▸ AI AGENTS

THREEAGENTS.
ONEPROCUREMENTSTACK._

AXIOM, CIPHER, and RACK are purpose-built AI agents for procurement teams — vendor intelligence, contract discipline, private infrastructure — each with its own edge of the job. Beneath them sits one procurement-native spine; how you say hello and where inference is allowed to live are yours to tune.

3
AGENTS
15
PACKAGED SKILLS
9ms
FASTEST LATENCY
0
DATA EGRESS
AI AGENTS
AXIOM
v2.4 · 18ms
Your AI procurement team, always on.

AXIOM is your primary procurement intelligence agent — handling vendor scoring, RFP analysis, spend clustering, and workflow automation at scale. Built for sourcing teams that need speed and accuracy without sacrificing rigour.

5
SKILLS
18ms
AVG LATENCY
94.3%
ACCURACY
AXIOM
Vendor Due Diligence
Runs a full 360° supplier assessment across financial health, operational resilience, and reputational risk. Ingests Companies House data, credit bureau feeds, and public news signals to build a composite risk score. Flags payment term anomalies, director change velocity, and adverse press — all before you sign the NDA.
RFP Auto-Scoring
Applies your weighted evaluation criteria to every RFP response simultaneously. Each criterion is scored independently, then combined into a ranked shortlist with per-criterion breakdowns and deviation flags for human review.
Spend Cluster Analysis
Groups purchase orders by semantic similarity rather than legacy taxonomy codes — surfacing consolidation opportunities that rule-based classification systematically misses.
Supplier Risk Score
Tracks 36 leading indicators across financial, operational, and relational dimensions to build a directional risk trajectory — not a point-in-time score. A supplier declining slowly is flagged earlier than one with a single bad quarter. Outputs a tier assignment (STRATEGIC / MONITOR / WATCH / EXIT) with recommended action deadlines.
PRIVATE INFERENCE
CIPHER
v1.9 · 12ms
Zero egress. Zero compromise.

CIPHER runs entirely air-gapped — no data leaves your environment. Designed for organisations handling sensitive contracts, confidential strategies, and proprietary supplier intelligence. Full NLP extraction with zero-egress guarantee.

5
SKILLS
12ms
AVG LATENCY
ZERO
EGRESS
CIPHER
Contract Risk Scan
Applies a fine-tuned NLP model at 94.3% obligation recall to your contract documents. Extracts payment terms, delivery milestones, IP clauses, termination rights, auto-renewal triggers, and liability caps — each cross-referenced against your baseline risk tolerance. Flags asymmetric clauses, uncapped liabilities, and data use provisions that conflict with your sovereignty requirements.
Confidential Strategy
Generates negotiation strategy briefs from historical outcomes and market data. No cloud routing. No model training on your inputs. Everything stays on-prem.
Competitive Intel
Synthesises competitive positioning analysis entirely from your own internal data. Maps where your vendor relationships expose IP signals and which contract structures inadvertently reveal procurement strategy to counterparties.
Clause Red-Flag Scan
Scans every clause against a configurable risk surface dictionary covering broad data rights, unfavourable IP assignment, uncapped indemnification, auto-renewal traps, and non-competes with unusual geographic scope. Outputs a prioritised list of clauses to renegotiate with suggested replacement language for each flag.
ONSITE INFRA
RACK
v3.1 · 9ms
Private GPU. Your models. Your rules.

RACK handles the infrastructure layer — sizing onsite GPU deployments, benchmarking latency against cloud providers, and validating compliance readiness. The technical backbone that makes private AI viable at enterprise scale.

5
SKILLS
9ms
AVG LATENCY
99.97%
UPTIME
RACK
Infra Sizing Calc
Takes your expected inference workload — concurrent users, model size, context length, tokens-per-second target — and outputs a specific GPU configuration with power draw, rack unit requirements, and cooling specifications.
Latency Benchmark
P99 latency head-to-head against AWS, Azure, and GCP for your specific model and query pattern.
Compliance Readiness
Runs a structured gap analysis against SOC 2 Type II and ISO 27001 control frameworks. Maps each control to your current infrastructure configuration, identifies gaps requiring remediation, and produces an evidence collection checklist with estimated time-to-audit-readiness. Median from cold start: 11 weeks.
Network Isolation Audit
Validates your air-gap architecture against a zero-egress specification. Checks DNS call-home patterns, model weight pull behaviour, and telemetry endpoints. Produces a signed attestation report suitable for client due diligence submissions.
01
SELECT YOUR AGENT

Start where the work points — AXIOM when procurement velocity matters, CIPHER when the brief is sensitivity, RACK when you are shaping the private stack underneath. Same lineage; different edge of the problem.

02
REACH IT YOUR WAY

A conversation in the terminal is one natural on-ramp. The same specialist is equally comfortable answering a Web API your services already speak, or sitting inside an MCP-aware toolchain if that is how your builders like to wire things — whoever meets the agent first, the behaviour underneath stays coherent.

03
WHERE THE MODEL BREATHES

We carry the procurement-native knowledge spine and the integration patterns that wrap it. Sometimes the lightest path is an agent-shaped loop you lean on as a service; sometimes the quieter one is inference parked beside hardware you control. The posture can shift; the craft does not.

04
RUNS YOU CAN ACT ON

What returns is still meant for operators: a plan, a trace you can reason about, the artefact itself, and the observability crumbs that make the next hand-off obvious — export, file, or automate without re-litigating the run.

READY TO RUN YOUR FIRST AGENT?

Open the terminal for the quickest conversation. The same agents are meant to follow when chat, HTTP, or MCP-shaped hooks suit you better — or when you would rather keep inference on hardware inside your own fence.