Changelog
New features, improvements, and updates to Ultra Security.
Subscribe to Updates
Get notified when we ship new features and security updates
April 2026
Clients Page
FeatureNew MCP client inventory page in the Hub. Aggregates every detected client across the fleet with last-seen activity, gateway attribution, and per-client metrics so security teams can see exactly which clients are talking to which servers.
Governance Page
FeatureDedicated Governance page in the Hub for managing MCP allow/block policies across servers, clients, and agents. Block or approve any server or agent fleet-wide from one place, view the live list of active blocks, and one-click unblock. Block actions are also available directly on Server rows for admins.
Rule Builder
FeatureCompose richer governance rules with multiple conditions and OR-separated server groups. The expanded validator preserves condition caps while letting you express policies that previously required several rules.
Ona Support
FeatureUltra now runs cleanly inside Ona cloud development environments — treated as a first-class MCP client, so any background agents running in your environment can be monitored, observed, and secured just like any other client.
Hermes Client Support
FeatureHermes joins the list of supported MCP clients, with one-step config migration so Hermes routes through Ultra just like Claude Code, Claude Desktop, Cursor, Codex, etc.
Guardrails Dry-Run
FeatureTest guardrail configurations against historical traces before enforcing. Pick a scope, choose a time range, and see exactly which traces would have been caught — including a stateful evaluator shim that simulates rate-limit behavior over real traffic so policies can be tuned without risk to production.
PII & Personal Data Protection Guardrail
SecurityNew built-in guardrail that scans MCP request and response payloads for personally identifiable information. Detects emails, phone numbers, SSNs, and other sensitive identifiers, with configurable block, warn, or audit actions.
Rate Limiting & Circuit Breaking Guardrail
SecurityToken-bucket rate limiting and circuit breaking guardrail to stop runaway agent loops, flood attacks, and endpoint scraping. Org and workspace-scoped limits are statically partitioned across active gateways and recomputed automatically as gateways join, leave, or go offline.
Gateway & Server Detail Enhancements
ImprovementGateways now report Ultra version and workspace name, and the Servers list shows transport type and binary location on host. Idle gateways are distinguished from offline ones, and the Gateways page now shows the full team's gateways instead of only the current user's.
Per-Trace Guardrail Results
ImprovementTrace details now include collapsible per-trace guardrail evaluation results. Inspect exactly which rules fired, which conditions matched, and what action was taken for any individual request — no more cross-referencing logs to understand why a call was blocked or warned.
March 2026
Guardrails
SecurityConfigurable security guardrails for MCP tool calls. Define policies to block, warn, or audit specific actions based on tool name, parameters, or calling context. Enforce least-privilege access at the protocol level.
SSO / SAML Support
FeatureEnterprise single sign-on with SAML 2.0 integration. Connect your identity provider for centralized authentication and automated user provisioning across your Ultra organization.
Google Login
FeatureSign in to Ultra Hub with your Google account. One-click authentication for teams already using Google Workspace.
SCIM Provisioning
FeatureAutomated user lifecycle management with SCIM 2.0. Sync users and groups from your identity provider to Ultra Hub, with support for Okta and other SCIM-compatible providers.
Okta Integration
FeatureNative Okta integration for SAML SSO and SCIM provisioning. Manage Ultra access directly from your Okta admin console with automatic user sync and deprovisioning.
Jamf Pro Integration
FeatureDevice trust and endpoint compliance via Jamf Pro. Verify managed device status and enforce security posture requirements before granting access to MCP infrastructure.
Slack Webhook Support
FeatureReal-time Slack notifications for security events, anomaly detections, and policy violations. Configure per-channel routing with customizable alert thresholds.
Documentation Site
DocsLaunched docs.ultra.security with comprehensive guides for installation, configuration, client setup, Hub management, observability, and security concepts.
February 2026
Admin Log
FeatureNew application-level security events system with a dedicated Admin Log page in the Hub. Tracks login attempts, member role changes, invite lifecycle events, and organization management actions with structured, auditable security trails.
Role-Based Access Control (RBAC)
SecurityFour-tier role hierarchy -- Owner, Admin, Member, and Read-only -- with per-route permission enforcement across the Hub. Ensures proper least-privilege access for all users.
AI-Native MCP Security Infrastructure
FeatureComplete security platform purpose-built for Model Context Protocol ecosystems with intelligent threat detection and response.
Observability
FeatureComplete visibility into your MCP ecosystem with real-time monitoring, automated discovery of all agents, servers, and tools. Includes detailed trace views for every MCP interaction with full request-response inspection.
Auditability
FeatureComprehensive logging for all MCP interactions with tamper-proof audit trails, real-time analytics, and compliance reporting. Full request and response payloads, latency breakdowns, and policy evaluation results.
Anomaly Detection
FeatureBehavioral analysis of agent-tool interactions that establishes baselines and flags deviations in real time. Detects unusual tool call patterns, unexpected parameter values, and suspicious sequences.
Client Detection
FeatureAdvanced client and agent identity verification with cryptographic attestation, tamper-proof mechanisms, and zero-trust authentication.