Open Source DSPM

Know what's hiding in your data

Poirot scans your databases, cloud storage, and message queues to detect API keys, secrets, PII, and sensitive information before attackers do.

38+
Detection Patterns
6
Validators
60%
Less Noise
Poirot Dashboard
CRITICAL
AWS Access Key detected
s3://bucket/config.env
92% confidence
HIGH
Credit Card Number
mysql://users/table
87% confidence
MEDIUM
JWT Token
kafka://topic/messages
76% confidence

Data Security Posture Management

Poirot continuously monitors your data infrastructure to identify sensitive information exposure, misconfigurations, and compliance violations.

Continuous Scanning

Schedule automated scans or trigger on-demand. Monitor databases, cloud storage, and streaming platforms.

Secret Detection

Find API keys, database passwords, tokens, and credentials buried in your datastores.

PII Discovery

Detect personally identifiable information — credit cards, SSNs, emails, phone numbers, and more.

Features

Built for modern security teams

Advanced detection capabilities with intelligent validation to minimize false positives.

38+ Detection Patterns

Comprehensive coverage for secrets, credentials, and sensitive data types across your infrastructure.

  • API Keys (AWS, Azure, GCP, GitHub, Stripe, etc.)
  • Database credentials (MySQL, PostgreSQL, MongoDB, Redis)
  • Authentication tokens (JWT, OAuth, API tokens)
  • Private keys (RSA, SSH, PEM)
  • PII (Credit cards, SSNs, emails, phone numbers)
  • Custom regex patterns
AWS Access Key
GitHub Token
Stripe Key
Slack Token
Private Key
JWT
Credit Card
SSN
Email
Password
API Secret
+27 more

6 Post-Match Validators

Reduce false positives by up to 60-70% with intelligent validation algorithms that verify pattern matches.

  • Luhn Check — Validate credit card numbers
  • SSN Validator — Verify US Social Security Numbers
  • IBAN Check — Validate international bank accounts
  • Entropy Analysis — Detect high-randomness secrets
  • Base58 Decoder — Validate cryptocurrency addresses
  • DB Password Validator — Check password complexity
1
Pattern Match
2
Validation
Confirmed
94% Confidence Score

Confidence Scoring

Every finding receives a confidence score (0.0-1.0) based on validation results, context analysis, and pattern specificity.

  • Filter by minimum confidence threshold
  • Sort findings by confidence level
  • Visual badges: High (≥80%), Medium (50-79%), Low (<50%)
  • Focus on high-confidence alerts first
High Confidence
67%
≥ 80% confidence score
Medium Confidence
28%
50-79% confidence score
Low Confidence
5%
< 50% confidence score

AI Classification with Ollama

Local LLM-powered classification that keeps your data private. No data ever leaves your infrastructure.

  • 100% Private — Local LLM, no cloud APIs
  • Contextual Analysis — Understands data context
  • Severity Assessment — AI-powered risk scoring
  • Custom Models — Use your own Ollama models
🤖
AI Analysis
Finding
AWS Access Key in production config
Classification
Critical — Production Credential Exposure
Recommendation
Rotate credentials immediately. Move to secrets manager.
Data Sources

Connect your data infrastructure

Scan databases, cloud storage, streaming platforms, and file systems.

🐬

MySQL

Relational databases

🐘

PostgreSQL

Advanced relational DB

🟠

Oracle

Enterprise databases

🪣

AWS S3

Object storage

📊

Kafka

Stream processing

📁

Google Drive

Cloud file storage

☁️

OneDrive

Microsoft cloud storage

+

More

Coming soon

Integrations

Works with your security stack

Seamlessly integrate with SOAR platforms, notification channels, and identity providers.

🐝

TheHive

SOAR case management with automatic case creation and bidirectional sync

🔐

Keycloak

SSO and RBAC with realm support, group mapping, and secure token validation

🦙

Ollama

Local LLM for AI classification with privacy-first architecture

🚨

PagerDuty

Incident management with severity-based alerting and on-call routing

💬

Slack

Real-time notifications with severity filtering and channel routing

👥

Microsoft Teams

Enterprise notifications with adaptive cards and mentions

Email (SMTP)

Configurable email alerts with HTML templates and severity filtering

🔌

Webhook

Custom HTTP callbacks for any integration with signature verification

Results

Before vs After

See the impact of confidence scoring and multi-layer validation on your detection accuracy.

Before
641
Total Findings
184
False Positives
After
180
Total Findings
9
False Positives
72%
Reduction in noise
95%
Fewer false positives
111%
More patterns
Deployment

Deploy anywhere

Self-hosted, open source, and ready for any environment.

Docker Compose

Single command deployment with all services included

docker compose up -d

Kubernetes

Production-ready manifests for K8s deployment

kubectl apply -k k8s/

Helm

Configurable charts for flexible deployments

cd k8s/charts/poirot && ./install.sh

Ready to secure your data?

Join thousands of security teams using Poirot to discover and protect sensitive information.

Open source • Self-hosted • Free forever

Report Issue