Architecture, security, and governance — in writing.
The papers below are documents we share with CISOs, compliance officers, and platform architects evaluating Eisberg. The technical depth is real — we wrote them for the audit committee, not the marketing channel.
What's in this set.
The Eisberg architecture
PDF · 28 pages · NDA-gated
Three-plane separation, customer-owned data plane, the open standards we commit to, and the implementation rationale. The deck most architects read on the second call.
Security model & threat model
PDF · 42 pages · NDA-gated
Threat modeling against the OWASP top 10 plus AI-specific threats. Per-layer controls, audit log schema, encryption posture, key management.
Agent governance specification
PDF · 18 pages · NDA-gated
The full graduated-autonomy model, approval-chain semantics, kill-switch behavior, and the audit guarantees behind every agent action.
Compliance module catalog
PDF · 22 pages · NDA-gated
BCBS 239, SR 11-7, HIPAA, 21 CFR Part 11, FedRAMP — what each module ships with, the audit pack format, and the regulator-mapping reference.
GPU vs CPU on real workloads
PDF · 14 pages · public
Methodology and measured speedups across analytical, agent micro-query, and federated workloads. Includes the reproducibility scripts.
Hardware-ready architecture brief
PDF · 10 pages · NDA-gated
How Eisberg's storage / cache / routing / scheduling abstractions slot future memory and compute hardware into existing interfaces. Forward-architecture rationale, available under NDA.
Request whitepapers
We share whitepapers under NDA with prospects we are working a real opportunity with. Tell us what your team needs and we will get the relevant set to you within 24 hours.