The platform

A coordination layer that converts fragmented institutional data into timely, accountable action. Not a BI stack. Not a chat interface. A closed operational loop.

The Noctarix platform is a closed operational loop: ingest fragmented data, resolve entities into a live graph, compile policies into executable process models, detect deviations, investigate with evidence chains, and feed outcomes back into the system. Not a BI stack. Not a chat interface.

Architecture
Noctarix platform architecture — end-to-end pipeline from multi-source ingestion through entity resolution, deviation detection, and bounded investigation

What Noctarix is optimized for

Fragmentation and inconsistency

The same entity appears differently across systems: names vary, identifiers are missing, formats diverge, documents are incomplete. Mapping has to tolerate ambiguity and improve over time.

High-stakes workflows

Decisions require justification. A system that cannot produce an evidence chain doesn't survive the first audit.

Slow, political adoption

Institutional systems aren't upgraded by mandate alone. Phased deployment, controlled scope, measurable outcomes.

Security and governance as prerequisites

Access control, auditability, data residency, and policy constraints aren't optional features. They're table stakes.

How it works

The operational loop

1

Data enters from multiple sources (structured + unstructured)

2

Entities are resolved into a live graph with provenance

3

Normative process expectations compiled from policies and SOPs

4

Deviations and anomalies generate prioritized cases

5

Investigations assemble evidence packages

6

Humans adjudicate and decide

7

Outcomes feed back into the graph and detection thresholds

The system improves operationally through this loop — without relying on vague claims of “self-learning.”

Map
Noctarix Map — entity graph with 25 resolved entities, provenance chain, and confidence-scored relationships

Ingestion

Noctarix ingests from the institutional landscape: relational databases, transaction streams, document repositories, ticketing systems, field logs, PDFs, scans, and semi-structured forms.

Normalization

Operational data rarely arrives clean. Schema drift, inconsistent fields, partial records — handled through transformation pipelines designed for continuous change, not one-time migration.

Entity Resolution

This is the core engineering challenge. Link records into canonical entities using deterministic rules and probabilistic resolution. Preserve: confidence scores per link, competing hypotheses when ambiguity exists, provenance back to raw sources, reversible transformations.

Graph Persistence

Entities and relationships stored as a queryable graph: traversal queries for investigations, incremental updates from new data, time-aware analysis, entity-level views for operators.

Detect
Noctarix Detect — policy rules engine with deviation timeline, expected vs actual comparison, and severity indicators

Normative Process Synthesis

Read regulatory requirements, SOPs, compliance frameworks. Extract expected steps and checks, constraints and thresholds, approval boundaries, required documents. Compile into executable process graphs — versioned, reviewable models of how things should work.

Deviations and Anomalies

Detection is not only "weird behavior." It's divergence: a step missing, an approval absent, an entity relationship inconsistent with policy, a multi-source contradiction. Outputs are structured cases with rationale. Not noise.

Operate
Noctarix Operate — case queue with 18 cases, filter tabs, priority badges, and evidence counts

Bounded Autonomous Investigation

When a case is created, execute investigation playbooks: traverse entity neighborhoods, fetch supporting documents, reconcile contradictions, compute risk factors, assemble a traceable evidence package. Controlled execution with trace — not open-ended autonomy.

Operator Workflows

Investigations surface through a casework interface: case summary and rationale, evidence timeline, linked entities, recommended next actions, escalation paths, disposition and closure.

Traceability

Every output is traceable: which sources were consulted, what transformations applied, what the system inferred, what the human decided, what policy checks were evaluated. Required for institutional credibility.

Deployment

Low-friction deployment

No requirement to centralize all systems into a new data lake upfront

No opaque model with autonomous authority over decisions

No permanent lock-in through proprietary schemas without export

No "rip and replace" deployments

FAQ

Platform questions

What is entity resolution?
Entity resolution is the process of linking records that refer to the same real-world entity across different systems — where names vary, identifiers are missing, and formats diverge. Noctarix uses deterministic rules and probabilistic resolution, preserving confidence scores, competing hypotheses, and full provenance back to raw sources.
What is the difference between deviation detection and anomaly detection?
Anomaly detection flags statistically unusual behavior. Deviation detection compares observed behavior against a formal model of how processes should work — compiled from regulatory text, SOPs, and compliance frameworks. A missing approval step isn't an anomaly; it's a deviation from expected process.
Can Noctarix work with legacy systems?
Yes. Noctarix doesn't require centralizing data into a new data lake. It ingests from existing systems — relational databases, document repositories, ticketing systems, field logs — through transformation pipelines designed for continuous change, not one-time migration.
What is bounded investigation?
When a case is created, Noctarix executes investigation playbooks within defined boundaries: traverse entity neighborhoods, fetch supporting documents, reconcile contradictions, compute risk factors, and assemble a traceable evidence package. Controlled execution with trace — not open-ended autonomy.
How does Noctarix ensure traceability?
Every output is traceable: which sources were consulted, what transformations were applied, what the system inferred, what the human decided, and what policy checks were evaluated. This is required for institutional credibility and audit compliance.

See the pattern in practice.