Auditable Synthetic Data Engine

SynthLabTech

Contract-driven synthetic data engine with auditable outputs and evidence bundles. Four operational modes — from rapid tabular synthesis to scenario-based ICS security datasets — with deterministic reproducibility and zero hard violations for feasible contracts.

Evidence Bundles
4 Modes
Relational Closure

About ITLOX

We build enterprise platforms for organizations that need credible security, realistic industrial data, and compliant care operations. Our products are designed for real deployment—not demos.

Production-grade

Memory safety and rigorous foundations for real-world deployment.

Deterministic outputs

Reproducible, auditable results for engineering and compliance.

Enterprise integration

Protocols, telemetry, and ops constraints built in from day one.

Product 1: SynthLabTech

SynthLabTech

Auditable Synthetic Data Engine

A contract-driven core engine for synthetic data with auditable outputs. Define your data contract, choose a generation mode, and receive projections alongside a comprehensive evidence bundle — proving quality, not just claiming it.

Relational closure with zero hard violations for feasible contracts
Evidence bundles: constraint, determinism, utility, and privacy reports
Deterministic modes (STRICT/FAST) with reproducible, auditable hashes
Scenario and regime-aware synthesis for industrial systems
Privacy measured and reported — evidence over claims

Four operational modes, one engine

Rapid Mode (RRF)

Fast baseline synthesis for common tabular use cases — schema inference, type profiling, and quality reports.

Research Mode (TRC)

World-state-first synthesis with relational closure, regime modelling, and comprehensive evidence bundles.

Virtual SCADA Mode

Scenario-based generation and streaming of synthetic telemetry with protocol-conformant output streams.

ICS Security Mode

Security training and SOC validation datasets — logs, alerts, attack chains, and evaluation reports.

Built for Regulated & Industrial Environments

Trusted across critical infrastructure and compliance-driven sectors

ICS / SCADA
Industrial control systems
SOC / SIEM
Security operations
ERP / Relational
Enterprise data systems
Regulated
Compliance-driven sectors

Core Capabilities

Relational Closure
Zero hard violations
Evidence Bundles
Auditable proof
Determinism Modes
STRICT / FAST
Scenario Engine
Regimes & transitions
Product 2: AegisWire

AegisWire

Pre-launch MVP in Progress

Post-Quantum Secure Transport Protocol

AegisWire is a memory-safe secure transport protocol with mandatory hybrid post-quantum cryptography (X25519 + ML-KEM-768). Built for enterprise communications that must remain secure against both current and future cryptographic threats, with self-healing capabilities via Post-Compromise Security.

Hybrid PQC key exchange combining X25519 with ML-KEM-512/768
Post-Compromise Security (PCS) for self-healing channels
Memory-safe Rust core eliminating entire vulnerability classes
High-throughput design: >8 Gbps with <1 RTT latency

Post-quantum security, designed for enterprise

Hybrid Cryptography

X25519 + ML-KEM-768 hybrid key exchange. Defense-in-depth if either algorithm is later found vulnerable.

Post-Compromise Security

Sessions re-establish fresh cryptographic state so compromise doesn't permanently poison connections.

High Performance

>8 Gbps throughput, <1 RTT latency. Zero-copy I/O and kernel-bypass options available.

Post-Compromise Security, Explained Simply

Traditional secure sessions can remain exposed if a session key is stolen; an attacker may decrypt or impersonate until the session ends. AegisWire is designed around recovery-oriented security: sessions are engineered to re-establish fresh cryptographic state so that compromise does not permanently poison long-lived connections.

Reduce Blast Radius

Isolate streams/sessions to limit exposure from any single compromise event.

Design for Recovery

Not just prevention—sessions can heal and re-establish secure cryptographic state.

Target High-Value Connections

Long-lived enterprise connections where compromise cost is highest.

How AegisWire Fits in Your Stack

Transport-Layer Security

AegisWire is a transport-layer security component designed to protect service-to-service links, internal platform traffic, and high-value data paths.

  • Service-to-service encryption
  • Internal platform traffic protection
  • High-value data path security

Hybrid Cryptography Advantage

Using hybrid cryptography means you are not forced to "bet" on a single era of algorithms. Defense-in-depth if either algorithm is later found vulnerable.

  • Classical + post-quantum combined
  • Conservative approach for transition period
  • Future-proof against quantum threats

Enterprise-Grade Foundations

Standards-aligned PQC

ML-KEM aligned to finalized NIST standardization direction for post-quantum KEMs.

Memory-safe Core

Rust-first design to eliminate entire vulnerability classes from the implementation.

Resilient Security Model

Self-healing channel concepts reduce long-term impact of compromise.

AegisWire VPN

Pre-MVP

Enterprise VPN built on post-quantum secure transport

Product 3: CareOS

CareOS

AI-Powered Care Operations OS

CareOS unifies workflow execution, compliance evidence, communications, and AI-assisted productivity across the full care chain — clinics, pharmacies, home-care teams, patients, and caregivers. Execute care workflows end-to-end with audit-grade compliance evidence built in from day one.

Full care-chain workflow execution (Episodes → Care Plans → Tasks → Outcomes)
Medication Safety + Home MAR loop with escalation and evidence capture
Safe AI: summaries, drafting, and triage support with approvals + provenance
Compliance as a product: DSAR, retention/legal hold, immutable audit exports
Enterprise integrations: SSO, messaging, docs/signing, baseline FHIR, billing export hooks
Secure communications: in-app messaging, SMS, email with template library and audit trails
Multi-tenant architecture with strict data isolation and role-based access control
Configurable care pathways with branching logic and conditional task assignment
Real-time dashboards for care coordinators with SLA tracking and workload visibility

Enterprise Trust: ISO 27001-aligned controls • GDPR/UK DPA foundations • HIPAA-ready security posture

Care operations, unified and compliant

Workflow Execution

Episodes → Care Plans → Tasks → Outcomes. Full care-chain tracking with evidence at every step.

Medication Safety

Home MAR loop with escalation alerts, evidence capture, and complete audit ledger.

Built-in Compliance

DSAR exports, retention/legal hold, immutable audit trails. Compliance as a product, not a project.

Escalation & Handoffs

SLA windows with automatic escalation routing and clear delegation protocols for seamless care transitions.

Secure Communications

In-app messaging, SMS, email with template library and complete audit trails for all communications.

Multi-Tenant Architecture

Strict data isolation with role-based access control. Each organization's data completely separated.

AI Review

AI with Approval Gate

Clinician review before action. Full audit trail.

Compliance

Built-in Compliance

DSAR, audit logs, evidence packs.

Communications

Secure Messaging

In-app, SMS, email. All logged.

Integrations

Enterprise Integrations

SSO, FHIR, billing hooks.

Multi-tenant

Multi-Tenant Security

Data isolation, role-based access.

Built for the Full Care Chain

Clinics
Pharmacies
Home-Care
Patients
Caregivers
Who Uses ITLOX

Built for teams that need real solutions

Security Teams

Build repeatable ICS security exercises and realistic datasets for detections.

Industrial Operators

Reduce cyber risk and improve test coverage for critical infrastructure.

Care Providers

Execute workflows across care teams with compliance evidence built in.

Researchers & Labs

Controlled datasets with reproducible conditions for evaluation.

Getting Started

Pilot programs that engineering teams can trust

We prefer staged rollout and measurable acceptance criteria.

1

Discovery

Protocols, data shapes, threat model, success metrics

2

Lab Evaluation

Sandbox, sample datasets, performance and correctness checks

3

Integration Pilot

Limited scope rollout, observability, operational controls

4

Scale-up

Production hardening, policy alignment, support model

FAQ

Frequently Asked Questions

Ready to get started?

Whether you need industrial synthetic data, post-quantum secure communications, or care workflow operations, we can support pilot evaluations and enterprise onboarding.