Most teams don't have a CISO. They have a tech lead, a security-minded engineer, and a Slack channel where someone occasionally posts "should we be worried about this?" Ospiri for Teams is built for that team — the one that wants real visibility into agent activity on their fleet without the procurement cycle of an enterprise security platform.
What you get
- Agent inventory in minutes. Install on your team's laptops via standard Windows MSI. The signature pipeline identifies known agents — Claude, ChatGPT desktop, Cursor, Copilot, Gemini — automatically.
- Activity feed per agent. What files it touched, what network endpoints it hit, what other processes it talked to. You see the action chain, not just a binary "agent ran."
- One-click sandbox toggles. When you want to contain an agent, flip it into a copy-on-write sandbox. The agent keeps working; the blast radius stops at the sandbox boundary.
- Sensible defaults. Unknown agents get restrictive policies until you've reviewed them. Known agents get sane policies you can customize.
- No blocking surprises. Copy-on-write means you don't break developer flow. Agents that try to do something risky get sandboxed, not killed.
"A firewall that breaks the agent gets uninstalled by Friday. Ospiri's bet is the opposite: let the agent work, contain the blast radius, give the team enough visibility to make policy decisions on real evidence."
Who this is for
- Engineering teams at startups and scale-ups where everyone runs at least two AI agents and nobody has an answer for "what does that agent have access to?"
- Security-engineering teams at mid-sized companies who want kernel-grade coverage without an enterprise procurement cycle.
- Platform & infrastructure teams who own the developer environment and need to govern what agents can do inside it.
What this is not
Ospiri for Teams is a small-fleet entry point into the same platform that powers our enterprise deployments. It's not a stripped-down product — same kernel driver, same signature pipeline, same copy-on-write isolation across filesystem, registry, network, and process scopes. It's just a lighter-touch path to get started.
If you grow into thousands of endpoints, vertical-specific policy templates, SIEM integration, and dedicated solutions architecture, you're on the enterprise path. The product migrates with you.
Pricing & access
We're rolling out team-tier access through the waitlist. Early team customers will help shape pricing, rollout flow, and the team-specific dashboard. Join the waitlist below and mention "team" to be in the first batch.