Resources

Enterprise evaluation guides, briefs, and approval material.

Use the library like a decision support system: orient the team, evaluate the right product, pressure-test architecture, and prepare deployment or approval review when the evaluation gets serious.

Start learning

Start with the platform story, align the buying team, and choose the next review path.

Overview
Platform Overview

See how Data Security, Agentic Security, and Exposure Validation fit together in one customer-owned operating model.

Open platform overview
Overview
Platform Overview Brief

Start with the customer-owned control plane story before the team splits into product-specific evaluation paths.

Platform StoryProduct Comparison
Open the overview
Guide
Buyer Guide

Start here when the buying team needs the platform story, stakeholder map, and next-step sequence before deeper review.

Platform StoryProduct Review
Open the guide
Calculator
Buyer Readiness Calculator

Estimate readiness effort, review time, and the most relevant Tutela product.

Open resource
Data security

Discovery, classification, access context, and reviewable data risk.

Overview
Data Security Executive Overview

Leadership-facing overview of sensitive-data posture, access risk, and control priorities before deeper technical review.

Sensitive Data PostureExecutive Review
Open the overview
Brief
Data Security Architecture Brief

A Data Security-specific architecture brief for teams reviewing sensitive-data discovery, business context, access analysis, and protection planning.

Sensitive Data DiscoveryClassification
Open the brief
AI security

Employee AI use, policy review, visibility, and governance questions.

Overview
Agentic Security Executive Overview

Leadership-facing overview of employee AI governance, workflow visibility, and policy-backed controls.

AI GovernanceExecutive Review
Open the overview
Overview
Agentic Security Technical Overview

A technical overview for teams evaluating how Tutela approaches agent visibility, prompt and output inspection, and policy-backed AI governance.

Agentic SecurityAI Governance
Open the overview
Article
Data Security In The Agentic Era

Learn why agentic workflows make data access, prompts, and outputs part of the same control surface.

Read article
Exposure validation

Private-preview material for validated exposure, remediation ownership, and board-ready reporting review.

Brief
Exposure Validation Private Preview Brief

A private-preview brief for teams evaluating how Tutela Exposure Validation turns findings into validated exposure evidence, remediation ownership, and reporting.

Exposure ValidationPrivate Preview
Open the brief
Brief
Exposure Validation Technical Review Brief

A technical review brief for teams going deeper into validated exposure, remediation ownership, and closure proof.

Exposure ValidationTechnical Review
Open the brief
Architecture and deployment

Deployment boundaries, architecture review, and operating-model questions.

Brief
Architecture Brief

Use this brief when architects and security teams need to understand the operating boundary, review model, and deployment assumptions before a deeper session.

ArchitectureDeployment Model
Open the brief
Brief
Agentic Security Architecture Brief

A customer-owned deployment brief for teams reviewing how Agentic Security fits browser, proxy, SDK, and audit workflows.

AI GovernanceArchitecture
Open the brief
Guide
Self-Hosted Deployment Readiness Guide

A deployment-readiness guide for teams preparing identity, secrets, support-path, and ownership questions before a customer-owned rollout.

Deployment ReadinessDeployment Model
Open the guide
Deployment and approval

Deployment review, approval, and commercial-planning material for security review and procurement timing.

Sheet
Pricing and Packaging Sheet

Use this planning sheet after the team has aligned on product fit and architecture assumptions and needs a structured commercial discussion.

PackagingCommercial Review
Open the sheet
Brief
Security and Deployment Controls Mapping

A review-oriented controls mapping for deployment, architecture, and procurement stakeholders.

Deployment ReviewControls Mapping
Open the mapping
Guide
Evaluation Checklist

A compact evaluation checklist for security, architecture, deployment, and commercial review readiness.

Evaluation ReadinessApproval
Open the guide
FAQ
Customer FAQ

Find product answers about Data Security, Agentic Security, private preview, and next steps.

Open resource
Browse all resources

Browse the full library.

Search by product, topic, audience, or resource type when your team already knows which evaluation asset should come next.

14 resources
Guide
Buyer Guide

Start here when the buying team needs the platform story, stakeholder map, and next-step sequence before deeper review.

Platform StoryProduct Review
Open the guide
Overview
Platform Overview Brief

Start with the customer-owned control plane story before the team splits into product-specific evaluation paths.

Platform StoryProduct Comparison
Open the overview
Brief
Architecture Brief

Use this brief when architects and security teams need to understand the operating boundary, review model, and deployment assumptions before a deeper session.

ArchitectureDeployment Model
Open the brief
Sheet
Pricing and Packaging Sheet

Use this planning sheet after the team has aligned on product fit and architecture assumptions and needs a structured commercial discussion.

PackagingCommercial Review
Open the sheet
Overview
Data Security Executive Overview

Leadership-facing overview of sensitive-data posture, access risk, and control priorities before deeper technical review.

Sensitive Data PostureExecutive Review
Open the overview
Brief
Data Security Architecture Brief

A Data Security-specific architecture brief for teams reviewing sensitive-data discovery, business context, access analysis, and protection planning.

Sensitive Data DiscoveryClassification
Open the brief
Overview
Agentic Security Executive Overview

Leadership-facing overview of employee AI governance, workflow visibility, and policy-backed controls.

AI GovernanceExecutive Review
Open the overview
Overview
Agentic Security Technical Overview

A technical overview for teams evaluating how Tutela approaches agent visibility, prompt and output inspection, and policy-backed AI governance.

Agentic SecurityAI Governance
Open the overview
Brief
Agentic Security Architecture Brief

A customer-owned deployment brief for teams reviewing how Agentic Security fits browser, proxy, SDK, and audit workflows.

AI GovernanceArchitecture
Open the brief
Brief
Exposure Validation Private Preview Brief

A private-preview brief for teams evaluating how Tutela Exposure Validation turns findings into validated exposure evidence, remediation ownership, and reporting.

Exposure ValidationPrivate Preview
Open the brief
Brief
Exposure Validation Technical Review Brief

A technical review brief for teams going deeper into validated exposure, remediation ownership, and closure proof.

Exposure ValidationTechnical Review
Open the brief
Guide
Self-Hosted Deployment Readiness Guide

A deployment-readiness guide for teams preparing identity, secrets, support-path, and ownership questions before a customer-owned rollout.

Deployment ReadinessDeployment Model
Open the guide
Brief
Security and Deployment Controls Mapping

A review-oriented controls mapping for deployment, architecture, and procurement stakeholders.

Deployment ReviewControls Mapping
Open the mapping
Guide
Evaluation Checklist

A compact evaluation checklist for security, architecture, deployment, and commercial review readiness.

Evaluation ReadinessApproval
Open the guide