Platform
Atlas
Operational Intelligence Platform
Unified situational awareness for critical infrastructure. Atlas consolidates asset monitoring, incident management, event correlation, and intelligence analytics into a single operational environment — deployed entirely on customer infrastructure.
See Atlas in Action
What Atlas Does
hubAtlas is a self-hosted operational intelligence platform designed for defense-adjacent organizations and operators of critical infrastructure. It provides a unified environment for tracking assets, managing incidents, correlating events from multiple sources, and conducting intelligence analysis — without depending on external SaaS services or third-party cloud infrastructure.
Where traditional tools fragment operational awareness across disconnected dashboards and siloed data stores, Atlas consolidates the full operational picture into a single workspace. Assets carry health scores derived from real-time event data. Incidents follow structured lifecycle workflows from detection through resolution. Alert rules trigger on configurable thresholds and pattern matches. Runbooks codify response procedures so that institutional knowledge persists beyond individual operators.
Atlas is built for environments where data sovereignty is non-negotiable, where uptime requirements preclude dependence on external services, and where the operational picture must be accurate, current, and accessible to authorized personnel at all times.
Core Modules
Asset Intelligence
Unified asset registry with real-time health scoring, classification tagging, and full lifecycle tracking. Every asset maintains a living record of its operational state, associated events, and dependency relationships.
Incident Command
Structured incident lifecycle management from detection through resolution. Severity classification, assignment workflows, timeline tracking, and post-incident review — all within a single command interface.
Event Correlation
Multi-source event ingestion with pattern detection and temporal correlation. Events from disparate systems are normalized, deduplicated, and linked to assets and incidents — surfacing operational patterns that siloed monitoring would miss.
Entity Graph
Dependency mapping and impact analysis across interconnected assets and systems. The entity graph reveals upstream and downstream relationships, enabling operators to assess blast radius before failures cascade.
Alert Rules Engine
Configurable alerting with threshold-based, regex, and composite conditions. Rules evaluate against incoming events in real time, triggering notifications through Slack, email, or webhook channels with full audit trails.
Runbook Automation
Codified response procedures that standardize operational workflows. Runbooks define step-by-step actions for known scenarios, ensuring consistent response quality regardless of which operator is on shift.
Technical Specifications
developer_boardSelf-hosted on customer infrastructure. No external cloud dependencies. Full operational control remains with the deploying organization.
MariaDB with workspace-level data isolation. Each workspace operates with strict tenant separation at the database layer.
JWT-based authentication with TOTP two-factor authentication. Role-based access control with granular permission scoping per workspace.
RESTful API with scoped API keys for programmatic access. All endpoints enforce workspace-level authorization and rate limiting.
Native integration channels for Slack, email, and webhook notifications. Configurable per workspace with encrypted credential storage.
Server-Sent Events (SSE) for live data streaming. Dashboards and operational views update in real time without polling overhead.
Security & Compliance
shieldData Sovereignty
Full data sovereignty with zero external SaaS dependencies. All data remains on customer-controlled infrastructure at all times.
Encrypted Secrets
All sensitive credentials and integration secrets are encrypted at rest using AES-256-GCM. Key material is managed independently per workspace.
Audit Logging
Comprehensive audit logging captures all significant operations — authentication events, configuration changes, data access, and administrative actions.
Workspace Isolation
Workspace-level data isolation ensures strict tenant separation. Users, assets, events, and configurations are scoped and enforced at every layer.
Get Started
Deploy Atlas in your environment
Atlas is available for deployment on customer infrastructure. Access the platform directly or request a guided demonstration to evaluate its capabilities against your operational requirements.