Nythrix
Nythrix
Detect. Monitor. Defend.
298+ Endpoints80+ Tables32 PagesMulti-TenantRow-Level SecurityAI-Powered

Built for Security Operations at Scale

A multi-tenant platform engineered for reliability, speed, and auditability. Every component is designed to operate at enterprise scale without sacrificing security or transparency.

Architecture

Three layers working together: a centralized control plane, distributed edge collectors, and a secure mesh that connects them.

Control Plane

FastAPI backend with 298+ API endpoints across 32 routers. PostgreSQL with 80+ tables and 30 schema migrations. Multi-tenant by design with row-level security on every query. Serves the dashboard, orchestrates collectors, and runs the detection pipeline.

FastAPI298+ endpoints80+ tables30 migrations

Collectors

Lightweight edge nodes deployed inside customer networks. Each collector runs honeypot services (ADE) and passive network sensors (NetWatch). Outbound-only communication to the control plane. Operates independently during network partitions with local event buffering.

Edge nodesHoneypotsNetWatch sensorsOutbound-only

Mesh Connectivity

Tailscale-based secure mesh connects collectors to the control plane without exposing inbound ports. Encrypted WireGuard tunnels with automatic key rotation. NAT traversal handles complex network topologies without firewall changes.

TailscaleWireGuardNAT traversalAuto key rotation

Detection Pipeline

An 8-stage worker pipeline that processes every detection event from raw signal to correlated, scored incident. Each stage runs on its own interval for optimal throughput.

StageIntervalFunction
Mapper2sMITRE ATT&CK technique classification for every detection event
Incidentizer5sDeduplication and correlation of events into unified incidents
Consequence30sRisk scoring based on asset value, technique severity, and blast radius
Profiler30sAdversary session building by source IP with TTP tracking and dwell analysis
Scoring5minCoverage scoring across MITRE matrix and detection confidence calibration
Deployer10sOrchestration of decoy deployment, updates, and health checks across collectors
Inventory60sAsset inventory synchronization and network topology mapping
Threat Intel5minIOC correlation against 7+ enrichment sources with result caching

AI-Powered Analysis

Claude API integration augments analyst workflows with contextual intelligence generated from platform data.

Threat Briefings

Automated executive summaries of active incidents with risk context, affected assets, and recommended actions. Generated on demand or on a schedule for leadership reporting.

Executive summariesRisk contextOn-demand

Incident Analysis

Deep-dive analysis of individual incidents including TTP mapping, adversary intent assessment, and historical correlation with similar activity patterns across the tenant.

TTP mappingIntent assessmentPattern correlation

Playbook Suggestions

Context-aware response recommendations based on the specific techniques observed, asset criticality, and organizational containment policies. Actionable, not generic.

Context-awarePolicy-alignedActionable steps

Hunt Leads

AI-generated hunt hypotheses derived from observed adversary behavior, gaps in detection coverage, and threat intelligence correlation. Includes suggested queries and IOCs to investigate.

Hunt hypothesesCoverage gapsSuggested queries

Security & Compliance

ControlImplementation
SOC 2 Auto-EvidenceAutomated evidence collection across 7 trust service criteria with continuous control monitoring
Row-Level SecurityRLS policies enforced on 27+ tables ensuring strict tenant data isolation at the database layer
Audit LoggingEvery API call, configuration change, and user action recorded with timestamp, actor, and context
SSRF ProtectionWebhook and integration URLs validated against internal network ranges to prevent server-side request forgery
Encrypted BackupsAutomated database backups with AES-256 encryption and verified restore testing
Infrastructure HardeningUFW firewall rules, SSH key-only authentication, and minimal attack surface on all control plane hosts

Deployment Models

Deploy where your environment requires — cloud-hosted with on-prem collectors, or fully air-gapped with no external dependencies.

Cloud

Control plane hosted and managed by Nythrix. Lightweight collectors deploy on-premises inside your network. Outbound-only communication from collectors to the control plane — no inbound ports, no VPN tunnels, no firewall changes required.

Hosted control planeOn-prem collectorsOutbound-onlyZero inbound exposure

Air-Gapped

Full platform deployed on-premises with no external dependencies. Docker Compose stack includes all services on a single server. Threat intelligence enrichment and AI analysis degrade gracefully when disconnected. All core detection and response capabilities remain fully operational.

Fully on-premDocker ComposeNo external dependenciesGraceful degradation

Platform Stats

ComponentCount
API Routers32
API Endpoints298+
Database Tables80+
Schema Migrations30
Dashboard Pages32
Docker Containers16+

See the Platform in Action

Walk through the architecture, detection pipeline, and deployment options with our engineering team.