AIXYS · ACT V · THE PROMISE
Enterprise.Built like infrastructure.Paper that signs on the first read.
The surface that runs your company has to run like infrastructure. Four promises to the teams whose job it is to verify them — security, privacy, reliability, governance — with the evidence package behind each one.
THE FOUR PILLARS
Four promises, wired together.
Scroll the pillars. The sentinel tracks which one you’re reading. Each promise is a set of specific contracts you can hand to your team — not a paragraph of reassurance.
THE SENTINELactive / sweep · 14s
01SECURITY Zero-trust substrate, signed every hop.
Requests are signed, secrets are scoped, paths are auditable. No shared databases, no shared keys, no shared surprises — ever.
- Audits
- SOC 2 Type II · ISO 27001 · HIPAA-ready
- Encryption
- AES-256 at rest · TLS 1.3 in transit
- Access
- SSO (SAML / OIDC) · SCIM provisioning
- Testing
- Quarterly third-party pen test
02PRIVACY Your data is yours. Never ours.
We don’t train on your data. AI answers are grounded on your tenant only. Residency is pinnable per record class, not just per customer.
- Training
- Customer data never used to train models
- Residency
- US · EU · UK · APAC
- Contracts
- GDPR DPA · UK IDTA · SCCs on file
- BYO model
- Supported for regulated workloads
03RELIABILITY Infrastructure-grade uptime, published.
Aixys runs like an air-traffic system: redundant, observed, honest about outages. The status page our oncall watches is the one you read.
- SLA
- 99.98% Enterprise · 99.95% all tiers
- Topology
- Multi-region active/active
- Failover
- RTO < 5m · RPO < 60s
- Oncall
- Incident commander 24/7/365
04GOVERNANCE Every change is an event, every event an actor.
The surface that remembers everything also remembers who did what. Your compliance team inspects actions, not mailboxes.
- Audit
- Immutable log across every module
- RBAC
- Role + field-level access
- Residency
- Per record class, not just per tenant
- Hold
- Legal-hold + discovery tooling built in
LIVE · OBSERVED
The numbers we publish.
The status page our oncall watches is the one you read. Trailing windows update in real time; we don’t round up.
THE MAP
Six regions. Active / active.
Pin residency per record class. Fail over region-to-region with no customer action. The arcs below are real cross-region failover paths — not decoration.
- REGIONS6
- ACTIVE/ACTIVEYES
- RTO< 5m
- RPO< 60s
THE LATTICE
Everything your vendor desk wants to see.
- SOC 2Type II
- ISO 27001ISMS
- HIPAABAA-ready
- GDPRDPA · SCCs
- CCPACPRA aligned
- UK IDTATransfer
- PCI-DSSv4 scope
- ISO 27701Privacy
THE FOLDER
One folder your procurement can actually use.
Three tabs. Real artifacts behind each. No “we’ll get back to you”.
Vetted by the teams who asked the hardest questions.
We keep the full evidence package — controls, architecture, penetration tests and subprocessor list — under NDA. One email gets you the real documents, not a two-paragraph summary.
- Audits
- SOC 2 Type II · ISO 27001 · HIPAA-ready
- Encryption
- AES-256 at rest · TLS 1.3 in transit
- Access
- SSO (SAML / OIDC) · SCIM provisioning
- Testing
- Annual third-party pen test + continuous scanning
- Secrets
- Hardware-rooted KMS · per-tenant keys
- Incident response
- 24/7 on-call · public post-mortems
ENTERPRISE · CROSS THE LINE
When the legal team says yes,
your operators are already on.
Start with a dossier. Move to a pilot. Go live in weeks, not quarters. Enterprise onboarding is white-glove end to end.