Reduction in time that critical vulnerabilities remain open
Cogent is an applied AI lab building agents to automate critical security tasks for Fortune 1000 enterprises. Where many security tools focus on finding vulnerabilities, Cogent focuses on fixing them. Cogent automates investigation, prioritization, and remediation across the full vulnerability lifecycle.
Reduction in time that critical vulnerabilities remain open
Reduction in time that critical vulnerabilities remain open
Reduction in time that critical vulnerabilities remain open
Security teams at large enterprises are generally effective at discovering vulnerabilities: scanners can surface thousands of findings daily. The hard part is the tedious, time consuming work that comes after that: determining which ones actually matter, who owns the fix, and what the exact remediation steps are. Those answers require pulling data across scanners, endpoint detection tools, asset inventories, threat intelligence feeds, and configuration databases, then synthesizing it manually.
The work is slow and often inconsistent. High-severity vulnerabilities can sit open for days or weeks. “AI has shifted the balance of power in cybersecurity,” said Geng Sng, Cogent's CTO. “Attackers now automate most of the attack lifecycle, compressing what once took weeks into hours. Meanwhile, defenders still rely on fragmented tools and manual coordination.” Cogent's founders wanted to build a system that could do this work continuously and at machine speed, across the full vulnerability lifecycle.
Response time to zero-day vulnerabilities
Response time to zero-day vulnerabilities
Response time to zero-day vulnerabilities
Cogent evaluated multiple model providers using internal security-focused benchmarks. The decisive factor was performance on complex, multi-step agentic workflows.
In vulnerability investigation, an agent needs to follow a chain of evidence across disparate systems without losing the thread: a vulnerability surfaces in a scanner, which points to a specific software version, which maps to a set of assets, which have varying levels of exposure depending on compensating controls. In workflows involving 10-15 sequential tool calls, Claude maintained coherence and instruction-following where alternatives lost context.
That reliability made Claude Opus and Haiku models the clear choice for production deployment in enterprise security environments, where incomplete reasoning has real consequences.
"Claude consistently performed best on complex, agentic workflows, especially multi-step investigations requiring policy adherence and sustained reasoning across multiple tools," said Anirudh Ravula, Cogent's Head of AI.
Fixing a vulnerability requires three things to go right in sequence: understanding what’s actually exploitable, deciding which issues deserve immediate attention, and actually resolving them. Most security teams do all three manually. Cogent automates the full chain by building the end-to-end remediation stack then embedding Claude as the reasoning layer at each step.
Investigation: Cogent's platform continuously pulls from scanners, logs, asset inventories, and threat feeds, building the environmental context that doesn't exist anywhere in a customer's environment ready-made. From there, Cogent's investigative agent works autonomously: tracing asset ownership across systems, synthesizing threat intelligence and business context into a risk score, and mapping the remediation processes that apply to each asset. For issues that warrant deeper analysis, security teams can ask questions in plain language and get back clear, explainable findings. Investigations that once took days now happen in minutes.
Prioritization: A large enterprise typically faces millions of vulnerability-asset combinations at any given time. Traditional risk scoring treats them uniformly, assigning severity based on the vulnerability itself rather than the environment it lives in. Cogent's agents assess real-world exploitability, how critical the affected asset is to the business, whether it's exposed to the internet, and what compensating controls are already in place. The result is a ranked list that reflects actual business risk, not a generic severity label. False positives drop; the issues that truly matter surface.
Remediation: Once vulnerabilities are prioritized, Cogent's agents generate action plans, identify the responsible owner, and draft implementation steps. Cogent is advancing toward fully autonomous remediation: agents that execute fixes directly within defined guardrails, with verification loops and policy controls at each step.
The results are measurable. Customers have reduced the time critical vulnerabilities remain open by 97%. Response time to zero-day vulnerabilities has dropped to 30 minutes. Vulnerability noise requiring human review has fallen by 90%, freeing security teams to focus on findings that genuinely require attention. Individual analysts have reclaimed more than 40 hours per month previously consumed by manual reporting.
One enterprise customer at a large hospitality brand put it simply: "In meetings, I used to say 'I'll get back to you on that' and spend hours in BI tools and Excel. Now I ask Cogent in plain language and generate charts in seconds. Executive questions get answered in real time, not days later."
Claude is also embedded in how Cogent builds its own product. The team developed an AI-driven software development lifecycle, integrating Claude into engineering workflows from specification through implementation and review. Smaller teams can now move faster and maintain the high security standards their enterprise customers require.
Cogent is working toward two capabilities next: fully autonomous remediation, where systems identify and fix vulnerabilities with minimal intervention, and offensive security simulation, where agents replicate attacker behavior.
“We are exploring Claude-powered agents that simulate sophisticated attackers, chaining misconfigurations and privilege escalations to uncover attack paths before adversaries do,” said CTO Geng Sng. “Our goal is fully autonomous systems, reducing millions of exploitable issues toward zero.”