Nine modules.
One command center.
Each Eyako module is a building block of the command center. They cooperate, enrich each other and provide a unified view of your cyber posture.
Governance
Structure your security policy, define the framework and responsibilities. Eyako helps you lay the foundations of managed cybersecurity.
- Security policy
- Asset mapping
- Security organization chart
- Frameworks and charters
Risk Management
Identify, assess and treat your cyber risks with a structured methodology and intuitive display.
- Risk register
- Assessment and scoring
- Treatment plans
- Residual risk tracking
Compliance
Manage your regulatory and normative obligations without being overwhelmed. NIS2, DORA, ISO 27001, GDPR and more.
- Multi-framework
- Auditable controls
- Gaps and remediation plans
- Compliance reporting
Vulnerabilities
Centralize your CVEs and vulnerabilities, contextualize their criticality and prioritize treatment by real risk.
- CVE import and centralization
- Business contextualization
- Business criticality prioritization
- Remediation tracking
Incidents & Crises
From detection to closure, manage every incident with rigor and traceability. Prepare for crises before they happen.
- Qualification and escalation
- Structured crisis management
- Full traceability
- Lessons learned
Security Projects
Integrate security into every IT project from conception. Track progress and security decisions.
- Security by design
- Security deliverable tracking
- Reviews and validations
- Link to risks
Suppliers
Systematically assess and monitor third-party risk. Your supply chain under control.
- Supplier mapping
- Security questionnaires
- Third-party risk score
- Corrective plan tracking
Action Plans
Track every remediation measure's progress, measure impact and communicate progress to leadership.
- Creation and assignment
- Progress tracking
- Impact prioritization
- Dedicated dashboard
Data Protection / DPO
Complete DPO module: processing registers, DPIAs, breach management, data subject rights.
- Processing register
- Impact analyses (DPIA)
- GDPR breach management
- Data subject rights
All your modules. One single view.
Every Eyako module is connected to the others. Risks feed action plans, vulnerabilities surface in compliance, incidents inform governance. Everything converges.
See the full cockpit