Auditable Synthetic Data Engine

SynthLabTech

Synthetic data built for industries that cannot afford to be wrong. Provably correct, cryptographically sealed, and reproducible on demand — with six capabilities for tabular synthesis, trained generative models, industrial OT simulation, ICS security, constrained data, and autonomous AI workflows.

Evidence Bundles
6 Capabilities
Constraint Enforcement

Three Platforms. One Company.

ITLOX is a cybersecurity, data, and healthcare technology company. Each platform ships with its own engineering, infrastructure, and commercial model.

SynthLabTech

ICS/OT security simulation and synthetic data with cryptographic evidence bundles.

AegisWire

Post-quantum secure transport and enterprise VPN with per-stream PCS.

CareOSP

AI-native healthcare intelligence and orchestration cloud.

SynthLabTech

SynthLabTech

Auditable Synthetic Data Engine

Synthetic data that organisations can actually trust. Not statistically plausible data — data that is provably correct, cryptographically sealed, and reproducible on demand. Six capabilities for tabular synthesis, trained generative models, industrial OT simulation, ICS security, constrained data, and autonomous AI workflows.

Constraint enforcement with zero hard violations for feasible contracts
Evidence bundles: constraint, determinism, utility, and privacy reports
Deterministic, cryptographically sealed outputs — bit-for-bit reproducible
Scenario and regime-aware synthesis for industrial systems
Privacy measured and reported — evidence over claims

Our engine suite

Mock Data

Instant data from descriptions — describe what you need in plain English and get production-realistic synthetic data.

Synthesize

Train on your data, generate high-fidelity synthetic replicas with a trained generative model preserving distributions and correlations.

Virtual SCADA Simulator

Scenario-based generation and streaming of synthetic telemetry with protocol-conformant output streams.

ICS Security Simulator

Security training and SOC validation datasets — logs, alerts, attack chains, and evaluation reports.

Built for Regulated & Industrial Environments

Trusted across critical infrastructure and compliance-driven sectors

ICS / SCADA
Industrial control systems
SOC / SIEM
Security operations
ERP / Relational
Enterprise data systems
Regulated
Compliance-driven sectors

Core Capabilities

Constraint Enforcement
Zero hard violations
Evidence Bundles
Auditable proof
Determinism Modes
Sealed & reproducible
Scenario Engine
Regimes & transitions
AegisWire

AegisWire

Production

Secure Transport & Enterprise VPN Platform

AegisWire is a production secure transport and enterprise VPN platform. Transport core, control plane, gateway fabric, and trust operations run as one integrated system — not bolted-on features. Post-quantum key exchange, per-stream post-compromise security, signed policy enforcement, and packet-level metadata privacy are all implemented and running now.

Post-quantum hybrid key establishment (X25519 + ML-KEM)
Per-stream post-compromise security (PCS) — in production
Signed policy distribution and trust-anchor lifecycle
Full and split tunnel VPN with secure DNS and kill switch

One integrated architecture, shipping now

Post-Quantum Key Exchange

X25519 + ML-KEM hybrid key establishment in production. Defense-in-depth against both classical and quantum threats.

Per-Stream Post-Compromise Security

Sessions re-establish fresh cryptographic state automatically. Compromise does not permanently poison long-lived connections.

Signed Policy Enforcement

Signed policy distribution from control plane to gateway. Trust-anchor lifecycle with rotation and revocation. Default-deny posture enforced in production.

Metadata-Only Telemetry

No payload logging. No content inspection. Privacy-safe observability is the production default, not configured as an option.

What Ships Today

Every capability below is implemented and operating in production environments — including the hardware appliance. AegisWire does not list aspirational features as current capabilities.

UDP Secure Transport

Deterministic wire discipline, stream multiplexing, anti-replay and anti-amplification.

Enterprise VPN

Full and split tunnel, secure DNS, OS-level kill switch, policy-driven routing.

Signed Policy

Signed policy distribution, trust-anchor lifecycle, default-deny gateway enforcement.

PQ + PCS

Post-quantum hybrid key establishment and per-stream post-compromise security.

Deployment Options

Managed SaaS, dedicated single-tenant, and self-hosted — all available now.

Evidence & Releases

SBOM generation, signed releases, reproducible builds, audit-ready evidence packaging.

Where Security Boundaries Are Made Explicit

Session ↔ Trust Boundary

Session establishment and trust chain verification happen together. Connectivity does not precede trust validation — enrollment and connection boundaries are explicit and signed.

  • Authenticated session establishment
  • Trust chain verified before connectivity
  • Replay-aware validation at protocol level

Policy ↔ Gateway Alignment

Gateway selection and enforcement reflect published control-plane policy at runtime — not stale config or client-local state. Policy integrity from publication through enforcement.

  • Signed policy publication and distribution
  • Runtime policy reflected at gateway level
  • Default-deny posture enforced in production

Auditable Operations by Default

SBOM & Signed Releases

Reproducible builds, SBOM generation, and signed release manifests — the thing that runs can be compared against the thing that was reviewed.

Trust-Anchor Governance

Trust-anchor rotation and revocation with signed posture artifacts. Governance maintained across all deployment modes.

Metadata-Only Telemetry

Privacy-safe observability enforced as the production default. No content inspection, no payload logging — ever.

AegisWire VPN

Available Now

Enterprise VPN with post-quantum transport, signed policy, and gateway fabric

CareOSP

CareOSP

AI-Native Healthcare Intelligence & Orchestration Cloud

CareOSP is an AI-native healthcare intelligence, orchestration, and revenue platform for ambulatory, community, home, pharmacy-linked, and hybrid care delivery. Seven product pillars, ten governed AI workers, and eight north-star journeys — market-ready for Europe and the USA.

Care Graph — longitudinal operational-clinical-commercial graph connecting patients, episodes, tasks, medications, messages, and outcomes
AgentOS — governed AI worker runtime with ten task-specific agents, autonomy levels, model routing, and human-review gates
Command Center — unified operational surface for work, risk, capacity, patient state, and branch performance
Evidence Ledger — tamper-evident audit, policy, and review fabric across every workflow and AI decision
Studio — no-code configuration for pathways, forms, policies, prompts, and integrations
Marketplace & Benchmark Network — partner apps, pathway packs, and opt-in de-identified cross-tenant analytics
UK country pack — NHS login, NHS Notify, DTAC/DSPT self-assessment, dm+d, UK GDPR compliant
US country pack — designed to HIPAA Security Rule principles, US Core/SMART adapters, NPI, RxNorm/NDC

Non-goal: CareOSP is not, on day one, an acute-hospital EPR replacement. It coordinates around existing clinical systems as a system of action above fragmented EHRs, messaging tools, and spreadsheets.

Seven product pillars

CareOSP Command Center

Unified operational command surface for work queues, risk, capacity, patient state, and branch performance.

CareOSP Care Graph

Longitudinal graph linking patients, episodes, tasks, medications, messages, documents, risks, and outcomes.

CareOSP AgentOS

Governed AI runtime with ten task-specific workers, autonomy levels, model routing, and human-review gates.

CareOSP Evidence Ledger

Tamper-evident audit, evidence, policy, and review fabric across every workflow and AI decision.

CareOSP Studio

Low-code tooling for pathways, forms, roles, policies, automations, prompts, and integrations.

CareOSP Marketplace

App, connector, template, and pathway distribution channel for partner-led extensions.

CareOSP Benchmark Network

Opt-in de-identified analytics across tenants for operational, engagement, and pathway benchmarks.

AI Review

AI with Approval Gate

Clinician review before action. Full audit trail.

Compliance

Built-in Compliance

DSAR, audit logs, evidence packs.

Communications

Secure Messaging

In-app, SMS, email. All logged.

Integrations

Enterprise Integrations

SSO, FHIR, billing hooks.

Multi-tenant

Multi-Tenant Security

Data isolation, role-based access.

Built for the Full Care Chain

Clinics
Pharmacies
Home-Care
Patients
Caregivers
Who Uses ITLOX

Built for operators, researchers, and regulated enterprises

Security Teams

Repeatable ICS security exercises and ground-truth attack datasets for detection and SOC validation.

Industrial Operators

Synthetic OT telemetry and virtual SCADA simulation for safe testing without touching live infrastructure.

Care Organisations

Workflow execution and compliance evidence across the full care chain — from clinics to home-care.

Research & Regulated Labs

Reproducible, evidence-backed datasets for model training, regulatory submissions, and peer-review-ready evaluation.

AI & Accelerated Computing

AI and Accelerated Computing

GPU-accelerated inference, physics simulation, and governed AI agents across all three platforms — purpose-engineered for data-intensive enterprise workloads.

Synthetic Data Generation

SynthLabTech produces structured, schema-conformant datasets for AI training, model validation, and regulated data sharing — with determinism and evidence built in.

Industrial Simulation

Virtual SCADA and ICS security simulators generate realistic OT and attack telemetry at volume — designed for compute-intensive scenario generation workloads.

Evidence-Backed AI Workflows

Our platforms produce auditable evidence bundles and human-in-the-loop approval gates — a foundation for responsible AI deployment in regulated environments.

High-Assurance Deployment

Platform architecture is aligned with accelerated compute environments. GPU-accelerated generation workloads are part of the product roadmap for SynthLabTech.

Product Evaluation

A structured path to enterprise adoption

Staged product evaluation with clear acceptance criteria at every phase.

1

Requirements

Define protocols, data shapes, threat model, and measurable acceptance criteria

2

Product Evaluation

Sandbox access, sample datasets, and correctness verification against your criteria

3

Controlled Deployment

Limited-scope production deployment with observability and operational controls in place

4

Enterprise Rollout

Full production hardening, policy alignment, and enterprise deployment model

FAQ

Frequently Asked Questions

Talk to the team

For partnerships, enterprise deployment, or technical briefings — reach out directly.