Your entire IT stack,one platform, zero duct tape.

Live platform preview
LIVE

Total Assets

1,247

Across all sites

Compliance

94%

NIS2 / BIO / ISO

Open Alerts

3

Needs attention

CVEs Detected

12

Last 30 days

Network Topology
1,247 nodes
Scanning
Servers 47
Workstations 892
Network 38
Alerts 3

Compliance

NIS294%
ISO 2700187%
BIO BBN291%

Recent Alerts

CRITCVE-2024-3094 on srv-db-012m
HIGHUnusual outbound traffic spike14m
MEDEOL firmware on sw-core-021h
LOWNew device joined VLAN 1203h

Trusted by IT teams in regulated industries across Europe

Municipalities
Water Boards
MSPs & IT Service Providers
Healthcare
Financial Services
Defence & Government
“Gatekeeper replaced four separate tools. Our NIS2 compliance coverage went from 41 % to 94 % in six weeks — and we finally have a single view across all 23 sites.”
IT

Head of IT Security

European Municipality · 600+ employees

NIS2 Compliant
“As an MSP managing 38 clients we needed one platform with proper tenant isolation, not tools hacked together per client. Gatekeeper also generates compliance reports our clients can hand straight to auditors.”
MS

CTO

European MSP · 38 Managed Clients

Multi-tenant
“Our CISO required NIS2 evidence packages for three regulators simultaneously. Gatekeeper generated audit-ready PDFs for each framework in under a minute. That alone justified the entire platform cost.”
SL

IT Security Lead

Financial Services · 2,400 employees

ISO 27001
200+OrganisationsLast verified: April 2026
500k+Assets managedLast verified: April 2026
60+Compliance frameworksLast verified: April 2026
5Global regionsLast verified: April 2026

Built for every IT team

One platform, every role

Everything in one platform

What customers say

Trusted by IT and security teams across Europe

“We replaced four separate tools — network scanner, CMDB, ITSM and compliance tracker — with Gatekeeper. The NIS2 audit preparation that used to take weeks now takes an afternoon.”

Thomas V.

IT Security Manager

Dutch municipality, ~18 000 residents

“Multi-tenant isolation is rock solid. Each client environment is completely separate and we can generate white-label compliance reports in minutes. It’s become the backbone of our managed security offering.”

Anke B.

Head of Operations

Managed Service Provider, 35+ clients

“Air-gapped deployment works exactly as advertised. Zero outbound connections, full feature parity with the cloud edition, and the agent-based discovery covers our OT network segments without any issues.”

Lars M.

CISO

Critical infrastructure operator

Deployment options

Deploy on your terms

Every organisation has different infrastructure constraints. Gatekeeper runs wherever you need it, with the same core feature set across all deployment models — infrastructure topology and operational responsibilities vary by model.

Cloud

Multi-tenant SaaS hosted in your chosen region. Zero infrastructure overhead. Regional isolation guaranteed.

Best for: organisations wanting immediate value with no on-prem setup

On-Premise

Full data sovereignty. Runs inside your own datacenter or private cloud. No data ever leaves your perimeter.

Best for: regulated industries, government, and strict data residency requirements

Hybrid

Cloud-managed control plane with on-prem Gatekeeper agents. Scan results processed locally; management console in the cloud.

Best for: distributed organisations with multiple sites

Air-Gapped

Fully offline deployment with zero outbound connections. No telemetry, no external calls, fully self-contained.

Best for: classified, critical, or defence infrastructure

Data residency

Your data, your region

Five fully independent regions — same feature set, TLS configuration, and SLA. Tenant data never crosses region boundaries. Infrastructure is fully isolated per region. Regional compliance certifications reflect local regulatory frameworks and may differ.

Europe

Frankfurt · Amsterdam · London · Paris · Stockholm · Dublin

Live
GDPR / AVGNIS2BIOISO 27001

Asia-Pacific

Singapore · Tokyo · Sydney · Mumbai · Auckland

Live
PDPA (SG)APPI (JP)MAS TRMISO 27001

Africa

Johannesburg · Nairobi · Cape Town

Live
POPIAKenya DPAISO 27001GDPR SCCs

Middle East

Dubai · Abu Dhabi

Live
PDPL (UAE)NESAISO 27001GDPR SCCs

Americas

Virginia · California · Miami · Dallas · Toronto · Montreal · Vancouver · São Paulo · Santiago · Buenos Aires · Mexico City · Nuuk

Live
CCPAHIPAA-alignedLGPD (BR)PIPEDA (CA)NIST CSFSOC 2

What data we process as a processor

  • Network telemetry: IP addresses, MAC addresses, hostnames, open ports, SNMP data
  • Asset inventory: device type, OS version, firmware, installed software
  • Security events: SIEM alerts, CVE matches, scan results, traffic logs
  • User account data: name, email, hashed credentials, MFA settings
  • Operational data: tickets, changes, runbooks, on-call schedules

What stays entirely on-premise (self-hosted)

  • All scan results and raw network telemetry — never transmitted externally
  • Credentials vault contents — encrypted locally, never sent to cloud
  • Device configurations and SNMP community strings
  • FortiGate, switch, and AD connection credentials
  • Agent scripts and custom automation playbook logic

Security controls

Built secure by default

Security is not a layer on top — it is the foundation. Every control below applies to all deployment models unless explicitly noted.

Encryption

AES-256 at rest, TLS 1.3 in transit. Credential vault uses envelope encryption with per-tenant keys.

Identity & Access

TOTP, WebAuthn passkeys, SAML 2.0 and OIDC support. MFA is enforced for all administrator roles.

Audit Logging

Tamper-evident audit trail with 12-month retention. Real-time alerting on privileged actions. Exportable as CSV or JSON.

Backups

Daily encrypted snapshots with 30-day retention. Quarterly restore tests. Cross-region replication for cloud tenants.

Patch Policy

Critical CVEs patched within 72 hours of disclosure. Minor vulnerabilities within 14 days. Public changelog maintained.

Row-Level Security

Tenant data isolated at the database level using Postgres RLS policies. No cross-tenant access is architecturally possible.

TLS & HTTP security hardening

Configured to achieve A+ on every security scanner

All HTTPS connections are governed by a strict TLS policy. HTTP security headers are deployed at the CDN edge and validated continuously against securityheaders.com and SSL Labs. Grades shown apply to the cloud-hosted tenant (bbravegatekeeper.cloud). On-premise deployments use the same configuration; TLS termination on customer-operated hosts is the customer’s responsibility.

A+

SSL Labs

TLS configuration

A+

Security Headers

HTTP response headers

Eligible

HSTS Preload

Preload list status

100%

Forward Secrecy

All cipher suites

Protocol support

TLS version enforcement — all clients

TLS 1.3enforcedPrimary — mandatory for all connections
TLS 1.2allowedFallback — restricted cipher suite only
TLS 1.1disabledDeprecated — explicitly disabled
TLS 1.0disabledDeprecated — explicitly disabled
SSLv3disabledObsolete — explicitly disabled (POODLE)

Accepted cipher suites

ECDHE only — forward secrecy guaranteed

TLS_AES_256_GCM_SHA384TLS 1.3A+
TLS_CHACHA20_POLY1305_SHA256TLS 1.3A+
TLS_AES_128_GCM_SHA256TLS 1.3A
ECDHE-RSA-AES256-GCM-SHA384TLS 1.2A
ECDHE-RSA-CHACHA20-POLY1305TLS 1.2A

RC4, DES, 3DES, EXPORT, NULL, anonymous DH, and CBC-mode suites are explicitly disabled.

HTTP security headers

Deployed at CDN edge — applied to every response

All 8 headers active

Strict-Transport-Security

max-age=63072000; includeSubDomains; preload

HSTS with 2-year max-age, all subdomains, preload list eligible

Content-Security-Policy

default-src 'self'; script-src 'self'; …

Strict CSP — no unsafe-eval, no inline scripts, connect-src scoped to Supabase endpoints

X-Content-Type-Options

nosniff

Prevents MIME-type sniffing attacks in legacy browsers

X-Frame-Options

DENY

Blocks all iframe embedding; reinforced by CSP frame-ancestors: none

Referrer-Policy

strict-origin-when-cross-origin

Sends only origin on cross-origin requests; full URL only on same-origin

Permissions-Policy

camera=(), microphone=(), geolocation=(), payment=(), usb=()

Disables all sensitive browser APIs not required by the platform

Cross-Origin-Opener-Policy

same-origin

Isolates browsing context, enables high-resolution timers, mitigates Spectre

X-Permitted-Cross-Domain-Policies

none

Blocks Adobe Flash / Acrobat cross-domain policy inheritance

Certificate Transparency

All TLS certificates are logged to public CT logs (RFC 6962). SCT delivery via TLS extension and OCSP stapling.

DNS CAA Records

CAA DNS records restrict which Certificate Authorities may issue certificates for bbravegatekeeper.cloud and all subdomains.

OCSP Stapling

Server-side OCSP stapling enabled, eliminating client-side revocation check latency and privacy leakage.

DANE / TLSA

TLSA records published for primary domain. DANE validation available for clients that support it.

Forward Secrecy

ECDHE key exchange on all connections. Compromise of the server private key cannot decrypt historical session recordings.

Certificate Monitoring

Automated alerting on certificate expiry and unexpected CT log entries via continuous monitoring infrastructure.

Availability & incidents

99.9% uptime. Structured incident response.

We operate a publicly visible status page and a defined priority matrix for every incident type, with committed response and resolution targets.

99.9%

Monthly uptime SLA

5 regions

Europe, Americas, Asia-Pacific, Middle East, Africa

72 hour

Critical CVE patch SLA

Live platform status:Datacenter Monitoring
Priority
Scenario
Response target
Resolution target
Follow-up
P1Critical
Full service outage
1 hour
4 hours
Post-mortem within 5 days
P2Degraded
Partial service impact
4 hours
24 hours
Incident report shared
P3Minor
Cosmetic or non-critical
24 hours
Next release window
Changelog entry
RTO: 4 hours (cloud-hosted)RPO: 1 hour (cloud-hosted)Maintenance windows: communicated 48h in advance via status page

Compliance mapping

Mapped to the frameworks that matter

The platform generates native compliance evidence packages for each mapped framework. No third-party GRC tool required to produce audit-ready artefacts.

Compliance controls are mapped to individual platform features. Each framework view in the platform shows control status, evidence links, and gaps — updated in real time as your infrastructure changes.

Self-service resources

Everything you need, without going through sales

Download the security overview, explore the architecture, check live platform health, and review the public pentest summary — all publicly available, no sign-in required.

Legal & compliance documentation

Documents available on request

All contractual and compliance documents are available for qualified prospects and existing customers. Response within one business day.

Data Processing Agreement

Standard GDPR Art. 28 DPA, available for review and countersigning. Covers all processing activities under the platform.

Subprocessor List

Full list of third-party processors with name, location, processing category, and applicable SCCs or adequacy basis.

Service Level Agreement

Full SLA terms including uptime measurement method, credit schedule, exclusions, and support tier definitions.

Pentest & Hardening Report

Last assessed Q1 2026. Scope: web application, REST API, and network layer. Conducted by independent third-party auditor. Full report shared under NDA.

Security

Responsible Disclosure Policy

We welcome responsible disclosure from security researchers. If you discover a vulnerability in the Gatekeeper platform, please report it to our security team. We commit to acknowledging your report within 24 hours, providing an initial assessment within 72 hours, keeping you informed of our progress, and — where applicable — publicly crediting your contribution.

We will not pursue legal action against researchers who act in good faith, do not access customer data beyond what is necessary to demonstrate the vulnerability, and provide us with reasonable time to remediate before any public disclosure.

PGP key available on request via the security address above.

Get in touch

Get in touch

Talk to our team about your requirements

  • Response within one business day
  • No commitment required
  • Custom demo available

We respond within one business day. No spam, guaranteed.

No sign-up required

Explore the full platform — right now

Walk through every module with live data. No sales call, no commitment.

Cookie Preferences

We use cookies to ensure the platform works correctly, remember your settings, and improve your experience.

© B-Brave Gatekeeper 2026