datapile.one
Sovereign Foundation
Demo
Privacy-first • Sovereign-grade • Modular

Turn chaos intointelligence.

datapile.one is the sovereign data foundation. From raw signal ingestion to operational decisions, we provide the canonical pipeline for intelligence agencies and enterprise security.

GLOBALUSID
Identity Anchor
HELIX
Behavioral Graph
NEXUS
Unified API
ARBOR
Provenance
Live Signal Traffic
Architecture

The canonical pipeline

Information flows linearly but can be accessed modularly. From ingestion to operations, every step preserves provenance and privacy context.

01

Ductus — Ingestion

Acquire, normalize, and route raw artifacts and observations from crawls, feeds, and internal streams.

02

Arbor — Enrichment

Transform artifacts into graph objects: entities, relationships, claims, evidence, and derived features.

03

Identitas — Resolution

Resolve a canonical GLOBALUSID across identifiers with confidence scoring and merge lineage.

04

Helix — Intelligence

Build behavioral graphs, infer cohorts, and produce risk/intent signals and trend analytics.

05

Nexus — Orchestration

Single integration surface that orchestrates Identitas + Helix and returns an enriched profile.

06

Datapile — Operations

Analyst workflows (DIKA) and operational execution (Onyx): alerts, cases, and enterprise actions.

Intelligence Analysis

Traverse the graph

Turn raw artifacts into resolved identities. Analysts explore connections, validate claims, and discover hidden networks in real-time using our mock graph explorer.

Search graph...
Filter: Risk > 50
Entity Types
Person5
Organization3
Device0
Payment1
Location2
!
J. Doe
!
Risk Score
85

J. Doe

ID: N1_8X92
Known Attributes
CitizenshipUS
Last Seen2h ago
Devices3 Active
Related Cases
Fraud Ring BKYC_Pending
Product Suite

Modular by design

Deploy the full ecosystem or integrate specific capabilities. Our boundaries are clean, and our interfaces are typed.

Ductus

Real-time ingestion + fusion bus for raw data and signal streams.

Enterprise
Core Responsibilities
  • Connectors + collectors (web crawl, OSINT/dark web, partner feeds)
  • Artifact capture + provenance
  • Normalization + routing
  • Streams and batch ingestion paths
Interfaces
Event/topic streamBatch jobs
IngestionContact sales

Arbor / Grapheum

Post-ingest enrichment: entities, relationships, claims, evidence, and features.

Enterprise
Core Responsibilities
  • Entity extraction + taxonomy assignment
  • Claim modeling with provenance and confidence
  • Linking/dedup against canonical objects
  • Feature derivation (metrics + embeddings)
Interfaces
Graph write pathGraph read path
EnrichmentContact sales

Identitas

Global identity resolution engine maintaining a canonical GLOBALUSID.

Core
Core Responsibilities
  • Deterministic + probabilistic dedup across identifiers
  • Confidence scoring (weak vs strong identity)
  • Identifier history + merge lineage
  • Canonical user/profile anchor keyed by globalusid
Interfaces
POST /identifyGET /profile/{globalusid}

Helix

Cohort analytics + relationship scoring + risk/intent inference.

Core
Core Responsibilities
  • Behavioral graph + embeddings + clustering
  • Cohort formation and cohort trends
  • Risk flags and intent scoring outputs
  • Longitudinal analytics over time
Interfaces
POST /cohort/createGET /cohort/{id}/trendsGET /risk/{globalusid}
InferenceContact sales

Nexus

Unified orchestration layer + API facade composing Identitas and Helix.

Core
Core Responsibilities
  • Unified integration surface (/unified/*)
  • Trigger orchestration + response composition
  • Enriched profile assembly across services
  • Policy-driven coordination of identity + inference
Interfaces
POST /unified/identify
OrchestrationContact sales

DIKA (Datapile / Scientia)

Analyst applications turning the graph into investigations, decisions, and actions.

Enterprise
Core Responsibilities
  • Dashboards, exploration UX, investigations
  • GraphRAG/copilot workflows
  • Entity pages and relationship navigation
  • Exports + workspace operations
ApplicationsContact sales

Onyx

Operational systems (IMS/ERP) with real-time risk and decision workflows.

Enterprise
Core Responsibilities
  • Operationalization of risk signals
  • Alerts and workflow routing
  • Enterprise governance integration patterns
  • Services layer for downstream execution
OperationsContact sales

GraphRAG Module

Semantic querying and copilot experiences over graph + documents.

Add-on
Core Responsibilities
  • Retrieval over graph + text
  • Answer synthesis with provenance
  • Analyst copilot UX

Quantum‑Safe Nexus

Post-quantum posture and cryptographic roadmap for sensitive deployments.

Add-on
Core Responsibilities
  • Cryptographic hardening roadmap
  • Compliance alignment
  • Deployment posture for high-assurance use

Obsidian (Restricted)

Invite-only restricted offering for Nine Eyes (or comparable) clients.

Restricted
Core Responsibilities
  • Controlled procurement + security review
  • Sovereign-grade deployment posture
  • Restricted capability set
Restricted Access: Invite-only. Eligibility review required (Nine Eyes or comparable).
RestrictedContact sales
Interactive Map

Explore the connections

Hover over the pipeline stages to understand how Ductus, Arbor, Nexus, and Datapile work in concert to produce intelligence.

Ductus
Ingestion
Arbor
Enrichment
Nexus
Orchestration
Datapile
Intelligence
Onyx
Operations

Hover over a pipeline stage to explore the architecture

Operations

From signal to action

Operationalize intelligence. Onyx transforms risk scores and alerts into guided workflows and automated responses.

Incident Queue
3 Active
INC-2024-882
2m ago
Suspicious Velocity Spike
Helix
4 Entities
INC-2024-881
14m ago
New Device Cluster
Identitas
12 Entities
INC-2024-879
45m ago
Sanctions List Match
Arbor
1 Entities

Suspicious Velocity Spike

critical
ID: INC-2024-882Detected by Helix2m ago
Description

Transaction velocity for user group "gamma-7" exceeded 400% baseline in 5 minutes.

Recommended Playbook
1
Freeze accounts associated with device cluster
2
Request identity re-verification (KYC step-up)
Impact Radius
$42k +12%
Users Affected4
JurisdictionEU-West
SLA Time Remaining1h 14m
Geospatial Operations

The world, quantified

Operational views combine physical jurisdiction data with digital signal intelligence. (Mock data visualization)

Geospatial ops view
A cinematic, mocked operational picture: density, corridors, and hubs. No API keys and no backend — suitable for landing UX.
Layers
What you’re seeing
  • Density = clustered signals (mocked points)
  • Corridors = movements / comms / logistics arcs
  • Hubs = anchor nodes for operations / routing
No keys
Uses MapLibre demo tiles and mocked layers. Replace with your own style + feeds later.
Mission Profiles

Ready for any domain

From sovereign intelligence to commercial risk, the platform adapts to your mission profile.

Sovereign: border + illicit network disruption

Fuse multi-source collection into enriched graph objects, resolve identity at scale, and track cohorts and intent over time.

  • Ductus collects OSINT / partner feeds → provenance-preserving artifacts
  • Arbor/Grapheum enriches entities + claims with evidence
  • Identitas resolves GLOBALUSID across identifiers
  • Helix forms cohorts and surfaces risk/intent signals

Intelligence: link analysis and investigations

Analysts navigate relationships, validate claims, and build narratives with provenance and repeatable workflows.

  • Entity pages + relationship graph traversal (DIKA)
  • GraphRAG module for natural language querying over graph + documents
  • Unified orchestration via Nexus for consistent enrichment responses
  • Exportable evidence trails and investigation packets

Domestic federal: integrity + risk programs

Detect coordinated behavior and identity duplication while keeping integration surfaces clear and auditable.

  • GLOBALUSID dedup for program integrity and cross-system reconciliation
  • Cohort detection (household, coworkers, coordinated clusters)
  • Nexus unified facade reduces integration complexity
  • Operational routing into Onyx-style workflows and alerts

Fortune 100: fraud, compliance, and supply-chain risk

Operationalize risk signals and investigations into enterprise workflows with modular product boundaries.

  • Identity resolution across customers, vendors, and devices
  • Cohort-level anomaly detection and risk scoring
  • Copilot-assisted analyst workflows (GraphRAG)
  • Decisioning + case management integration patterns (Onyx)
Competitive Edge

Why we win

We don't just sell software; we sell sovereignty. Compare our architecture against the incumbents.

Strategic Positioning

Asymmetric Advantage

The market is fragmented between ingestion, identity, and analysis. We provide the unified sovereign architecture. Compare our canonical flow against the landscape.

Capability Matrix
Axis
datapile.one
End-to-end platform
Palantir
End-to-end platform
Anduril
Defense / Mission
CrowdStrike
Security
Splunk
Observability
Elastic
Observability
OpenAI / Anthropic (Enterprise)
Cloud AI
Databricks
Data platform
Snowflake
Data platform
Integration surface
What you integrate with on Day 1.
Nexus unified API facade (/unified/*) returning an enriched profile.
Integrated platform surface (varies by product family and deployment).
Mission system integration points; strongest in operator workflows.
Security platform APIs; optimized for SOC workflows.
Search + dashboards + app ecosystem.
Search + indices + apps.
Model APIs + tools.
Data/ML platform primitives.
Warehouse surface + apps marketplace.
Canonical contracts
Whether interfaces are explicit and stable.
GLOBALUSID, merge lineage, cohorts, enriched profile — named boundaries and outputs.
Platform-led story; contracts are real but less front-and-center in buyer copy.
Product interfaces are strong; not primarily sold as canonical data contracts.
Security schemas/events; canonical enterprise contracts are not the primary product.
Schemas exist; contracts often emerge per team/use-case.
Highly flexible; canonical contracts are not the primary sell.
Relies on your contracts; not the owner of canonical enterprise interfaces.
Governance + schemas; contracts often left to teams.
Schema discipline; canonical contracts often per org/team.
Identity primitive
Whether identity resolves to a canonical anchor and can be audited.
Identitas → GLOBALUSID with confidence tiers + merge lineage.
Strong entity modeling story; patterns vary by deployment.
Entity resolution depends on deployment and mission design.
Strong device/user signals but security-scoped.
Typically correlation patterns and add-ons.
Often enrichment and correlation patterns.
Identity is your system’s job.
Typically custom implementations over tables/models.
Often MDM/CDP add-ons or custom.
Cohorts + inference
Whether cohort intelligence is productized, not improvised.
Helix cohorts + trends + risk/intent signals as a dedicated boundary.
Strong AI/ML posture; frequently workflow-specific.
Strong mission inference; not necessarily cohort-first across enterprise data.
Detections + threat models; cohort intelligence across domains is secondary.
Analytics exist; cohorts rarely a first-class primitive.
ML exists; cohort primitives not central.
Reasoning is strong; cohorts depend on your data layer.
Strong ML; cohort boundary not usually packaged.
Possible via tools; cohort boundary external.
Claims + evidence
Whether narratives are defensible under review.
Arbor/Grapheum claims + evidence + provenance as first-class graph objects.
Often strong provenance story.
Strong in mission contexts; varies by integration.
Good evidence trails for detections.
Evidence exists as logs; claims model is not default.
Strong trails; claims/evidence model external.
Tooling exists; evidence modeling typically external.
Governance helps; claims/evidence boundary external.
Lineage/governance; claims/evidence model external.
Operationalization
Whether insights become cases, alerts, and actions.
DIKA investigations → Onyx cases/alerts/decision workflows and downstream execution.
Best-in-class “into operations” narrative.
Operational execution is the product.
Excellent alerting/case workflows (security).
Strong triage; deeper workflow often custom.
Dashboards strong; workflow often bespoke.
Automation possible; workflow ownership elsewhere.
Requires stitching apps + workflow tooling.
Operational workflows typically external.
Explicit Boundaries
Ductus, Identitas, Helix, Nexus — distinct products with clear contracts, not a black box platform.
Canonical Identity
GLOBALUSID is the first-class primitive. Merge lineage, confidence scoring, and history are built-in.
Sovereign Control
Designed for air-gapped, on-prem, and sovereign cloud. Your data never leaves your jurisdiction.
Restricted Access

Obsidian Program

Available exclusively to Nine Eyes (and comparable) nations. Advanced capabilities beyond the commercial baseline.

Eligibility Verification Required

Obsidian contains capabilities classified under export control. Access requires enhanced vetting and a separate procurement channel.

Engage

Start the conversation

Whether for a pilot or a full deployment, our team is ready to structure a solution that fits your mandate.

Secured by sovereign infrastructure.