What is Method?

The Method Platform is a full spectrum security platform combining autonomy, data, tooling, and command & control (C2) to power defensive and offensive products.

Method accelerates the scale and speed of your security program through a continuous combination of defense and offense.

It is architected around two point of views regarding the future of security:

  1. In order to win, teams must safely harness autonomy at scale
  2. The most valuable outcomes are naturally cross-category, cross-domain, and cross-workflow

In essence, the Method Platform is the ultimate infrastructure for proactive security agents optimized for any environment.


The problem

Security teams face several compounding challenges:

  • Offensive AI: AI is being weaponized by adversaries in high-scale, machine-speed attacks.
  • Massive scale and noise: teams are responsible for attack srufaces which grow faster than they can assess them. Manual red team exercises cover a fraction of the attack surface, and triage workflows drown under alert volume.
  • Fragmented tooling: point products for cloud posture, vulnerability scanning, pen testing, and more each produce isolated data sets that don’t connect. Cross-domain analysis requires manual effort, and context is lost between tools.

Method addresses these by combining autonomy, data, tooling, and command & control (C2) into a single platform that powers both defensive and offensive security products.

Two products, one platform

Method is organized around two Products that cover distinct areas of security:

  • Bastion: Digital-twin driven exposure management. Map, validate, and control the totality of resources and possible attack paths in the context of your business.
  • Reaper: Software-defined offensive operations. Plan and execute red team operations and adversary emulation exercises on top of robust autonomy and software-defined C2 infrastructure.

Both products share the same underlying platform core: the same Tools, Objects, Issues, and Data Architecture. Data collected in one product is immediately available in the other.


How Method is different

The Method Platform is a new kind of security platform built to be more integrated, cross-domain, and AI-enabled than existing point solutions.

Built on a Data Ledger and Ontology

Almost every security workflow hits data roadblocks in the form of not connecting the dots across controls, environments, and organizational context. Method Platform is built on a Ledger which tracks security data temporally as well as by source. This Ledger feeds an Ontology, or security Digital Twin, consisting of objects (e.g. Host, User) and links (e.g. Is Administrator Of, Group Contains).

Every Tool operated feeds the Ledger and then Ontology, for continuous understanding. This rigorous data approach enables several outcomes:

  • Cross control/domain workflows become possible where point products fall short; connect code, cloud, web, network, etc. inspection in a single workflow
  • Streamlined analysis and reporting via a standard API for security data abstracted from underlying sources
  • Change detection with complete tracking of object changes over time
  • Effective AI Agents that can reason over a structured, continuously mapped environment

Deploy any Tool, everywhere

Method is built on a Tool and security agent (Jackal) framework that can control any API, scanner, or custom CLI, in the cloud or on-premises. This allows it to collect both authenticated and unauthenticated data, assume both defender and attacker perspectives, and execute workflows in any environment.

Humans in control of AI

AI acts as a powerful enabler and force multiplier. In high-stakes security domains, you must retain full control over AI agents for effective operational deployment. Method incorporates rigorous guardrails and architectural safeguards through the Ontology, Rules of Engagement, and Agent Policies to ensure complete authority over AI behavior and decision-making.