Listrum

Edge detection & response for healthcare.

Automated NYSDOH 405.46 and CIRCIA compliance.

Runs on your existing Cisco infrastructure. Never touches patient data.

listrum :: sterile-field-001
~
Compliance

What We Automate

NYSDOH 405.46 and CIRCIA 2026 require healthcare organizations to report cybersecurity incidents within 72 hours. Miss the deadline, face the fines. Listrum detects threats and auto-generates compliant reports so you never miss a deadline.

NYSDOH 405.46

72-hour incident reporting for NY hospitals. Listrum auto-generates the required report format.

CIRCIA 2026

Federal mandate: 72 hours for incidents, 24 hours for ransom payments. Listrum tracks both timelines.

When an incident happens, your security team shouldn't be writing reports. Listrum captures every detection event with timestamps, affected systems, and response actions. When regulators ask, the documentation is already there.

Stop spending hours on manual compliance reporting.

What We Catch

7 Detection Algorithms

Ransomware Detection

01 / 07

Catches file-locking malware before it can encrypt patient records or critical systems.

Blocked at the network edge

Scroll over cards to explore
How It Works

No Guessing. No AI Hallucinations.

This is not a probabilistic model. There is no "confidence score." There are no AI hallucinations.

Listrum uses deterministic detection logic. Each algorithm is designed to catch a specific attack pattern. The logic is auditable. The behavior is predictable.

When we say "detected," we mean detected.
Not "probably detected." Not "likely detected."
Detected.

See real-time detection in action on your network.

How It Works

Deploy. Detect. Report.

Three steps from threat to compliance report. No new hardware. No cloud dependencies.

01: Deploy on Existing Cisco

Listrum runs on your existing Cisco switches and routers. No new hardware to purchase. No new racks to provision. Deploy in hours, not weeks.

Your IT team installs. Your infrastructure stays the same.

terminal
$ listrum deploy --switch 192.168.1.1
Connecting to Cisco IOx...
Installing detection agent...
Loading 7 detection algorithms...
[OK] Listrum active on switch

02: Detect Threats at the Edge

7 algorithms monitor your network traffic for ransomware, data exfiltration, lateral movement, and more. All detection happens at the network edge.

No machine probing. No patient data access. Just network pattern analysis.

detection_event.json
{
"event": "THREAT_DETECTED",
"type": "RANSOMWARE",
"segment": "VLAN_40_RADIOLOGY",
"action": "BLOCKED"
}

03: Generate Compliance Reports

Incident detected? Report auto-generated. NYSDOH 405.46 and CIRCIA formats ready to file.

Your CISO reviews and approves. Complete audit trail. 6-year retention. When regulators ask, the documentation is already there.

compliance_report.pdf
[REPORT] Ready for Filing
Format:NYSDOH 405.46Incident:INC-2026-0412Deadline:68h 14m remainingStatus:AWAITING_CISO_APPROVAL

Ready to eliminate your compliance blind spots?

Security Model

Never Touches Patient Data

Edge Monitoring Agent
PASSIVE MONITORACTIVE

Network metadata only · No machine probing · No data access

Listrum never probes machines. Never accesses files. Never reads patient records. All detection happens at the network edge using traffic metadata only.

No patient data exposure. Ever.

Listrum runs as an ephemeral container on Cisco IOx. It observes network patterns, not content. It cannot scan endpoints. It cannot read files. It cannot exfiltrate data.

All processing is local. Nothing leaves your premises. No cloud dependencies. HIPAA-safe by design.

No Machine Probing

Never scans endpoints. Never accesses files. Detects threats from network traffic patterns alone.

No New Hardware

Runs on your existing Cisco infrastructure. No appliances. No rack space. No CapEx.

No Cloud Dependencies

All processing happens on-premise. Nothing leaves your network. No third-party data exposure.

Questions about our security architecture?

Roles

Who Needs Listrum

Hospital CISOs

Automate the 72-hour clock. Stop tracking deadlines in spreadsheets. Start proving compliance with evidence.

72-hour automation
Compliance Officers

NYSDOH 405.46. CIRCIA 2026. Pre-filled reports. Audit-ready logs. 6-year retention. Merkle integrity.

Audit-ready
IT Directors

No new hardware. No network changes. Deploy on existing Cisco infrastructure.

Zero CapEx
Risk Managers

Formal verification. Mathematical proof. Deterministic response. No AI. No guessing.

Verifiable

One platform. Four roles. Zero ambiguity.

Find out which solution fits your role.

Verification

Formally Verified. Mathematically Proven.

In surgery, "probably sterile" means infected. In compliance, "probably detected" means liable.

Listrum uses Verus, a formal verification system, to prove our state machine logic correct at compile time. Not at runtime. At compile time.

This is not AI. There is no training data. There are no edge cases. The proof is the product.

Deterministic

Same input → same output. No temperature. No randomness. No probability.

Proven

Logic verified with mathematical proof. Every state transition validated at compile time.

Auditable

Every decision traces to source code. Every log entry traces to telemetry. Full chain of custody.

Immutable

6 years of Merkle-tree storage. Tamper-evident by design. Cryptographic proof of integrity.

Compliance_Report

{
  "event_type": "INCIDENT_DETECTED",
  "threat_class": "RANSOMWARE_SYMMETRIC",
  "vlan_name": "Infusion Pumps",
  "criticality": "CRITICAL",
  "hours_remaining": 72,
  "verification": "VERUS_FSM_STATE_VALID"
}

The 72-hour clock is ticking.

Schedule a technical review. We'll analyze your Cisco infrastructure and deploy Listrum on a test VLAN.