Alba v1.0 is live

Attackers never sleep.
Neither does Alba.

Autonomous AI that triages every alert, investigates every lead, and learns from every outcome. No vendor lock-in. No six-figure license. Your SIEM. Your LLM. Your rules.

alba analyst — alert #555833
alba > analyze 555833 --depth 1
 
[1/7] Fetching alert from case management...
[2/7] Extracting IOCs: 12 IPs, 3 domains, 2 hashes
[3/7] Enriching via threat intelligence (400+ feeds)...
     2 suspicious • 0 malicious
[4/7] History: Rule fired 47x, 94% FP rate (30d)
[5/7] SIEM depth=1: 14 queries → 10 follow-up
     Discovered: 4 hosts, 2 users, 6 IPs
[6/7] Memory: 3 similar past investigations found
[7/7] Generating analysis...
 
✓ Classification: True Positive — HIGH confidence
   ▶ Isolating compromised endpoint via EDR...
✓ Endpoint isolated • Incident ticket created
✓ Posted to case management • Tagged • Indexed
   62.1s total • 24 SIEM queries • 3,156 tokens
▣ Alba SOC Dashboard — Global MSSP 19 Feb 2026 • 14:32 UTC
2,847
Alerts Today
2,791
Auto-Resolved
56
Escalated
Customer Tenants
Vanguard Bancorp — 1,204 alerts 98.1% auto
Halcyon Interactive — 892 alerts 97.4% auto
Evergreen MedSys — 431 alerts 96.8% auto
Ridgeline Freight — 320 alerts 99.1% auto
Performance
Avg. Investigation Time 47s
Mean Time to Respond 1m 12s
Active Threats (24h) 3 under investigation
“We went from a 6-person overnight rotation to 2 analysts plus Alba. Our MTTR dropped from 38 minutes to under 4. The accuracy improvement alone justified it — our analysts used to misclassify about 1 in 5 alerts under fatigue. Alba hasn't missed one in three months.”
VP
VP of Security Operations
Global MSSP
89%
Reduction in MTTR
97.6%
Classification Accuracy
4x
More Alerts Processed
<90s
Average investigation time
30+
Investigation & response tools
400+
Threat intel feeds supported
0
Vendor lock-in required

AI SOC tools cost a fortune
and lock you in.

Every major vendor now offers an "AI analyst." They all require you to buy their entire stack. Here's what that looks like.

  • Vendor lock-in by design

    Charlotte AI requires CrowdStrike Falcon. Purple AI requires SentinelOne. Copilot requires Microsoft E5. Your "AI analyst" is a sales funnel.

  • Six-figure entry price

    Microsoft Security Copilot starts at $105K/year. Torq HyperSOC lists at $450K. These aren't analyst tools — they're enterprise tax.

  • Copilots, not analysts

    Most "AI analysts" are glorified chatbots that summarize alerts. They don't investigate. They don't follow entity trails. They don't learn.

  • No multi-tenant support

    Built for single enterprises, not MSSPs. Running 15 customer tenants? You're buying 15 licenses and managing 15 silos.

What competitors charge for AI triage

Microsoft Copilot for Security $105,000+/yr
Torq HyperSOC $450,000/yr
CrowdStrike Charlotte AI Falcon Platform req.
SentinelOne Purple AI S1 Platform req.
Palo Alto Cortex AgentiX Cortex Suite req.
Alba by AlbaCyber Your infra. Your price.

Not a copilot.
A full autonomous analyst.

Alba doesn't wait for you to ask questions. It triages the queue, investigates alerts end-to-end, and posts its analysis. Then it learns from the outcome.

🔍

Autonomous Alert Triage

Processes your entire alert queue automatically. Fetches context, extracts IOCs, enriches via your threat intelligence platform, runs SIEM queries, and classifies with confidence scores.

🌐

Multi-Pass SIEM Investigation

Doesn't stop at the first query. Discovers entities in SIEM results, follows trails across hosts, users, and IPs. Iterates until every lead is exhausted.

🧠

Investigation Memory

Alba remembers every investigation. False positive rates per detection rule. IOC prevalence across customers. Historical context that makes every new analysis smarter.

🛡

Automated Response Actions

Isolate compromised hosts, block malicious IPs, disable accounts, and quarantine files. Configurable autonomy: fully automatic, approval-gated, or recommend-only per action type.

🔬

Detection Rule Auditing

Automatically audits every detection rule across your SIEM. Finds broken syntax, silent encoding failures, case sensitivity issues. Auto-generates corrected rules and validates them end-to-end.

💬

Interactive Chat & Slack Bot

Natural language interface via web UI or Slack with 30+ RBAC-gated tools. Real-time streaming. Ask "search for lateral movement in the last 24h" and watch Alba work.

🔎

Semantic Investigation Search

Search across thousands of past investigations by meaning, not just keywords. "Have we seen this attack pattern before?" Answer in milliseconds, with cross-customer anonymization.

📧

Email & Phishing Investigation

Automated phishing triage: header analysis, URL detonation, attachment sandboxing, sender reputation. Integrates with your existing email security platforms and gateways.

🚀

Threat Intelligence Enrichment

Enrich every IOC through your threat intelligence platform — OSINT, commercial, and proprietary feeds. MITRE ATT&CK mapping. Dark web monitoring. Per-IOC depth scoring across 12 dimensions.

👤

Identity & EDR Integration

Native integration with your EDR platform and identity provider. Pull endpoint telemetry, device timelines, identity risk signals, and impossible-travel alerts from whatever stack you already run.

📄

SOAR Playbook Engine

Configurable response playbooks with human-in-the-loop gates. Auto-close confirmed false positives, escalate true positives, create incident tickets in your ITSM. Ships with 30+ pre-built playbooks.

Full Transparency & Debug

Debug mode exposes every query Alba runs against your SIEM. Full audit trails. Structured logging with timing metrics. You see exactly what Alba did and why.

From alert to answer
in under 90 seconds.

Alba runs a 17-step investigation pipeline for every alert. Here's the path from raw alert to classified, contextualised outcome.

01

Ingest & Extract

Fetch alert from your case management platform. Parse alert context, source content, and detection query. Extract IOCs from text with junk filtering. Deduplicate.

Any Case Management IOC Extraction Alert Pipeline
02

Enrich & Correlate

Every IOC is enriched through your threat intelligence platform. Cross-referenced against investigation history for prevalence. Detection rule exceptions are pre-analyzed for syntax bugs.

Threat Intelligence Historical Context Detection Analysis
03

Investigate (Multi-Pass)

Run alert-type-specific SIEM queries against your existing platform. Extract new entities from results. Follow the trail: discovered hosts, users, IPs feed follow-up queries. Repeat until exhausted or depth limit.

Any SIEM Multi-Pass Depth Entity Trailing
04

Analyze & Classify

Full context sent to your chosen LLM for analysis. Executive summary, evidence chain, MITRE mapping, confidence score. If prior analysis exists, Alba states agreement or disagreement.

Any LLM Local or Cloud Swap at Runtime
05

Respond & Remediate

For confirmed threats: isolate hosts via your EDR, block IPs at the firewall, disable compromised accounts in your identity provider, create incidents in your ITSM. Each action is configurable: autonomous, approval-gated, or recommend-only.

Any EDR Any Identity Provider Any ITSM Playbooks
06

Remember & Improve

Post analysis to case management. Tag and close the alert. Store the outcome for future context. Index the investigation for semantic recall. Notify your team. The next investigation is already smarter.

Case Management Investigation Memory Semantic Index ChatOps

The only AI analyst built for
freedom, depth, and any budget.

Capability Alba Charlotte AI Purple AI Copilot Radiant
Autonomous investigation + response Partial Partial
EDR + identity integration Native Native Native Via API
SIEM-agnostic (any SIEM)
LLM-agnostic (bring your own model)
Run on your own infrastructure
Multi-tenant MSSP-native Partial Partial
Investigation memory (learns from outcomes)
Multi-pass entity trail following Partial
Detection rule auditing & auto-fix
Semantic search over past investigations
Full query transparency / debug mode Partial
SOAR playbook engine Partial Partial
Slack / Teams ChatOps Teams
No vendor platform required Falcon S1 M365 E5

One platform.
Every customer. Every SIEM.

Alba was built from day one as a multi-tenant SOC platform. Customer isolation isn't bolted on — it's the architecture.

  • Customer-Scoped SIEM Queries

    Every SIEM query is validated against customer-specific index patterns. Cross-tenant data access is architecturally impossible.

  • Cross-Customer Intelligence (Anonymized)

    Investigation memory tracks IOC prevalence across all customers. Analysts see "IOC seen across 3 customers" — never names or details.

  • Mixed SIEM Support

    Every customer on a different SIEM? No problem. One Alba instance handles all of them through unified query abstraction. No rip-and-replace required.

  • RBAC Per Analyst, Per Customer

    Analysts only see customers they're assigned to. Admins see everything. Tool permissions are enforced at execution time, not the UI.

  • Automatic Queue Processing

    Configure which customers get automated analysis. Alba processes the queue, restores the previous alert owner, and tags completion. Zero manual intervention.

Customer Tenants — Live
Customer Alpha — SIEM A 12 alerts/hr
Customer Bravo — SIEM B 8 alerts/hr
Customer Charlie — SIEM C 23 alerts/hr
Customer Delta — SIEM D 5 alerts/hr
Customer Echo — SIEM A 17 alerts/hr
All tenants isolated • 65 alerts/hr processed • 94% auto-classified

Open. Modular.
Swap anything.

Every layer is independently replaceable. Switch your LLM. Change your SIEM. Add a case management platform. Nothing breaks.

AI Engine
Local / Self-Hosted LLMs
GPU Inference Endpoints
Cloud AI Providers
Enterprise AI Platforms
Your SIEM
Any SIEM platform
Any log analytics
Security event streams
Plugin-based adapters
Intelligence
Your Threat Intel Platform
Investigation Memory
Semantic Search Index
MITRE ATT&CK
Endpoint & Identity
Any EDR Platform
Any Identity Provider
Directory Services
Plugin-based adapters
Case & Ticketing
Any Case Management
Any ITSM Platform
Custom Webhooks
REST API Adapters
Channels
Web UI
Chat Bots (Slack / Teams)
REST / WebSocket API
Custom Interfaces

Enterprise AI analysis.
Without the enterprise price.

Run Alba on your infrastructure with your models. Or let us host it. Either way, you'll spend less than a single additional analyst salary.

Self-Hosted

Your Infrastructure

Deploy Alba on your own hardware. Run local LLMs for complete data sovereignty. Nothing leaves your network.

  • Unlimited alerts & investigations
  • All investigation & response tools
  • Investigation memory & semantic search
  • Multi-tenant MSSP support
  • Single-command deployment
  • Community support
Contact Us
Enterprise

Full Partnership

Custom deployment, dedicated support, and joint development of industry-specific capabilities.

  • Everything in Managed
  • Custom LLM fine-tuning
  • Industry threat reporting
  • Dedicated account team
  • Custom tool development
  • On-site deployment option
Let's Talk

Ready to stop paying the
vendor tax on AI?

See Alba investigate a real alert in under 90 seconds. No slide deck. No sales pitch. Just a live terminal and your toughest alert.