers to take over an affected system.

Brinqa today announced that the current CEO of Tricentis & former CEO of SolarWinds, Kevin Thompson, has been appointed as Executive Chairman of the Board. The company also announced it has named former HP executive Brian Moriarty as new CFO.

Microsoft has released an emergency patch for the PrintNightmare, a set of two critical remote code-execution (RCE) vulnerabilities in the Windows Print Spooler service that hackers can use to take over an infected system.

Multiple critical vulnerabilities in Philips Clinical Collaboration Platform Portal could enable an attacker to take control over an affected system, according to a recent Department of Homeland Security Cybersecurity and Infrastructure Agency alert.

The latest zero-day entails an attack chain that allows an unauthenticated intruder to execute code as root and install a permanent backdoor on the vendor’s network-attached storage (NAS) devices.