Complete cyber asset visibility. Zero spreadsheets.

So we built Koopic. One platform that pulls from every security tool, merges duplicates, and gives you a number you can actually trust. No six-figure contract required.

API-First Integrations
Intelligent Record Merging
Compliance & Governance
app.koopic.com/dashboard

Unified Assets

24,847

+12%

Active Sources

8

Connected

Compliance Score

94.2%

Healthy

Merged Records

3,291

+8%

Data Pipeline

All Healthy
Microsoft Defender API 8,412 Active
GCP Cloud Storage Cloud 5,293 Active
On-Prem Gateway Agent 6,841 Syncing
Azure Blob Storage Cloud 4,301 Active

Compliance

94%
Compliant 23,356
Non-Compliant 1,491

Latest Unified Assets

View all
prod-web-01 10.0.1.45 4 sources Compliant
db-primary 10.0.2.12 3 sources Compliant
edge-proxy-03 10.0.3.88 2 sources Review
See Koopic in Action

One platform. Complete visibility.

Watch how Koopic unifies your security tools into a single, transparent asset inventory with compliance scoring and full audit trails.

Sound familiar?

Every security team hits the same walls. Siloed tools, conflicting data, and no single source of truth. These are the problems we built Koopic to solve.

"How many devices do we actually have?"

Your EDR, MDM, and CMDB all give different numbers. Koopic merges them into one count you can trust.

"Is our EDR actually covering everything?"

See coverage gaps across every tool - continuously, not just during audits.

"We have compliance exceptions nobody tracks"

Exceptions do not disappear anymore. Track them, assign ownership, push for remediation.

"Which tool has the right inventory?"

Stop arguing with your peers. Bring in data from all of them. Let the merge engine sort it out.

"Leadership wants a report by Friday"

One platform, one export. Not a week of spreadsheet wrangling.

"We can't afford what enterprise CAASM costs"

Enterprise-grade visibility should not require an enterprise budget. Koopic starts at $249/month.

Platform

How Koopic solves it

Pull data from every tool you already use, merge it into one golden record per device, and finally have the visibility your team needs - with the automation to keep it accurate.

Connect every tool you already use

Pull asset data from EDRs, MDMs, cloud platforms, and on-prem infrastructure. No rip and replace - just connect what you have and see everything in one place.

Explore integrations

One device, one record, zero guesswork

Priority-based merging with field-level data lineage. See exactly which source contributed each field in the golden record. No black box.

See how merging works

Know what's compliant before auditors ask

Automated compliance scoring, coverage tracking, and exception management. Surface gaps continuously instead of scrambling before audits.

Explore compliance tracking

Enrich your data without writing code

Auto-tag departments, normalize OS names, calculate coverage metrics, and flag anomalies with point-and-click rules. More context from the data you already have.

See enrichment rules

Track every device from active to decommissioned

Know how many devices are in operation, stale, or decommissioned. Automated aging policies keep your inventory current without manual effort.

View lifecycle management

Security you don't have to worry about

Database-level tenant isolation, RBAC with granular permissions, SSO with OIDC/SAML, and full audit logging on every action. Built in from day one.

See security features
1
Golden Record
Growing Integrations
0
Manual Reconciliation
100%
Compliance Visibility
Transparency

You deserve to know how your data merges.

Other platforms merge your data behind closed doors. Koopic's Analysis Table shows you exactly which source contributed each field value, so you can trust the result and override priorities when your team knows best.

  • Priority badges show which source wins
  • Drag-and-drop to reorder source priority
  • Switch between auto and manual merge modes
analysis-table
Field CrowdStrike 1 Intune 2 Defender 3
hostname
WS-PC-0142
WS-PC-0142
ws-pc-0142
os_version
Win 11 23H2
Windows 11
--
last_seen
2h ago
6h ago
1d ago
Winning values highlighted by source priority
How It Works

From fragmented tools to
unified governance

Three steps to transform your asset management from scattered spreadsheets to a single source of truth.

01

Connect Your Sources

Connect to EDR, MDM, CMDB, cloud platforms, file imports, or on-premises infrastructure via a lightweight agent. Pull asset data automatically on a schedule or on-demand.

  • Native API connectors for Defender, Intune, Azure, GCP
  • CSV and file-based import support
  • On-prem agent for local network collection
connectors.config
Microsoft Defender EDR
Connected
Microsoft Intune MDM
Connected
Azure VMs Cloud
Syncing...
On-Prem Agent Agent
Connected
CSV Import File
Ready
02

Merge Into Golden Records

Automatically deduplicate and merge overlapping records from every source into a single golden record per device. Transparent priority logic means you always see which source wins each field.

  • Automatic deduplication across all sources
  • Configurable source priority per field
  • Full merge lineage in the Analysis Table
merge-preview
Defender (P1) Field Intune (P2)
WS-PC-0142 Hostname ws-pc-0142
10.0.4.88 IP Address 10.0.4.88
Win 11 23H2 OS Version Windows 11
-- Enrolled 2024-12-01
Golden record auto-selected by priority
03

Automate Compliance

Run compliance rules, enrichment rules, and aging policies automatically after every merge. Score every asset, derive new fields, and flag stale records without lifting a finger.

  • Per-asset compliance scoring with custom rules
  • Enrichment rules for derived fields and normalization
  • Automated aging policies for lifecycle management
compliance-dashboard
94%
Compliance
7
Enrichments
3
Aging Policies
Antivirus Installed
98%
OS Patched (30d)
87%
Encryption Enabled
92%
EDR Active
76%
Integrations

Native APIs for your entire security stack

Out-of-the-box connectors for the tools you already use, plus an agent for anything behind your firewall.

Available Now

Live
Microsoft Defender

Microsoft Defender

Available

Pull endpoint inventory, vulnerability data, and threat alerts directly from Microsoft Defender for Endpoint via the Security Graph API.

Endpoint inventory Vulnerability data Threat alerts OAuth2 auth
Google Cloud Storage

Google Cloud Storage

Available

Import CSV, JSON, or NDJSON asset exports stored in GCS buckets. Supports service account authentication and automatic schema detection.

CSV/JSON/NDJSON Service account auth Auto schema detection Scheduled pulls
Azure Blob Storage

Azure Blob Storage

Available

Same file-import power as GCS but for Azure. Authenticate with storage keys or SAS URLs and pull from any container.

Storage key auth SAS URL support Any container File-type agnostic
On-Prem Gateway

On-Prem Gateway

Available

Deploy the Koopic Agent inside your network to collect from on-prem sources. Data is encrypted end-to-end before leaving your perimeter.

E2E encryption On-prem friendly Docker image SQLite buffer

On the Roadmap

Coming Soon
EDR / XDR

EDR / XDR

Endpoint detection and extended detection platforms.

CrowdStrike SentinelOne Carbon Black
MDM / UEM

MDM / UEM

Mobile device and unified endpoint management.

Jamf SCCM Workspace ONE
CMDB / ITSM

CMDB / ITSM

Configuration management and IT service management.

ServiceNow Jira Assets Freshservice
Vulnerability Scanners

Vulnerability Scanners

Vulnerability assessment and prioritisation tools.

Tenable Qualys Rapid7
Network Scanners

Network Scanners

Network discovery and asset identification.

Nmap Rumble Lansweeper
Custom / REST

Custom / REST

Bring any REST API or custom data source.

Any REST API Webhooks Custom scripts

Don't see your tool? We'll build it.

Tell us which data sources matter to your team and we'll prioritize the connector. Most integrations ship within two weeks.

Request an Integration

Why teams choose Koopic

Unified

Asset Inventory

Custom

Compliance Rules

Full

Merge Transparency

Self-Serve

No Sales Calls

30 Days

Free Trial

Frequently Asked Questions

What is CAASM and why do security teams need it?
Cyber Asset Attack Surface Management (CAASM) aggregates data from every security and IT tool into a unified inventory. Security teams need it because siloed tools create blind spots - devices that exist in one system but not another, or with conflicting data across sources. Koopic eliminates these gaps by creating a single golden record per device.
How is Koopic different from a CMDB?
CMDBs require manual data entry and quickly become outdated. Koopic automatically pulls from your existing tools, merges overlapping records using transparent priority logic, and keeps everything current. You can see exactly which source contributed each field value - no black box.
How quickly can we deploy Koopic?
Most teams connect their first integration within minutes of signing up. Koopic handles field mapping, deduplication, and compliance scoring automatically. No professional services or multi-month implementation required.
Does Koopic support on-premises environments?
Yes. The Koopic Agent is a lightweight Docker container deployed on your network. It collects data from internal tools (Active Directory, OCS Inventory, Zabbix, or any REST API) and pushes encrypted data to Koopic Cloud using end-to-end encryption.
Is there a free trial?
Yes. Koopic offers a 30-day free trial with full platform access - unlimited assets, all integrations, all rules. No credit card required. Connect your tools, merge your data, and see compliance scores before making any commitment.
What is Founding 100 pricing?
Koopic is offering founding pricing to our first 100 customers. The rate you sign up at is locked for the lifetime of your subscription. As we add more integrations, prices will increase for new customers - but founding customers keep their original rate forever.

Ready to unify your asset inventory?

Start your free trial in under 2 minutes. No credit card required. No sales call needed.