AEGIS is our named methodology for assessing and fixing SMB infrastructure.
It's the reason we can deliver a fixed‑price assessment that's rigorous, repeatable, and priced for a business that isn't a Fortune 500. This page explains how it actually runs.
Four stages. One report at the end.
Data flows left to right. Nothing identifiable leaves your environment.
Collect
A dedicated collector is dropped on your network. It reads configuration, logs, and telemetry from the systems we're assessing. Raw data stays on‑site.
Sanitize
Every client‑identifiable value — names, hosts, IPs, license keys — is replaced with a stable placeholder. Only sanitized data crosses the Tailscale boundary.
Analyze
Sanitized data is analyzed by AEGIS skill files — executable playbooks for each device class. AI assists; scoring logic is deterministic.
Report
Findings are de‑anonymized back to real values on your side. The output is a branded, client‑ready report with exec summary, findings, and roadmap.
Your raw data never leaves your network.
This is the most important slide in this page. The SMB IT market has trained buyers to expect "we'll install our tools on your network." AEGIS inverts that. The collector is local, the sanitization is local, and the mapping back to real values stays on your side.
Edge collector
- Raw configs, logs, telemetrylocal
- Identifier ↔ placeholder mapencrypted
- Inbound public portsnone
Sanitized only
- Sanitized configs + structured JSONok
- Skill‑file execution per device classok
- Your customer's name, anywherenever
Plainly ·Your name, your customers' names, your IPs, your license keys — none of that is what AEGIS analyzes. It analyzes sanitized placeholders. The final report is re‑hydrated with real values on your side at the end.
What CRITICAL, HIGH, MEDIUM, and LOW actually mean.
In business terms, not jargon. If it doesn't explain itself to a non‑technical owner, it doesn't belong on this page.
One sample finding. Real shape, anonymized content.
Every finding in the report follows this exact structure. The full report has 40–120 of them, grouped and ranked.
Domain administrator accounts do not require phishing‑resistant MFA.
CriticalAEGIS is a methodology. Not a SaaS product.
There is no dashboard to log into. No portal. No admin UI you're paying for. You bought an engagement, not software.