Drop Your Documents.
Train Your Agents.
Upload the documents your team already has — vendor contracts, asset inventories, network diagrams — and Liberty91 builds a living, structured threat profile for every organisation in your account.
Start Free Trial
One click tells you exactly which organisations are affected — and cites the documents that prove it.
The Problem.
Every time a new threat hits the wire, someone on your team has to figure out whether it actually matters to your organisation. That usually means digging through vendor contracts, asset inventories, and architecture documents that live in five different places.
For MSSPs and security teams managing multiple clients or business units, multiply that effort by every organisation under your responsibility. The question is always the same: are we affected?The answer shouldn't take hours to find.
How It Works.
Upload Your Documents
Drop PDFs, spreadsheets, slides, or plain text into any organisation or business unit. Vendor contracts, asset inventories, network diagrams, security policies — whatever describes what that org owns and who it depends on.
Confirm What Liberty91 Finds
Liberty91 indexes each document into a private knowledge base and automatically extracts the assets and suppliers it mentions — your Okta, your ServiceNow, your Palo Altos, your critical vendors. You review and confirm before anything is persisted.
Analyse Any Threat in One Click
Hit "Analyse now" on any threat event. Liberty91 checks it against every organisation in your account simultaneously and returns an executive summary — citing the specific documents and assets that connect.
Answers With Receipts.
When you analyse a threat event, Liberty91 doesn't just say “you might be affected.” It tells you exactly which organisations are affected and why — with citations back to your uploaded documents.
Example output
ACME Aviation is affected: the article discusses OAuth consent attacks in Microsoft Entra ID, and ACME's uploaded SSO architecture shows Okta with known Entra overlap.
Bravo Logistics — no connection identified. None of the uploaded documents reference Microsoft identity services or OAuth infrastructure.
1 click
Analyse any threat event against every organisation in your account simultaneously. Know where to focus — and where you can move on.
Private by Design.
Isolated Per Organisation
Every document goes into a private store owned by that organisation. Knowledge bases are completely separated — no data leaks between orgs or business units.
Analyst in the Loop
Extracted assets and suppliers are presented for your confirmation before anything is persisted. You decide what makes it into the threat profile.
Ready to do more with less?
Request a demo or start your free trial today. Get instant access to AI-powered threat intelligence tailored to your organisation.