Research Project: This is a free AI research project. No warranties, SLAs, or company associations. Learn more

Autonomous MDR Control Plane
Overlay, Not Replace

Verified remediation.
Audit-grade evidence.

Autonomous MDR that overlays your existing MSP stack and executes only policy-gated, reversible ChangeSets.

Every action is scoped, every action has a rollback, and every action produces a SHA-256 hashed evidence record. DRY_RUN any ChangeSet before committing. No rip-and-replace. No black-box automation.

Signal
Investigate
ChangeSet
Evidence
Verified ChangeSets
Policy-checked, scoped, reversible
Evidence Ledger
SHA-256 hashed audit trail
Overlay Architecture
Works on top of your existing stack

Every ChangeSet is policy-gated. Every action is reversible. Every outcome has a receipt.

4,968+
Tests
Every push verified
6
ChangeSet Types
Each with tested rollback
30
Sentinels
Continuous monitoring
5
Connectors
EDR, Identity, PSA, Backup
56
Isolation Tests
Multi-tenant verified
13
MITRE Stages
Full kill chain coverage
The Problem

The MSP model is insolvent

Escalating costs, rising risks, and no context. The current approach doesn't scale.

0%
Alert Crisis

of alerts are false positives. Your team is drowning in noise while real threats slip through.

+0%
Insurance Squeeze

premium increases year-over-year. Carriers demand evidence MSPs can't produce.

2025
Compliance Burden

CMMC Level 2 deadline (Nov 2025). Most MSPs lack the evidence chain to pass.

Legacy Resolution Time
4-8 Hours

Average time from alert to resolution. Zero context preserved between incidents. Every ticket starts from scratch.

No memory
No learning
No evidence
How It Works

Three pillars. Zero hand-waving.

Every claim below has a code path you can inspect. See the truth table in our positioning docs.

Verified ChangeSets

Every remediation is policy-checked, scoped, and reversible.

  • 6 ChangeSet templates: isolate endpoint, disable account, quarantine email, contain lateral movement, rollback policy, preempt ransomware
  • 5 approval levels: AUTO, SINGLE, DUAL, ADMIN, EMERGENCY
  • DRY_RUN mode: preview exactly what will happen before committing
  • Blast-radius verification: scope boundaries confirmed before execution
  • Tested rollback procedures for every ChangeSet type

Evidence Ledger

Every action has a receipt. Every receipt has a hash.

  • SHA-256 hashed evidence artifacts with chain-linked integrity verification
  • 10 evidence types: observation, analysis, decision, execution, verification, and more
  • Merkle-like chain hashing for tamper detection
  • Insurance questionnaire answers cite specific evidence with timestamps and hashes
  • PSA ticket creation with full evidence context (ConnectWise, HaloPSA)

Overlay, Not Replace

Sits on top of your stack. No migration. No rip-and-replace.

  • Connectors for Acronis, Microsoft Defender, Entra ID, ConnectWise Manage, HaloPSA
  • Edge agent deploys alongside your existing RMM β€” does not replace it
  • 30+ edge tools for Windows, macOS, Linux
  • Per-tenant connector credentials, encrypted and isolated
  • Multi-tenant row-level security verified by 56 automated tests
Agentic Architecture

20 specialized agents, one reasoning engine

Each agent observes a specific domain. The central brain synthesizes context and decides.

ReasoningEngine
Claude
EndpointObserver
PatchOrchestrator
SecurityResponder
FleetLearning
Telemetry IN
Commands OUT
5
Observe Agents
Endpoint, Backup, Network
5
Orchestrate Agents
Patch, Deploy, Remediate
3
Secure Agents
Threat, Compliance, Insurance
4
Learn Agents
Pattern, Anomaly, Optimize

Every agent runs its own OODA loop. Every decision gets evidence. Every outcome feeds learning.

Semantic Memory

Every incident lives in vector space

The brain doesn't search keywordsβ€”it understands meaning. Similar problems cluster together, and solutions propagate automatically.

A
B
Cosine Distance
< 0.2
Semantic Match Found
Similar incident from 2 months ago

The Learning Flywheel

πŸ”΄
Incident
New alert arrives
πŸ”§
Resolve
Human or AI fixes it
πŸ“
Vectorize
Embed into 1024d space
πŸ’Ύ
Store
HNSW index for fast retrieval
πŸ”„
Match
Similar incidents found instantly
Powered by:PostgreSQL + pgvector|HNSW Index|1024d Embeddings|42 Vendor Tools
The Evolutionary BrainAgentic GenAI

AI that thinks, learns, and justifies

Not a chatbot. Not a rules engine. A Claude-powered reasoning system that runs OODA loops every 10 seconds, stores every decision in vector memory, and gets smarter from outcomes.

Traditional Automation

Scripts run when triggered. No reasoning. Brittle when conditions change.

β€œAI-Powered” Tools

ML detects anomalies. Chatbot answers questions. Humans still do the work.

Agentic GenAI (Us)

LLM reasons through problems. Takes autonomous action. Learns from outcomes.

Vector Memory

Semantic search across all decisions

# Every decision becomes a vector
embedding = text-embedding-3-large(decision)
dimensions: 1024
index: pgvector HNSW
Pattern Discovery: Similar problems cluster togetherβ€”find past solutions instantly
Cross-Tenant Learning: Anonymized patterns improve all tenants (with consent)
Evidence Chains: Every decision includes SHA-256 hash for audit trail

Confidence-Based Autonomy

Trust scales with certainty

<70%
70-84%
85%+
85%+Auto-Execute

High confidence actions execute automatically

70-84%Notify

Medium confidence triggers notification

<70%Require Approval

Low confidence requires human approval

Key insight: Unlike black-box AI, the brain admits uncertainty. Low confidence = human decision.

How Every Decision Gets Made

Signal
Telemetry arrives from integrations and edge agents
Classify
Brain classifies signal type and urgency
Reason
Claude-powered reasoning with vector context
Act
Execute action or escalate to human
Learning Loop

The system gets smarter from every outcome

When an action succeeds, confidence increases. When it fails, the brain learns why. Over time, your BrainstormMSP instance becomes an expert on your environment.

Success β†’ Higher confidence
Failure β†’ Learning update
Pattern β†’ Cross-fleet insight
10s
OODA Cycle
1024d
Vector Dimensions
4,968+
Test Coverage
SHA-256
Evidence Hashing
Always Watching

30 Sentinels Monitoring Every Dependency

5 tiers of autonomous monitoring: Platform, Vendor, AI, Intelligence, and Fleet. Each sentinel probes, assesses, heals, and escalates β€” before you even notice.

8
Platform
6
Vendor
5
AI
7
Intelligence
4
Fleet
The Problem

Why MSPs struggle to deliver MDR

The gap between "we offer security services" and "we can prove what we did" is where trust breaks down.

Third-party MDR is a black box

When a client asks "what happened?", you have to ask your MDR provider and wait. No evidence, no control, no visibility.

Automation without guardrails is reckless

"Autonomous SOC" without policy verification, blast-radius limits, or rollback isn't autonomy β€” it's gambling.

Assembling a stack creates more work

Open-source components shift the integration burden to you. You trade vendor lock-in for operational complexity.

Remediation has no receipts

Most tools tell you "action taken." They don't tell you what specifically happened, why, or how to undo it.

Multi-tenant is an afterthought

Application-level tenant filters hope nothing leaks. Database-level row-level security guarantees it.

Architecture Matters

You can't bolt AI onto legacy

A chatbot feature doesn't make you AI-native. The thinking must be at the core.

Legacy + AI Feature

AI bolted on as an afterthought

Monolithic Codebase
Alerts
Tickets
Reports
Patches
AI Chatbot
bolted-on
No context between features
AI can't take action
Learning trapped in chat logs
Evidence not connected

AI-Native Architecture

OODA loop at the core

AI Core
O
β†’
O
β†’
D
β†’
A
Alerts
Tickets
Reports
Patches
Evidence
Learning
Every feature connected to reasoning
AI acts with evidence
Learning compounds across all data
Full provenance chain
β€œThe machine manages itself. The human manages outcomes.”
Safety & Governance

Autonomy with guardrails

Every safety mechanism is enforced by code, not policy documents. These are structural guarantees.

SafeguardHow it works
Policy-gated execution
Every ChangeSet is checked against your tenant's autonomy policy before execution. No action runs without passing the policy gate.
Blast-radius caps
Every ChangeSet declares the resources it will affect. If the scope exceeds your policy limits, execution is blocked.
Tested rollback
Every ChangeSet type has a rollback procedure that is validated before execution. If rollback can't be verified, the action requires elevated approval.
DRY_RUN before commit
Any ChangeSet can be fully evaluated β€” policy checks, blast-radius, rollback verification β€” without executing. See exactly what would happen.
Configurable autonomy
Start supervised (human approves everything). Move to guarded (low-risk auto-executes). Graduate to autopilot (policy-granted autonomy). You control the dial.
ControlGraph

Trust, but verify everything

Every vendor claim gets validated. Every piece of evidence gets certified. The brain never guesses.

Layer 1: Raw Vendor Telemetry
Alert: Critical
Backup OK
Scan: 0 threats
Patch pending
Auth failed
CPU: 89%
Disk: healthy
License OK
Unverified claims from 42 vendor APIs
FILTER
Layer 2: ControlGraph Certification
Schema Valid
Timestamp Fresh
Tenant Isolated
Source Verified
Contract Passed
Hash Computed
733 contract tests|β€œNever Guess” Policy
Layer 3: Certified Evidence
Backup: Verified
SHA-256: a4f2...
Patch: Applied
SHA-256: c7e9...
Scan: Clean
SHA-256: 3b1d...
Auth: Secured
SHA-256: f8a2...
Ready for insurance submission, audit, or AI reasoning
42
Integrations
733
Contract Tests
100%
Evidence Chains
Test Rigor

4,725+ tests. Every push.

We don't ship hope. We ship proof. Every feature tested, every integration verified.

brainstorm-msp β€” pytest
$ ./scripts/qa/ga.sh
Running CI/CD Pipeline...4,725+PASS
Running Contract Tests...733PASS
Running API Endpoints...771PASS
Running Unit Tests...3,265+PASS
Running Tenant Isolation...56PASS
Running RBAC Checks...49PASS
Test Suite Complete
GREEN BUILD
2026-02-15 12:46:36 UTC
100%
Code Coverage
Critical paths
< 2min
Build Time
CI/CD pipeline
0
Known Issues
In production
99.9%
Uptime
Last 30 days
Use Cases

Signal. ChangeSet. Evidence.

Each scenario follows the same loop: detect the threat, propose a scoped remediation, execute with a receipt.

Ransomware Containment

Signal

Defender detects ransomware behavior on endpoint.

ChangeSet

Isolate endpoint, disable user account, trigger emergency backup snapshot.

Evidence

Hashed detection record, isolation timestamp, account disable confirmation, PSA ticket with full timeline.

Identity Compromise

Signal

Entra ID reports impossible travel β€” login from two countries in 30 minutes.

ChangeSet

Revoke all sessions, force MFA re-enrollment, restrict access to sensitive apps.

Evidence

Login event hashes, geographic analysis, MFA state before/after, policy change record.

Phishing / O365 Takeover

Signal

Email forwarding rule created to external address.

ChangeSet

Remove malicious rule, force password reset, revoke sessions, quarantine forwarded messages.

Evidence

Rule details, session timeline, remediation confirmations, quarantine receipts.

Lateral Movement

Signal

Edge agent detects unusual SMB traffic between workstations.

ChangeSet

Isolate source endpoint, block SMB between affected hosts, rotate exposed credentials.

Evidence

Network flow records, isolation confirmation, block verification, rotation timestamps.

Verifiable Outcomes

What you can verify yourself

Every claim has a receipt. Every action leaves a trail.

Evidence chain hashes

Every compliance artifact includes a SHA-256 hash. You can independently verify the content hasn't changed.

Autonomous action logs

Every Edge decision includes the OODA reasoning chain: what was observed, how it was interpreted, what options were considered, why this action was chosen.

Integration health history

Every API call, every failure, every remediation attempt is logged with timestamps. You can see exactly when an integration degraded and what was done about it.

Questionnaire citations

Every insurance questionnaire answer links to source evidence. Underwriters can follow the chain themselves.

Works with your existing stack

42 vendor integrations with self-healing connectors. When an OAuth token expires, the system renews it and logs the remediation.

ConnectWise PSA logo
HaloPSA logo
Datto Autotask logo
Kaseya BMS logo
SyncroMSP logo
Atera logo
Freshservice logo
Zendesk logo
ServiceNow logo
SuperOps.ai logo
Accelo logo
RepairShopr logo
Insurance Wedge

Evidence that carriers trust

Every compliance claim backed by cryptographic proof. Underwriters can verify themselves.

Compliance Check

CIS v8.1 controls evaluated in real-time

Artifact Generation

PDF reports with timestamped evidence

SHA-256 Hashing

Immutable proof of artifact integrity

Carrier Submission

Automated questionnaire prefill

8 Carrier Templates with Evidence Citations

Coalition
Premier
At-Bay
Premier
Cowbell
Standard
Travelers
Standard
CFC
Standard
Corvus
Standard
Chubb
Enterprise
Beazley
Enterprise

Insurance Integration Benchmark

0-1
Carrier integrations
ConnectWiseDattoNinjaRMM
8
Carrier integrations
BrainstormMSP
Market Opportunity

Three markets converging

The intersection of cyber insurance, compliance, and RMM creates a new categoryβ€”and we're first.

Cyber Insurance Tech$16.5BMSP Compliance$4.8BRMM Software$3.2BBrainstormMSP$25B+TAM
$16.5B
Cyber Insurance Tech
$4.8B
MSP Compliance Tools
$3.2B
RMM Software
Cyber insurance: 21% CAGR
Compliance: 15% CAGR
RMM: 12% CAGR
Category of One

Where we stand

No one else combines autonomous AI agents with insurance-grade evidence.

Siloed ToolsInsurance-Integrated
Manual OperationsAutonomous Agents
Point Solutions
Insurance tools without RMM
Compliance scannersRisk assessmentsPolicy managers
BrainstormMSP
Category of One
AI-native RMMInsurance evidenceAutonomous agents
Legacy RMM
Manual with bolt-on features
ConnectWiseDattoNinjaRMM
Modern RMM
Automation without evidence
Scripted automationNo insurance tie-inAlert fatigue

Competitors are either insurance tools without RMM or RMM without insurance integration. We're the only platform that does bothβ€”autonomously.

Who this is for (and who it isn't)

This is for you if:

  • You're an MSP adding security services and need MDR you can deliver with your existing stack
  • You need audit-grade evidence of remediation β€” not just "ticket closed"
  • You want to control how much autonomy the system has, starting from zero
  • You need multi-tenant isolation that's structural, not optional
  • You want to DRY_RUN any action before committing to it

This is NOT for you if:

  • You want to replace your entire RMM/PSA/EDR stack with one platform
  • You want fully autonomous remediation with no human oversight ever
  • You don't have an existing EDR or RMM foundation to connect to
  • You need a managed service β€” we're a control plane, not a SOC team

Your tools stay. We add a control plane.

BrainstormMSP connects to your existing RMM, PSA, EDR, and backup tools. The edge agent deploys alongside your current RMM agent. Connector credentials are per-tenant and encrypted. We orchestrate your stack β€” we don't replace it.

Platform Security Posture

Multi-Tenant Isolation
RLS Enforced
AES-256 Encryption
At Rest
CIS v8.1 Aligned
56 Safeguards
HTTPS Only
In Transit

Calculate potential savings

See what autonomous backup triage could save you in time and tickets.

1030 clients200

Monthly Savings

$10,800

Annual Savings

$129,600

Tickets Eliminated

240/mo

Based on 16 tickets/client/month, 50% noise reduction, $45/ticket cost

Frequently Asked Questions

See the loop. See the evidence.

Walk through a live signal β†’ investigation β†’ ChangeSet β†’ DRY_RUN β†’ execution β†’ evidence chain. No slides. No promises. Just the mechanism.

Start with Supervised MDR. Upgrade to Guarded or Autopilot when you're ready.