One Platform.
From Boardroom to Kernel.

Governance policies set at the top. Endpoint enforcement at the bottom. Control effectiveness measured across the chain.
This is Organisational Intelligence.

Three-Layer Architecture

Each layer operates independently. Together, they close the gap between governance and operational reality.

Governance Layer

Where Policies Are Set

Strategy-to-execution governance, compliance management, risk frameworks, and institutional memory — all in one platform. Decisions are tracked from board approval through to operational enforcement.

  • Policy management and approval chains
  • Compliance framework mapping (SOC 2, ISO 27001, APRA CPS 234, HIPAA)
  • MeshMemory® institutional memory capture
  • Executive dashboards and audit reporting
Every tool feeds in • Cryptographic proof comes out
Endpoint Layer

Where Data Is Protected

A kernel-level agent intercepts file I/O operations before they complete. User-mode tools can be disabled by insiders or attackers. Kernel-level visibility cannot.

  • USB, removable media, and external device monitoring
  • Print spool interception and control
  • Clipboard and screenshot detection
  • Cloud sync folder monitoring (Dropbox, OneDrive Personal, etc.)
  • Behavioral chain detection across time windows
Telemetry • Enforcement • Evidence
Intelligence Layer

Where Governance Meets Reality

The intelligence layer that turns evidence into cryptographic proof. Endpoint telemetry feeds directly into control effectiveness scores. Every enforcement action links back to the governance decision that authorised it.

  • Control effectiveness measurement from real endpoint data
  • Policy-to-enforcement proof chains for auditors
  • Signed and verified policy distribution
  • Threat intelligence integration

Core Capabilities

Strategy to Execution

Board decisions tracked through policy creation, operational enforcement, and outcome measurement. Internal governance — not just external compliance.

  • Board decision tracking and approval chains
  • Policy lifecycle management
  • Enforcement verification at every layer
  • Outcome measurement against strategic intent

Endpoint Protection

Kernel-level visibility into every file operation across managed endpoints. Three enforcement modes adapt to your operational needs.

  • Observe: Log and baseline — understand what’s happening
  • Prompt: Allow but notify — build awareness without disruption
  • Enforce: Block operations — zero-trust data protection

Control Effectiveness

Endpoint telemetry feeds directly into control effectiveness scores. Proof that your controls work — not just that they exist.

  • Continuous measurement, not point-in-time
  • Evidence sourced from endpoint data, not self-assessments
  • Audit-ready reports with governance context
  • Risk reduction you can quantify

MeshMemory®

Institutional Memory

Every governance decision, its context, rationale, and outcome — captured permanently. Your organisation’s accumulated wisdom becomes a durable asset that survives team changes, leadership transitions, and audit cycles.

  • Decision pattern preservation across governance and security
  • Context and rationale capture — the “why” behind every decision
  • Knowledge continuity across team changes
  • Retrievable organisational wisdom for future decisions

Security & Compliance

Platform Security

Zero trust architecture
End-to-end encryption
Ed25519 signed policy distribution
Certificate pinning on cloud API
DPAPI-protected credential storage
HMAC-SHA256 cache integrity verification
Complete audit trail
Tamper-resistant kernel-level agent
Filter Port comms (immune to EDR interception)

Endpoint Channels Monitored

File system I/O operations
USB & removable media
Print spool
Clipboard & screenshots
Cloud sync folders
Network file shares (SMB/CIFS)
Browser downloads
Email attachment saves
Behavioral chain detection (multi-channel correlation)

Compliance Framework Support

OPA/Rego policy engine adapts to any compliance framework or internal policy. Measure effectiveness of regulatory controls and your own proprietary frameworks alike.

SOC 2 Type IIISO 27001APRA CPS 234HIPAAEssential EightISMPSPFSOXGDPRPrivacy ActNIST CSF+ any regulatory or internal framework with measurable controls

SOC 2 Type II certification underway with Prescient Assurance, a FedRAMP-approved assessor

Deployment Options

Cloud Native

Fully managed SaaS deployment with regional availability

  • Multi-region redundancy
  • Automatic scaling
  • Enterprise SLA available

On-Premises

Complete control with deployment in your data centres

  • Air-gapped environments
  • Full data control
  • Customisable architecture

See the Platform in Action

Request a demo to see how governance connects to endpoint reality.