SoulAuth is Generally Available

Tiresias sees threats.
Never data.

Zero-knowledge agent security for the enterprise. Identity, authorization, and runtime protection - without ever accessing your data.

Tiresias - The blind prophet of AI security

AI agents are the new attack surface

Every autonomous agent is an identity without governance. They call APIs, access data stores, and communicate with other agents - all with implicit trust and zero audit trails. Traditional IAM was never built for this.

0%

of enterprises deploy AI agents in production

0

implicit permissions per agent on average

0

visibility into agent-to-agent traffic

Statistics are illustrative, based on industry trends and research estimates.

The Soul* Platform

End-to-end agent security. From identity to runtime to the API edge.

GA

SoulAuth

Agent Identity & Zero-Trust Auth

Cryptographic agent identity, just-in-time authorization, and policy-as-code. Every agent request is verified. No standing permissions. No implicit trust.

Explore SoulAuth
Coming Soon

SoulWatch

AI Runtime Security Monitoring

Real-time behavioral analytics for your agent fleet. Sigma-compatible detection rules, anomaly scoring, and automated alerting - without reading agent payloads.

Join Waitlist
Coming Soon

SoulGate

API Security Gateway

Secure the perimeter between your agents and the outside world. Rate limiting, schema validation, and threat detection at the API layer.

Join Waitlist

How it works

Three layers of defense. One unified platform.

STEP 01

Identity

Every agent gets a cryptographic soulkey identity. Hardware-bound, non-extractable, and verifiable across your entire fleet.

STEP 02

Authorize

Zero-trust policy evaluation on every request. Just-in-time permissions, no standing access. Policies defined as code, synced from git.

STEP 03

Protect

Runtime monitoring, behavioral anomaly detection, and automated quarantine response. Seven response actions, from alert to full isolation.

We can't see your data. That's the point.

Tiresias is built on a zero-knowledge architecture. We verify identities, evaluate policies, and detect anomalies - all without accessing, storing, or transmitting your agent payloads. Metadata flows through. Data never does.

  • Agent payloads never leave your infrastructure
  • Policy evaluation uses metadata, not content
  • Cryptographic proofs replace data inspection
  • Designed with GDPR Article 25 principles in mind

ZERO

KNOWLEDGE

METADATA
VERDICT
DATA

Built for the enterprise

Production-grade security infrastructure, not another proof-of-concept.

Policy-as-Code

Define authorization policies in YAML, version them in git, and deploy through CI/CD. No console clicks, no drift.

SIEM Integration

Native connectors for Splunk, Elastic, and Microsoft Sentinel. Stream security events in real-time to your existing SOC workflow.

Sigma Detection Rules

SOC-compatible Sigma rules for agent behavior detection. Use your existing detection engineering pipeline.

Multi-Tenancy

Tenant isolation with row-level security. Each tenant gets its own policy namespace, audit trail, and key hierarchy.

Automated Quarantine

Seven graduated response actions - from soft alerts to full agent isolation. Automated, policy-driven, and audit-logged.

Compliance Ready

Architecture designed with data protection by design principles. Exportable audit logs and policy versioning support your compliance journey.

Ready to secure your AI agents?

Join the waitlist. Be among the first to secure your AI agents.

Free tier includes 1,000 agent authentications/month. Enterprise plans available.