Platform
Enterprise-grade, from day one
Every feature designed for regulated environments where audit trails, encryption standards, and compliance evidence are not optional.
Platform
Enterprise-grade, from day one
Every feature designed for regulated environments where audit trails, encryption standards, and compliance evidence are not optional.
Credential Vault
AGAP C-06Six pluggable encryption providers — Fernet, AES-256-GCM, AWS KMS, HashiCorp Vault, Azure Key Vault, and GCP Cloud KMS. Bring your own key per tenant. Agents authenticate with scoped tokens — real credentials stay encrypted at rest and never leave the vault.
Policy Engine
AGAP C-02Declarative policies with field-level access control, intelligent caching, and validation before deployment. Version history and change audit included.
Inter-Agent Governance
AGAP E-04Control how agents delegate to each other. Every delegation is tracked through a verifiable principal chain — from the human who authorised the agent to the action it takes. Policy evaluation at every hop.
Anomaly Detection
AGAP F-01Tenant-scoped statistical baselines flag unusual patterns: bulk access, off-hours activity, new action types, and inter-agent delegation anomalies. Auto-responds by severity.
Human-in-the-Loop
AGAP E-02Agents request approval to access protected data. Reviewers see context, approve or deny, and every decision is logged.
Kill Switch
AGAP C-14Global and per-service emergency stop with instant propagation across all running instances. Satisfies EU AI Act Article 14 requirements for immediate human intervention.
Tamper-Evident Audit
AGAP C-10Cryptographically-chained audit log with execution evidence binding every authorised request to the observed response. Tagged by regulation — including EU AI Act Article 12 — for compliance reporting.
Workflow Enforcement
AGAP E-06State machines govern action sequences with deny-by-default for unknown states. Supports EU AI Act Article 9 risk management across healthcare, legal, and financial domains.
Multi-Tenancy
AGAP C-16Strict tenant isolation with no data leakage. Dedicated encryption, scoped baselines, metered billing, and complete data residency controls.
Runtime Sandboxing
AGAP E-08Custom adapters execute in fully isolated processes with strict resource limits. Static analysis blocks unsafe operations before code can run, preventing credential exfiltration.
Cloud-Native Deployment
Docker and docker-compose for one-command setup. Distributed rate limiting supports horizontal scaling across multiple instances.
Custom Connectors
AGAP C-08Upload adapter code with automatic validation. Security-checked and sandboxed at runtime, with 25+ prebuilt service adapters included.
Role-Based Access
AGAP C-04Four admin roles with separation of duties. Timing-safe authentication and high-entropy tokens as standard.
Authority Grants
AGAP C-18Every agent's permissions trace back to a named human and an organisational mandate. Grants have independent lifecycles — suspend, revoke, or renew without touching the agent itself.
Identity Attestation
AGAP E-01Agents carry short-lived signed tokens that downstream services verify without calling back to Vortalis. Every attestation is tied to an active authority grant. Tokens can be revoked instantly by ID.
AGAP Conformance
AGAP C-01Full conformance test suite validates every governance guarantee against the AGAP specification. 1000+ tests. Published results.
SLA Management & Capacity Planning
Define uptime targets and response-time SLAs per tenant. Automated breach detection, error budgets, and usage forecasting with trend analysis predict when you will hit plan limits — before it happens.
Chaos Engineering & Red Team
Run structured chaos experiments — latency injection, failure simulation, dependency outages — and measure resilience scores. Automated red-team suites with 150+ attack vectors validate your security posture continuously.
Canary Automation
Metrics-driven canary deployments with progressive traffic shifting. Configure error-rate and latency thresholds — Vortalis auto-promotes healthy releases and auto-rolls back bad ones. No manual intervention required.
Private Networking
Manage PrivateLink endpoints and VPN tunnels across AWS, Azure, and GCP from a single API. Health monitoring, connectivity dashboards, and zero public-internet exposure for backend services.
August 2026 is closer than you think.
EU AI Act enforcement begins in four months. We'll have you audit-ready before the deadline — or your money back.
No credit card required · UK data residency · SOC 2 ready
Enterprise plans from £1,500/month · Pilot programmes available · Custom enterprise pricing on request