Skip to main content2026 Changelog
March 2026
Network Discovery
Upload firewall or proxy logs to automatically discover AI tools active on your network. Ayliea detects shadow AI, scores risk per platform, and maps data flows — giving you visibility into AI usage you may not have sanctioned or even known about.
A consolidated view of all discovered AI platforms across your organization. Filter by risk level, approval status, or data access scope, and export your full inventory as a CSV for auditors or procurement reviews.
Continuous Monitoring
Stream firewall logs via syslog for always-on AI tool detection. Automated alerts notify your team when new shadow AI appears on the network, so you can respond before sensitive data leaves your environment.
Collector Agent
A lightweight agent for network-level AI tool detection. Privacy-first — it analyzes traffic metadata only. No content decryption, no payload inspection. Deployable in minutes alongside your existing network infrastructure.
Trust Gap and Verified Score
See the gap between your self-reported assessment score and what network discovery actually observes. The Trust Gap highlights where your stated controls do not match your operational reality, surfacing the highest-priority items for immediate attention.
Executive Dashboard
A unified view combining your assessment posture with your network discovery findings. The Trust Gap anchors the dashboard, giving security leaders a single screen that shows both what you report and what the network sees.
PDF Posture Report
Generate a 7-page branded report combining assessment results and discovery data. Includes an executive summary, category score breakdown, AI tool inventory, and a prioritized remediation roadmap. Formatted for auditors, executives, and board presentations.
Email-Based Invitations
Invite team members to your organization by email with role assignment at the time of invitation. Invitees receive a secure link and are automatically added to your organization after completing sign-up.
Auditor Report Sharing
Share security posture reports with external auditors via secure, time-limited links. Links require email verification and support configurable scope so you control exactly what the recipient can see.
Simplified Role System
Streamlined organization roles from five to three: Owner, Admin, and Member. External auditors now access reports through secure share links rather than organization seats, making it easier to manage your team while keeping auditor access appropriately scoped.