Ductus
Real-time ingestion + fusion bus for raw data and signal streams.
- Connectors + collectors (web crawl, OSINT/dark web, partner feeds)
- Artifact capture + provenance
- Normalization + routing
- Streams and batch ingestion paths
datapile.one is the sovereign data foundation. From raw signal ingestion to operational decisions, we provide the canonical pipeline for intelligence agencies and enterprise security.
Information flows linearly but can be accessed modularly. From ingestion to operations, every step preserves provenance and privacy context.
Acquire, normalize, and route raw artifacts and observations from crawls, feeds, and internal streams.
Transform artifacts into graph objects: entities, relationships, claims, evidence, and derived features.
Resolve a canonical GLOBALUSID across identifiers with confidence scoring and merge lineage.
Build behavioral graphs, infer cohorts, and produce risk/intent signals and trend analytics.
Single integration surface that orchestrates Identitas + Helix and returns an enriched profile.
Analyst workflows (DIKA) and operational execution (Onyx): alerts, cases, and enterprise actions.
Turn raw artifacts into resolved identities. Analysts explore connections, validate claims, and discover hidden networks in real-time using our mock graph explorer.
Deploy the full ecosystem or integrate specific capabilities. Our boundaries are clean, and our interfaces are typed.
Real-time ingestion + fusion bus for raw data and signal streams.
Post-ingest enrichment: entities, relationships, claims, evidence, and features.
Global identity resolution engine maintaining a canonical GLOBALUSID.
Cohort analytics + relationship scoring + risk/intent inference.
Unified orchestration layer + API facade composing Identitas and Helix.
Analyst applications turning the graph into investigations, decisions, and actions.
Operational systems (IMS/ERP) with real-time risk and decision workflows.
Semantic querying and copilot experiences over graph + documents.
Post-quantum posture and cryptographic roadmap for sensitive deployments.
Invite-only restricted offering for Nine Eyes (or comparable) clients.
Hover over the pipeline stages to understand how Ductus, Arbor, Nexus, and Datapile work in concert to produce intelligence.
Hover over a pipeline stage to explore the architecture
Operationalize intelligence. Onyx transforms risk scores and alerts into guided workflows and automated responses.
Transaction velocity for user group "gamma-7" exceeded 400% baseline in 5 minutes.
Operational views combine physical jurisdiction data with digital signal intelligence. (Mock data visualization)
From sovereign intelligence to commercial risk, the platform adapts to your mission profile.
Fuse multi-source collection into enriched graph objects, resolve identity at scale, and track cohorts and intent over time.
Analysts navigate relationships, validate claims, and build narratives with provenance and repeatable workflows.
Detect coordinated behavior and identity duplication while keeping integration surfaces clear and auditable.
Operationalize risk signals and investigations into enterprise workflows with modular product boundaries.
We don't just sell software; we sell sovereignty. Compare our architecture against the incumbents.
The market is fragmented between ingestion, identity, and analysis. We provide the unified sovereign architecture. Compare our canonical flow against the landscape.
| Axis | datapile.one End-to-end platform | Palantir End-to-end platform | Anduril Defense / Mission | CrowdStrike Security | Splunk Observability | Elastic Observability | OpenAI / Anthropic (Enterprise) Cloud AI | Databricks Data platform | Snowflake Data platform |
|---|---|---|---|---|---|---|---|---|---|
Integration surface What you integrate with on Day 1. | Nexus unified API facade (/unified/*) returning an enriched profile. | Integrated platform surface (varies by product family and deployment). | Mission system integration points; strongest in operator workflows. | Security platform APIs; optimized for SOC workflows. | Search + dashboards + app ecosystem. | Search + indices + apps. | Model APIs + tools. | Data/ML platform primitives. | Warehouse surface + apps marketplace. |
Canonical contracts Whether interfaces are explicit and stable. | GLOBALUSID, merge lineage, cohorts, enriched profile — named boundaries and outputs. | Platform-led story; contracts are real but less front-and-center in buyer copy. | Product interfaces are strong; not primarily sold as canonical data contracts. | Security schemas/events; canonical enterprise contracts are not the primary product. | Schemas exist; contracts often emerge per team/use-case. | Highly flexible; canonical contracts are not the primary sell. | Relies on your contracts; not the owner of canonical enterprise interfaces. | Governance + schemas; contracts often left to teams. | Schema discipline; canonical contracts often per org/team. |
Identity primitive Whether identity resolves to a canonical anchor and can be audited. | Identitas → GLOBALUSID with confidence tiers + merge lineage. | Strong entity modeling story; patterns vary by deployment. | Entity resolution depends on deployment and mission design. | Strong device/user signals but security-scoped. | Typically correlation patterns and add-ons. | Often enrichment and correlation patterns. | Identity is your system’s job. | Typically custom implementations over tables/models. | Often MDM/CDP add-ons or custom. |
Cohorts + inference Whether cohort intelligence is productized, not improvised. | Helix cohorts + trends + risk/intent signals as a dedicated boundary. | Strong AI/ML posture; frequently workflow-specific. | Strong mission inference; not necessarily cohort-first across enterprise data. | Detections + threat models; cohort intelligence across domains is secondary. | Analytics exist; cohorts rarely a first-class primitive. | ML exists; cohort primitives not central. | Reasoning is strong; cohorts depend on your data layer. | Strong ML; cohort boundary not usually packaged. | Possible via tools; cohort boundary external. |
Claims + evidence Whether narratives are defensible under review. | Arbor/Grapheum claims + evidence + provenance as first-class graph objects. | Often strong provenance story. | Strong in mission contexts; varies by integration. | Good evidence trails for detections. | Evidence exists as logs; claims model is not default. | Strong trails; claims/evidence model external. | Tooling exists; evidence modeling typically external. | Governance helps; claims/evidence boundary external. | Lineage/governance; claims/evidence model external. |
Operationalization Whether insights become cases, alerts, and actions. | DIKA investigations → Onyx cases/alerts/decision workflows and downstream execution. | Best-in-class “into operations” narrative. | Operational execution is the product. | Excellent alerting/case workflows (security). | Strong triage; deeper workflow often custom. | Dashboards strong; workflow often bespoke. | Automation possible; workflow ownership elsewhere. | Requires stitching apps + workflow tooling. | Operational workflows typically external. |
Available exclusively to Nine Eyes (and comparable) nations. Advanced capabilities beyond the commercial baseline.
Obsidian contains capabilities classified under export control. Access requires enhanced vetting and a separate procurement channel.
Whether for a pilot or a full deployment, our team is ready to structure a solution that fits your mandate.