Platform Features

Built for security teams who understand that compliance is a means to an end — not the end itself. Every feature in TATER is designed to improve your actual security posture, not just your audit score.

Built for the real work

Built for the analyst who works nights before an audit

Compliance audit prep shouldn't require an all-nighter. TATER's continuous monitoring means evidence is always collected, every control is always assessed, and your posture is always audit-ready — not just the week before.

Contact Sales →
Compliance

Multi-framework compliance automation

Map, assess, and report across all major compliance frameworks from a single platform.

Multi-Framework Compliance

Assess 5,000+ controls across 19 compliance frameworks from a single unified interface. NIST 800-53, ISO 27001, SOC 2, PCI-DSS, HIPAA, CIS Benchmarks, CISA SCuBA, DISA STIGs, and more — with cross-framework overlap detection.

Learn More →

Standards Compliance

Map controls to NIST 800-53, ISO 27001, SOC 2, PCI-DSS, and HIPAA with granular control mapping and per-org compliance narratives. Track posture across all frameworks simultaneously.

Learn More →

AI-Powered Compliance Narratives

Generate audit-ready responses for 300+ standard controls across NIST, ISO, SOC 2, PCI-DSS, and HIPAA. Context-aware prompts use your actual compliance posture to produce organization-specific narratives.

Learn More →

Policy Template Library

Generate audit-ready security policies from 11 professional templates with org branding and PDF export. Information Security, Incident Response, Access Control, and more — ready in minutes.

Learn More →

Dashboard Trend Charts

Track historical compliance posture over time with interactive trend charts. Visualize improvement trajectories, identify regressions, and demonstrate progress to auditors and leadership.

Risk Dashboards & Reports

Executive-ready dashboards with drill-down analytics. Generate compliance reports by framework, export to CSV/Excel, and track KPIs across your entire environment.

Multi-Framework Compliance

Most organizations face overlapping compliance requirements from multiple regulatory bodies. TATER eliminates the need to manage each framework independently by providing a single unified view of 5,000+ controls spanning CIS Benchmarks, CISA SCuBA, DISA STIGs, NIST 800-53, ISO 27001, SOC 2, PCI-DSS, and HIPAA. When one control satisfies requirements across multiple frameworks, TATER maps those relationships automatically so you only need to collect evidence once.

The platform continuously evaluates your environment against all active frameworks simultaneously. Real-time scoring shows exactly where you stand with each authority, and cross-framework gap analysis reveals shared weaknesses that a single-framework tool would miss entirely.

Key Capabilities

  • 5,000+ controls across 19 industry-standard compliance frameworks
  • Cross-framework overlap detection reduces duplicate evidence collection
  • Unified control view with domain tagging and category filtering
  • Custom framework builder for organization-specific requirements
  • Threshold-based evaluation engine with boolean, regex, and composite rules
  • Two-tier visibility model separates default baselines from org-specific overlays
Built for: Compliance officers managing multiple regulatory obligations, security teams preparing for audits across frameworks, and MSPs standardizing compliance programs for diverse client bases.
Multi-Framework
Compliance Dashboard

Screenshot coming soon

Standards Mapping & Compliance Narratives

Auditors expect more than a list of pass/fail results. TATER maps every compliance control to the specific sections of NIST 800-53, ISO 27001, SOC 2, PCI-DSS, and HIPAA where they apply, then lets you attach per-organization compliance narratives explaining your implementation approach for each standard section.

The standards detail view breaks each framework into its constituent sections and shows which TATER controls map to each one, along with the current compliance percentage. AI-powered narrative generation uses your actual scan results and organizational context to draft audit-ready responses.

Key Capabilities

  • Granular control-to-standard mapping across 5 major compliance frameworks
  • Per-organization compliance narratives stored per standard section
  • AI-powered narrative generation from actual compliance posture data
  • Section-level compliance percentages with drill-down to individual controls
  • Gap analysis showing unmet requirements per framework
Built for: Compliance officers preparing for SOC 2 or ISO 27001 audits, GRC analysts writing control narratives, and legal teams documenting HIPAA safeguard implementations.
Standards Mapping
Detail View

Screenshot coming soon

AI-Powered Compliance

Writing compliance narratives, answering audit questionnaires, and drafting remediation guidance consumes hundreds of hours per audit cycle. TATER uses AI to generate context-aware responses for over 300 standard controls. Each narrative incorporates your actual compliance scan results, organizational context, and implementation details to produce answers that auditors will accept.

Beyond narratives, the AI assists with remediation guidance by suggesting specific configuration changes based on the control definition and your current environment state.

Key Capabilities

  • Context-aware narrative generation using actual compliance scan data
  • Coverage across 300+ standard controls in 5 major frameworks
  • Remediation guidance with specific configuration change suggestions
  • Audit questionnaire response drafting from organizational context
  • One-click generation with review and edit workflow
Built for: Compliance analysts writing audit documentation, GRC teams responding to customer security questionnaires, and consultants preparing compliance deliverables.
AI Narrative
Generation

Screenshot coming soon

Policy Template Library

TATER provides 11 professionally written policy templates covering the most common requirements auditors look for: Information Security, Acceptable Use, Incident Response, Access Control, Data Classification, Business Continuity, Change Management, Vendor Management, Remote Work, Data Retention, and Vulnerability Management.

Each template uses a variable engine with typed placeholders. Generated policies export to branded PDFs with your organization logo, cover page, table of contents, and professional formatting.

Key Capabilities

  • 11 professional security policy templates covering major audit requirements
  • Variable engine with typed placeholders and intelligent value caching
  • PDF export with organization branding, cover page, and table of contents
  • Template browser with category filtering, difficulty ratings, and recommendations
  • Draft and published status tracking with version history
Built for: Compliance officers who need audit-ready policy documentation, IT managers establishing security governance programs, and MSPs standardizing policies across client organizations.
Policy Template
Editor

Screenshot coming soon
Security

Proactive security monitoring and response

Detect vulnerabilities, map adversary techniques, and remediate findings automatically.

Automated Remediation

1,446+ pre-built remediation scripts execute with one click — 67 for M365 cloud controls and 1,379 for Windows endpoint hardening (W11E, Server 2019/2022/2025). Secure execution via Azure Automation.

Learn More →

Endpoint Hardening Plan

1,318 CIS Benchmark remediations for Windows 11 Enterprise and Server 2019/2022/2025 — filter by severity, select failing controls, and trigger automated fixes with one click.

Learn More →

Endpoint Vulnerability Scanning

Discover CVEs across your fleet via Microsoft Defender for Endpoint. Cross-reference with CISA KEV catalog and EPSS exploit prediction scores.

Learn More →

Risk Scoring & SLA Tracking

Weighted risk scores prioritize remediation by impact, likelihood, and asset criticality. SLA timers track remediation deadlines with escalation warnings.

Learn More →

MITRE ATT&CK Mapping

Map compliance controls to MITRE ATT&CK adversary techniques. Visualize coverage gaps and identify which tactics your controls defend against.

Learn More →

Smart App Discovery

Automatically discover and track 80+ applications across your environment. Integrated endoflife.date version checking flags EOL software before it becomes a gap.

Learn More →

Compliance Drift Alerts

Detect configuration changes between scan cycles in real time. Drift alerts notify you when controls regress from Pass to Fail so you can respond before your next audit.

EPSS Exploit Prediction

Prioritize vulnerabilities using FIRST EPSS probability scores. Focus remediation on CVEs most likely to be exploited in the wild, not just the highest CVSS.

Incident Response Playbooks

Eight pre-built incident response playbooks guide your team step-by-step through security events with decision trees and escalation paths.

Learn More →

Implementation Guides

Curated step-by-step rollouts for high-leverage initiatives — Conditional Access for compliant devices, MFA, DMARC enforcement, BitLocker, PIM. Verification and rollback notes at every step. Per-org progress tracking. Reviewed periodically for accuracy.

Learn More →

TATERpedia — Shared Knowledge Wiki

Wikipedia-style wiki shared across every TATER organization. Generic process knowledge — troubleshooting playbooks, diagnostic decision trees, remediation methodology, vendor primers, error-code translations. Searchable, contributable by any Auditor+, with a content validator that prevents organization-specific data leakage.

Learn More →

Automated Remediation

TATER closes the loop with 1,446+ pre-built remediation scripts that fix failing controls directly from the platform. A single click triggers a secure execution pipeline through Azure Automation, complete with user confirmation, parameter review, and full audit trail logging.

The system covers two domains: 67 M365 cloud scripts fix Defender, Exchange Online, SharePoint, Entra ID, Power BI, Purview, and CISA SCuBA controls via the Graph API. 1,379 Windows endpoint scripts harden Windows 11 Enterprise and Windows Server 2019/2022/2025 machines against CIS Benchmark controls via local registry, secedit, auditpol, and firewall policy.

Key Capabilities

  • 67 M365 scripts: Defender, Exchange, SharePoint, Entra ID, Power BI, Purview, SCUBA
  • 1,379 endpoint scripts: Windows 11 Enterprise + Server 2019/2022/2025 CIS Benchmark
  • One-click execution with confirmation modal and parameter review
  • Two-runbook architecture for cross-service compatibility
  • Real-time status polling with 10-minute timeout
  • Full audit trail of every remediation action
  • Per-organization enablement with webhook integration
Built for: IT administrators who need to fix compliance gaps quickly, security engineers managing M365 hardening, and MSPs remediating issues across multiple client tenants.
Remediation
Execution Modal

Screenshot coming soon

Endpoint Hardening Plan

TATER's Endpoint Hardening Plan gives you a complete, actionable checklist of CIS Benchmark controls for every Windows platform in your environment — with one-click automated remediation for each.

The plan pulls scan results from the TATER agent running on your endpoints, shows each control's current Pass/Fail/Not Scanned status, and lets you filter by severity (Critical/High/Medium/Low) or status. Select multiple failing controls and trigger all their remediations in batch — scripts run through Azure Automation and report results back in real time.

Coverage

  • Windows 11 Enterprise — 435 CIS Benchmark controls
  • Windows Server 2019 — 286 CIS Benchmark controls
  • Windows Server 2022 — 287 CIS Benchmark controls
  • Windows Server 2025 — 310 CIS Benchmark controls

Key Capabilities

  • Filter by severity and status — focus on what matters most
  • Bulk select failing controls and remediate with one click
  • Each remediation script uses secedit, registry, auditpol, or firewall policy
  • Pre/post state capture in run logs for AI-assisted analysis
  • Intune Proactive Remediation export for managed device fleets
Built for: IT administrators hardening Windows environments against CIS Benchmarks, security engineers managing endpoint compliance, and MSPs enforcing baseline configurations across client fleets.
Endpoint
Hardening Plan

Screenshot coming soon

Endpoint Vulnerability Scanning

TATER integrates with Microsoft Defender for Endpoint to pull device inventories, CVE data, and software catalogs directly into your compliance platform. Every vulnerability is automatically cross-referenced against the CISA KEV catalog. EPSS scores help prioritize remediation by real-world exploit likelihood.

The endpoint security dashboard provides tabbed views for devices, vulnerabilities, CISA KEV alerts, installed software, security recommendations, and Intune compliance status.

Key Capabilities

  • Microsoft Defender for Endpoint integration for device and CVE discovery
  • CISA KEV cross-referencing with ransomware campaign tracking
  • EPSS exploit prediction scoring for prioritized remediation
  • Software inventory with end-of-life detection via endoflife.date API
  • Automatic device bridging between MDE and TATER inventories
  • Intune compliance status correlation
Built for: Security operations teams managing endpoint patching, vulnerability management analysts prioritizing remediation, and compliance teams demonstrating continuous monitoring.
Endpoint Security
Dashboard

Screenshot coming soon

Risk Scoring & SLA Tracking

TATER assigns weighted risk scores to every control based on impact severity, likelihood of exploitation, and asset criticality. SLA tracking adds accountability: critical findings get 24-hour SLAs, medium-risk items get 30 days. Escalation warnings appear as deadlines approach.

Quantitative risk metrics including ALE, SLE, and ARO transform subjective risk assessments into concrete financial figures for executive communication.

Key Capabilities

  • Weighted risk scores based on impact, likelihood, and asset criticality
  • SLA countdown timers with severity-based deadlines
  • Escalation warnings as remediation deadlines approach
  • Quantitative risk metrics (ALE, SLE, ARO) for financial risk communication
  • Finding ownership with clear remediation timelines
Built for: Security managers prioritizing remediation backlogs, CISOs reporting risk posture to boards, and compliance teams demonstrating timely response to findings.
Risk Scoring
Dashboard

Screenshot coming soon

MITRE ATT&CK Mapping

TATER bridges compliance and threat intelligence by mapping controls directly to ATT&CK tactics and techniques. The coverage view shows which tactics are addressed by your current posture and where gaps exist, allowing you to prioritize based on real-world threat intelligence.

Key Capabilities

  • Control-to-technique mapping across the ATT&CK framework
  • Tactic-level coverage visualization showing defended vs. exposed areas
  • Gap analysis highlighting techniques with no defending controls
  • Documented mapping rationale for audit evidence
  • Continuous expansion as new mappings are validated
Built for: Threat intelligence analysts, red/purple team leads validating control coverage, and CISOs reporting security posture in threat-centric terms.
MITRE ATT&CK
Coverage Map

Screenshot coming soon

Smart App Discovery

TATER automatically discovers applications running across your environment by analyzing endpoint scan data. Every discovered application is checked against the endoflife.date API for version lifecycle status. EOL software is flagged immediately.

Key Capabilities

  • 80+ trackable applications in the curated discovery allowlist
  • Version lifecycle checking via endoflife.date API integration
  • Automatic compliance zone creation for high-risk software
  • Version badges: Up to Date, Update Available, Major Update, EOL
  • Device install count tracking per application
Built for: IT asset managers maintaining software inventories, security analysts tracking shadow IT, and compliance teams ensuring all applications are within scope.
Smart App
Discovery

Screenshot coming soon

Incident Response Playbooks

TATER includes 8 pre-built incident response playbooks that provide structured, step-by-step guidance for the most common security scenarios. Each playbook follows industry-standard methodology with clear phases for preparation, detection, containment, eradication, recovery, and lessons learned.

Key Capabilities

  • 8 playbooks: Ransomware, Data Breach, Phishing, Insider Threat, DDoS, Account Compromise, Malware, Third-Party Breach
  • Step-by-step execution with assignment and completion tracking
  • Decision trees with conditional escalation paths
  • After-action report generation for audit evidence
  • Integration with risk register for post-incident risk updates
Built for: Incident response teams needing structured guidance, security managers building IR capabilities, and compliance teams documenting incident handling.
Incident Response
Playbook Execution

Screenshot coming soon

Implementation Guides

Implementation Guides are curated, step-by-step rollouts for the security initiatives every M365 organization eventually needs to do — but rarely has documented end-to-end. Each guide is structured for project-style execution: prerequisites, ordered steps with explicit verification at each one, rollback notes for when something doesn't go as planned, and links to the controls and frameworks the initiative advances.

Bundled Guides

  • Identity & Access: Require Compliant Devices via Conditional Access · Block Legacy Authentication · Move Admin Roles to PIM · Require MFA for All Users
  • Email Security: Roll Out DMARC to p=reject
  • Endpoint: Enforce BitLocker on All Windows Endpoints
  • Audit & Logging: Enable Unified Audit Log + 365-Day Retention
  • Data Protection: Tighten SharePoint / OneDrive External Sharing

Why this matters

  • Per-organization progress tracking — pick up where you left off
  • Verification criteria at every step so you know when each phase is genuinely complete
  • Rollback notes so you can recover without paging the on-call
  • Periodic review cadence (default 180 days) — guides for fast-moving Microsoft features stay current
  • Links to TATER controls so completing a guide explicitly advances your compliance posture
  • Custom org-private guides for M&A integration, regulatory transitions, or internal runbooks
Built for: Security architects driving major rollouts, MSPs onboarding new clients with consistent security baselines, and compliance teams converting roadmap line items into actionable execution.
Implementation Guides
Step-by-step rollout
with progress tracking

Screenshot coming soon

TATERpedia — Shared Knowledge Wiki

TATERpedia is a Wikipedia-style wiki shared across every TATER organization. It's the platform's collective brain — generic process knowledge that every customer benefits from but no single org should have to write from scratch.

Content Model

  • Scoped pages: tied to a control, application, framework, or free-form topic — discoverable from the relevant detail page in TATER
  • Required summary field: 1–2 sentence brief surfaces in list views and on item-result panels so readers can decide whether to open the full page
  • Markdown body: with searchable full-text search across title, summary, body, and tags
  • Revision history: every edit creates a new revision; rollback at any time
  • Content validator: automated check that flags emails, GUIDs, IPs, and customer onmicrosoft.com domains BEFORE saving — prevents accidental org-specific leakage in shared content

Pairs with everything

  • Control detail panels link to the relevant TATERpedia article — and offer one-click stub creation if none exists
  • Policy detail mirrors the same pattern, scoped to the policy's mapped framework
  • Implementation Guides reference TATERpedia articles from individual steps for deeper background
  • Topbar quick search indexes wiki pages alongside controls / policies / vendors
Built for: Compliance practitioners who want to capture institutional knowledge once and have it benefit everyone, MSPs codifying repeated client patterns, and AI agents using MCP to write reliable diagnostic and remediation references.
TATERpedia
Shared Knowledge Wiki

Screenshot coming soon
GRC Modules

Complete governance, risk, and compliance suite

13 purpose-built GRC modules covering the full governance lifecycle — from risk registers and audit management to change control and regulatory tracking — integrated with the core compliance engine.

Risk Register & Heat Map

Central risk catalog with quantitative ALE scoring, treatment plans, and a 5x5 likelihood-impact heat map. Risks link bidirectionally to compliance controls.

Learn More →

Audit Management

Plan, execute, and track audits. Manage findings from discovery to resolution, collect evidence from control owners, and maintain an audit calendar.

Data Classification & Privacy

Inventory data assets with classification labels, map data flows, conduct privacy impact assessments, and enforce retention policies.

Business Continuity & DR

Document BCP/DR plans with RTO/RPO targets, conduct business impact analysis, and track test exercises with version-controlled procedures.

Exception & Waiver Management

Structured approval workflows for risk acceptance with compensating controls, multi-level approval chains, and automatic expiry enforcement.

Regulatory Change Management

Curated feed of framework updates with impact assessments, affected controls analysis, and compliance deadline tracking.

Security Awareness Training

Campaign management with target audiences, completion tracking, phishing simulation result import, and training compliance reports.

Control Testing Automation

Automated test scheduling with reusable test procedures, historical results with trend charts, and automatic gap detection from failures.

Access Reviews

Periodic user access certification campaigns. Review privileged roles, service accounts, and group memberships with approve/revoke workflows and audit-ready evidence.

GRC Calendar

Unified timeline view of 18 event sources — access reviews, control tests, exception expiries, BCP/DR drills, training deadlines, vendor assessments, audit milestones, override expiries, change implementation dates, policy review cycles, subscription renewals, tenant credential expiries, daily endpoint scans, and more — in one calendar with iCal feed.

Compliance Roadmap

Multi-phase remediation planning with drag-and-drop control assignment, cascading phase durations, optional Phase 0 discovery, and MSP billing columns for service delivery tracking.

Learn More →

Vendor Management

Third-party risk tracking with vendor profiles, risk tiers, contract management, SLA monitoring, compliance questionnaires, and assessment workflows.

Custom Control Frameworks

Visual framework builder with drag-and-drop domains, custom threshold logic, JSON import/export, and cross-mapping to standard frameworks.

Change Control & Approval Workflows

Structured change request lifecycle with automatic approval routing. Low and medium impact changes auto-approve; high and critical require OrgAdmin sign-off. Full audit trail on every decision.

Complete GRC Suite

TATER goes beyond compliance scanning with 13 purpose-built GRC modules. The Risk Register provides a central catalog with 5x5 heat map visualization, quantitative ALE scoring, and four treatment options. Exception and waiver management handles structured approval workflows with compensating control documentation.

Audit Management supports the full lifecycle from planning through finding resolution. Business Continuity and Disaster Recovery modules maintain versioned plans with RTO/RPO tracking. Data Classification inventories assets with sensitivity labels. Security Awareness Training tracks campaigns and completion rates. Control Testing automates scheduled evaluations.

Key Capabilities

  • Risk Register with 5x5 heat map, ALE/SLE/ARO scoring, and treatment plans
  • Exception and waiver management with multi-level approval chains
  • Regulatory change management with impact assessment and deadline tracking
  • Audit planning, finding management, and evidence collection workflows
  • BCP/DR plans with RTO/RPO targets and test exercise tracking
  • Data classification, privacy impact assessments, and retention policies
  • Change Control with automatic approval routing by impact level (Low/Med auto-approve, High/Critical requires OrgAdmin)
  • GRC Calendar: unified timeline view of all GRC obligations with lookahead filtering
  • Access Reviews with manual user population, CSV import, and approve/revoke workflows
  • Bidirectional risk-to-control linkage from control detail pages
Built for: GRC program managers building enterprise risk management programs, internal auditors conducting compliance assessments, and organizations preparing for ISO 27001 or SOC 2 certification.
GRC Suite
Risk Register & Heat Map

Screenshot coming soon

Compliance Roadmap

The Compliance Roadmap translates your current scan results into a prioritized, multi-phase remediation plan. Controls are assigned to phases with estimated effort, owner, and completion targets. An optional Phase 0 Discovery automatically collects unscanned and manual-review controls for assessment before remediation phases begin.

Phase durations cascade automatically: changing one phase's timeline shifts all subsequent phases, eliminating manual date math. MSP organizations see additional fee and billing columns on each phase card, making it straightforward to scope and price remediation engagements for clients.

Key Capabilities

  • Multi-phase remediation planning with drag-and-drop control assignment
  • Optional Phase 0 Discovery — unscanned and manual controls staged for assessment
  • Cascading phase durations — changing one phase automatically shifts subsequent phases
  • MSP billing columns on roadmap phase cards (fee, billing notes, engagement scope)
  • Roadmap templates for common compliance journeys (CIS baseline, SOC 2 readiness, etc.)
  • Progress tracking with phase completion percentages and control status rollup
Built for: MSPs scoping client remediation engagements, compliance officers planning multi-quarter hardening programs, and CISOs communicating remediation timelines to leadership.
Compliance Roadmap
Phase Builder

Screenshot coming soon
AI & Automation

Agentic AI that works alongside your team

TATER includes purpose-built AI capabilities that go well beyond chat: an agentic compliance analyst, autonomous evidence collection, MCP server integration, and living network documentation that builds itself.

AI Compliance Analyst

An agentic AI assistant with 12 TATER-specific tools. It reads your scan data, creates risk acceptances, assigns controls, triggers remediations, and documents evidence — pausing to confirm critical actions with a human-in-the-loop design.

Learn More →

Autonomous Evidence Agent

The TATER Agent (Go binary) includes a browser-based evidence collector that navigates Microsoft admin portals, takes screenshots, and documents findings for Manual Review controls — automatically.

Learn More →

MCP Server Integration

Connect Claude Desktop or Claude Code to TATER via the Model Context Protocol. 61 tools expose your compliance data, risk register, controls, and change queue directly to your AI assistant.

Learn More →

Living Network Documentation

Every AI agent interaction automatically adds to a searchable knowledge base — infrastructure configs, CA policies, mail flow, endpoint settings, and resolved support issues. The library gets more accurate with every control investigated and every help desk ticket resolved.

Learn More →

Predict the Unknown

Manual Review controls with known default postures are automatically predicted as pass or fail based on platform defaults — shrinking the unknown compliance surface and surfacing hidden risk.

Cross-Platform Endpoint Agent

A lightweight Go binary for Windows, Linux, and macOS. Windows runs as a service with system tray, local dashboard (Edge app mode), auto-update, and DPAPI config encryption. Linux daemon (RHEL/Ubuntu) includes 20 built-in security controls covering firewall, SSH hardening, disk encryption, SELinux/AppArmor, auditd, kernel hardening, and more — available as amd64 and arm64 binaries. macOS tray application for Intel and Apple Silicon with browser-based evidence collection.

AI Compliance Analyst

The AI Compliance Analyst is an agentic assistant powered by Claude. Unlike a simple chat interface, it operates as an autonomous agent with 12 TATER-specific tools it can invoke in sequence to complete multi-step tasks. It reads your scan results, identifies patterns, and proposes actions — creating risk acceptances, assigning controls to team members, adding evidence comments, and triggering remediations.

A human-in-the-loop design ensures the analyst always pauses and asks before taking consequential actions. Critical and high-severity findings require explicit user confirmation before an override or remediation is triggered. The analyst surfaces its reasoning at every step so you understand what it's doing and why.

Key Capabilities

  • 12 tools: get scans, get results, get overrides, create risk acceptance, add evidence comment, get people, assign control, ask user, trigger remediation, get control context, add thread post, create change request
  • Agentic loop runs up to 12 iterations to complete multi-step tasks
  • Human-in-the-loop: always pauses for confirmation on critical/high findings
  • Tool call status shown in real time (wrench icon with pass/fail indicators)
  • Configurable: BYOK Anthropic API key stored encrypted per organization
  • Model override via AI_ANALYST_MODEL environment variable
Built for: Compliance analysts who need to process large scan results quickly, CISOs who want AI-assisted risk acceptance workflows, and MSPs managing compliance programs for multiple clients.
AI Compliance
Analyst Chat

Screenshot coming soon

Autonomous Evidence Agent

The Evidence Agent is built into the TATER Windows endpoint agent (Go binary). It navigates Microsoft admin portals using a real browser (via chromedp), waits for the user to sign in, then systematically steps through Manual Review controls — taking screenshots, analyzing them with Claude, and documenting findings as evidence comments in TATER.

A polling loop in the agent checks for pending evidence jobs every 15 seconds. PowerShell-based controls run directly via the existing scanner pipeline. All findings are posted to the Comments API with source: 'evidence-agent' for full traceability in the audit log.

Key Capabilities

  • Browser-based automation via chromedp for web portal controls (Windows/macOS)
  • PowerShell-based collection for endpoint and local controls
  • Claude analyzes each screenshot and returns structured action JSON
  • Token usage tracked per job for cost visibility
  • Evidence steps posted to TATER Comments with source tagging
  • Background goroutine in agent — runs silently without interrupting the user
Built for: Compliance teams preparing for audits who need evidence for Manual Review controls, security analysts who want to automate portal-based evidence collection, and organizations with many controls requiring manual inspection.
Evidence Agent
Collection Status

Screenshot coming soon

MCP Server Integration

TATER exposes its compliance data via the Model Context Protocol (MCP) in two deployment modes: an HTTP MCP endpoint at /api/mcp for remote connections (compatible with claude.ai), and a local stdio MCP server for Claude Desktop and Claude Code.

61 tools give your AI assistant direct access to scans, controls, the risk register, overrides, people, assignments, change requests, framework narratives, remediation history, community stats, evidence jobs, config documentation, and manual control verification. The first tool any agent must call is get_org_context to confirm which organization it is operating in before taking any action.

Agents are instructed to document proactively: whenever they encounter configuration data, infrastructure topology, or security findings, they call upsert_config_doc automatically — building your org's knowledge base as a natural byproduct of compliance work, not as a separate task.

Key Capabilities

  • HTTP MCP endpoint: JWT or API key auth with X-Organization-Id header
  • stdio MCP server: for Claude Desktop and Claude Code integration
  • 61 tools including list_scans, get_failing_controls, create_risk_acceptance, verify_manual_control, trigger_remediation, list_pending_changes, list_remediations, list_community_stats, get_evidence_job_status, search_catalog, create_policy, create_issue, verify_identity, and more
  • Infrastructure config docs with dependency and integration notes per org
  • Proactive documentation: agents document findings automatically without being prompted
  • Mandatory get_org_context session initialization prevents cross-org mistakes
Built for: Security engineers using Claude Desktop, compliance analysts who want AI access to their TATER data, and MSPs building custom AI workflows on top of TATER.
MCP Server
Tool List

Screenshot coming soon

Living Network Documentation

Network documentation is the single most neglected IT discipline. Most organizations discover what their network actually looks like during an incident — when it's too late. TATER changes this by making documentation an automatic byproduct of compliance work rather than a separate effort.

Every AI agent interaction adds to a structured, searchable configuration knowledge base. When an agent remediates a control, it documents the before/after state. When it encounters a firewall dependency, it records it. When it analyzes scan results, it captures the posture snapshot — all without being asked.

This knowledge base is not just for humans. Future AI agents read existing docs before making recommendations. If a Palo Alto NGFW is documented as inspecting traffic on a subnet, the next agent to touch Global Secure Access settings will automatically read that dependency and build a recommendation that avoids the conflict — without requiring the user to explain the network topology again.

What Gets Documented Automatically

  • Identity & Access: Conditional Access policies, named locations, MFA methods, PIM config
  • Email Security: DKIM/DMARC/SPF records, Safe Links/Attachments scope, mail flow connectors
  • Network: Azure Firewall rules, NSG policies, third-party NGFW vendor/model/firmware, VPN topology
  • Endpoint: Intune compliance policies, MDE sensor health, ASR rules, BitLocker escrow
  • Cloud Infrastructure: Key Vault policies, Automation account config, Log Analytics workspaces
  • Compliance Posture: Scan summaries, top-failing areas, accepted risks, remediation history
  • Resolved Issues: Help desk resolutions, root causes, affected users, and changes made — so the same question never generates a second ticket

Structured for Discoverability

Every doc follows a consistent template: Current State, Configuration Details, Infrastructure Dependencies, Known Conflicts, Recommended Integration Settings, and Related Controls. The "Recommended Integration Settings" section is specifically designed to be read by AI agents when making configuration recommendations for adjacent systems.

Help Desk Overhead That Compounds Downward

Every time Claude resolves a support issue inside TATER, the resolution is written back into the library with the root cause, the fix, and any affected configuration context. The next time the same issue surfaces — from a different user, on a different endpoint, six months later — Claude already has the answer. Escalations to senior engineers decrease. Repeat tickets stop recurring. And the institutional knowledge stays in the platform, not in someone's head.

The library does not need to be maintained. It is a byproduct of using TATER with Claude. The more compliance work, investigations, and support resolutions run through the platform, the more accurate and useful the documentation becomes.

Built for: IT teams who know their documentation is always out of date, MSPs who need consistent knowledge across clients, and security engineers tired of re-explaining their infrastructure to every new tool — and tired of answering the same help desk questions every quarter.
CONFIG DOC AUTO-CREATED
Entra ID — Conditional Access

Current State: 7 policies active. MFA enforced org-wide. Named locations: HQ (10.1.0.0/16), VPN egress (203.0.113.45).

Infra Dependencies: Palo Alto PA-5250 inspects traffic on 10.0.4.0/24. GSA tunnel active for Azure VMs.

Integration Settings: CA named location changes must account for GSA egress IP. PA mgmt interface excluded from DoH.

Created automatically by AI Analyst · v3

Power BI & Power Automate Integration

Bring your compliance data into Microsoft's productivity ecosystem without writing a line of code.

Power BI — Live Compliance Dashboards

  • One URL, five datasets: controls, scans, risks, overrides, and an overview summary — all from a single authenticated endpoint
  • Returns flat, denormalized JSON tables that import directly into Power BI Desktop or Power Query without transformation
  • Filter by status, application, or scan count before import for focused reports
  • Authenticate with your TATER API key — no OAuth setup required
  • 60-second client cache prevents rate throttling on scheduled Power BI refreshes
  • Works with Power BI Desktop, Power BI Service, Excel, Fabric, and any tool that supports web data sources

Power Automate — Compliance Workflow Automation

  • Custom connector definition available for download — import into Power Automate in minutes
  • Webhook trigger: scan.completed event fires every time a scan finishes, with pass/fail counts and compliance rate as trigger data
  • Actions: Get compliance data, create risk acceptances, create risks, get audit log, trigger scans — all available as named actions in your flows
  • Build flows that post scan summaries to Teams, create ServiceNow tickets on compliance drift, or email executives when compliance drops below threshold

Example Use Cases

  • Auto-post a compliance scorecard to your Teams channel after every scan
  • Create a ServiceNow incident when any Critical control fails
  • Email a weekly compliance summary to the CISO using Power Automate scheduled flow
  • Build a Power BI executive dashboard showing compliance trend over time
  • Automatically create risk acceptances for N/A controls via Automate flow
  • Trigger Power BI dataset refresh as soon as a scan completes

Getting Started

  • Power BI: Go to Get Data → Web, enter https://api.tatersecurity.com/api/reports/powerbi?dataset=controls, add x-api-key header
  • Power Automate: Download the connector JSON from TATER-PowerAutomate-Connector.json and import via Custom Connectors → New → Import OpenAPI
  • Webhook trigger: Configure your SIEM webhook URL in TATER Settings → Integrations; enable and listen for X-TATER-Event-Type: scan.completed
Reporting & Integration

Connect, export, and share your compliance data

Integrate with your existing tools and present compliance data to every audience.

Integration Marketplace

16 built-in integrations: SIEM forwarding via syslog (CEF) and HMAC-signed webhooks, Teams, Slack, email alerts, and ticketing system connections.

Learn More →

Multi-Organization & MSP

Oversee multiple client organizations from a single platform. Three-tier client access (Monitor, Operate, Manage), cross-org dashboards, side-by-side comparison, and white-label branding options.

Learn More →

Customizable Access & Views

Groups, feature-level permission toggles, and simplified view modes. Tailor the experience for executives, auditors, and technical staff.

Learn More →

Trust Center

Publish a public-facing Trust Center for your customers. Share real-time compliance status, certifications, and security practices transparently.

Power BI & Power Automate

Connect Power BI directly to live TATER data for custom dashboards and executive reports. Automate compliance workflows in Power Automate with a dedicated custom connector, triggers, and actions.

Learn More →

Microsoft Built-in Integration Scanners

Native, ready-to-run scanners for the four core Microsoft surfaces — Entra ID (12 checks: legacy auth, MFA, security defaults, PIM, CA policy count, sign-in risk, GA count), Defender for Endpoint (8 checks: device onboarding, AV/EDR, critical CVEs, exposure score, sensor health), Intune (8 checks: compliance policies, ASR, BitLocker, Windows Update rings, MDM coverage), and Azure (10 checks: Defender for Cloud secure score, Key Vault, NSG open ports, Activity Log alerts, RBAC owners). 38 checks total, no extra credentials needed beyond the existing tenant connection.

Email Security & Cloud Hardening Checks

Cloud Graph scan now covers SPF / DKIM / DMARC records (DNS-resolved), Customer Lockbox, external calendar sharing restrictions, Modern Auth, external auto-forwarding block, plus Azure log infrastructure: Entra ID diagnostic settings forwarded to Log Analytics or Event Hub, and 365-day log retention on the workspace. CISA SCuBA-aligned and runs on every cloud scan.

CSV & Excel Export

Export scan results, control lists, vulnerability data, and compliance reports to CSV and Excel formats for your existing workflows.

Embeddable Compliance Widget

Publish a lightweight compliance score widget on your website or customer portal with real-time data from your TATER dashboard.

Continuous Monitoring

Automated scans detect configuration drift in real time. Forward events to your SIEM via syslog (CEF) or HMAC-signed webhooks.

Interactive Runbook Wizard

Set up cloud compliance scans in three guided steps. The wizard walks through app registration, permissions, and scheduling.

Scan Deduplication

Intelligent deduplication at upload ensures efficient storage while maintaining full scan history and drift comparison capabilities.

Integration Marketplace

TATER offers 41 integrations spanning notification channels, SIEM platforms, ticketing systems, and identity providers. SIEM integration supports syslog (CEF format) and HMAC-signed webhooks. Notification rules configure which events trigger alerts and where they go.

Key Capabilities

  • SIEM forwarding via syslog (CEF) and HMAC-signed webhooks
  • Microsoft Teams and Slack notification channels
  • Email alerts with configurable triggers and recipients
  • Ticketing system integration for automated remediation workflows
  • Per-organization integration scoping for MSP deployments
  • Webhook HMAC signatures for event authenticity verification
Built for: SOC analysts, IT operations teams, and MSPs routing client-specific notifications to separate channels.
Integration
Settings

Screenshot coming soon

MSP Portal & Multi-Tenant Management

TATER was built from the ground up as a multi-tenant platform with strict data isolation. The MSP portal provides a cross-organization dashboard and streamlined client onboarding with organization templates. Organizations flagged as MSPs unlock additional operational controls: fee and billing columns in compliance roadmaps, white-labeling controls, and service delivery metrics across the client base.

The MSP flag (isMsp) is set by a SuperAdmin on any organization. Once enabled, that org's admins see billing context in roadmap phases and can configure client-facing white-label branding independently from internal views.

Three-tier client access controls precisely what MSP staff can do in each client organization. Tiers are org-to-org relationships managed from the MSP Portal: Monitor (Tier 1) grants read-only access to dashboards, scans, and reports; Operate (Tier 2) adds the ability to manage compliance workflows including overrides, roadmaps, assignments, and remediations; Manage (Tier 3) provides full organization administration including branding, API keys, and tenant credentials.

Key Capabilities

  • Multi-organization management with per-client data isolation
  • Three-tier client access: Monitor (read-only dashboards), Operate (manage compliance workflows), Manage (full organization administration)
  • Cross-organization compliance dashboard with client grid view
  • MSP organization flag unlocks fee/billing columns in compliance roadmaps
  • White-labeling controls for client-facing portal customization
  • Five role levels: SuperAdmin, ServiceProvider, OrgAdmin, Auditor, Viewer
  • Streamlined client onboarding with organization templates
  • Organization licensing: plan types, user/admin seat limits, and live usage tracking per org
Built for: MSP security practice leads, vCISOs overseeing multiple organizations, and consulting firms delivering compliance-as-a-service.
MSP Client
Grid Dashboard

Screenshot coming soon

Customizable Access & Views

TATER provides granular control over what each user sees through groups, feature-level permission toggles, and simplified view modes. Feature master switches at the organization level let OrgAdmins enable or disable entire capability areas.

Key Capabilities

  • User groups with feature-level permission assignments
  • Organization-level feature master switches
  • Simplified view modes for non-technical stakeholders
  • Per-group navigation visibility controls
  • Role-based default views (executive, auditor, technical)
Built for: Organization administrators, CISOs controlling information exposure, and MSPs customizing client portals.
Access Control
Group Settings

Screenshot coming soon
Team Engagement

Make compliance a team sport

TATER is the only compliance platform with built-in gamification, community leaderboards, and achievement systems — keeping your team engaged and motivated to maintain strong security posture.

Team Profiles & Identities

Every team member gets a customizable profile with a unique nickname, avatar, bio, and accent color. Co-workers see each other's real names alongside nicknames for human context.

XP & Level Progression

Team members earn XP from 19 action types: scans, remediations, evidence comments, risk acceptances, policies, control assignments, evidence exports, audit snapshots, auditor tokens, AI Analyst sessions, plus governance creators (risks, exceptions, change requests, vendors, audits, BCP/DR plans, training campaigns, policy approvals) and achievement bonuses. Progress through 7 levels from Rookie to Legend.

Governance Creator Badges

14 leveled badges that recognize the people doing GRC work — Risk Logger, Exception Handler, Change Steward, Vendor Tracker, Audit Lead, BCP Planner, Training Coordinator, Policy Approver — each with first-create, 10x, and 25x milestone tiers. Auto-awarded as records are created across the GRC module suite.

User Achievements

User achievements covering every compliance workflow — from First Scan to Evidence Exporter to AI Analyst. Includes secret achievements that reward deep platform mastery. Bonus XP awarded per unlock.

Org-Level Achievements

Organizations earn collective achievements for milestones like first scan, high compliance rates (80%/90%/95%), team size growth, multi-framework adoption, and successful remediations. A motivating shared goal for the whole team.

Multi-Category Leaderboards

Real-time org leaderboards rank your team across six categories: XP, scans completed, remediations triggered, evidence comments, policies created, and achievements unlocked. Org leaderboards let you compare across your entire MSP fleet. Customizable profiles with avatars and nicknames bring personality to the rankings.

Community Dashboard

A dedicated community hub showing your personal level, XP bar, recent achievements, org milestones, and a live mini-leaderboard — all in one place. The more you work, the more your dashboard reflects your expertise.

Team Profiles & Identities

Every TATER user gets a rich profile: a unique nickname (2–32 characters, globally unique within the tenant), a custom avatar (upload a photo or generate a randomized icon), a short bio, and an accent color. Real names are shown to co-workers in a "nickname (Real Name)" format, giving both human warmth and professional context — while outside your org, only the nickname is visible.

Profile Features

  • Globally unique nicknames per tenant (case-insensitive enforcement)
  • Avatar upload (JPG, PNG, GIF, WebP — max 150KB) or auto-generated icon
  • Custom accent color from a curated palette
  • Short bio visible to co-workers
  • Co-worker view: "nickname (Real Name)" — others see nickname only
  • Profile accessible from the Community nav group

XP & Level Progression

Team members earn XP automatically as they do real compliance work. No artificial tasks, no gamification theater — XP maps directly to platform value. Running scans, remediating findings, documenting risk acceptances, writing policies, adding evidence comments, and using the AI analyst all earn XP. Unlocking achievements awards bonus XP on top.

XP per Action

  • Scan upload: 10 XP
  • Remediation triggered: 15 XP
  • Evidence comment: 5 XP
  • Risk acceptance created: 5 XP
  • Policy created: 20 XP
  • Control assignment: 5 XP
  • Evidence package export: 25 XP
  • Audit snapshot locked: 15 XP
  • Auditor token generated: 10 XP
  • AI Analyst session: 10 XP
  • Achievement bonus: varies (5–50 XP)

7 Level Tiers

  • Rookie (0 XP) through Legend (6,000 XP)
  • 7 distinct ranks with escalating XP thresholds and unique titles
  • Level badges displayed on profiles, leaderboards, and community dashboard

User Achievements & Org Achievements

Achievements reward meaningful platform milestones. User achievements cover individual compliance workflows, while org achievements recognize collective team milestones. Each achievement awards bonus XP and is permanently recorded with an earned date. Progress trackers show how close you are to the next unlock. Secret achievements remain hidden until earned.

User Achievement Categories

  • Scanning: First Scan, Scanner (10), Scanning Pro (50)
  • Risk Management: First Override, Override Practitioner (10)
  • Remediation: First Fix, Fixer (10)
  • Evidence & Comments: First Comment, Commentator (25)
  • Policy: Policy Author, Policy Library (5)
  • Advanced: Evidence Exporter, Audit Architect, External Auditor Enabled, AI Analyst
  • Profile: Named (nickname set)

Org Achievement Categories

  • First scan, high compliance rates (80%/90%/95%), team size growth, multi-framework adoption, successful remediations, and full documentation

Multi-Category Leaderboards

Leaderboards make team progress visible and motivating. Filter by six categories and toggle between individual and org views. A podium display highlights the top three, with full ranked lists below. Your current rank is always shown — even if you're outside the top 25. For MSPs, org leaderboards let you see which client organizations are most actively using the platform.

Leaderboard Categories

  • XP / Level — overall platform engagement and expertise
  • Scans — compliance scan volume
  • Remediations — findings fixed
  • Comments — evidence documentation
  • Policies — policy creation
  • Achievements — total unlocks
Federal & Regulated

Built for commercial, GCC, GCC High, and DoD tenants

TATER's compliance catalog, scanning engine, and integrations are sovereign-cloud-aware. Customers in regulated environments get GCC High and DoD-specific remediation guidance on every applicable control today, and have a clear path to a private TATER Gov deployment when their accreditation boundary requires it.

Per-control GCC High & DoD guidance

Every catalog control can carry a Government Cloud Guidance block with sovereign-cloud-specific remediation steps, portal URLs, Graph endpoints, and PowerShell environment flags. SuperAdmins maintain it via the catalog editor; sovereign-cloud admins see it inline in the control detail panel.

Tier-aware scanning

Mark a tenant credential as Commercial / GCC / GCC High / DoD and TATER's scanRun engine automatically picks the right Graph, AAD, and ARM endpoints. No code changes per customer; one configuration toggle per tenant.

Private TATER Gov deployment

For GCC High and DoD customers requiring TATER itself to run in Azure US Government, we partner directly. Typical engagement: 4–8 weeks from signed SOW to first scan, with FedRAMP Moderate Equivalency, ITAR / EAR / CMMC attestations as scoped to your accreditation boundary.

An honest baseline. TATER's SaaS today runs in commercial Azure (TATER Security tenant). We do not yet hold a public FedRAMP authorization. The codebase is engineered so a private TATER Gov instance is a config flip, not a rewrite — but standing one up is a customer-specific engagement. If you are evaluating TATER for a regulated environment, reach out early so we can align on attestation requirements and deployment scope.
Read the Gov Cloud Compatibility Guide → Talk to Sales
Complementary Stack

Your existing tools stay. TATER fills the gap between them.

You already own Tenable, CrowdStrike, Splunk, Okta, ServiceNow, and 8–15 other security and IT tools. None of them own M365 SaaS configuration compliance, continuous endpoint hardening at the registry/policy level, or the GRC workflow that wraps it. That is the gap — and it is where TATER lives. The Complementary Stack playbook maps each major tool category, what your existing investment does well, and the specific layer TATER adds next to it.

Read the Complementary Stack Playbook → Or see the head-to-head Market Comparison
View Complete Technical Feature List in Docs →

Ready to simplify compliance?

Get audit-ready in days, not months.

Try Interactive Demo → Launch TATER Contact Sales