Skip to main content2026 Changelog
April 2026
AI Usage Policy Engine
Define policies for every AI tool in your organization: Approved, Monitor, or Restricted. Ayliea automatically checks discovery scan results against your policies and flags violations with severity scoring. Export blocklists in CSV, JSON, or text format for direct import into Zscaler, Netskope, or Palo Alto firewalls.
Policy Violation Trends
Track policy violations over time with a stacked area chart showing severity breakdown (critical, high, medium, low). View resolution rates, current open violations, and select between 7-day, 30-day, and 90-day time ranges.
Public REST API
Enterprise-tier organizations can now access assessment scores, recommendations, and discovery results programmatically via the v1 REST API. API keys are scoped, hashed at rest, and rate-limited. Full documentation available at docs.ayliea.com/api-reference.
Third-Party Integrations
Connect Ayliea to your existing workflow tools. Push recommendations directly into Jira, Linear, GitHub Issues, or Azure DevOps as actionable tickets. Connect Slack for real-time notifications on assessment completions and discovery alerts.
Webhook Notifications
Subscribe to platform events (assessment completed, recommendation updated, discovery completed, policy violation detected) and receive HMAC-signed webhook deliveries to your endpoints. Track delivery status and retry failed deliveries.
Scheduled Discovery Scans
Organizations with continuous monitoring enabled now receive automated daily discovery scans. New AI tools and risk escalations trigger alerts automatically without manual intervention.
Scheduled Report Delivery
Configure weekly or monthly security digest emails delivered to your inbox. Reports include framework scores, recommendation progress, stale assessment warnings, and overdue items.
Industry Benchmarking
Compare your security scores against anonymized industry benchmarks. See where you stand relative to the 25th, 50th, and 75th percentiles for your industry and framework.
AI-Powered Recommendations
Recommendations are now personalized by Claude AI based on your organization’s size, industry, device environment, and platform stack. The AI tailors remediation steps to reference the specific tools, admin consoles, and settings paths relevant to your setup.
Account Security Improvements
- Password changes now require current password re-authentication
- Concurrent session limiting: one active session per user, with forced sign-out on other devices
- Account deletion uses a 30-day soft-delete recovery window with email notification
- GDPR data export: download all your personal data in JSON format from Security settings
Billing Simplification
Removed per-seat pricing. All tiers now include generous fixed seat limits: Free (1), Pro (10), Business (25), Enterprise (unlimited). No more seat selectors, add-ons, or proration complexity.
Enterprise Provisioning
Administrators can now upgrade organizations to any tier with one click from the admin panel. Full audit trail tracks all provisioning actions.
March 2026
Network Discovery
Upload firewall or proxy logs to automatically discover AI tools active on your network. Ayliea detects shadow AI, scores risk per platform, and maps data flows — giving you visibility into AI usage you may not have sanctioned or even known about.
A consolidated view of all discovered AI platforms across your organization. Filter by risk level, approval status, or data access scope, and export your full inventory as a CSV for auditors or procurement reviews.
Continuous Monitoring
Stream firewall logs via syslog for always-on AI tool detection. Automated alerts notify your team when new shadow AI appears on the network, so you can respond before sensitive data leaves your environment.
Collector Agent
A lightweight agent for network-level AI tool detection. Privacy-first — it analyzes traffic metadata only. No content decryption, no payload inspection. Deployable in minutes alongside your existing network infrastructure.
Trust Gap and Verified Score
See the gap between your self-reported assessment score and what network discovery actually observes. The Trust Gap highlights where your stated controls do not match your operational reality, surfacing the highest-priority items for immediate attention.
Executive Dashboard
A unified view combining your assessment posture with your network discovery findings. The Trust Gap anchors the dashboard, giving security leaders a single screen that shows both what you report and what the network sees.
PDF Posture Report
Generate a 7-page branded report combining assessment results and discovery data. Includes an executive summary, category score breakdown, AI tool inventory, and a prioritized remediation roadmap. Formatted for auditors, executives, and board presentations.
Email-Based Invitations
Invite team members to your organization by email with role assignment at the time of invitation. Invitees receive a secure link and are automatically added to your organization after completing sign-up.
Auditor Report Sharing
Share security posture reports with external auditors via secure, time-limited links. Links require email verification and support configurable scope so you control exactly what the recipient can see.
Simplified Role System
Streamlined organization roles from five to three: Owner, Admin, and Member. External auditors now access reports through secure share links rather than organization seats, making it easier to manage your team while keeping auditor access appropriately scoped.