Torus IT Security
Menu

Platform

A cyber cockpit for campaigns, documents, risks and evidence.

Torus organizes everyday cyber workflows around a simple principle: every signal should become a tracked action and then usable evidence.

Cyber cockpit
Torus
Cockpit
Campaigns
Assistant
Risks
Evidence

Q2 campaign

Tracked

Open actions

Assigned

Recent evidence

Export

Tracked action

Usable evidence

Modules

The core building blocks of Torus.

The site presents the modules separately, but the value comes from how they work together: awareness, document assistance and risk analysis, with evidence and exports built into the workflows.

Awareness

Cyber e-learning

Campaigns, learners, Torus awareness courses, operational tracking and exportable evidence for cyber and compliance teams.

  • Campaigns and reminders
  • Learner KPIs
  • Reports and evidence
Explore the module

Assistance

Cyber Assistant

A cyber chatbot for each client space, built to query internal documents, use an expert cyber and compliance document corpus and prepare sourced deliverables.

  • Client spaces
  • Internal documents
  • Policies and procedures
Explore the module

Risk

Risk Analysis

AI-assisted risk analysis, MONARC-compatible, with a standalone Excel workbook and human validation.

  • Guided steps
  • Risk mapping
  • Excel workbook
Explore the module

Journeys

Three use cases, one evidence logic.

Cyber admin journey

  1. 1 Create or import learners.
  2. 2 Launch an awareness campaign or targeted review.
  3. 3 Track exceptions and reminders.
  4. 4 Export useful evidence for an audit or committee.

Consultant journey

  1. 1 Create a space per client or scope.
  2. 2 Add the documents needed for context and make them available to the chatbot.
  3. 3 Generate sourced working deliverables.
  4. 4 Keep a usable trail for validation.

Learner journey

  1. 1 Access assigned training.
  2. 2 Progress through training without unnecessary friction.
  3. 3 Complete required modules.
  4. 4 Leave a clear progress record.

Product architecture

Separation, access control and sovereignty.

Torus is designed as a cyber operating platform, not a set of files. Access, perimeters and evidence remain structured for daily work.

01 Clear separation between platform administration and client spaces.
02 Access management built into the product, with roles adapted to cyber, compliance and audit use cases.
03 Dedicated Cyber Assistant spaces to isolate client perimeters.
04 PDF/Excel exports to keep deliverables standalone and shareable.

Security / sovereignty

Security and sovereignty designed for European B2B

Torus focuses on data separation, access control and operations aligned with the expectations of European organisations.

View security & data
01

Secure, isolated client spaces, with clear separation between administration and business usage.

02

Data and documents organised by perimeter, with explicit activation of document repositories.

03

ZDR (Zero Data Retention) enabled for AI exchanges: client data sent to the model is not retained for training or reuse.

04

Sovereign approach: European location, limited exposure and documented technical governance.

05

Exports and evidence designed to support audits, reviews and committees.

See how Torus fits into your organisation.

We review your populations, documents, risks and evidence constraints to build a useful demo, not a generic scenario.