How Porcia Works
Deploy once. Your agent runs continuously. Here’s what happens under the hood.Discovery Architecture
Data Sources
1. Email Intelligence
When you connect your email (Gmail or Outlook), Porcia analyzes vendor communications to discover applications and extract key information. What we detect:- Vendor emails (invoices, renewals, updates)
- Pricing information
- Contract terms and renewal dates
- License counts and user information
- Payment confirmations
- You connect via OAuth or set up email forwarding
- Our AI classifier scans emails for vendor communications
- We extract structured data (vendor name, pricing, dates)
- Vendors are matched to our global intelligence database
- Information appears in your dashboard
We only read emails from known vendor domains. Personal emails are never processed or stored.
2. SSO Discovery
Connect your identity provider to discover all applications your team accesses via single sign-on. Supported providers:- Google Workspace
- Microsoft Entra ID (Azure AD)
- Okta
- All SSO-enabled applications
- User access patterns
- Login frequency
- Application usage by team member
- You connect your SSO provider with admin permissions
- Porcia syncs your application catalog
- We track login events (with user consent)
- Applications are matched to our vendor database
- Usage data appears in your analytics
3. Browser Extension
Our privacy-first Chrome extension tracks which SaaS applications your team actually uses in their browser. What we track:- Domain names of SaaS applications
- Time spent on each application
- Active vs. idle time
- Usage patterns over time
- Page content or form data
- Keystrokes or mouse movements
- Personal browsing (only known SaaS domains)
- Credentials or sensitive information
- Install the extension from Chrome Web Store
- Sign in with your Porcia account
- Extension monitors browser tabs locally
- Only domain names and duration are sent to Porcia
- Usage data appears in your dashboard
Coming Soon: Financial integrations with Brex, Ramp, QuickBooks, and Xero will provide automatic transaction tracking and even more granular spend data.
Vendor Matching & Intelligence
How We Match Vendors
When Porcia discovers a new application, we use a multi-step matching process:- Domain Matching - Check if the domain matches a known vendor
- Fuzzy Matching - Handle variations in vendor names (e.g., “Salesforce” vs “Salesforce.com”)
- Alias Resolution - Match common aliases (e.g., “SFDC” → Salesforce)
- AI Categorization - Use AI to identify unknown vendors
- Manual Review - Flag uncertain matches for user confirmation
Global Vendor Intelligence
Porcia maintains a comprehensive database of SaaS vendors including:- Vendor Profiles - Company information, products, pricing tiers
- Pricing Benchmarks - Anonymized pricing data from other Porcia users
- Negotiation Playbooks - Proven strategies for each vendor
- Contract Terms - Common clauses and gotchas
- Relationship Mapping - Parent companies, acquisitions, partnerships
All pricing benchmarks are anonymized and aggregated. We never share your specific pricing with other users.
AI-Powered Features
Email Classification
Our AI automatically categorizes vendor emails:- Actionable - Requires response (renewals, invoices, contract changes)
- Updates - Product announcements, feature releases
- Marketing - Promotional content, newsletters
Negotiation Assistant
When you start a negotiation, our AI:- Analyzes your current contract and pricing
- Compares to pricing benchmarks from similar companies
- Identifies negotiation leverage (market timing, competition, usage)
- Generates a negotiation strategy
- Drafts a professional negotiation email
Spend Optimization
Porcia continuously analyzes your SaaS stack to identify:- Duplicate Tools - Multiple tools serving the same purpose
- Underutilized Licenses - Apps with low usage
- Consolidation Opportunities - Vendors offering bundled pricing
- Renewal Timing - Best time to negotiate based on vendor fiscal calendar
Data Security & Privacy
What We Store
- Vendor names and domains
- Pricing and contract information
- Usage analytics (aggregated)
- Email metadata (sender, subject, date)
- Email content (stored encrypted, used for vendor data extraction)
What We DON’T Store
- User credentials or passwords
- Personal browsing history
- Sensitive business data
Security Measures
- Encryption - All data encrypted at rest and in transit (AES-256)
- Access Control - Role-based permissions for team members
- Audit Logs - Complete audit trail of all actions
- Compliance - GDPR compliant
- Data Retention - Email metadata retained for 90 days after disconnection, then automatically deleted
Security: Porcia follows industry-standard security practices including end-to-end encryption and role-based access control. Full security documentation coming soon.