Skip to main content

2026 Changelog

March 2026

Network Discovery

Upload firewall or proxy logs to automatically discover AI tools active on your network. Ayliea detects shadow AI, scores risk per platform, and maps data flows — giving you visibility into AI usage you may not have sanctioned or even known about.

AI Tool Inventory

A consolidated view of all discovered AI platforms across your organization. Filter by risk level, approval status, or data access scope, and export your full inventory as a CSV for auditors or procurement reviews.

Continuous Monitoring

Stream firewall logs via syslog for always-on AI tool detection. Automated alerts notify your team when new shadow AI appears on the network, so you can respond before sensitive data leaves your environment.

Collector Agent

A lightweight agent for network-level AI tool detection. Privacy-first — it analyzes traffic metadata only. No content decryption, no payload inspection. Deployable in minutes alongside your existing network infrastructure.

Trust Gap and Verified Score

See the gap between your self-reported assessment score and what network discovery actually observes. The Trust Gap highlights where your stated controls do not match your operational reality, surfacing the highest-priority items for immediate attention.

Executive Dashboard

A unified view combining your assessment posture with your network discovery findings. The Trust Gap anchors the dashboard, giving security leaders a single screen that shows both what you report and what the network sees.

PDF Posture Report

Generate a 7-page branded report combining assessment results and discovery data. Includes an executive summary, category score breakdown, AI tool inventory, and a prioritized remediation roadmap. Formatted for auditors, executives, and board presentations.

Email-Based Invitations

Invite team members to your organization by email with role assignment at the time of invitation. Invitees receive a secure link and are automatically added to your organization after completing sign-up.

Auditor Report Sharing

Share security posture reports with external auditors via secure, time-limited links. Links require email verification and support configurable scope so you control exactly what the recipient can see.

Simplified Role System

Streamlined organization roles from five to three: Owner, Admin, and Member. External auditors now access reports through secure share links rather than organization seats, making it easier to manage your team while keeping auditor access appropriately scoped.