What Is Coming Next
See what we are working on, what is planned, and what we have recently shipped. Our roadmap is driven by customer feedback and security research.
In Progress
3 itemsRemote URL analysis
Analyze files directly from a URL without downloading them first. Paste a link and the platform fetches, analyzes, and reports on the file automatically.
Exploited vulnerability intelligence
Automatically flag files that contain or depend on packages with actively exploited vulnerabilities. Proactive alerting when new critical advisories drop, so you know before it becomes an incident.
ServiceNow integration
Bi-directional connector for ServiceNow ITSM and SecOps. Automatically create incidents from high-risk verdicts, attach analysis reports to change requests, and sync approval workflows.
Planned
12 itemsJira and project management integration
Create Jira issues from analysis findings, link verdicts to tickets, and track remediation status. Supports Jira Cloud and Data Center with customizable issue templates.
Enterprise risk register
Centralized risk register with quantified risk scores per vendor, category, and business unit. Export risk matrices for GRC platforms. Track risk trends over time with historical baselines.
Threat intelligence platform connectors
Two-way integration with threat intelligence platforms. Ingest IOC feeds to enrich analysis, and export file indicators back to your TIP for organization-wide blocking.
PDF and branded report exports
Generate polished, branded PDF reports for executive summaries, procurement decisions, and audit evidence. Customizable templates with your organization logo and color scheme.
Microsoft Sentinel and Defender integration
Forward analysis events and IOCs to Microsoft Sentinel workspaces. Correlate file verdicts with Defender alerts for unified security operations.
Slack and Teams notifications
Real-time notifications to Slack channels or Microsoft Teams when high-risk files are detected, quarantines are triggered, or approval requests are submitted.
Custom dashboards and widgets
Build custom dashboard views with drag-and-drop widgets. Pin the metrics that matter to your team: verdict trends, top risky vendors, coverage gaps, or compliance posture.
Automated remediation playbooks
Define automated response actions triggered by analysis verdicts. Quarantine, notify, create a ticket, or block at the firewall based on configurable rules and severity thresholds.
Package registry scanning
Connect your private package registries (npm, PyPI, NuGet, Maven) for continuous monitoring. Get alerted when a dependency in your registry is flagged by new intelligence.
Email gateway integration
Analyze email attachments inline before they reach user inboxes. Integrates with email security gateways to quarantine suspicious attachments and replace them with analysis report links.
Multi-tenant MSP console
Dedicated MSP management console with cross-tenant visibility, aggregated risk dashboards, bulk policy deployment, and per-client billing breakdowns.
Mobile app for on-the-go triage
iOS and Android app for reviewing analysis results, approving or denying requests, and monitoring agent fleet health from anywhere.
Recently Shipped
15 itemsIn-portal support system
FAQ knowledge base and contact form for submitting support requests directly from the portal, with ticket tracking and email notifications.
Audit log quality improvements
Human-readable audit events with filename enrichment, severity classification, noise reduction for file-view events, and smart detail formatting.
SBOM generation and vulnerability cross-referencing
Automatic CycloneDX SBOM generation with dependency extraction and cross-referencing against NVD and OSV vulnerability databases.
Compliance framework mapping
Analysis signals automatically mapped to NIST 800-53, SOC 2, GDPR, HIPAA, CMMC, PCI-DSS, and ISO 27001 controls.
Vendor risk assessment with transparent scoring
Multi-source vendor risk grades (A-F) with component breakdown: identity verification, security posture, code signing, license compliance, community health, and vendor maturity.
Corporate and open-source intelligence enrichment
Automatic enrichment with corporate registry data, open-source repository health metrics, and verified license information from public databases.
Custom detection rule uploads
Tenant-specific detection patterns for tailored threat identification.
Verdict feedback and false positive reporting
Report false positives directly from analysis reports with one-click rule creation.
SIEM connectors
Forward analysis events to your security platform for centralized monitoring.
Approval workflow
Automatic approval requests for flagged files with admin review dashboard.
Sanctioned apps and license intelligence
Define approved software lists and track compliance across your fleet.
Enterprise analysis report redesign
Tabbed layout with trust scoring breakdown, visual gauges, security signals, and transparent verdict reasoning.
Endpoint agent with fleet management
Device enrollment, background monitoring, quarantine enforcement, remote commands, config templates, and fleet health dashboard for Windows, Linux, and macOS.
Team management, audit logging, and approval rules
Invite members, role-based access, full audit trail, and criteria-based approval matching.
Dashboard with risk register
Fleet status, trend charts, verdict distribution, activity feed, severity grid, and riskiest files and vendors overview.
Have a feature request?
We build based on what our users need. Let us know what would make Vile Analyziz more valuable for your team.