SynthLabTech
Synthetic data built for industries that cannot afford to be wrong. Provably correct, cryptographically sealed, and reproducible on demand — with six capabilities for tabular synthesis, trained generative models, industrial OT simulation, ICS security, constrained data, and autonomous AI workflows.
Three Platforms. One Company.
ITLOX is a cybersecurity, data, and healthcare technology company. Each platform ships with its own engineering, infrastructure, and commercial model.
SynthLabTech
ICS/OT security simulation and synthetic data with cryptographic evidence bundles.
AegisWire
Post-quantum secure transport and enterprise VPN with per-stream PCS.
CareOSP
AI-native healthcare intelligence and orchestration cloud.
SynthLabTech
Auditable Synthetic Data Engine
Synthetic data that organisations can actually trust. Not statistically plausible data — data that is provably correct, cryptographically sealed, and reproducible on demand. Six capabilities for tabular synthesis, trained generative models, industrial OT simulation, ICS security, constrained data, and autonomous AI workflows.
Our engine suite
Instant data from descriptions — describe what you need in plain English and get production-realistic synthetic data.
Train on your data, generate high-fidelity synthetic replicas with a trained generative model preserving distributions and correlations.
Scenario-based generation and streaming of synthetic telemetry with protocol-conformant output streams.
Security training and SOC validation datasets — logs, alerts, attack chains, and evaluation reports.
Built for Regulated & Industrial Environments
Trusted across critical infrastructure and compliance-driven sectors
Core Capabilities
AegisWire
ProductionSecure Transport & Enterprise VPN Platform
AegisWire is a production secure transport and enterprise VPN platform. Transport core, control plane, gateway fabric, and trust operations run as one integrated system — not bolted-on features. Post-quantum key exchange, per-stream post-compromise security, signed policy enforcement, and packet-level metadata privacy are all implemented and running now.
One integrated architecture, shipping now
X25519 + ML-KEM hybrid key establishment in production. Defense-in-depth against both classical and quantum threats.
Sessions re-establish fresh cryptographic state automatically. Compromise does not permanently poison long-lived connections.
Signed policy distribution from control plane to gateway. Trust-anchor lifecycle with rotation and revocation. Default-deny posture enforced in production.
No payload logging. No content inspection. Privacy-safe observability is the production default, not configured as an option.
What Ships Today
Every capability below is implemented and operating in production environments — including the hardware appliance. AegisWire does not list aspirational features as current capabilities.
UDP Secure Transport
Deterministic wire discipline, stream multiplexing, anti-replay and anti-amplification.
Enterprise VPN
Full and split tunnel, secure DNS, OS-level kill switch, policy-driven routing.
Signed Policy
Signed policy distribution, trust-anchor lifecycle, default-deny gateway enforcement.
PQ + PCS
Post-quantum hybrid key establishment and per-stream post-compromise security.
Deployment Options
Managed SaaS, dedicated single-tenant, and self-hosted — all available now.
Evidence & Releases
SBOM generation, signed releases, reproducible builds, audit-ready evidence packaging.
Where Security Boundaries Are Made Explicit
Session ↔ Trust Boundary
Session establishment and trust chain verification happen together. Connectivity does not precede trust validation — enrollment and connection boundaries are explicit and signed.
- Authenticated session establishment
- Trust chain verified before connectivity
- Replay-aware validation at protocol level
Policy ↔ Gateway Alignment
Gateway selection and enforcement reflect published control-plane policy at runtime — not stale config or client-local state. Policy integrity from publication through enforcement.
- Signed policy publication and distribution
- Runtime policy reflected at gateway level
- Default-deny posture enforced in production
Auditable Operations by Default
SBOM & Signed Releases
Reproducible builds, SBOM generation, and signed release manifests — the thing that runs can be compared against the thing that was reviewed.
Trust-Anchor Governance
Trust-anchor rotation and revocation with signed posture artifacts. Governance maintained across all deployment modes.
Metadata-Only Telemetry
Privacy-safe observability enforced as the production default. No content inspection, no payload logging — ever.
CareOSP
AI-Native Healthcare Intelligence & Orchestration Cloud
CareOSP is an AI-native healthcare intelligence, orchestration, and revenue platform for ambulatory, community, home, pharmacy-linked, and hybrid care delivery. Seven product pillars, ten governed AI workers, and eight north-star journeys — market-ready for Europe and the USA.
Non-goal: CareOSP is not, on day one, an acute-hospital EPR replacement. It coordinates around existing clinical systems as a system of action above fragmented EHRs, messaging tools, and spreadsheets.
Seven product pillars
Unified operational command surface for work queues, risk, capacity, patient state, and branch performance.
Longitudinal graph linking patients, episodes, tasks, medications, messages, documents, risks, and outcomes.
Governed AI runtime with ten task-specific workers, autonomy levels, model routing, and human-review gates.
Tamper-evident audit, evidence, policy, and review fabric across every workflow and AI decision.
Low-code tooling for pathways, forms, roles, policies, automations, prompts, and integrations.
App, connector, template, and pathway distribution channel for partner-led extensions.
Opt-in de-identified analytics across tenants for operational, engagement, and pathway benchmarks.
AI with Approval Gate
Clinician review before action. Full audit trail.
Built-in Compliance
DSAR, audit logs, evidence packs.
Secure Messaging
In-app, SMS, email. All logged.
Enterprise Integrations
SSO, FHIR, billing hooks.
Multi-Tenant Security
Data isolation, role-based access.
Built for the Full Care Chain
Built for operators, researchers, and regulated enterprises
Security Teams
Repeatable ICS security exercises and ground-truth attack datasets for detection and SOC validation.
Industrial Operators
Synthetic OT telemetry and virtual SCADA simulation for safe testing without touching live infrastructure.
Care Organisations
Workflow execution and compliance evidence across the full care chain — from clinics to home-care.
Research & Regulated Labs
Reproducible, evidence-backed datasets for model training, regulatory submissions, and peer-review-ready evaluation.
AI and Accelerated Computing
GPU-accelerated inference, physics simulation, and governed AI agents across all three platforms — purpose-engineered for data-intensive enterprise workloads.
Synthetic Data Generation
SynthLabTech produces structured, schema-conformant datasets for AI training, model validation, and regulated data sharing — with determinism and evidence built in.
Industrial Simulation
Virtual SCADA and ICS security simulators generate realistic OT and attack telemetry at volume — designed for compute-intensive scenario generation workloads.
Evidence-Backed AI Workflows
Our platforms produce auditable evidence bundles and human-in-the-loop approval gates — a foundation for responsible AI deployment in regulated environments.
High-Assurance Deployment
Platform architecture is aligned with accelerated compute environments. GPU-accelerated generation workloads are part of the product roadmap for SynthLabTech.
A structured path to enterprise adoption
Staged product evaluation with clear acceptance criteria at every phase.
Requirements
Define protocols, data shapes, threat model, and measurable acceptance criteria
Product Evaluation
Sandbox access, sample datasets, and correctness verification against your criteria
Controlled Deployment
Limited-scope production deployment with observability and operational controls in place
Enterprise Rollout
Full production hardening, policy alignment, and enterprise deployment model