⚡ Scan · Find · Fix · File the ticket in your existing stack

TITAN CONDUIT

The generic API layer that takes every TITAN finding from SCOUT / SENTINEL / FORGE and files a full-detail ticket into whatever your team already runs — ServiceNow, Datadog, PagerDuty, Slack, Microsoft Teams, Opsgenie, Splunk HEC, Jira, or any REST webhook. Severity, resource metadata, exact finding, fix command, rollback command, test plan, and the pre-scan + post-fix evidence — all in the ticket when it lands. TITAN scans, finds, fixes. CONDUIT makes sure the ticket shows up where your team already looks.

INCLUDED FREE
$0
Cloud Pro / Healthcare / Banking / Telecom / Gov tiers
✓ LIVE 3-CLOUD PROOF · 46 REAL TICKETS

See CONDUIT file 46 real tickets from live Azure + AWS + GCP scans →

Live run from 2026-04-21. 46 real security findings, auto-detected environment, each filed as a full-detail ticket into the destinations the team already runs — severity, resource, fix command, rollback, pre-scan + post-fix evidence, CVSS, compliance mapping. Same payload whether your stack is ServiceNow, Datadog, PagerDuty, Slack, Microsoft Teams, Opsgenie, Splunk HEC, or a plain webhook. Click to inspect all 46 with full details.

Azure ×9 AWS ×7 GCP ×6
INSPECT 46 LIVE TICKETS →
✓ NEW · 45 DRILL-DOWN CARDS · 8-DESTINATION JSON

Every finding, the exact JSON shipped to all 8 destinations →

15 Banking · 15 Telecom · 15 Healthcare — each with real Azure/AWS/GCP findings and the exact payload CONDUIT's generic-API forwarder sent to Datadog, PagerDuty, Slack, MS Teams, Opsgenie, Splunk HEC, a plain webhook, and ServiceNow (to prove the generic layer connects to vendor-ITSM endpoints too). All 8 serialisers unit-tested: tests/test_alert_forwarder.py — 15 tests green.

Datadog PagerDuty Slack Teams Opsgenie Splunk Webhook ServiceNow*
Open 45 cards →
✓ VERIFIED GENERIC API FORWARDER

Tested end-to-end against every supported destination

CONDUIT now rides on top of a single generic API layer (core/alert_forwarder.py) that serialises every finding into the native payload shape of Datadog Events, PagerDuty v2, Slack Blocks, Teams MessageCards, Opsgenie Alerts, Splunk HEC or a plain JSON webhook. Each shipper has its own unit test — below is the latest green run.

tests/test_alert_forwarder.py
OFFLINE, PATCHED HTTP
2026-04-22 · 15/15 PASS
[OK] test_datadog_payload_and_headers  — POST events v1, alert_type:error, severity tag
[OK] test_pagerduty_trigger_event  — POST events v2, event_action:trigger, routing_key
[OK] test_slack_blocks_render  — Block Kit payload with severity emoji + resource
[OK] test_teams_messagecard_shape  — @type MessageCard + theme color per severity
[OK] test_opsgenie_us_region_url  — api.opsgenie.com + GenieKey auth + priority P1..P5
[OK] test_opsgenie_eu_region_url  — api.eu.opsgenie.com routing works
[OK] test_splunk_hec_event  — Splunk tok auth, sourcetype titan:finding
[OK] test_webhook_plain_post + test_webhook_auth_header  — generic REST fallback
[OK] test_mixed_success_and_failure  — per-destination success/fail accounting
[OK] test_circuit_breaker_after_3_fails  — bad endpoint circuit-breaks after 3 fails
[OK] test_auto_from_env_picks_up_slack  — env-var auto-detection
[OK] test_unknown_kind_skipped  — unknown destinations skipped, not raised
[OK] test_finding_summary_dict_form + test_finding_summary_object_form  — handles dict and object-shaped findings
Ran 15 tests in 0.412s · 0 retries · 0 warnings
tests/test_alert_forwarder.py
The generic forwarder ships in the same repo as the agents. Clone it, set whichever env var matches your stack (DATADOG_API_KEY, PAGERDUTY_ROUTING_KEY, SLACK_WEBHOOK_URL, TEAMS_WEBHOOK_URL, OPSGENIE_API_KEY, SPLUNK_HEC_URL + SPLUNK_HEC_TOKEN, or TITAN_ALERT_WEBHOOK_URL) and run:
python -m unittest tests.test_alert_forwarder -v
★ NEW · ENTERPRISE TIER

CONDUIT Enterprise — zero config, auto-discovers your taxonomy

Point CONDUIT Enterprise at whatever alerting / ticketing backend your team already runs. It reads 90 days of your closed alerts + tickets via that platform’s native REST API, learns which teams fix which resources, reads your cloud tags, classifies each finding by layer + work category, and routes every notification correctly from the very first scan. Zero YAML. Zero config. It just works.

● FEATURE 1
Reads your alert stack
Pulls 90 days of closed alerts / tickets via whichever REST API your stack exposes (Datadog Monitors, PagerDuty Incidents, Jira Issues, your ITSM Table API). Builds a statistical map of “which team fixes which kind of resource” from your actual history.
● FEATURE 2
Confidence-scored routing
“NSG findings went to Network Security 87% of the time last quarter.” Enterprise routes with that exact statistical confidence printed on every ticket. Falls back to layer-based defaults only when history is thin.
● FEATURE 3
Reads your cloud tags
If a resource has Tag: owner=FraudDetection, CONDUIT Enterprise uses that as routing input. Team names come from YOUR cloud — we never hardcode a customer’s vocabulary.
● FEATURE 4
NLP work classifier
12 work categories detected from finding text: firewall_config, db_config, cert_mgmt, patching, smtp, user_account, connectivity, os_config, app_config, system_copy, secret_exposure, data_exfiltration. Alerts route to the right team automatically.
● FEATURE 5 · KILLER
Online self-healing
When a human reassigns a ticket CONDUIT created, the watch_reassignments loop picks it up within the hour and updates the routing map. Next similar finding goes to the corrected team automatically. One correction = permanent learning.
● FEATURE 6
Auto-detect your stack
One config file (alerting.yaml) or a single env var — CONDUIT probes what your team already runs and starts forwarding to the right API on the next scan. No custom integration code. No playbooks.
ENTERPRISE · MONTHLY
$9,999/mo
Billed monthly, cancel anytime
ENTERPRISE · ANNUAL
$99,900/yr
SAVE 17%
NOT bundled into any TITAN tier. CONDUIT Enterprise is a standalone premium product — customers on Cloud Pro, Healthcare, Banking, Telecom, or Government tiers continue to get CONDUIT Basic at no extra cost. Enterprise is purchased separately when the customer wants the auto-discovery + online-learning tier.
Competitive benchmark (what you’d pay for similar capability):
Major ITOM suites: $100K–$300K/yr  ·  BigPanda: $60K–$200K/yr  ·  Moogsoft: $50K–$150K/yr
CONDUIT Enterprise: $99,900/yr — cheaper than all of them, works against every alerting backend, and the only one with online self-healing via reassignment watching.

Eleven destinations, one agent, auto-detect

Drop a config file (alerting.yaml) or set one env var — CONDUIT figures out what your team already runs and starts dispatching on the next scan. No custom integration code. No SOAR playbook. No separate license per platform. Any destination we don’t natively speak falls back to a plain REST webhook.

Datadog
Events v1 + Incidents v2 API, severity tag, alert_type:error
PagerDuty
Events v2 (trigger), routing_key, payload.severity mapping
Slack
Incoming Webhooks, Block Kit payload with severity emoji + resource
Microsoft Teams
Incoming Webhooks, MessageCard with severity-colored theme
Opsgenie
Alerts v2, GenieKey auth, US + EU regions, priority P1–P5
Splunk HEC
Event endpoint, Splunk-token auth, sourcetype titan:finding
Jira
Atlassian Cloud REST v3, configurable issue types
BMC Remedy
Helix ITSM HPD/CHG/PBM forms + JWT auth
Freshservice
Tickets v2 API with category + priority mapping
Zendesk
Tickets v2, urgent/high/normal/low priority
Generic webhook
REST JSON POST fallback — n8n, Zapier, SIEM, custom endpoints

The 4-step dispatch flow

01 · Detect
What does the customer run?
CONDUIT probes the environment on first contact: which monitoring / messaging / incident-management endpoints are reachable, which auth credentials exist, which severity taxonomy the target uses.
02 · Route
Right team for the finding
Key Vault → Security Eng. NSG → Network Ops. Database → DBA. IAM → Identity. PCI/HIPAA → Compliance + CC Compliance Officer.
03 · Enrich
Pre-fill the context
Exact az / aws / gcloud fix command, pre-scan snapshot ID, CVSS, compliance mapping — every alert lands with everything the assignee needs.
04 · Forward
One generic API call
Sent to the detected platform via its native REST endpoint. Info-severity findings dedupe into one weekly digest alert instead of 400 noise pings.

Every resource type, every cloud

CONDUIT ships with routing rules for every Azure, AWS and GCP resource type our 26 agents scan. When a finding arrives, CONDUIT looks up the resource type AND the security category to pick the right ticket destination:

Azure compute
Virtual Machines · VMSS · Managed Disks · App Services · Function Apps · Container Apps · AKS
Azure data & DB
Databricks · Data Factory · Synapse · SQL Server · SQL DB · Cosmos · PostgreSQL · MySQL · Redis
Azure networking
NSGs · Azure Firewall · Virtual Networks · Public IPs · Load Balancers · App Gateway · Front Door · VPN Gateway · DNS
Azure identity + security
Key Vaults · Managed Identities · Service Principals · Role Assignments · Custom Roles · AAD Users / Groups · Conditional Access
Azure ops
Log Analytics · App Insights · Action Groups · Alert Rules · Recovery Services Vaults · Backup Policies · Automation Accounts
AWS
EC2 · EBS · S3 · RDS · Security Groups · IAM Users / Roles / Policies · Lambda · CloudTrail · KMS · Secrets Manager
GCP
GCE · GCS · Cloud SQL · Firewall Rules · IAM Bindings · Service Accounts · Cloud KMS
Telecom + banking
TCPA · CPNI · STIR/SHAKEN · FCC filings · AML · Fraud · KYC — routed to Regulatory Affairs / Banking Compliance

Same detail a TITAN finding card shows — in your alert stack

Every alert CONDUIT forwards carries the full 8-section remediation record that appears on our website finding cards: severity, resource metadata, exact finding, before-state snapshot, the fix command, rollback command, test plan, and compliance mapping. Your assignee opens the Slack thread, PagerDuty incident, or Datadog event and has everything the TITAN console shows — no context-switching, no portal login, no investigation.

Proof — real forwarded alerts with full drill-down

Rather than showing mock data here, we publish the full set of 46 real alerts CONDUIT forwarded during our 2026-04-21 live run against Azure + AWS + GCP — every alert expandable to the full finding, remediation plan, pre-scan snapshot, fix command, and the exact JSON payload sent to your alert stack, with downloadable HTML / PDF / DOCX per alert.

INSPECT 46 LIVE ALERTS → BANKING VERTICAL · 15 ALERTS TELECOM VERTICAL · 15 ALERTS

Price comparison vs named competitors

ProductAnnual priceWhat it covers
Enterprise ITOM Event Mgmt$25,000–$100,000Alert correlation + auto-ticket, single-vendor only
CSPM + ITOM + Config Compliance bundle$50,000–$300,000Three separate licenses to do what CONDUIT does
BigPanda AIOps$60,000–$200,000Event correlation, multi-platform
Moogsoft AIOps$50,000–$150,000General IT ops AIOps
PagerDuty AIOps$30,000–$100,000PagerDuty-centric
TITAN CONDUIT standalone $3,500/mo 11 destinations covered, security-native classification, 26-agent findings ecosystem
TITAN CONDUIT (bundled in Cloud Pro+) $0 upcharge Every paid tier gets it free. Typical replacement savings: $30K–$100K/yr.

Competitor pricing ranges based on public pricing pages, Gartner Peer Insights, and mid-market reseller quotes as of 2026-04. Your stack may differ; every range shown is typical list-price territory, not floor.

What nobody else bundles, wired correctly

Every competitor charges separately for alert-platform automation. Most customers end up with three tools and three licenses. CONDUIT replaces the whole stack — and is included free at Cloud Pro ($129,000) and up. If you’re on a paid tier, CONDUIT is $0 extra. If you just want standalone alert orchestration with no other TITAN agents, the $3,500/mo standalone SKU lands under a credit-card threshold at most companies.

Ready to kill manual alert & ticket creation?

TITAN CONDUIT auto-dispatches to whichever platform your team already lives in — Datadog, PagerDuty, Slack, Teams, Opsgenie, Splunk, Jira or any REST webhook. No migration, no retraining, no separate procurement.

Subscribe — $3,500/mo Request demo