Built for the moves attackers actually make.
Diopter defends SMB and mid-market teams from AI social engineering on the channels attackers actually use (video and voice), so the people answering the call don't have to be the last line of defense.
Two builders who saw the other side of the model.
Diopter was born out learnings that Rohan and Jeremy observed at Quillbot. They saw the industry development of powerful video, audio and text models being used maliciously to run social engineering at a scale that small and mid-sized teams were never staffed to defend. They started Diopter to put that defense in their hands.
Founder and prev. CEO of Quillbot, a generative AI company with 40M+ monthly users.
"We're only in the opening innings of how powerful these AI social engineering attacks will get. This is the problem worth our decade."
Prev. VP of Product at Quillbot & FanDuel
"Defense has to be as cheap to deploy as the attack is to launch. Anything else just protects the Fortune 500."
Four tenets.
An attack is not a file.
Single-frame deepfake detectors miss the attack because the attack is a sequence of moves across time, not an artifact in a frame.
Arcs, not artifacts.
We model the conversation: Authority, Urgency, Isolation, Escalation, Ask. The arc is the unit of analysis.
Cross-channel, by default.
Video, voice, email, SMS, and LinkedIn signals correlate. The vishing call is rarely the first move.
Defense has to be affordable.
Attacks are getting cheaper every quarter. SMB and mid-market teams need protection that ships through MDM and an MSP, not a year-long rollout.
Channels and posture.
- Video CallLive · Zoom, Teams, Meet, Webex
- Voice / VoIPLive · Ring Central + 8x8
- Email · SMS · LinkedInCorrelation only
- DeploymentMDM · agent + connector
- RegionUS + EU residency
- SOC postureSOC 2 Type II in progress
- Data retentionConfigurable per tenant
The companies the rest of the market skipped.
Most deepfake and voice-clone defense is priced and packaged for the Fortune 500. Small businesses, mid-market teams, and the MSPs that run security for them get told to wait. Attackers did not wait. Neither do we.
Self-serve setup, MSP-delivered where you want a partner running it.
Direct rollout through MDM, no year-long program required.
Multi-tenant console so one team can defend many.
Talk to us.
Walkthrough · 30 min · NDA-safe
Walk an attack arc with our threat team.
We'll replay a real deepfake incident through Diopter, frame by frame and signal by signal, and show what you would have caught and when.