EU-Sovereign Endpoint
Compliance Agent
No MDM required. No data leaves the EU.
Fortis Monolith collects device security evidence automatically from every endpoint — disk encryption, firewall, OS patches, software inventory, vulnerabilities. Evidence syncs to your compliance dashboard and maps to NIS2, DORA, ISO 27001, and GDPR controls. Self-hosted on Scaleway France. EU-hosted by default. Ask about self-hosted and air-gapped deployment for strict sovereignty requirements.
From device to dashboard. Zero US dependencies.
13 evidence types. One agent.
Device Compliance
Aggregate posture score across all enrolled endpoints. Tracks overall fleet health in real time.
Disk Encryption
FileVault (macOS), BitLocker (Windows), LUKS (Linux). Verifies full-disk encryption is active on every device.
Firewall Status
Host firewall enabled/disabled. Gatekeeper and SIP verification on macOS. Windows Defender Firewall state.
OS Patch Compliance
Automatic update status per device. Detects outdated OS versions and missing security patches.
Software Inventory
Complete list of installed applications, versions, and sources. Detects shadow IT and unapproved software.
Antivirus Status
Antivirus/EDR presence and signature freshness. Verifies real-time protection is active.
Vulnerability Detection
Known CVEs affecting installed software. Severity scoring (CVSS), affected package identification, and remediation guidance.
Custom Policy Compliance
User-defined osquery policies. SQL-based compliance rules that return pass/fail per device.
Process Audit
Running processes with code-signing verification. Detects unsigned or suspicious binaries.
Network Exposure
Open ports and listening services. Identifies unnecessary network surface area on endpoints.
USB Device Audit
USB attach/detach events. Tracks removable media usage for data exfiltration prevention.
Browser Extension Audit
Installed browser extensions across Chrome, Firefox, Edge. Flags known-malicious or unapproved extensions.
Login Audit
Login success/failure events with 24-hour rolling window. Detects brute-force attempts and unauthorized access.
Every evidence type maps to a regulation.
| Framework | Article | Description | Evidence Types |
|---|---|---|---|
| NIS2 | Art. 21 | Cybersecurity risk-management measures | Disk EncryptionFirewall StatusOS Patch ComplianceAntivirus Status |
| NIS2 | Art. 23 | Incident reporting and forensic evidence | Login AuditProcess AuditVulnerability DetectionNetwork Exposure |
| DORA | Art. 9 | ICT risk management framework | Device ComplianceVulnerability DetectionSoftware Inventory |
| DORA | Art. 11 | ICT systems, protocols and tools management | OS Patch ComplianceCustom Policy ComplianceSoftware Inventory |
| ISO 27001 | A.8.1 | User endpoint devices | Device ComplianceSoftware InventoryDisk Encryption |
| ISO 27001 | A.8.7 | Protection against malware | Antivirus StatusUSB Device AuditProcess AuditBrowser Extension Audit |
| ISO 27001 | A.8.8 | Management of technical vulnerabilities | Vulnerability DetectionOS Patch ComplianceSoftware Inventory |
| ISO 27001 | A.8.24 | Use of cryptography | Disk EncryptionOS Patch Compliance |
| GDPR | Art. 32 | Security of processing | Disk EncryptionFirewall StatusAntivirus StatusLogin Audit |
| GDPR | Art. 5(1)(f) | Integrity and confidentiality principle | Disk EncryptionProcess AuditNetwork ExposureUSB Device Audit |
Three steps. Fifteen minutes.
Enable in Dashboard
Navigate to Settings, select Integrations, click Enable Monolith. An HMAC enrollment secret is generated automatically. One toggle. No infrastructure provisioning.
Install the Agent
Run a single command on each device. The agent self-enrolls using the embedded tenant secret. Works on macOS, Windows, and Linux.
# macOS
curl -fsSL "https://your-instance.fortis.eu/api/v1/monolith/agent/install?secret=YOUR_SECRET&platform=macos" | sudo bash
# Windows (PowerShell, Run as Administrator)
irm "https://your-instance.fortis.eu/api/v1/monolith/agent/install?secret=YOUR_SECRET&platform=windows" | iex
# Linux (Debian/Ubuntu)
curl -fsSL "https://your-instance.fortis.eu/api/v1/monolith/agent/install?secret=YOUR_SECRET&platform=linux" | sudo bashEvidence Flows Automatically
Devices appear within 60 seconds. Compliance evidence syncs every 15 minutes. Non-compliant devices generate alerts. Mapped to your active frameworks. No manual steps.
Simple per-device pricing.
No seat minimums. No annual lock-in. Pay only for enrolled devices.
Essential endpoint compliance evidence. Device inventory, encryption, firewall, and patching verification.
- Device compliance posture
- Disk encryption verification
- Firewall status monitoring
- OS patch compliance
- Software inventory
- Antivirus status
- 15-minute sync cycle
- Compliance framework mapping
- Vulnerability detection
- Custom osquery policies
- CIS benchmark templates
- Device compliance scoring
Full visibility. All 13 evidence types, custom policies, CIS benchmarks, vulnerability detection, and compliance scoring.
- Everything in Base
- Vulnerability detection (CVE/CVSS)
- Custom osquery policies
- CIS benchmark templates
- Process audit with code signing
- Network exposure analysis
- USB device tracking
- Browser extension audit
- Login event audit
- Device compliance scoring
- Remediation suggestions
- Priority support
Monolith vs. alternatives
| Feature | Monolith | Jamf | Intune | Kandji | Fleet |
|---|---|---|---|---|---|
| EU-Sovereign Data | Partial | ||||
| No MDM Required | |||||
| Self-Hosted | Partial | ||||
| Same-DB Compliance Sync | |||||
| RLS Multi-Tenancy | |||||
| Compliance Framework Mapping | Partial | Partial | Partial | ||
| Open Source Core | |||||
| Price per Device | EUR 3-7 | ~EUR 5-15 | ~EUR 2-10 | ~EUR 5-12 | EUR 0-50 |
Frequently asked questions
Deploy Monolith today.
Create account, launch a live demo, or talk to our team about enterprise deployment. Tenant isolation is enforced with Row Level Security.