Skip to content
EISBERG
Resources · Whitepapers

Architecture, security, and governance — in writing.

The papers below are documents we share with CISOs, compliance officers, and platform architects evaluating Eisberg. The technical depth is real — we wrote them for the audit committee, not the marketing channel.

Whitepapers

What's in this set.

The Eisberg architecture

PDF · 28 pages · NDA-gated

Three-plane separation, customer-owned data plane, the open standards we commit to, and the implementation rationale. The deck most architects read on the second call.

Security model & threat model

PDF · 42 pages · NDA-gated

Threat modeling against the OWASP top 10 plus AI-specific threats. Per-layer controls, audit log schema, encryption posture, key management.

Agent governance specification

PDF · 18 pages · NDA-gated

The full graduated-autonomy model, approval-chain semantics, kill-switch behavior, and the audit guarantees behind every agent action.

Compliance module catalog

PDF · 22 pages · NDA-gated

BCBS 239, SR 11-7, HIPAA, 21 CFR Part 11, FedRAMP — what each module ships with, the audit pack format, and the regulator-mapping reference.

GPU vs CPU on real workloads

PDF · 14 pages · public

Methodology and measured speedups across analytical, agent micro-query, and federated workloads. Includes the reproducibility scripts.

Hardware-ready architecture brief

PDF · 10 pages · NDA-gated

How Eisberg's storage / cache / routing / scheduling abstractions slot future memory and compute hardware into existing interfaces. Forward-architecture rationale, available under NDA.

Request whitepapers

We share whitepapers under NDA with prospects we are working a real opportunity with. Tell us what your team needs and we will get the relevant set to you within 24 hours.