Skip to content
ES EN

Introducing Gerion: ASPM for Modern Engineering Teams

By Gerion Team 4 min read

For the past few years we’ve worked on engineering teams where security always arrived late: at the end of a sprint, as a blocker in the CI pipeline, or as a compliance email the day before an important deployment.

The problem wasn’t a lack of tools. It was that the tools didn’t speak the language of product teams. Security engineers reported in CVEs and severity labels. Engineering managers reported in deadlines and delivery. The C-suite reported in money. Nobody was translating between the three.

The Problem with Today’s Security Tools

Traditional scanners generate hundreds of findings without business context. A HIGH from Opengrep on a feature branch that never reaches production doesn’t carry the same weight as the same finding on main. But the tools don’t distinguish.

The result: alert fatigue, ignored findings, and security technical debt silently accumulating — until a breach makes it visible on the balance sheet.

There’s also the tool sprawl problem. Most teams end up running SAST, SCA, secrets scanning, and IaC audits through separate tools with separate outputs, separate dashboards, and separate triage workflows. The operational cost of managing four disconnected security signals is itself a form of debt.

What Makes Gerion Different

Gerion integrates four best-in-class open-source scanners into a unified platform:

  • Opengrep — source code SAST (community fork of Semgrep)
  • OSV-Scanner — dependency analysis and CVEs (Google)
  • Gitleaks — leaked secret detection across the full git history
  • KICS — infrastructure-as-code analysis (Terraform, Kubernetes, Dockerfiles)

But the scanners aren’t what matters most. It’s the Financial Impact Engine.

Financial Impact Engine

Every finding is translated into an economic impact based on the repository’s real context: branch, finding type, severity, exposure. Findings on production branches (main, master, release/*) carry a 10× cost multiplier.

This lets engineering teams prioritize not by “this scanner says HIGH” but by “this finding represents €8,400 in production exposure right now.” It lets security leads report to the CFO not in CVE counts but in euros of avoided cost. And it creates a shared language between security, engineering, and leadership that makes security investment defensible.

The Financial Impact Engine also tracks Savings Realized — the accumulated value of mitigated findings. When security sprints happen, the dashboard shows the ROI in currency, not just a lower finding count.

Your Code Never Leaves Your Network

We believe trust in a security tool starts with transparency. The Gerion CLI is open source — you can read exactly what it does before giving it access to your codebase. The repository is at github.com/gerion-appsec/gerion-cli.

Because scanning runs inside your own CI/CD pipeline, your source code never leaves your network. All four scanners execute on your infrastructure. What reaches the Gerion dashboard is only findings metadata, git context (branch, commit, author), and calculated financial impact — never source code.

This architecture matters especially in regulated environments. Under GDPR, NIS2, and DORA, organizations need to demonstrate control over where their data goes. Gerion’s design makes that answer simple: your code stays in your network, full stop.

Open Core SaaS

The scanning engine is open source and auditable. The platform — dashboards, financial engine, governance views, reporting — is a SaaS at gerion.dev, running on European infrastructure.

You get the transparency of open-source tooling with the simplicity of SaaS: no infrastructure to manage, no scanner maintenance, no dashboard to build. Install the CLI in your pipeline, and findings with financial context start flowing to your dashboard within minutes.

Early Access

Today we open the Early Access program. If you lead an engineering or security team and want to be among the first to use Gerion, request access.

The first teams will work directly with us to define roadmap features — and their findings and financial metrics will help us build the benchmarks that will eventually let every team compare their security posture against industry peers.