See it
Real-time posture across compliance, alerts, threats, and access. Searchable down to the command keystroke that triggered an incident.
For CISOs, SREs, and platform teams
Control One is the unified control plane for compliance, privileged access, threat detection, and infrastructure provisioning. One place to see your posture, one place to act on it, one record to prove control to auditors.
Built on standards your team already uses
Why Control One
Most teams stitch together a SIEM, a PAM, a CMDB, a threat-intel feed, an MDM, and a half-dozen scripts. Each one ships its own dashboard, its own auth, its own gaps. Control One collapses that stack into a single control plane that talks to every host you run — bare metal, KVM, hypervisor, or cloud.
Real-time posture across compliance, alerts, threats, and access. Searchable down to the command keystroke that triggered an incident.
Author detection rules in plain language or a visual builder. Auto-remediate within change windows behind circuit breakers. Push policy live to every node in seconds.
Tamper-evident audit trail, mapped to SOC 2 and ISO 27001 controls. Export CSV evidence for auditors in one click. Session recordings searchable by command.
Capabilities
Continuous policy evaluation across the fleet. Pre-built CIS, SOC 2, and ISO 27001 packs; customisable rules in DSL or visual blocks. Rollouts propagate live to every node — no waiting for the next pull cycle.
// rule: only listening ports we approved allow port 22/tcp where labels.role == "bastion" deny port 3306/tcp on public_ip alert severity=high if log ~ /failed login/ > 5/min
Stop handing out standing root. Every privileged session is requested, time-bound, recorded, and scrubbable. Short-lived SSH certificates issued by a tenant-scoped CA the bastion holds — no shared keys, no copy-paste secrets.
Pull from Spamhaus, FireHOL, Tor exit lists, AbuseIPDB, AlienVault OTX, or your own honeypot dump. Operators add and remove sources without redeploys. The auto-block pipeline turns high-confidence indicators into firewall rules with a per-tenant cooldown, score floor, and allowlist guard.
Spin up nodes on KVM, VMware, AWS, or Azure with a single template. Fleet enrol existing hosts via SSH in bulk, watching each one walk the gate. Cluster lifecycle, change windows, and circuit breakers prevent half-finished rollouts from cascading.
$ controlone fleet enrol \ --tenant prod \ --token $ENROL \ --targets hosts.txt → 24 hosts queued → 22 healthy · 2 awaiting first scan
Apache Doris is the analytic backbone. Millions of events per day, exact unique counts via BITMAP, partitioned daily for fast retention. Export to Loki or Elasticsearch when you want a single pane across teams. OpenTelemetry traces every request end-to-end.
How it works
Deploy via Docker, Kubernetes, or the offline bundle. Bring your own Postgres + Redis or use the embedded ones.
One-line installer for Ubuntu, Debian, RHEL, Rocky, Alma, Fedora, SUSE, Alpine, and Windows. Or bulk-enrol over SSH.
Pick a policy pack or author your own. Promote, simulate, roll out — every node sees the change in seconds via SSE.
Schedule CSV reports, hand over session recordings, point at the audit trail. Done in an afternoon.
Security & trust
Every privileged session is JIT and time-bound. SSH certs are signed by a tenant CA and expire in minutes.
AES-256-GCM on every credential, API key, and SSH CA private key. Operator never sees plaintext after save.
TOTP and WebAuthn (FIDO2) for the highest-risk actions: rotate CA, approve change-window override, delete tenant.
Append-only audit log with actor, target, action, and metadata. Mapped to SOC 2 CC and ISO 27001 controls.
Optional encrypted overlay between control plane and nodes. Bastion never traverses the public internet.
tlog session recordings, OpenTelemetry traces, OIDC auth, standard SSH certs. No proprietary lock-in.
Self-contained install bundle. Offline threat-feed mirroring. No phone-home telemetry without consent.
Role-based access at the page, route, and action level. Tenants are isolated from the database up.
Who it's for
One number on the board: how compliant are we, right now? Evidence packs that hand auditors what they want without engineering time. SOC 2 in weeks, not quarters.
A single tool that knows about every host, every cluster, every rule. Visual rule builder for newcomers; YAML and API for automation pipelines. Open standards, no vendor lock-in.
Bulk enrol existing fleets over SSH. Distro-aware installer that respects your init system. Every host firewall — ufw, firewalld, iptables, Windows — speaks one API.
Pricing
For teams < 50 hosts
£0 · self-hosted
Most popular
£12 / host / month
For regulated estates
Custom
FAQ
It can. The Apache Doris backbone handles millions of events per day with exact-distinct counts and free-text search. If you already have Splunk, Loki, or Elastic, the log forwarder ships events out without losing the local view.
Wherever you put it. Self-hosted by default — Postgres for transactional state, Doris for events, S3-compatible cold archival for retention. We never see customer data on the standard plans.
Native Windows Service via SCM, signed PowerShell installer, netsh advfirewall integration, and Sysmon log ingestion. The same rules apply across the fleet.
Yes. The threat-sources page accepts any URL serving a line list or Spamhaus-format payload. Paste a SOC honeypot dump, a partner share, or a paid commercial feed — same UI, same scoring.
One tarball, no outbound calls. The offline bundle script ships every binary, migration, and threat-feed mirror you need. The included docker-compose runs Postgres, Redis, the control plane, and the operator console with no internet egress.
Get a demo
We'll spin up a sandbox with synthetic data, walk through compliance, PAM, threat intel, and rule rollout, and answer the questions your team needs answered before a buy.