PRIAM CYBER AI · LONDON

Investigate,
then conclude
on evidence, not opinion.

AVA brings the discipline of a senior analyst to every alert. Hypothesis-driven triage, tested against your environment, ending in a verdict your team can defend — true positive, false positive, or a precise specification of what evidence is still missing. Forensic-grade. Audit-ready. Defensible by construction.

What it is
An Investigation Discipline for the SOC — autonomous L1 triage that closes alerts with a defensible verdict.
What it isn't
Not an alert summariser. Not an AI tool that fabricates certainty. Not a SOAR playbook in chat.
Who runs it
Enterprise SOCs and MSSP / MDR teams running cloud, on-prem, or private.
§POSITIONING · 01

Three categories.
One of them investigates.

The SOC market has spent a decade arguing about detection sensitivity and automation throughput. AVA is in a third category — the one most products skip — where evidence is gathered, hypotheses are tested, and a verdict gets made.

01 · Detection

Surfacing what looks anomalous.

SIEM and XDR rules surface events. Volume is the metric. False-positive density is the consequence. The decision is still pending.

02 · Automation

Executing pre-decided playbooks.

SOAR runs the steps an analyst already wrote. Speed is the metric. Coverage is bounded by the playbook library. Judgment is still pending.

03 · Investigation

Concluding on evidence.

AVA gathers evidence, tests hypotheses against your environment, and returns a verdict your team can defend. Discipline is the metric. The decision arrives with the alert.

Where AVA lives
§METHODOLOGY · 02

Depth, by design.

Hypothesis-driven, evidence-bound, defensible by construction. Four capabilities define the Investigation Discipline. None of them is the one your team would have skipped.

CAPABILITY · 01

Hypothesis-driven triage.

Every alert enters investigation with multiple competing Investigation Hypotheses — malicious and benign — drawn from MITRE ATT&CK and the alert's own context. AVA tests them. The one supported by evidence becomes the verdict.

SANS · PEAK · TaHiTI lineage, applied to triage.
CAPABILITY · 02

Tested against your environment.

Hypotheses are evaluated against the user, the asset, the historical baseline, and the operational context — not in the abstract. Two identical alerts on two different assets produce two different investigations.

Contextual grounding, not pattern matching.
CAPABILITY · 03

An evidence chain, not a summary.

Every claim in the verdict resolves to a query, a log, a process tree, or an identity event — captured, citable, and timestamped. Cross-source corroboration is built in: EDR and SIEM independently confirm the same event. The Investigation Report is the artifact an examiner can walk through line by line.

Audit-ready by construction.
CAPABILITY · 04

A third verdict, when evidence is insufficient.

When AVA can't conclude, it says so — and specifies exactly what evidence is missing. INCONCLUSIVE is a feature, not a fallback. Every investigation compounds: outcomes route into the priors, future investigations get sharper.

Evidence sufficiency determines the verdict.

When AVA can't conclude,
AVA shows what's missing.

Evidence Gaps · Inconclusive Verdict
  • CTI tool unavailable — reputation verdict not rendered
  • Internal-only IP — no public attribution surface
  • Endpoint telemetry absent — behavioural corroboration unavailable
  • Cross-source corroboration interrupted — confidence ceiling capped

This is not the absence of evidence. It is the audit-grade declaration of it.

The Investigation Report is not a paragraph.
It's a record.

Read it the way an examiner would — the verdict, the evidence beneath it, the reasoning that connects them, the gaps that bound it, the actions it recommends.

  • For the analystThe verdict and the chain that supports it.
  • For the auditorThe reasoning, traceable end to end.
  • For the SOC managerThe decision and what comes next.

One artifact. Three readings. The shape of a defensible decision.

INVESTIGATION REPORT
PRM-2026-04-2841 · 28 Apr 2026 · 14:07 UTC
Tenant — Northwind Energy · EU-WEST
TRUE POSITIVE
Investigation-grade confidence
High · evidence-bound

Suspicious PowerShell access to LSASS on a privileged endpoint.

Alert raised by Microsoft Defender for Endpoint · sev. medium · MITRE ATT&CK T1003.001 (LSASS Memory).

Investigation Hypotheses · tested
Malicious scenario

Credential-dumping attempt against LSASS via comsvcs.dll MiniDump, executed under elevated PowerShell on host NW-FIN-W11-204.

— Supported by evidence
Benign scenario

Sanctioned IR or red-team exercise; or an EDR self-test triggering identical signatures.

— Rejected
Verdict synthesis

Process tree, parent-child lineage, and command-line entropy on host NW-FIN-W11-204 match the malicious scenario. No sanctioned IR engagement or red-team window covers this activity. Identity context shows the user signed in from an unusual ASN seventeen minutes prior. Evidence is sufficient to conclude.

Recommended containment

Isolate NW-FIN-W11-204 at the network layer; force credential reset for the affected identity; preserve LSASS dump artifact for forensics. Confidence sufficient for automatic action with analyst sign-off.

MITRE T1003.001 MITRE T1059.001 Endpoint Identity Credential access
Audit trail
    Evidence chain · selected

    EDR · proc tree captured · powershell.exe → rundll32.exe comsvcs.dll, MiniDump
    IDP · sign-in from ASN 14061 · 17 min prior · unusual
    BASE · host has no prior LSASS-handle history

    Generated by AVA · Investigation Discipline Defensible by construction
    §OPERATING MODELS · 04

    Built for two operating models, not retrofitted for both.

    In-house SOC and managed service provider operate against different economics, different audit pressures, and different definitions of done. AVA's operating posture changes with them; the Investigation Discipline does not.

    FOR ENTERPRISE SOC

    For the team that owns its own verdicts.

    AVA closes L1 with an evidence-backed Investigation Report your senior analysts can defend in the next audit, the next board review, and the next post-incident write-up. Every verdict carries its evidence chain.

    Native connectors into your existing Defender, CrowdStrike, Sentinel, or QRadar stack. No rip-and-replace. No new SIEM.

    What your senior analysts do with the time AVA returns —
    threat-hunt, not triage backlog. Tune detections, not chase false positives.
    FOR MSSPs & MDR

    For the team that owns everyone else's verdicts.

    One Investigation Discipline across every tenant. Per-tenant context, per-tenant evidence, per-tenant Investigation Report — without rebuilding the playbook library each time you onboard.

    Multi-tenant by construction. Cloud, on-prem, or private — sovereignty is a constraint, not a compromise.

    Each new tenant onboards with their existing stack — not yours. Every new SIEM, EDR, or XDR is a single integration class away. No rebuild. No mapping spreadsheet.

    Scale your client book without scaling your analyst headcount.
    The same team handles materially more accounts when AVA owns L1.
    §DETECTION ENGINEERING · 05

    Beyond the verdict,
    the discipline continues.

    The verdict is one artifact. The Co-Pilot is the next — an interactive surface where AVA continues, and the analyst directs. Detection engineering, root cause work, plain-English investigation across the stack — autonomous when configured, hand-off when judgment must be human.

    The verdict is not the end of the discipline.

    Beyond it, AVA continues — drafting the next detection, opening the next investigation thread, pivoting across the endpoint in plain English, composing the next containment.

    How far AVA goes is a setting, not a guess.
    Run autonomous, with every step on the record.
    Hand the keys to the analyst, when judgment must be human.

    The Co-Pilot is the seam between the two — conversational, tool-aware, and always auditable.

    Detection engineering, not as a separate team — as the verdict's natural conclusion.

    §SECTORS · 06

    The methodology is sector-agnostic. The constraints are not.

    Three filters define an AVA customer. The role you play in the SOC. The audit weight your industry carries. The shape your deployment must take. None of them is the one we ranked first.

    01 · Role

    Anyone running a SOC.

    If you operate a Security Operations Center — or pay for one — AVA fits. The methodology is sector-agnostic. What changes by sector is the regulatory weight and the type of evidence required.

    • Enterprise CISO & SOC lead In-house
    • Mid-market security manager Lean team
    • MSSP operations director Multi-tenant
    • MDR provider lead 24×7
    A fraction of the analyst hours, the same Investigation Discipline.
    02 · Regulation

    Where audit weight is heaviest.

    Different regulators, same core question — can you defend this verdict in front of an examiner? AVA's evidence chain and audit trail are built for that moment by construction.

    • Critical infrastructure NIS2 · sovereignty
    • Financial services DORA · FCA · PRA · GDPR
    • Healthcare & life sciences GDPR · HIPAA
    • Public sector Sovereignty · classified-ready
    Listed at peer weight — none ranked first.
    03 · Deployment

    Where deployment shape matters.

    Cloud, on-prem, or private — sovereignty is a constraint, not a compromise. The methodology doesn't change with the deployment shape. The audit trail still resolves. The verdict is still defensible.

    Cloud
    Multi-tenant SaaS, region-pinned.
    On-prem
    Single-tenant, your perimeter.
    Private / Sovereign
    On-prem or private-cloud AVA. Inference partner of your choice — cloud, private, or sovereign.
    Where your data must stay, AVA stays.
    §NUMBERS · 07

    Numbers describe the discipline.
    Evidence describes the verdict.

    We don't quote inflated MTTR reductions as marketing figures. The numbers below describe AVA's <em>structural commitments</em>, observed pilot outcomes, and published industry baselines — labelled accordingly. Where a number is modelled, the model is named.

    9,334
    Alerts investigated
    Observed — Q4 2025 pilot, energy sector. Every alert investigated, including the ones the team would have skipped.
    97%
    False-positive closure
    Observed — same deployment. Closed with a defensible Investigation Report, not auto-suppressed.
    35–601–2
    L1 triage · minutes
    Industry baseline → observed compression. Q4 2025 pilot, energy sector.
    15024
    L2 investigation · minutes
    Industry baseline → observed compression. Same deployment.
    Customers per analyst
    Observed — multi-tenant MSSP deployment. The same team handles materially more accounts when AVA owns L1.
    10×
    Analyst throughput
    Modelled from L1+L2 compression. Methodology disclosed on request.
    100%
    Alert coverage
    Architectural commitment — every alert investigated, including the ones a manual queue would skip.
    $4.82M
    Avg breach cost · critical infra
    Industry baseline — IBM Cost of a Data Breach Report 2024. Why the third verdict matters.
    0
    Unexplained actions
    Architectural commitment. Every action in the audit trail resolves to evidence.
    §INTEGRATIONS · 08

    Native connectors into the stack you already run.

    AVA reads from the systems your analysts already trust. No rip-and-replace, no new SIEM, no parallel pipeline. Every report carries an evidence trail back to the source.

    Microsoft Defender
    XDR · Microsoft
    CrowdStrike Falcon
    EDR · CrowdStrike
    Cortex XDR
    XDR · Palo Alto
    TrendMicro Vision One
    EDR / XDR · Trend Micro
    Microsoft Sentinel
    SIEM · Microsoft
    IBM QRadar
    SIEM · IBM
    Elastic Security
    SIEM · Elastic
    Trellix SIEM
    SIEM · Trellix
    FortiSIEM
    SIEM · Fortinet
    Wazuh
    SIEM · open-source
    Cortex XSOAR
    SOAR · Palo Alto
    RST Cloud
    CTI · threat intel
    VirusTotal
    CTI · file & URL
    AbuseIPDB
    CTI · IP reputation
    AlienVault OTX
    CTI · open exchange
    Threatmon
    CTI · threat intel
    Zendesk
    ITSM · ticketing
    Slack
    Comms · workspace
    Extensible adapter pattern. Connectors listed include built-in, partner, and roadmap — a single integration class per new source.
    THE OFFER · 09

    See AVA investigate your own alerts.

    Every alert investigated, every investigation compounding. Send us one sanitised alert; we send back a full Investigation Report in 48 hours — verdict, evidence chain, audit trail, the report your team would defend.