Enterprise

Designed for organizations with strict data residency, sovereignty, or regulatory requirements that prohibit code, findings, or inference from leaving their environment.

Deploys on
Google Cloud Amazon Web Services Microsoft Azure

Air-gapped deployments
also available.

Keygraph Enterprise deploys entirely within your cloud infrastructure. Source code, scan results, and AI inference remain within your security perimeter, with no Keygraph-managed control plane and no externally operated data plane.

Architecture

Every component runs inside your cloud account.

Your cloud account
01
Shannon Runner

Deployed in your cloud. Scans repos and infrastructure. Calls the LLM via your credentials.

02
Orchestration & UI

Scheduling, workflow, and operator console all run on your compute.

03
Findings Store

Your Postgres. Your encryption. Your retention policy.

04
Identity

Integrates with your IdP via SAML 2.0 or OIDC: Okta, Microsoft Entra ID, Ping, Auth0, OneLogin, or any standards-compliant provider.

Air-gapped deployments

Run Keygraph in a fully network-isolated environment. Designed for FedRAMP, ITAR, defense, classified networks, and financial-services environments where every byte of egress requires legal sign-off.

Mirrored registry

Container images mirrored to your private registry, Docker Hub, ECR, GCR, Artifactory, or Harbor.

BYO AI inference

Models served from your own Anthropic Bedrock, Vertex AI, Azure OpenAI, or self-hosted endpoint.

Offline license

No phone-home, no expiry-day surprises. Validation runs entirely inside your network.

Signed updates

Update bundles delivered as signed artifacts, applied on your schedule via your change-management process.

Integrations

Plugs into the tools your security and engineering teams already run. Native connectors for source control, identity, container registries, ticketing, and AI inference.

SSO via SAML 2.0 or OIDC. Native single sign-on with any standards-compliant identity provider, including Okta, Microsoft Entra ID, Ping, Auth0, OneLogin, or your own SAML / OIDC endpoint. SCIM provisioning, group-to-role mapping, and just-in-time user creation included. Custom webhook outputs and any S3-compatible registry also available on Enterprise.

Everything in Enterprise

The complete platform plus the service wrap, in one license. End-to-end coverage, a unified findings layer, and the support to make it land.

Continuous AppSec Coverage
Agentic SAST & Whitebox Pentesting

Finds exploitable vulnerabilities, not just pattern matches.

Agentic Blackbox Pentesting (DAST)

Simulates real attacker behavior against running applications.

Business Logic Security Testing

Identifies workflow and authorization flaws traditional tools miss.

IaC Scanning

Terraform, CloudFormation, Kubernetes manifests.

SCA · Supply chain

Dependency and supply-chain risk.

Container Scanning

Image and runtime configuration.

Secrets Scanning

Committed credentials, tokens, keys.

Unified Findings & Workflow
Single findings layer

Unified across all scanners. One queue, one triage model.

Severity calibration

Tunable to your risk model and asset criticality.

Ticketing & chat integration

Jira, GitHub, GitLab, Azure DevOps, Slack.

RBAC with role hierarchy

Granular permissions per project, scanner, and finding action. Inherit roles from your IdP groups.

Dedicated audit log tab

Every scan, finding mutation, status change, suppression, role grant, and integration call recorded with actor, timestamp, source IP, and diff. Searchable, filterable, and exportable as JSON or CSV for SIEM ingestion or auditor evidence.

SSO via SAML 2.0 or OIDC

Provisioning, de-provisioning, and group mapping inherit from identity.

License & Service
Unlimited scans

All scanners, all findings, no per-scan quotas.

BYOK across the stack

Bring your own keys for infrastructure and AI providers.

Customer engineer

A single point of contact, embedded with your team.

Quarterly business reviews

Usage, findings, and roadmap alignment, every quarter.

24x7 support

Custom SLAs written directly into your contract.

White-glove onboarding

Typically 4 to 8 weeks, end to end.

Full audit log retention

JSON/CSV export for SIEM ingestion and compliance evidence.

No add-ons. All scanners, integrations, and service items are included in the base license, you do not buy modules.

Annual contracts. Net 30 standard. Procurement-friendly paper available: MSA, DPA, and security addendum templates ready for redline.

Ready to talk through an Enterprise deployment?

Schedule time with a solutions engineer. We will walk through your current AppSec architecture, identify coverage gaps, and design Keygraph's deployment into your environment.