Documentation
Technical documentation, security architecture, and compliance mapping.
How Aorka handles control plane compromise, prompt injection, supply chain integrity, and agent privileges. Includes a comparison table against traditional RMM tools.
Control-by-control mapping to HIPAA Technical Safeguards, SOC 2 Trust Service Criteria, NIST CSF 2.0, and FINRA cybersecurity requirements.
What data we collect, how we use it, our AI providers, tenant isolation, data location, and your deletion rights.
Acceptable use, AI disclaimers, data ownership, subprocessors, liability, and service availability.
Agent installation, first endpoint, your first chat conversation.
Available in your demo
How facts work, confidence scoring, organizing with units.
Available in your demo
MSI, GPO, remote push, Active Directory sync, Entra ID.
Available in your demo
REST API, MCP integration, webhook configuration.
Available in your demo
Request a demo and we'll walk you through whatever you need.
Request a demo