Scandar OverwatchFleet AI security · from $349/mo
Have questions? Talk to usStart Free Trial
ENTERPRISESELF-SERVE IN 25 MINUTES

Your agents are running.
Who's watching them?

The only AI agent security platform that catches threats, contains them in milliseconds, and proves compliance — all without a professional services engagement.

Not a SIEM bolt-on. Not an LLM wrapper. Purpose-built for AI agents running in production.

Start Free TrialHave questions? Talk to us

14-day full-access trial · No credit card required · Cancel any time

analytics-repo…score 6research-pipel…score 22customer-supportscore 8billing-agent-v3score 78email-assistantscore 91DANGEROUS COMBO
SEE IT IN ACTION

From install to fleet-wide protection in 25 minutes.

Watch a real Overwatch deployment — SDK install, first agent detection, policy activation, kill chain caught, compliance report generated.

3-minute walkthrough
SDK install → first detection → policy activation → compliance report
DEMO
11
Detection Layers
44
Finding Categories
14
Encoding Decoders
100%
Detection Coverage
0.18ms
Overhead/Call
25min
Self-Serve Setup
THE COMPLETE AI SECURITY LIFECYCLE

Three layers. Every phase covered.

Overwatch is the fleet command layer — it sits on top of scandar-scan and scandar-guard to give you visibility, response, and compliance across your entire agent estate.

DEPLOY GATE
scandar-scan
Pre-deployment. 140+ rules across 5 scan types.
RUNTIME
scandar-guard
Runtime. 11 layers, canary tokens, honeypots, taint tracking. Free on all plans.
ENTERPRISE
Overwatch
Fleet. Incident response, quarantine, compliance, policies.
EU AI ACT · ENFORCEMENT DEADLINE

August 2, 2026. Penalties up to €35M or 7% of global revenue.

EU AI Act enforcement begins in months, not years. Overwatch auto-scores your entire agent fleet against EU AI Act articles, SOC 2, ISO 42001, NIST AI RMF, and GDPR — with evidence chains, gap analysis, and compliance report with PDF export for auditors. Most teams are production-ready in under 48 hours.

See the compliance timeline →OWASP LLM Top 10 · MITRE ATLAS · PDF export
WHY OVERWATCH

Built for one thing. Better at it than anything else.

Generic security tools weren't designed for agents. Overwatch was.

Not a SIEM bolt-on

SIEMs were built for logs, not for multi-turn agent conversations, tool call chains, and injection payloads encoded in 14 different formats.

Not an LLM wrapper

Routing every message through a secondary LLM adds latency, cost, and a new attack surface. Overwatch uses deterministic detection — fast, cheap, and auditable.

Purpose-built for agents

Kill chain graphs, blast radius simulation, agent identity fingerprinting, canary tokens, and fleet-wide quarantine. None of this exists anywhere else.

WHAT YOU GET ON DAY ONE

Production-ready in one afternoon.

0–5 min

Install Guard SDK

One-line wrapper around your LLM client. Python, TypeScript, or Go. No infrastructure changes.

5–10 min

See your fleet

Every agent appears automatically with tools, threat scores, and session history. Interactive graph with blast radius simulation.

10–15 min

Activate policies

Smart recommendations based on your agents' actual tool access. One-click activation. Simulate before deploying.

15–20 min

Connect alerts

Slack, PagerDuty, email, Teams, or custom webhook. Test alert in one click. Your oncall gets notified on the first real threat.

20–25 min

Run compliance

Auto-score against EU AI Act, SOC 2, ISO 42001, NIST AI RMF, GDPR. US and EU coverage in one report. Evidence chains tied to real runtime data. Export for auditors.

Done

Fleet is secured

Copy a summary for your CISO. Every agent monitored. Every threat contained in <15ms. Every compliance framework scored.

AUTOMATED INCIDENT RESPONSE

Threats contained
in 15 milliseconds.

When Guard detects a critical threat, the response is automatic. The session freezes. The agent is quarantined fleet-wide. A forensic snapshot is captured. Your team is alerted. All before the attacker's next tool call executes.

FreezeAll subsequent tool calls blocked instantly
QuarantineAgent blocked across your entire fleet via API (with retry + verification)
CascadeRelated agents sharing dangerous tools are quarantined automatically
ForensicsIncident ID, all findings, tool history, SHA-256 message hashes (privacy-preserving — no raw content stored), session duration
Alert blastSlack, PagerDuty, and webhooks notified simultaneously
INSTANT TRIGGERS — Honeypot, canary, and taint findings bypass threshold. Always respond.
INCIDENT RESPONSE TIMELINE
0ms
Threat detected
1ms
Session frozen
3ms
Forensics captured
8ms
Agent quarantined
12ms
Team alerted
15ms
Fleet cascaded
Total containment: <15 milliseconds*
*Measured in-process. Network propagation varies by region and fleet topology.
ZERO FALSE POSITIVE DETECTION

Irrefutable proof of compromise.

Not probabilistic alerts. Not "might be suspicious." Canary tokens, honeypot tools, and taint tracking provide mathematically certain proof that an agent is compromised.

CANARY TOKENS

Invisible leak detection

Zero-width unicode tokens injected into system prompts and tool results. Invisible to the model. Invisible to the attacker. If a canary appears in any outbound tool call — irrefutable proof of exfiltration.

Confidence: 0.99 · Per-call rotation
HONEYPOT TOOLS

Zero false positive traps

Fake tools that should never be called. admin_override, extract_credentials. If triggered — definitive proof of compromise. Fuzzy matching catches typo evasion.

Confidence: 1.0 · 8 default traps
TAINT TRACKING

Source → sink exfiltration

Fingerprints sensitive data from source tools. Detects it in outbound sinks. The URL isn't suspicious. The email isn't suspicious. But the data flowing through them is stolen.

SHA-256 hashing · Overlapping windows
DETECTION ENGINE

11 layers. Every message. Every call.

Every message, tool call, and response passes through all 11 layers. Findings compound into a composite threat score from 0–100.

01
Pattern Matching
26 regex patterns
02
Content Decoding
14 methods + recursive
03
Multi-Turn
Split injection tracking
04
Anomaly Detection
Sequences + spikes
05
Semantic Classifier
14 weighted signals
06
Multilingual
9 languages, 27 patterns
07
Tool Security
Args + results decoded
08
Schema Validation
Unknown tool detection
09
Reconciliation
Hidden tool calls
10
Consistency
False claims caught
11
Advanced
Canary + honeypot + taint
Cross-Session
Slow-burn correlation
UNDER THE HOOD

Built for engineers doing diligence.

Every mechanism is deterministic, auditable, and designed around a specific adversarial model. Here's how the non-obvious parts work.

CANARY TOKENS

Zero-width unicode encoding

A 6-byte random ID is encoded as invisible characters injected per-call: U+200B (0-bit), U+200C (1-bit), U+200D (separator), with U+2060 start and U+FEFF end markers. The token rotates with every API call — so a canary hit tells you exactly which call was exfiltrated, not just that something leaked. Three detection paths: invisible decode, visible token match, hex fragment match.

Confidence: 0.99 · If you see your canary returned, there is no other explanation.
CROSS-SESSION CORRELATION

Detecting adversarial patience

A single session may look benign. Twenty sessions tell a different story. Guard tracks each agent across up to 20 sessions, detecting three slow-burn patterns: monotonically escalating threat scores (≥70% increase across the last 5 sessions), the same encoded payload appearing in 2+ sessions (attacker retrying the same evasion), and gradual tool accumulation designed to stay below single-session anomaly thresholds.

CROSS_SESSION_ESCALATION · REPEATED_PAYLOAD · PRIVILEGE_ACCUMULATION
RECURSIVE DECODER

14 methods + depth-3 recursion

Decodes before pattern matching. Methods: Base64, Base32, Hex, ROT13, all 25 Caesar shifts, URL, HTML entities, leetspeak, zero-width stripping, RTL mark stripping, NFKD normalization, homoglyph normalization (Cyrillic/Greek→Latin), and reverse text. Recursive up to depth 3 catches triple-encoded payloads. Caesar brute-force only keeps variants that match an injection pattern — no false positives from 24 junk shifts.

HONEYPOT + FUZZY MATCH

Levenshtein typo-evasion detection

Trap tools with innocent-sounding descriptions. A legitimate agent should never call admin_override. Fuzzy matching normalizes separators then applies Levenshtein distance ≤2, catching variants like admin_0verride and admin-override. Exact match: confidence 1.0. Fuzzy match: confidence 0.95. Zero false positives by design.

SEMANTIC CLASSIFIER

Not ML. Deterministic weighted signals.

13 signals covering authority claims, role reassignment, constraint removal, false context, and secrecy requests. Compound bonuses: authority claim + constraint removal = +0.2 (classic social engineering). Catches paraphrased and synonym-based injections that bypass regex entirely. Zero latency overhead, fully auditable — every signal that fired is listed in the finding detail.

FLEET INTELLIGENCE

Every agent. One screen.

Live agent inventory with trust scores, tool access, session history, and behavioral baselines. Kill chain graph with blast radius simulation. Agent identity fingerprinting detects replacement mid-session.

Real-time graphKill chainsBlast radiusTime travelIdentity fingerprintingBehavioral baselines
COMPLIANCE & THREAT MAPPING

5 frameworks. Global coverage.

EU AI Act, SOC 2 Type II, ISO 42001, NIST AI RMF, GDPR — US, EU, and global frameworks assessed with evidence chains tied to actual runtime metrics (not checkboxes), gap analysis, and P1/P2/P3 remediation actions with effort estimates. Compliance report with PDF export ready for auditors.

THREAT INTELLIGENCE MAPPING
OWASP LLM Top 10 — 36 mappingsMITRE ATLAS — 42 mappings
EU AI ActSOC 2ISO 42001NIST RMFGDPRPDF exportSplunk CEF
QUARANTINE

World-class kill switch.

Full lifecycle: quarantine record (who, when, why, trigger finding), blast radius cascade, required unquarantine reason, threat score advisory, complete audit trail. Manual or automatic.

API-driven with 3x retry + verification. Cascade quarantines agents sharing 2+ dangerous tools. Unquarantine requires documented resolution.

POLICY ENGINE

Define rules. Enforce automatically.

9 policy templates. Real-time evaluation at session end. Simulate before saving. Slack, PagerDuty, and webhook alerts on violation. Block deployments or alert — your choice.

tool_combinationthreat_scoresession_countstatustemporal
THE MATH

One breach. 400x your annual Overwatch subscription.

$4.9M
Average cost of an AI-related data breach
IBM Cost of a Data Breach Report 2024
vs
$999/mo
Overwatch — unlimited agents, full incident response
No setup fees. No professional services. Self-serve.
See full pricing →
SCANDAR OVERWATCH

Enterprise AI security that respects your time.

Deploy fleet-wide AI agent security in 25 minutes. No demos. No POCs. 11 detection layers, automated incident response, and compliance reports — all self-serve, starting at $349/month.

Start Free TrialSee pricing

14-day free trial · No credit card required

Works with your stack on day one — TypeScript · Python · Go