LET'S CHAT
COVENANT Dashboard - AI-powered portfolio monitoring

AI-Powered Portfolio Monitoring

Portfolio Monitoring That Never Sleeps

A quarterly review is a smoke detector turned on 4 times a year. COVENANT is always on.

Track covenants across your entire portfolio. AI-powered analysis. Self-hosted for data sovereignty. Know before your lenders do.

Self-hosted. Your data never leaves your network. Enterprise AI at small-firm prices.

100+
Covenant Types
<5min
Analysis Time
24/7
Monitoring

The Cost of Manual Covenant Tracking

73% of PE firms cite covenant monitoring as a major operational bottleneck.

Spreadsheet Hell

Covenant tracking doesn't scale. As your portfolio grows, spreadsheets become unmanageable, error-prone, and impossible to audit.

Reactive, Not Proactive

You find out about breaches after lenders call. By then, it's too late to negotiate or remediate. You're always playing catch-up.

Data Sovereignty Concerns

Sensitive financial data scattered across cloud tools. When LPs ask where their portfolio data lives, what's your answer?

The NO HUMAN NEARBY Advantage

Institutional-grade monitoring, delivered on your infrastructure.

๐Ÿ“Š

Automated Covenant Testing

AI automatically tests covenants against thresholds. Debt/EBITDA, Interest Coverage, Current Ratio - all monitored in real-time.

๐Ÿ”

AI-Powered Extraction

Upload financials in any format. Our AI extracts the data you need without manual entry or reformatting.

๐Ÿ”

Self-Hosted Security

Your data stays on your infrastructure. No third-party clouds. Full data sovereignty for LP compliance.

One Number. Whole Portfolio.

Stop staring at twelve spreadsheets. COVENANT rolls every portfolio company's covenant posture into one health score the investment committee can read in three seconds.

78/100
Portfolio Health
Your 24-company fund at a glance.

Real-time covenant testing across every LBO in the book. Green means tested and clean. Yellow means within ten percent of a covenant trip. Red means breach. Click through to any company for the full test-by-test drill-down.

19
Healthy
4
Watch List
1
In Breach
612
Tests / Quarter

Illustrative dashboard. Live product uses your fund's covenant schedule and financials.

Weather Radar for Financial Contagion

One breach. Four defaults. You are not watching an isolated thunderstorm over a single portfolio company - you are seeing the topological map of how the floodwaters spread across your capital structure before the original lender's demand letter lands.

A BREACH B EXPOSED C EXPOSED D EXPOSED E HEALTHY ORIGIN CROSS-DEFAULT RADIUS UNAFFECTED same lender ยท shared covenant ยท MFN clause
Active breach
Cross-default exposed
Healthy, isolated

Company A trips a leverage covenant. The radar picks up the contagion as it spreads: COVENANT's lender-graph analysis surfaces every shared-lender exposure, MFN clause, and cross-default provision that drags B, C, and D into the storm before the original lender's demand letter lands. Your workout team has a two-week head start.

Beta · Q3 2026 Portfolio Contagion Graph

Predictive Cross-Default Mapping, Honestly Scoped

Today's radar detects breach. The contagion graph predicts which other borrowers' collateral, lender-graph position, and cross-default provisions put them at risk before a breach trips. The graph is built directly on the covenant-agreement parsing the product already does: shared-lender pairs, pledged-collateral overlaps, MFN clause clusters, parent-subsidiary guarantee chains.

Beta opens to founder-tier customers in Q3 2026. We are deliberately not shipping it as a real-time dashboard until the false-positive rate is lower than the human-analyst baseline. Predicting contagion that does not happen is alert fatigue dressed up as foresight.

Out of scope: equity prices, CDS spreads, peer-comp valuations, real-time market data. The contagion graph is built from the covenant agreements the fund already holds. No external market data feeds, no shadow-banking concerns.

Three Tiers Of Confidence, Zero Alert Fatigue

A radar that fires on every drizzle trains its users to mute notifications. COVENANT routes every signal through a three-tier confidence classifier before it reaches a human. Pager-worthy signals stay pager-worthy.

Tier 1

Cascade Warning

High confidence. Cross-default cascade risk detected across 2+ borrowers with connected exposure.

Routes to: pager credit committee

Response: within 24 hours

Calibrated to fire under 5x per quarter per 200-facility fund.

Tier 2

Storm Forming

Medium confidence. Single-borrower covenant ratio deteriorating, debt-service coverage dropping past warning threshold, unplanned capex mid-quarter.

Routes to: portfolio manager daily digest

Response: within 5 business days

Per-PM sensitivity controls tune the floor.

Tier 3

Watch

Low confidence. Early signals, single data-point drift, not yet indicative of stress. Logged for pattern detection.

Routes to: weekly portfolio summary

Response: no immediate action

Feeds quarterly sensitivity recalibration.

Alert-history analytics recalibrate sensitivity quarterly based on tracked outcomes.

"Your last 20 Tier 2 alerts, 14 actionable, 6 noise, sensitivity auto-recalibrated." The radar gets sharper every quarter. The boy-who-cried-wolf problem is engineered out by design.

Tier 2 Density Cap

3 Signals Per Day. Hard Cap. No Digest Blindness.

A daily digest that bundles twelve lukewarm signals is just a junk drawer with a calendar. COVENANT caps the Tier 2 daily digest at the 3 most relevant signals per portfolio manager, with a steady-state guarantee of under 5 Tier 2 alerts per week.

When signal volume would exceed the cap, the system makes a hard decision: promote the highest-confidence candidate to Tier 1 (Cascade Warning, pager), or demote the lowest to Tier 3 (Watch, weekly digest). Never overflows.

In the alert preferences UI: "Your current digest is averaging 2.4 signals per day." The PM sees the cap working in real time.

Tier-2 Auto-Promotion Audit Log

Every Promote / Demote Decision Is Logged In The PM's Own Audit Trail

When the density cap forces a promote-or-demote, the system writes a structured audit row that the PM can re-open six months later. Confidence delta, alternatives considered, and a deep link to the underlying signal. Auto-triage logic stops being a black box.

Sample audit row
signal_id:    SIG-2026-04-26-0173
decision:     PROMOTED Tier 2 โ†’ Tier 1
timestamp:    2026-04-26T08:14:22-04:00
confidence:   0.973  (threshold for promote: 0.92)
reason:      cross_default_path detected (Borrowers A, C, F)
demoted:     [SIG-...0168 cap-ex-overrun 0.71,
             SIG-...0171 leverage-drift 0.68]
policy:      density_cap_v2 (3-per-day, rank-by-confidence)
audit_link:  /audit/SIG-2026-04-26-0173

During postmortem, the PM clicks audit_link and sees the full alert tree: which signals were considered, why this one beat them, what the confidence model weighted. If the model was wrong, the row is the receipt.

Conservative-By-Default

Sliders Ship Tuned For The Fiduciary, Not For The Vendor

COVENANT's per-PM sensitivity sliders ship with conservative defaults that catch roughly 95% of correlated breach signals as Tier 1. PMs can dial sensitivity down to fit their portfolio's volatility profile, but the factory default catches the "we should have been paged" cases where demoting a signal would later constitute a breach of fiduciary duty.

Every slider adjustment is logged, timestamped, and reasoned - the PM enters a short note. When the inevitable postmortem happens, the audit log answers "why was this signal demoted" with a dated reason in the PM's own words. The tuning tool is not a vendor liability shield. The defaults are the shield.

Honest Coping For The 80/20 Book

COVENANT continuously monitors the 80% of your book with clean data AND auto-generates targeted compliance enforcement requests to the 20% lagging behind. The radar does not wait for the data. The radar hunts the data down.

Per-Borrower Data Quality Grade

A to F, Visible On The Dashboard

A

Real-time API integration direct from the borrower's accounting system.

B

Scheduled daily structured push via Onboarding Wizard.

C

Monthly structured financial statements via Onboarding Wizard.

D

Quarterly structured financials (the legacy baseline).

F

Parsing failed. The model could not read this borrower's most recent submission. Routed to Compliance Friction.

COVENANT directs scarce human attention to the 20% that actively requires it, while fully automating the 80% that has clean data pipelines.

Every sub-A borrower ships with an auto-generated Path to A action list: "Re-negotiate reporting requirements in next amendment cycle," "Deploy Onboarding Wizard for this borrower," "Request API integration for upcoming refinancing." Portfolio coverage compounds as the action list closes out.

Parsing Confidence, Not Borrower Default

An F Means The AI Could Not Read The Document. It Does Not Mean The Borrower Defaulted.

The most common silent-failure mode in cloud covenant tools is conflating data quality with parsing confidence. A scanned PDF with a watermark looks identical to a scanned PDF that says "we breached our covenant" - if the parser fails on either, the system goes quiet. COVENANT refuses that conflation. Every F surfaces the precise failure mode and the action it triggers.

Failure Mode 1

Watermark / scan artifact

Borrower stamped a CONFIDENTIAL watermark across the income statement. Parser logs parse_fail.watermark_overlap. Routed to Compliance Friction with a request for an unwatermarked submission.

Failure Mode 2

OCR confidence floor

Image-only PDF, OCR confidence below floor across the financial-statement table. Parser logs parse_fail.ocr_below_floor. Routed for human escalation, never silently scored.

Failure Mode 3

Missing pages

Submission references Schedule 5.02 but the schedule was not included. Parser logs parse_fail.missing_schedule. Compliance request fires same-day, citing the contractual reporting obligation.

An F is a transparent admission that the radar could not see. The PM gets a named failure mode, a routing decision, and a tracked request. The system never goes silent on a borrower it cannot read.

Explainability Dashboard

A Single Glance Tells The Risk Officer Where The Radar Has Coverage

Open the portfolio view. The header is a coverage map: how much of the book is on clean pipelines, how much is delayed, how many borrowers the parser could not read, and how many compliance requests are outstanding right now.

Portfolio Data Coverage · 80 borrowers

Updated 2026-04-26 08:14 ET

80%

A / B clean
64 borrowers, real-time or daily push

15%

C / D delayed
12 borrowers, monthly or quarterly cadence

5%

F unreadable
4 borrowers, parser failure logged per failure mode

Compliance Friction

12 borrowers with open requests

Overdue > 7 days

3 borrowers, escalated to PM

Path-To-A Closures (30d)

+5 borrowers, coverage trending up

Risk officers stop seeing "the radar found a breach." They start seeing "the radar covers 95% of the book and is actively closing the remaining 5%." The blind spot becomes a tracked metric, not a hidden liability.

A-F Grading: Active Enforcement

True Risk Management Is Defined By How The System Behaves In The Dark

When a borrower hits a D or F grade, COVENANT does not wait. The system auto-generates a templated compliance-enforcement request to the borrower's CFO or CRO, referencing the specific contractual reporting obligations the borrower signed, requesting the missing data, and opening a tracked response timer.

Non-responsive borrowers surface as a daily Compliance Friction report on the PM dashboard, sorted by days-since-request and by underlying credit exposure. The 20% is not celebrated as a blind spot. The 20% is hunted until it becomes the 80%.

The companies with the worst financial-reporting hygiene are historically the first to default in a liquidity crisis. Active enforcement does not pretend otherwise; it goes and gets the data.

CISO Fast-Track Bridge

The Translation Layer, Not A Substitute For Institutional Audit

The COVENANT SOC 2 Equivalence Document is a CISO Fast-Track Bridge for early adopters: it translates the local-inference architecture into the vocabulary a cloud-era SOC 2 checklist already understands. It is not a substitute for an independent audit. It is the bridge that gets early-mover credit funds deployed while the independent audit completes.

Because borrower financial data never leaves the fund's environment, the standard SaaS security risks are bypassed entirely. The architecture itself is the primary security control. The Bridge is the roadmap that proves the local architecture requires a lower burden of proof.

Independent Big-4 SOC 2 Type 2 audit target: Q2 2027. Funded by founder-tier subscription revenue. Published on a public calendar so CISOs can plan around it rather than squint at a self-attested document.

Request The Fast-Track Bridge →

SOC 2 Equivalence v2: Fortress Framing

We Are Not Safer Because We Passed The Checklist. We Are Safer Because We Don't Have The Cloud Problem.

SOC 2 was written for a world where the vendor holds your data. Every control on that checklist exists to govern how the vendor protects what they hold. COVENANT collapses the threat model by never holding the data in the first place. The structural answer is mathematically stronger than the checklist answer.

CISO Concern
Cloud Vendor Answer
COVENANT Structural Answer
Data breach risk
Encryption at rest, access logs, breach notification SLA, $X cyber liability cap.
No central honeypot to breach. Borrower documents never leave the fund's network. There is no server to hack.
Multi-tenant data leakage
Tenant isolation testing. Penetration test reports. Bug bounty program.
No multi-tenant deployment exists. Each fund's appliance is single-tenant by architecture, not by configuration.
Vendor employee access to fund data
Background checks, principle of least privilege, quarterly access review.
Vendor has zero standing access. Post-deployment, NHN cannot reach the data even if it wanted to.
Subprocessor / supply-chain risk
Subprocessor list, flow-down obligations, audit rights.
No subprocessors handle borrower data. The inference engine runs on the fund's hardware behind the fund's firewall.
Vendor goes out of business
Hope the acquirer honors the contract. Hope the cloud account does not get suspended mid-migration.
Escrow Sunset Protocol auto-releases source code to active customers. Appliance keeps running on fund-owned hardware.
Vendor gets acquired by a cloud-AI incumbent
Forced cloud migration. Renegotiate the data-handling addendum from a position of weakness.
Acquisition Poison Pill triggers escrow release and a Local Product Freeze. Acquirer cannot disable local inference.

"Decentralizing the honeypot is mathematically safer than protecting a central target." A SOC 2 audit certifies the central target is well-protected. COVENANT eliminates the target.

Hardware EOL Strategy

"What If Apple Kills The M-Series?" Has A Documented Answer.

Apple Silicon is the current reference platform because unified memory and the on-package Neural Engine make this latency profile possible on a desk-side appliance. It is not the only platform COVENANT can run on. The application is bound to MLX, Core ML, and Metal - portable across every M-series generation Apple has shipped - and the inference backend is abstracted so the same data pipeline, parser, alert engine, and UI run unchanged on Snapdragon X Elite, AMD Strix Halo, or NVIDIA workstation hardware if the M-series is ever discontinued.

M4 โ†’ M5 migration is documented as a same-week appliance swap. Hardware refresh is voluntary unless Apple drops macOS security patches for the deployed generation - typically a 6-to-8-year window. The fund chooses its own refresh calendar.

Full roadmap, generation-to-generation migration runbook, and 6-year TCO model are published in the COVENANT Hardware EOL Strategy. Available on request alongside the CISO Fast-Track Bridge.

COVENANT vs. A Spreadsheet

Drag the slider to match your portfolio. The math comes from finance teams who still run covenant tracking in Excel.

Portfolio Size
20
companies
Excel & associate hours 4 hrs/company/quarter x 4 quarters
320 hrs
Annual cost of that labor at $175/hr blended associate rate
$56K
COVENANT annual subscription $4,000/month flat, unlimited tests
$48K
Hours your team gets back COVENANT auto-runs continuously
310 hrs
The missed-breach math. One contagion storm missed on a single mid-market LBO has cost PE sponsors $100M+ in workout fees, forced equity cures, and accelerated lender negotiations. COVENANT pays for itself the first time its radar catches one.

Estimates based on industry PE ops benchmarks. Your mileage varies with fund size, covenant complexity, and how busy your FP&A team already is.

See COVENANT vs. Hiring An Analyst →

Investment

Two ways to buy. Pick the one that fits how your fund procures software.

Option A · Monthly Recurring

$4,000 / month, flat

  • ✓ Unlimited covenant tests, unlimited borrowers
  • ✓ Month-to-month commitment, cancel any time
  • ✓ Same local-inference architecture, same support
  • ✓ Roughly $48,000 annualized at the flat rate

For funds whose procurement requires monthly billing or an exit ramp inside 12 months. Net new cash spend, no annual commit.

Best Value

Option B · Annual Founder Ladder

$1,449 → $4,990 / year

  • ✓ Tier 1 Early Adopter: $1,449/yr (save 71%)
  • ✓ Five tiers, capped at 234 founder licenses
  • ✓ Founder rate held for 12 months from purchase
  • ✓ Locks to $4,990/yr standard once the 234 are gone

For funds happy to commit annually in exchange for a defined founder rate. Tier prices rise as licenses sell. Discount is real, the window is finite.

Both options unlock the same product on the same architecture. Procurement teams cross-verify pricing at finance.nohumannearby.com - the prices on this page are the only authoritative quote.

AVAILABLE NOW
Early Adopter Tier
$4,990/yr
$1,449/yr
Save 71%
24 of 24 spots left
When this tier sells out, price increases to $1,849/yr
✓ Unlimited companies
✓ AI financial extraction
✓ Covenant monitoring
✓ Ratio calculations
✓ Compliance testing
✓ Data never leaves your machine
✓ Sovereignty Badge for LP trust pages
Sovereignty Badge
Display this on your fund's LP trust page. Investors see sovereign AI proof.
CLAIM YOUR COVENANT FOUNDER LICENSE
0 founders have already secured their license

234 Founder Licenses.
That's It.

Once they're gone, it's full price. Lock in your rate before the next tier fills.