Platform

Built for security leaders

Fortworx gives your team a single place to handle every inbound security message — with AI that triages automatically, workflows that enforce accountability, and controls that match how your organization actually operates.

Fort Intelligence

AI that reads, classifies, and triages for you

Every inbound message is automatically analyzed by Fort Intelligence. It reads the content, determines what type of communication it is, and surfaces the details your team needs to act — so nothing sits unread in a shared inbox.

Automatic classification

  • Knows what it's looking atVulnerability reports are separated from security questionnaires, compliance requests, abuse reports, and legal notices — each routed into the right workflow automatically.
  • Surfaces what mattersFor every report, Fort Intelligence generates a summary with suggested severity, vulnerability type, known CVEs, and area of concern — giving your team a head start before they even open the message.
  • Routes to the right personReports are matched to your defined scopes (e.g. Web, API, Infrastructure) and sent to the designated lead, so the right person is notified immediately.
  • Your data stays yoursYour data is never used for model training and is never shared with third parties. Enterprise customers can bring their own AI model for full control.

Always a human in the loop

  • AI assists, your team decidesFort Intelligence can read and analyze on its own, but anything consequential — like sending a response or changing a report's status — requires explicit approval from your team first.
  • Easy to correctIf something is misclassified — say, a legal notice tagged as a vulnerability report — any team member can reclassify it in one click. The change is logged in the audit trail automatically.
  • Works like a conversationFort Intelligence lives inside every report as a chat assistant. Ask it to summarize a thread, draft a response, or pull out key details — all in context.
  • Spam and malware filteredAll inbound emails are scanned for spam, viruses, and malware before they ever reach your team.

Integrations

Works with your existing tools

Fortworx meets reporters where they already are — email — and connects to the tools your team already uses day to day.

Email

Forward your security@ inbox or use a dedicated Fortworx address. Outbound responses can come from your own domain, so reporters never see a third-party address.

All plans

Web Forms

Give researchers a structured way to submit reports through your public portal — including anonymous submissions for those who prefer not to identify themselves.

All plans

Slack

Get notified in Slack when new reports come in, when responses need approval, or when a report is assigned to you. Connects in seconds via OAuth.

Business+

API

Build on top of Fortworx with a full REST API. Pull data into internal dashboards, connect to your existing tooling, or automate workflows programmatically.

All plans

Webhooks

Push events in real time to your SIEM, ticketing system, or any endpoint you choose. Use it to trigger workflows in Jira, PagerDuty, ServiceNow, or your own internal tools.

Business+

Bring your own model

Need full control over which AI processes your data? Enterprise customers can plug in their own model — whether for compliance, performance, or data residency requirements.

Enterprise

Access control

The right people see the right things

Not everyone on your team should see everything. Fortworx lets you control who has access to what — from organization-wide authentication to fine-grained, scope-level permissions.

Identity & authentication

  • Single sign-onLet your team log in with your existing identity provider. Available on Business and Enterprise plans.
  • SAMLFor organizations that need standards-based federated identity. Available on Enterprise.
  • Separate workspacesRun independent workspaces for different products, brands, or business units — each with their own team, settings, and access controls.

Scopes and roles

  • Organize by area of responsibilityDefine scopes like Web, API, Infrastructure, or Legal — and assign a lead to each. Reports are automatically routed to the right scope, so the right person handles every message.
  • Leads own their domainEach scope lead receives notifications, reviews outbound correspondence, and is accountable for every report in their area. You always know who's responsible.
  • Workspace-level rolesAssign Owner, Admin, or Member roles to control who can manage settings, invite team members, or administer the workspace.

Approval workflow

No outbound message leaves without sign-off

When your team responds to a security researcher or a legal inquiry, the stakes are high. Fortworx holds outbound messages for review so the right person always signs off before anything is sent.

1

Draft

A team member writes a response to a researcher or external party.

2

Hold & notify

The message is held automatically. The scope lead is notified in-app, by email, or in Slack.

3

Review

The lead reviews the draft with full context — the report history, prior messages, and any notes from the team.

4

Approve or reject

One click to send, or send it back for revision. Either way, the decision is recorded in the audit log.

Flexible by design: Approval is enforced when a scope has a designated lead and the sender isn't that lead. Workspace owners and admins can always send directly. You decide how tight the controls are by how you configure your scopes.

Bounty program

Reward researchers, from report to payout

Run a bug bounty program directly inside Fortworx. Researchers submit reports, your team evaluates them, and payments go out — all in one place, no separate bounty platform needed.

Review and reward

When a researcher submits a valid vulnerability, they can request recognition or a bounty. Your team reviews the claim and decides whether to award a monetary bounty or Hall of Fame credit — with the full history tracked from submission to resolution.

Built-in payments

Researchers set up their payout account once, and approved bounties are transferred automatically — with currency conversion, international payouts, and tax reporting handled for you.

Researcher portal

Researchers get their own portal to track submissions, see report status, manage payouts, and communicate with your team — without ever needing access to your internal workspace.

You choose what's covered: Bounty eligibility is set per scope, so you have precise control over which parts of your system are part of your bounty program and which aren't.

Reliability

Your critical path, never interrupted

Inbound security reports are too important to lose to an outage. Fortworx's email infrastructure is built for 100% uptime — and when the unexpected happens, every message is encrypted and queued until delivery succeeds. No email is ever dropped.

100% inbound uptime

Inbound email is handled by AWS, distributed across multiple regions with no single point of failure. Messages are accepted 24/7/365 — regardless of what's happening downstream.

Encrypted long-term queueing

If a connectivity issue, DNS disruption, or any other problem prevents immediate delivery, messages are queued in fully encrypted storage for as long as it takes. Nothing is bounced, nothing is lost.

Resilience by design

Every layer of the system is built with redundancy so that transient failures never reach your team. Your vulnerability disclosure process keeps running — even when infrastructure around it doesn't.

Compliance

Every action logged, every decision traceable

When regulators or legal teams ask "what happened and when?", Fortworx has the answer. Every email, response, classification change, and approval decision is recorded — with who did it, when, and from where.

Complete audit trail

Every action is logged with the user's identity, timestamp, what changed, and their location — giving your compliance team a defensible record for every report.

EU data residency

All data stored in Germany by default, on infrastructure certified to ISO 27001, BSI C5, NIS-2, and PCI DSS. Enterprise customers can choose their preferred region.

Encrypted end to end

All data encrypted in transit and at rest using individually rotating encryption keys. No shortcuts, no exceptions.

Built for regulated industries

SOC 2 Type II (in progress), GDPR compliant from the ground up. DPA included with all paid plans.

Ready to see it in action?

Book a demo with our team

See how Fortworx can automate your vulnerability disclosure program, streamline security questionnaire responses, and give your leadership team full visibility and control.