Now Available

Loom Security is proud to introduce CINQUE — persona-based, AI-driven security posture management.  Learn more →

Loom Security — Product Announcement
CINQUE

Correlate your visibility.
Know your security posture.

The new AI-driven platform from Loom Security that maps user behavior across the five core security domains—Identity, Device, Network, Application, and Data—into business personas to correlate risk across your entire environment.

Learn More

Designed for

CISOs
SOC Teams
Identity Teams
Security Architects
Risk Officers
Identity
Who is acting
Device
What they use
Network
How they connect
Application
What they access
Data
What they touch
Introducing CINQUE

One platform.
Five domains.
Total clarity.

Loom Security built CINQUE to solve the problem that no single posture tool has been able to crack: correlated, cross-domain risk visibility. Traditional tools generate a flood of isolated alerts. CINQUE changes that. By consolidating signals from your existing xSPM platforms—CSPM, DSPM, SSPM, ISPM, and more—it builds rich behavioral personas for every user in your environment.

Those personas become the lens through which risk is measured. Instead of drowning in thousands of individual findings, your team sees correlated, prioritized risk stories that map directly to business impact — and fuel the continuous verification that Zero Trust demands.

  • Ingests from all major xSPM platforms out of the box
  • AI-built behavioral baselines per persona
  • Cross-domain risk correlation in a single view
  • Anomaly detection against established persona norms
CINQUE — Personas
CINQUE Personas view — business persona mapping across security domains
CINQUE
Platform Capabilities

See what others can't.

CINQUE is purpose-built for security teams who need clarity, not just coverage.

xSPM Signal Aggregation

Ingest and normalize alerts and signals from your CSPM, DSPM, ISPM, AISPM, and other posture management platforms. CINQUE acts as the aggregation and correlation layer, so nothing falls through the cracks between tools.

CSPM DSPM ISPM AISPM + more

Visual User Journey Mapping

See exactly how signals map across a user's complete journey—from authentication to data access. Interactive timelines surface where behavior concentrates risk, giving analysts a clear narrative instead of a wall of alerts.

Cross-Domain Risk Correlation

Translate dozens of low-severity signals across Identity, Device, Network, Application, and Data into a single, high-priority risk that actually needs your attention. Reduce alert fatigue while increasing accuracy.

Anomalous Journey Detection

CINQUE learns what normal looks like for every persona. When a user's journey deviates from their established baseline—across any of the five domains—you're alerted immediately with full context.

Business Persona Intelligence

Security signals are mapped to business-relevant personas—not just usernames or IP addresses. Understand risk in the language of your organization: Finance, Engineering, Executive, Operations, and more.

Unified Posture Dashboard

A consolidated pane of glass for your entire security posture. Executive-ready risk scores, drill-down analytics for practitioners, and trend data that shows whether your posture is improving over time.

Zero Trust Network Access

CINQUE is the visibility layer your ZTNA journey needs

Zero Trust is not a product — it's a strategy. And strategies fail without visibility. CINQUE gives you the cross-domain, persona-level behavioral intelligence to know whether your Zero Trust policies are actually working, where gaps exist, and which users present the most risk to your ZT posture — continuously, not just at point-in-time.

Zero Trust Pillars
Verify Explicitly
Use Least Privilege Access
Assume Breach
CINQUE maps directly to all three, across all five security domains.
ZT Principle 01 — Verify Explicitly

Know exactly who is doing what, and when

Zero Trust demands continuous verification across every dimension — not just at login. CINQUE's persona engine validates user behavior across all five domains in real time, so verification is ongoing, not a one-time checkpoint.

  • Continuous behavioral verification beyond MFA
  • Multi-domain signal correlation confirms identity intent
  • Persona baselines detect impersonation and credential misuse
  • Real-time anomaly scoring triggers re-verification workflows
ZT Principle 02 — Least Privilege Access

Enforce access that matches the risk, not just the role

Static roles drift. CINQUE's per-persona risk view gives your access control systems the live intelligence they need to enforce dynamic least-privilege — tightening or expanding access based on real behavioral context.

  • Risk-per-persona informs dynamic access policy decisions
  • Identify over-privileged users through cross-domain activity mapping
  • Surface privilege creep before it becomes an exploit path
  • Feed correlated risk scores into your PAM and IAM platforms
ZT Principle 03 — Assume Breach

Operate as if the perimeter is already gone — because it is

Assume breach means having the detection capability to act before damage is done. CINQUE's cross-domain anomaly detection surfaces the subtle, multi-stage behavioral shifts that signal an active compromise — even from inside a trusted session.

  • Lateral movement detection across network and application domains
  • Correlated anomalies reduce time-to-detect from days to minutes
  • Full journey context for rapid containment and response
  • Continuous posture scoring to measure your breach readiness

CINQUE doesn't replace your ZTNA solution stack — it makes it smarter

Your ZTNA program controls access. CINQUE tells it what the risk actually is. By feeding correlated, persona-based behavioral intelligence into your Zero Trust architecture, CINQUE closes the gap between policy enforcement and ground-truth user risk — turning your ZTNA investment into a genuinely adaptive security posture.

Platform in Action

See what CINQUE
actually looks like

Real views from the platform — built for analysts who need to act fast and leaders who need to understand risk at a glance.

01 — Persona Risk

Risk correlated to the people who matter

CINQUE rolls up signals from all five security domains into a single risk score for each business persona. Stop triaging alerts in isolation — see the full risk picture per user, per role, per team.

  • Aggregated risk score per persona across all domains
  • Drill into which domains are contributing most to risk
  • Prioritize remediation by persona business impact
  • Track risk trends over time per user group
CINQUE — Persona Risk
CINQUE Persona Risk view — correlated risk scores by business persona
02 — Activity Map

The complete picture of every user's journey

The Activity Map gives you a visual timeline of how each persona moves through your environment — touching identity systems, devices, networks, applications, and data. See exactly where a user's behavior concentrates risk across the kill chain.

  • Cross-domain activity mapped onto a single timeline
  • Visual correlation of signals across the full user journey
  • Identify which stages of the journey carry the most risk
  • Quickly compare current behavior against established baselines
CINQUE — Persona Activity Map
CINQUE Activity Map — visual user journey mapping across security domains
03 — Anomaly Detection

Know the moment a journey goes off-script

When a user's behavior deviates from their persona baseline across any of the five security domains, CINQUE flags it immediately — with full context on what changed, which domains are affected, and the correlated risk severity.

  • Baseline deviation detection per persona, not just per user
  • Anomalies correlated across domains to reduce false positives
  • Full journey context attached to every anomaly alert
  • Severity scoring based on multi-domain signal correlation
CINQUE — Anomaly Detection
CINQUE Anomaly Detection — flagging user journeys that deviate from persona baselines
How CINQUE Works

From signal chaos to security clarity

1

Ingest from your xSPM stack

Connect your existing posture management tools. CINQUE normalizes signals from every platform into a unified data model without displacing your existing investments.

2

Build behavioral personas

AI models map each user's activity across Identity, Device, Network, Application, and Data domains into a business persona with a dynamic behavioral baseline.

3

Correlate risk across domains

CINQUE's correlation engine combines signals from all five domains to identify risks that no single tool can see alone—and surfaces only those that matter.

4

Detect anomalous journeys

When a user's behavior deviates from their persona baseline, CINQUE flags the anomaly with full context: what changed, which domains are affected, and the correlated risk level.

5

Act on prioritized, correlated findings

Your team receives clear, actionable findings tied to business context—not alert queues. Faster triage, faster remediation, measurable posture improvement.

CINQUE — Persona
CINQUE Activity Map — visual user journey across the five security domains
Correlated Finding: Credential Compromise Risk
User deviates from baseline across 4 domains simultaneously. Cross-domain correlation indicates elevated exfiltration risk.
5
Security domains unified in a single platform
90%
Reduction in alert noise through correlation
360°
User risk visibility across identity to data
Use Cases

Built for the challenges your team faces today

Whether you're a CISO managing board-level risk or an analyst in the SOC, CINQUE gives you the right view at the right level.

Catch insider threats before damage is done

Traditional DLP and UEBA tools see behavior in silos. CINQUE correlates activity across all five security domains to detect the subtle multi-stage patterns that precede data theft or sabotage.

  • Detect privilege escalation paired with unusual data access
  • Identify activity deviating from persona norms
  • Surface correlated risk signals before exfiltration occurs
  • Visualize the full user journey to understand intent and impact
PERSONA Finance Analyst Priv Escalation IDENTITY + NETWORK Data Exfil Risk ALL DOMAINS App Anomaly APPLICATION

Know your true security posture at all times

Stop guessing about your security posture. CINQUE continuously aggregates signals from every xSPM tool and gives you a live, correlated view of where your real exposure lies.

  • Unified posture score across all five security domains
  • Trend data showing whether posture is improving or degrading
  • Business context attached to every finding
  • Drill-down from board-level summaries to individual signals
72 POSTURE SCORE ID 86 DEV 78 NET 65 APP 70 DATA 51

Accelerate and validate your Zero Trust journey

Zero Trust demands continuous, multi-domain visibility to verify every user, enforce least privilege, and assume breach. CINQUE delivers the behavioral intelligence layer that makes those principles real — not theoretical.

  • Continuously verify user behavior across all five ZT domains
  • Feed persona risk scores into your PAM, IAM, and ZTNA controls
  • Surface lateral movement and anomalous access patterns
  • Measure and report on Zero Trust posture maturity over time
Learn More
ZERO TRUST ARCHITECTURE CINQUE Visibility Layer PAM / IAM ZTNA Policy SIEM / SOAR MFA / SSO Endpoint Risk signal feed CINQUE = the intelligence hub

A force multiplier for your SOC

Analysts spend too much time chasing alerts that don't connect. CINQUE's correlation engine does the heavy lifting—delivering pre-correlated, contextualized findings so your team can focus on what matters.

  • Pre-correlated findings replace raw alert queues
  • Full persona and journey context attached to each finding
  • Anomaly scoring guides triage priority automatically
  • Integrates with your SIEM and SOAR workflows
WITHOUT CINQUE WITH CINQUE Alert: MFA failure Alert: Unusual login Alert: Port scan Alert: Priv escalation Alert: Data download Alert: VPN anomaly Alert: App abuse + 2,847 more alerts Alert fatigue CRITICAL Account Takeover 4 domains correlated HIGH Data Exfil Risk 2 domains correlated 2 findings. Act now.

Evidence-ready compliance reporting

Map your security posture directly to compliance frameworks. CINQUE's cross-domain visibility makes it straightforward to demonstrate control effectiveness to auditors and regulators.

  • Continuous evidence collection across all five domains
  • Trend reporting to demonstrate control maturity over time
  • Executive-ready reports for board and audit committee
NIST CSF ISO 27001 SOC 2 CINQUE Continuous Mapping Control Coverage 80% Evidence Collected 90%
CINQUE
Now Available

Be among the first to see CINQUE

CINQUE is here. Request a personalized demo today and discover what unified, AI-driven, persona-based security posture management looks like for your organization.