Now accepting pilot partners

Initiate your deployment.

Integrate fragmented institutional data, detect deviations against policy, and run evidence-backed investigations at scale.

Case Operations / CASE-4827
1,211 total cases3 open2 investigating1 escalated
Critical
Investigating
CASE-4827

Meridian Capital — Layered Transaction Network

Multi-entity layering pattern detected through Meridian Capital Holdings and 4 connected intermediaries. Round-trip funds flow within 62-day window.

Assigned To
E. Marchetti
Created
Jan 10, 2025
Deadline
Feb 10, 2025
Evidence
8 items
Linked Entities(5)
ENT-001ENT-002ENT-004ENT-007ENT-008
Linked Deviations(3)
DEV-001DEV-003DEV-004
AMLLayeringSanctionsPEP
Investigation Timeline
C
Case created from DEV-004 (layering detection)
SystemJan 10, 2025 20:00
A
Assigned to Elena Marchetti — AML team lead
James WhitfieldJan 10, 2025 20:30
E
Round-trip transaction analysis attached (EV-004)
SystemJan 10, 2025 21:00

Noctarix is an operational intelligence platform that integrates fragmented institutional data into a live entity graph, detects deviations against policy, and runs evidence-backed investigations — for finance, healthcare, government, logistics, and defense.

The coordination layer for high-stakes operations

For institutions across finance, healthcare, logistics, and defense — where the cost of late detection is measured in regulatory breach, revenue loss, and operational failure.

Core mechanics
01 / Map

A living operational picture

Ingest structured and unstructured data. Resolve entities across inconsistent identifiers. One massive, continuously updated graph with full provenance.

Entity-Graph Architecture
02 / Detect

Measure absolute divergence

Compile policies into executable process models. Flag where reality breaks the model — missing steps, absent approvals, suspicious patterns in context.

Deviation-Detection Engine
DIV
03 / Operate

Bounded investigations

Investigate with evidence chains. Sources checked, contradictions resolved, confidence scored. Humans decide. Everything traced.

Tactical Investigation
RAW
VER
ACT
IngestVerifyAction

Entity resolution is the hard problem

The same entity appears differently across systems. Names vary, identifiers are missing, formats diverge. Noctarix resolves records into canonical entities — preserving confidence scores, competing hypotheses, and lineage back to raw sources. Not a one-time import. A live graph that tolerates ambiguity and improves over time.

Resolve entity...
Resolution Queue6 Pending
Viktor Petrenko94%
Merging 4 raw sources
Meridian Capital Ltd88%
Discrepancy in jurisdiction
Sofia Marchetti91%
Missing DOB identifier
Atlas Freight GmbH76%
Requires manual review
Chen Wei82%
Multiple aliases detected
MV Northern Crown98%
Vessel IMO verified
Workspace / Entity Overview
VP
Viktor PetrenkoENT-0041
Verified Canonical Record
Resolved Attributes
NationalityUA / CY
Date of Birth1978-03-14
PEP StatusTier 2 Match
Last Observation2024-11-02
Source Lineage
SWIFTCompRegOFAC_SDN
First-Degree Connections
ORG
Meridian Capital Ltd
UBO91% Confidence
ORG
Atlas Freight GmbH
Director67% Confidence
PER
Sofia Marchetti
Associate58% Confidence

Policy-aware deviation detection

Institutions detect problems late because they monitor anomalies in isolation. Noctarix reads your regulatory text and SOPs to build a formal model of expected behavior. Then it watches. A step missing? An approval absent? A relationship inconsistent with policy? That's a case — with reasons, not noise.

Policy Rules6 rules
Dual-signatory bypass
criticalSOX 4043 dev
KYC refresh overdue
criticalBSA/AML7 dev
Vendor overlap threshold
highFAR 3.1042 dev
Settlement window breach
highMiFID II4 dev
PEP transaction limit
mediumFATF R.121 dev
Document retention gap
mediumGDPR Art.5
Detect / Policy Rules / POL-001
CriticalPOL-001SOX 404

Dual-signatory bypass

Active — 3 deviations in 30d

Transfers exceeding $500K require two authorized signatories. This rule monitors all outbound SWIFT MT103 messages for single-signatory approvals on high-value transactions.

Rule Conditions
Trigger
MT103 amount > $500,000
Expected
2 distinct signatory records
Window
T+0 (same business day)
Scope
All correspondent accounts
Triggered Deviations
2024-11-02 14:32 UTCcritical
Expected

Two authorized signatories required for transfers > $500K

Actual

Single signatory (V. Petrenko) approved $1.2M transfer to Meridian Capital

2024-11-01 09:17 UTCcritical
Expected

Signatory must not be listed as related party to beneficiary

Actual

V. Petrenko identified as UBO of Meridian Capital (91% confidence)

2024-10-29 16:45 UTChigh
Expected

Override approvals require compliance sign-off within 4 hours

Actual

Override approved by ops desk — compliance notified after 18 hours

Bounded investigation with full trace

Every finding stays under human control. Every source and transformation is traceable. Every action recorded and reviewable. Governance isn't bolted on after the fact — it's how the system works from day one.

Active Cases
Meridian Capital — Layered Transaction...
CASE-4827Critical
Atlas Trade Finance — Velocity Breach
CASE-4831High
Orion Shipping — Trade-Based ML Indica...
CASE-4835High
Pinnacle Realty — Source of Funds
CASE-4790Critical
Novus Consulting — Shell Indicators
CASE-4862Medium
Case Operations / CASE-4827
Critical
Investigating
CASE-4827

Meridian Capital — Layered Transaction Network

Multi-entity layering pattern detected through Meridian Capital Holdings and 4 connected intermediaries. Round-trip funds flow within 62-day window.

Assigned To
Elena Marchetti
Created
Jan 10, 2025
Deadline
Feb 10, 2025
Evidence Items
8
Linked Entities(5)
ENT-001ENT-002ENT-004ENT-007ENT-008
Linked Deviations(3)
DEV-001DEV-003DEV-004
AMLLayeringSanctionsPEP
Investigation Timeline
C
Case created from DEV-004 (layering detection)
SystemJan 10, 2025 20:00
A
Assigned to Elena Marchetti — AML team lead
James WhitfieldJan 10, 2025 20:30
E
Round-trip transaction analysis attached (EV-004)
SystemJan 10, 2025 21:00
Industries and sectors

Built for institutional environments

Finance & Banking
Status: Active

Systemic risk hides in plain sight

Global markets move faster than traditional compliance can track. We identify structural vulnerabilities, synthetic identities, and coordinated market manipulation before they compound into institutional crises.

Targeted Capabilities
01Detect coordinated cross-border synthetic entities
02Monitor sub-second market manipulation patterns
03Trace obfuscated liquidity flows across jurisdictions
Government & Public Sector
Status: Active

Procurement fraud leaves a trail

Billions lost not because evidence doesn't exist, but because it's scattered across agencies. We connect procurement systems, vendor registries, customs records, and banking reports into a single investigable structure.

Targeted Capabilities
01Flag award patterns inconsistent with procurement policy
02Map vendor networks sharing directors or addresses
03Detect contract splitting across approval thresholds
Healthcare & Life Sciences
Status: Active

Claims fraud is a network problem

Provider clusters, patient overlaps, billing anomalies across time. The investigation graph maps providers, claims, procedures, pharmacies, and payer relationships into one queryable structure.

Targeted Capabilities
01Detect deviation from authorization and documentation flow
02Identify unusual provider networks and referral loops
03Correlate supply chain gaps with claims behavior
Logistics & Supply Chain
Status: Active

Exceptions reveal the real risk

Logistics is strong at planned movement and weak at everything else. Delays, diversions, inventory mismatch, suspicious routing — the signals that matter go unconnected.

Targeted Capabilities
01Flag route deviations against declared constraints
02Link repeated exceptions to shared entities
03Trace custody breaks across handoffs
Defense & Intelligence
Status: Active

Connect faster than threats move

The sources already exist — signals, reports, logistics data, intercepts, imagery metadata. The problem isn't volume. It's connecting them fast enough to act.

Targeted Capabilities
01Resolve entities across disparate source types
02Map threat networks through link analysis
03Detect deviation from expected operating patterns
Deployment model

Pilot-first deployment

A typical first deployment: 2–3 data sources, one primary use case, one operational team. Defined metrics, not feature milestones.

  • 1Production entity graph for the scoped domain
  • 2Operational applications (casework + review)
  • 3Closed-loop investigation workflows
  • 4Governance package: access control, audit trails, residency, AI policy

Noctarix expands only if it moves the numbers — detection uplift, response time reduction, leakage reduction.

FAQ

Frequently asked questions

What is operational intelligence?
Operational intelligence is the ability to integrate fragmented institutional data, detect deviations from expected processes, and investigate findings with full evidence chains — in real time, not after the fact. It goes beyond dashboards and reporting to support coordinated action across teams.
How does Noctarix differ from SIEM or BI tools?
SIEM tools focus on security event correlation. BI tools focus on historical reporting. Noctarix operates at the entity level — resolving identities across systems, detecting process deviations against policy, and running bounded investigations with traceable evidence. It's a coordination layer, not a monitoring dashboard.
What sectors does Noctarix serve?
Finance and banking, government and public sector, healthcare, logistics and supply chain, and defense and intelligence. The underlying architecture is domain-agnostic — what changes per sector is the entity model and policy logic.
How long does a typical pilot take?
A typical pilot runs 8–12 weeks, scoped to 2–3 data sources, one primary use case, and one operational team. Expansion is tied to measurable outcomes — detection uplift, response time reduction, leakage reduction — not feature milestones.
Does Noctarix make autonomous decisions?
No. Noctarix assembles evidence packages and surfaces findings for human review. Consequential decisions always require human oversight. Every output is traceable to its sources, transformations, and policy checks.
What data sources does Noctarix integrate?
Relational databases, transaction streams, document repositories, ticketing systems, field logs, PDFs, scans, and semi-structured forms. Noctarix doesn't require centralizing everything into a new data lake — it connects to existing systems.

Start with one use case

We respond within one business day to schedule a 30-minute briefing.