Arca Platform

The log management and security operations platform.

Arca replaces your logging stack and your security stack in one self-hosted platform. Collect and search logs from 18 agents. Detect threats with 6 SIEM rule types. Investigate with autonomous AI. Manage cases with full SOC workflow. Simulate attacks. Generate compliance reports. All for $0 per GB.

AI-first by design
Autonomous investigations on every alert
No per-GB billing
Self-hosted on your own hardware
Full security operations
SIEM + cases + MITRE + threat intel + compliance
686 automated tests
Validated detection chain

Everything your team needs to stay ahead of incidents

Arca Dashboard

From deployment to detection in three steps

1
Deploy agents on your infrastructure

Download a pre-configured agent package from Arca. Drop it on any Linux host, macOS machine, or cloud environment. Agents begin streaming data immediately — no manual configuration of API keys or collection identifiers required.

2
Data flows in, indexed and searchable

Logs and metrics land in named collections with your schema. Arca indexes up to 55 fields per document for fast querying. Full-text search works out of the box across all indexed fields.

3
Threats detected. AI investigates. Cases created.

Six SIEM rule types run continuously. When a rule fires, an autonomous AI investigation launches immediately — examining log data with 6 read-only tools, mapping to MITRE ATT&CK techniques, assessing severity, and producing a structured report. Cases are created with full SOC workflow. Response agents can automatically block IPs, disable accounts, kill processes, restart services, or revoke AWS sessions. You get notified via Email, Slack, or PagerDuty.

18 pre-built agents cover Linux, macOS, cloud, containers, and common services out of the box.

Linux System Metrics Auth Log (SSH, sudo, PAM) Syslog Kernel Log UFW Firewall Nginx Access & Error Apache Access & Error PostgreSQL Query Log systemd Journal Fail2ban Login History Active Connections (netstat) auditd macOS System Docker Kubernetes AWS CloudTrail MySQL

Six rule types cover the detection patterns that matter most — from brute-force attempts to statistical drift.

Frequency

More than N events within M minutes. Detects brute-force, scan activity, and error bursts.

Absence

No data from a known source within M minutes. Heartbeat and host-down detection.

New Value

A previously unseen value appeared. Catches new source IPs, unexpected processes, unknown users.

Spike

Metric average changed more than N% between two time windows. Rate-of-change detection.

Baseline

Value deviates from rolling mean by more than N standard deviations. Statistical outlier detection.

Compound

Multiple conditions combined with AND/OR logic. Correlated multi-signal detection.

Stop reading logs. Start asking questions.

Most monitoring tools give you data. Arca gives you an autonomous analyst. Every rule trigger launches an AI investigation — powered by Claude — that examines your log data with 6 read-only tools, identifies the attacker, maps to MITRE ATT&CK techniques, assesses severity and confidence, and produces a structured report with specific recommendations. An AI chat assistant embedded at every collection and namespace level lets your team ask follow-up questions in plain English. And every hour, Arca writes an AI health digest summarizing the state of each namespace.

This isn't a chatbot bolted on as an afterthought. Arca's AI has full context of your schema, your data, your detection rules, your active anomalies, and your investigation history. It's a conversation about your infrastructure, backed by autonomous action.

"Why did this alert fire at 3am?"

The autonomous investigation has already answered this. Open the investigation report to see the identified attacker, MITRE ATT&CK technique mapping, severity assessment, and recommended response actions — or ask the chat assistant for more detail.

"Block the source IP and create a case"

Response agents can take autonomous action — blocking IPs, disabling accounts, killing processes, restarting services, or revoking AWS sessions. Cases track investigations through a full SOC workflow from triage to resolution.

"What detection rules should I add for this agent?"

The assistant understands your collection schema and data patterns. It can recommend specific alert thresholds and event rule configurations based on what it sees.

Built AI-first from day one

AI isn't a feature in Arca — it's the architecture.

Every collection schema, every document, every alert rule, and every anomaly is structured to be AI-readable. When you open a chat, there's no loading, no context-switching — the model already has everything it needs to be useful. We built Arca this way intentionally, because we believe the future of infrastructure monitoring isn't better dashboards. It's better conversations.

Powered by Claude Sonnet
Your API key. Your data. Your control.
The threat landscape has changed

AI is finding zero-days autonomously. Your defense needs to be autonomous too.

Anthropic's Mythos model discovered tens of thousands of zero-day vulnerabilities in real-world software — autonomously. Comparable capabilities will proliferate to threat actors within months. When attacks move at machine speed, human-only detection and triage become the weakest link. Arca's autonomous investigation and response pipeline was built for exactly this moment: every alert investigated by AI, response actions in seconds, and continuous validation through Nemesis attack simulation.

Read our full analysis: Mythos Is the Warning Shot
AI-speed offense
demands AI-speed defense.

Every alert is investigated autonomously — before a human touches it.

When a SIEM rule fires, Arca doesn't just send a notification. It launches an autonomous AI investigation powered by Claude. The investigation examines your log data using 6 read-only tools, identifies the attacker and affected systems, maps the activity to MITRE ATT&CK techniques, assesses severity and confidence, and produces a structured report with specific response recommendations. Investigations complete in 60–120 seconds, not hours.

This is the detection-to-investigation loop that SOC teams have always wanted but never had — running 24/7, on every alert, without fatigue or alert blindness.

6 Read-Only Investigation Tools

The AI queries collections, correlates events, checks threat intelligence, builds timelines, assesses severity, and analyzes entity activity — with read-only access that cannot modify your environment.

Structured Investigation Reports

Every investigation produces a report with severity, confidence score, identified entities (IPs, users, processes), MITRE ATT&CK technique mapping, and actionable recommendations.

Autonomous Response Actions

5 response adapters execute automatically or on-demand: block IP (iptables/UFW), disable user account, kill process, restart service, revoke AWS IAM session. Configurable per namespace.

Cases Created Automatically

Investigations automatically create cases with full SOC workflow — new, triaged, in_progress, resolved. Assign analysts, add comments, track audit trail, print to PDF.

Attacks are neutralized in seconds — not hours.

When an AI investigation identifies a confirmed threat, Arca doesn't wait for a human to act. Autonomous response agents execute containment actions within seconds of detection — blocking attackers, isolating compromised accounts, and stopping malicious processes before damage spreads. Every action is logged with full audit trail and tied to the originating investigation and case.

Response actions are configurable per namespace with blast-radius controls, so you define what Arca is allowed to do autonomously and what requires human approval. This is real autonomous defense — detect, investigate, and respond at machine speed, 24/7.

Block IP Address

Automatically add attacker IPs to iptables or UFW deny rules. Blocks take effect instantly and persist until manually removed or auto-expired.

Disable User Account

Lock compromised user accounts at the OS level. Prevents lateral movement using stolen credentials while the investigation proceeds.

Kill Process

Terminate malicious or suspicious processes by PID. Stops active exploitation, cryptominers, reverse shells, or runaway processes immediately.

Restart Service

Restart compromised services to clear injected code or restore from a known-good state. Useful for web servers, databases, and application processes.

Revoke AWS IAM Session

Immediately invalidate active AWS sessions for compromised IAM users or roles. Cuts off cloud-level access before resources can be exfiltrated or destroyed.

Configurable Blast Radius

Define which response actions are allowed per namespace. Set auto-execute for high-confidence threats or require human approval — you control the boundaries.

Built for engineers. Designed for visibility.

AI Chat Assistant

Claude Sonnet embedded in every collection and namespace. Ask natural-language questions about your data. Full context: schema, recent documents, active anomalies, configured rules.

Auto-Generated Dashboards

Every collection gets a dashboard automatically — time series charts with anomaly overlays, word clouds for text fields, and severity-coded markers. No chart building required.

Multi-Channel Alerting

Email, Slack, and PagerDuty — all individually toggleable per alert rule. Threshold alerts fire synchronously on write. Event rules evaluate every 60 seconds.

Full-Text Search

Case-insensitive substring search across all indexed fields, composable with partition filters and time range queries — from both the UI and the REST API.

Synthetic Collections

Correlate fields from two or more source collections on a shared time bucket. Cross-collection dashboards and anomaly detection with no custom code.

Schema Inference

Don't know your schema upfront? Send sample documents, let Arca discover the fields, review the suggestions, and confirm. Buffer-to-collection in seconds.

Full REST API

Complete API coverage: create namespaces and collections, write single or batch documents (up to 100), query with filters, and manage schema — all via API key.

Configurable Storage

Documents stored on your filesystem in configurable slices. Set per-collection expiration and compression thresholds. Storage monitoring built into the main dashboard.

One-Click Recommended Rules

Each agent type ships with curated alert and event recommendations pre-tagged with MITRE ATT&CK techniques. Review and create them in one click — no configuration from scratch.

MITRE ATT&CK Coverage

64-technique taxonomy with coverage matrix visualization. Technique chips on every investigation report. See which ATT&CK techniques your detection rules cover and where gaps remain.

Threat Intelligence Feeds

4 integrated feeds — CISA KEV, URLhaus, ThreatFox, AlienVault OTX — all free. Automatic enrichment of investigations with known indicators of compromise.

Compliance Reporting

SOC 2 Type II, HIPAA, PCI DSS v4.0, and NIST CSF. Automated evidence evaluation from live platform data. Print-optimized auditor-ready reports.

4 Analytics Dashboards

Operational, Threat Intel, Executive, and Security dashboards. Pre-built views that give different stakeholders the data they need without custom configuration.

Attack Map

Leaflet-based geographic visualization of threat sources. See where attacks originate in real time, correlated with SIEM detections, AI investigations, and threat intelligence data.

5-Role RBAC

Admin, analyst, read_only, engineer, and IT roles. Engineers and IT see log management only — SOC surfaces (investigations, cases, compliance) are restricted to security roles.

Validate your detection chain — not just your rules.

Nemesis is Arca's built-in breach and attack simulation engine. It runs 28 attack scenarios across 14 MITRE ATT&CK techniques, covering all 6 SIEM rule types. But Nemesis doesn't just check if a rule fires — it validates the entire detection chain: rule trigger, AI investigation launch, attacker identification, and technique classification. Grading happens at the investigation level.

Nemesis v2 goes further — it conducts real autonomous penetration tests against your infrastructure on an ongoing basis, not just as a one-time assessment. Schedule continuous pentesting as part of your security monitoring program, so your attack surface is validated regularly as your infrastructure changes. New hosts, new services, new configurations — Nemesis catches what drifts.

5-minute setup. No cloud account needed. No external tooling. Just run the scenarios and see what your detection coverage actually looks like.

Beyond simulation — real adversarial testing against your infrastructure with built-in safety controls.

1
Stage 1: Safe Reconnaissance

Port scanning, banner grabbing, TLS certificate inspection, DNS enumeration, WHOIS lookups. Non-invasive discovery that maps your external attack surface without triggering defenses.

2
Stage 2: Active Testing

Credential stuffing against known services, CVE-based vulnerability checks, and configuration audits. Blast-radius limits and auto-abort ensure testing stays within defined boundaries.

3
Stage 3: Purple Team Loop

Chains offensive actions with detection and response verification. Attacks are launched, detections are validated, response agents are triggered — a closed loop that proves your security posture end to end.

Auditor-ready compliance reports — generated from your live platform data.

Arca doesn't just help you monitor — it helps you prove compliance. Built-in compliance reporting evaluates your detection rules, investigation coverage, response actions, and logging completeness against the specific controls required by major frameworks. Evidence is pulled automatically from your live platform data. Reports are print-optimized and auditor-ready.

Stop assembling compliance evidence manually from screenshots and spreadsheets. Arca generates the documentation your auditor expects to see.

SOC 2 Type II

15 Trust Services Criteria controls evaluated. Covers logical access (CC6), system operations (CC7), change management (CC8), and more.

HIPAA Security Rule

13 implementation specifications evaluated. Administrative, physical, and technical safeguards mapped to platform evidence.

PCI DSS v4.0

15 requirements evaluated. Emphasis on logging (Req 10), vulnerability testing (Req 11), and access control (Req 7-8).

NIST CSF

13 categories across Identify, Protect, Detect, Respond, and Recover. Gap analysis with maturity scoring on a 1–5 scale.

Four free threat feeds. One real-time attack map.

Arca integrates with 4 curated threat intelligence feeds — all free, no subscriptions required. Indicators of compromise are automatically correlated with your investigation data and surfaced as "Known Threat" badges on investigation reports. The Attack Map provides a Leaflet-based geographic visualization of threat sources.

CISA KEV URLhaus ThreatFox AlienVault OTX

Feeds sync automatically every 6 hours. Admin UI for feed management and manual sync.

Real-Time Attack Map

Full-page Leaflet-based world map showing geographic origin of detected threats. Attackers appear as pulsing red dots, targets as blue dots, with smooth bezier attack vectors color-coded by severity. Hover popups show IP, city, country, ISP, and linked investigations. Opens from any investigation page.

4 Analytics Dashboards

Operational (storage, ingest, agent performance), Threat Intel (feed health, indicator trends), Executive (KPIs, resolution time, platform value), and Security (MITRE heatmap, kill-chain depth, risk ranking). Time-window filters from 7 to 90 days.

Arca is now in beta

We're onboarding teams now. Arca is self-hosted, with no per-GB billing. To get started, send us an email with a brief description of your infrastructure and security needs and we'll be in touch within 24 hours.

Request Beta Access Ask a Question