Bring Intelligence
To Every Application

Every system understood. Any initiative solved.

May 2026

Platform Overview

01

Tailored Critical Application Visibility

Legacy, Homegrown, 3rd Party, AI Generated

02

Eliminate Vendor Lock-In

Access your data anywhere. Move freely between vendors.

03

AI Integration Layer — Universal MCP

Structured context from systems with no official/sufficient API/MCP

04

Make OT & Legacy Observable Modern Applications

Bridge tech debt to unlock modern observability and productivity capabilities

Case Study

A Race Against Data Exfiltration in a Black-Box Application

CRM data was leaking live on Telegram — and with no visibility into who was acting in the application, they had no way to stop it.

Sector
Gov Entity
Company Size
5,000+
Environment
Self-Hosted
Incident
Active data exfiltration
01 · The Situation

Customer Couldn't Tell Who Is Accessing A Resource

01

3rd Party CRM

Self Hosted CRM, one of the market leader vendors

02

Elite IR Teams Trying For Weeks

Combined efforts of internal and external IR teams

03

Sensitive Customer Data Still Leaking

Classified records leakage, from a gov agency that has huge potential damage, continuously leaking to the public.

02 · Without Unfold

The Reality Before

01

Trying To Understand Who Is Accessing The Resource

Internal team trying to correlate between multiple resources (The asset, security products - EDR, FW, SIEM)

02

Two External IR Services Companies Called In

Reach out and hire 2 premium IR companies in order to accelerate the investigation process

03

Still, No Lead

After multiple weeks of manual investigation, they can't still determine who is the actor and what is the root cause

04

Negotiating With Attacker

Trying to reach out and interact with attacker in order to stop the incident

03 · With Unfold

Resolution in Minutes

01

Understanding the application in minutes

Using the Unfolding process, unfold learned the CRM deeply - its events, entities, protocols, and operational patterns.

02

Unfold Ships Correlated Events

Unfold Maps every user activity to any product functionality - Answering the question - which user triggered the export and from which IP.

03

From Installation To Remediation In Minutes

Immediately after the next export attempt, The Team was able to block the specific actor using the FW.

04

On-Going Monitoring

Telemetry pipeline from the CRM to the Customer's SIEM was built and continuously monitoring the asset.

04 · Impact

The Numbers

Time To Detect
From weeks of IR
2 Hours
Total Project Cost Reduced
Future cost avoided for all events
70%
Per App
Regulation Violations Avoided
Due to the security breach
5
Under The Hood

How Unfolding Works

How Unfolding Works
01
Connect to Any Source
02
Build & Tailor the Connector
03
Ship Normalized Detection-Ready Scheme
04
Security-Grade Visibility Across Your Environment
The Difference

CRM App — Export All Customer Data

Without Unfold
{
  "data" : "INFO 192.168.4.22 2026-03-07T09:42:15 /api/v3/reports/customers/export"
}
With Unfold
{
  "timestamp": "2026-03-07T09:42:15",
  "event_id": 4055,
  "target_id": "crm_core_prod",
  "actor_name": "sarah.connor",
  "source_ip": "192.168.4.22",
  "action_category": "data_export",
  "action_name": "mass_customer_export",
  "resource_accessed": "customer_database",
  "export_format": "CSV",
  "records_exported": 84591,
  "request_uri": "/api/v3/reports/customers/export",
  "severity": "HIGH",
  "risk_flag": "bulk_data_extraction"
}
Case Study

Bring Modern Security Capabilities Into A Proprietary HMI

An OT System Integrator wanted to add threat detection on top of their HMI's.

Sector
Critical Infra (Oil & Gas, Rail, Airports)
Company Size
10,000 +
Environment
OT/On-Prem
Initiative
Embedded Threat Detection for HMI
01 · The Situation

Add Visibility To Critical HMI Applications

01

Old HMI Application, No Current Support

Application Owner left the organization, legacy outdated documentation only

02

Not A Security Company, With A Security Need

Core business is industrial operations, not software. Security talent is scarce, expensive, and hard to retain

03

Hiring Pro Service That Are Not Domain Experts

Team was worried the consultants are generalists, not OT or HMI specialists

04

Estimated Project Costs — $2M

8-12 month engagement

02 · Without Unfold

The Reality Before

01

Months Just To Kickoff

Security consultancy spends 3-4 months just understanding the HMI architecture, protocols, and data flows.

02

Need Multiple TDR Products With Major Customization

Find a product that support their HMI's (Complex Deployment, Multiple Program Language's)

03

Maintenance Is Impossible

Pushing a firmware update will cause parser to break, detections stop firing. Start the project all over.

04

Competitors Are Moving

Their customers are asking for security visibility. If you can't offer it, someone else will package it into their HMI.

03 · With Unfold

Resolution in Days

01

Understanding The Application In Minutes

Using the Unfolding process, unfold learned the HMI deeply - its events, entities, protocols, and operational patterns.

02

Built A Single Tailored Product

Supports the architecture, programming language and complex deployment environment.

03

Ship A Security Product, Not A Consulting Engagement

Support and adapt to any firmware update - make sure parsers not break, detections are running.

04

Ongoing Monitoring

Installed on 3 beta customers instances in weeks.

04 · Impact

The Numbers

Time To Coverage
From 25 weeks of engineering
1 Week
Total Project Cost Reduced
Intended payment for PS Company
70%
New Customers
Due to adding security capabilities
3
Case Study

Red Team Moved Through Jenkins With Zero Detection

A pen test exposed what everyone missed — red team moved through the organization's most critical CI/CD system with zero detection.

Sector
Industrial
Company Size
3,000 - 5,000
Environment
On-Prem
Trigger
Failed pen test finding
01 · The Situation

The Pen Test Passed Through Jenkins. Nobody Saw It.

01

Red Team Created A User Via Admin Console

Code executed, new account created, role assigned, privileges escalated. Standard attack chain. Zero detection.

02

Investigation Couldn't Answer Basic Questions

Who was the admin? What user was created? What permissions were granted? When? Jenkins logs couldn't answer any of it.

03

No SIEM Integration Exists

No connector in any marketplace. No structured audit trail. Data buried in flat text files — unstructured, incomplete.

04

CISO Report: Critical Gap

The most important system in the software supply chain. Zero detection coverage. Zero investigation capability.

02 · Without Unfold

The Reality Before

01

Find The Owner, Get Access

Track down who owns Jenkins. Request access. Wait. Schedule meetings. Weeks before security work starts.

02

Figure Out What's Even Logged

Inspect runtime behavior. Modify logging config. Coordinate every change with DevOps.

03

Build A Parser From Scratch

Pull raw events. Write a custom parser. Structure the output manually. Test. It breaks on edge cases. Repeat for weeks.

04

Write Detections Blind

Build a custom SIEM connector. Write detection rules without knowing what normal looks like. Months of work.

03 · With Unfold

Resolution in Hours

01

Jenkins Understood In Minutes

The Unfolding process mapped every entity: user creation, role assignment, admin actions, code execution, pipeline triggers.

02

Structured Telemetry Flowing Immediately

Normalized data in the SIEM. The pen test scenario fully visible, queryable, alertable.

03

Detection Rules Written In Minutes

Every entity, action, and relationship already structured. Detection team writes rules against clean, semantic data.

04

Jenkins Works Like Any Other Source

No chasing owners. No parsing flat logs. Next pen test? The SOC sees it in real time.

The Difference

Jenkins User Creation Event

Without Unfold
Feb 19, 2026 12:31:53.251
PM/securityRealm/createAccountByAdmin by
admin
from 172.19.0.1
With Unfold
{
  "timestamp": "2026-02-24T14:22:08",
  "event_id": 8213,
  "target_id": "jenkins_PROD_01",
  "actor_name": "mchen",
  "source_ip": "10.142.8.47",
  "action_category": "user_management",
  "action_name": "user_created",
  "target_user": "apatil",
  "auth_realm": "jenkins_internal",
  "permissions_granted": ["Overall/Read"],
  "request_uri": "/securityRealm/createAccountByAdmin",
  "http_method": "POST"
}
04 · Impact

The Numbers

Time To Full Integration
From months of manual work
1 Day
Detection Coverage
From 5% visibility on Jenkins
100%
Investigation Time
From days of manual log hunting
Minutes
Case Study

Unlocking Vendor Lock For An EMR Product

A healthcare medical clinic company wanted to integrate different EMR's into a centralized Data-lake.

Sector
Healthcare
Company Size
5,000 +
Environment
Cloud
Initiative
AI Data lake for BI
01 · The Situation

Too Much Product Fragmentation Stopping The Org From Using AI

01

Acquiring 40–50 Clinics Per Year, Each Uses A Different EMR

Intention to expand and accelerate the M&A Process.

02

Vendor Lock-In Preventing Data Extraction

Some are EOL, others blocking access due to competitive reasons.

03

Using Microsoft Fabric As A Data Lake

Budgeted Project run BI Analytics using AI on top of the data lake.

02 · Without Unfold

The Reality Before

01

A Lot Of Time To Kickoff

A dedicated integration team of 4 engineers assigned full-time. Their job: reverse-engineer each EMR and build a custom pipeline.

02

Delaying Future M&A's

Each EMR takes 4-6 weeks. Different schemas, different formats. Every connector is built from scratch.

03

Maintenance Is Impossible

When a vendor pushes an update, pipelines break. The team spends 30% of their time fixing what already worked.

04

Locked By Design

No APIs exposed. No documentation shared. No official connector exists.

03 · With Unfold

Resolution in Days

01

Understanding The Application In Minutes

Using the Unfolding process, unfold learned the EMR deeply - its events, entities, protocols, and operational patterns.

02

Creating Normalized Data From Different Products

Once app is Unfolded, all the data it extracts is already normalized.

03

AI Enabled In The Org

AI initiative unblocked. Analytics and models running on clean, unified data from every clinic.

04

Vendor Agnostic — Continues M&A Without Bottleneck

Using Unfold, Org now not tied down to single EMR. Next acquisition? Same process. Hours, not months.

04 · Impact

The Numbers

Time To Add New Source
From 25 weeks of engineering
1 Week
Total Project Cost Reduced
Internal Team Efforts Cost
70%
Per EMR
Organization Efficiency
Due to AI enabled on top of its data
+45%