Enterprise Engagement Policy · Version 1.0

How We Work
With Enterprise

A structured, five-phase engagement model designed to protect both parties — ensuring controlled access to intellectual property while facilitating efficient procurement.

Effective: February 2026
Classification: Controlled Distribution
Review Cycle: Quarterly
Engagement Model

Five Phases. Clear Gates.

01
Initial Qualification
1–2 weeks · No Cost

Access Level

  • Public materials only
  • No NDA required
  • Open to all qualified enquiries

Activities

  • Executive briefing (45 min)
  • High-level architecture overview
  • Interactive demo access
  • Initial fit assessment

Requirements

  • None — public access
Open Access
02
Technical Evaluation
2–4 weeks · NDA Required

Access Level

  • Controlled disclosure under NDA
  • Redacted technical brief
  • Security assessment pack

Activities

  • Architecture workshop (90 min max)
  • Security questionnaire
  • Risk & compliance mapping
  • Integration requirements analysis

Requirements

  • Executed Mutual NDA
  • Identified technical stakeholders
  • Defined evaluation criteria
NDA Gate
03
Proof of Concept
4–8 weeks · Paid

Access Level

  • Limited deployment artifacts
  • POC license keys
  • Limited API specifications

Activities

  • Controlled environment deployment
  • Integration testing
  • Performance validation
  • Stakeholder demonstrations

Requirements

  • Executed POC Agreement
  • POC fee payment (50% upfront)
  • Dedicated technical team (2 FTEs)
Paid Gate
04
Commercial Agreement
2–6 weeks · Procurement

Access Level

  • Full disclosure post-contract
  • Complete documentation
  • Full API specifications

Activities

  • MSA terms negotiation
  • Contract review & execution
  • Payment terms finalisation
  • Deployment planning

Requirements

  • Budget approval
  • Procurement authority
  • Technical & security sign-off
Contract Gate
05
Deployment & Onboarding
4–12 weeks · Licensed

Access Level

  • Full customer access
  • Production license keys
  • Full documentation suite
  • Support channel active

Activities

  • License credential issuance
  • Production deployment
  • Integration implementation
  • Team training & go-live

Requirements

  • Contract executed
  • Initial payment cleared
  • Infrastructure prepared
Licensed
Access Control

What You Can Access & When

Material Type Phase 1
Public
Phase 2
NDA
Phase 3
POC
Phase 4+
Licensed
Executive Overview
Interactive Demo
Security Summary
Architecture Workshop✓ 90 min max
Technical Brief✓ Redacted✓ Full
Security Assessment Pack
POC Environment
API Specifications✓ Limited✓ Full
Deployment Package
Full Documentation
License Keys✓ POC only✓ Production
Support Channel✓ POC support✓ Full support
Source Code✗ Never
Commercial Model

Infrastructure Licensing, Not SaaS

Pricing Factors

All quotes are scope-dependent and value-anchored.

  • Deployment scope (tenants, properties, users)
  • Tenant complexity (hierarchy depth, governance rules)
  • Regulatory exposure and data residency requirements
  • Integration requirements (LLM models, existing systems)
  • Support level (Bronze / Silver / Gold)
  • Geographic deployment (Australia / Thailand / Multi-region)

License Components

  • Infrastructure License — Annual recurring fee
  • Deployment Services — One-time implementation
  • Support & Maintenance — Annual plan
  • AI Model Integration — Optional add-on

Strategic discounting available for: government entities, multi-year commitments, reference customers, and early adopters in new markets.

Pricing Policy: No public pricing disclosure. Indicative ranges provided during Phase 2 (under NDA). Formal quotation during Phase 3/4. Pricing anchored to value delivered, not cost-plus.
IP Protection

What Customers Receive vs. What Remains Proprietary

✓ What Customers Receive

Compiled container images (obfuscated)
License credentials with validation callbacks
Reference architecture documentation
Deployment playbooks & runbooks
Integration API specifications
Administrator training materials
Support channel access (per tier)

✗ What Remains Proprietary

Source code (never disclosed)
Build pipelines & tooling
Core governance algorithms (patent-pending)
Internal database schemas
Proprietary AI orchestration logic
Fork or resell rights
Decoupled governance deployment

Ready to Begin Phase 1?

Executive briefings are open — no commitment required at this stage.

Request Briefing View Live Demo