Infrastructure. Intelligence. Independence.

We build systems that keep working when everything else stops. On-premises AI, industrial control, and infrastructure designed for independence.

Lead Offering

On-Premises AI Integration

Run 70B-class language models on your own hardware. No cloud dependency, no data leaving the building. We assess your needs, design the architecture, deploy a working pilot, and hand you the keys.

For Whom
Organizations handling sensitive data — legal, medical, financial, government — who want AI without cloud exposure. Anyone concerned about GDPR, data sovereignty, or vendor lock-in.
Evidence
Running 70B-class Llama models locally on a single workstation with full desktop workload. Production-proven AI workflows across dozens of projects. No cloud dependency whatsoever.

How It Works

  • Needs assessment — we map your workflows, data sensitivity, and hardware to determine the right model and architecture
  • Architecture design — local inference stack tailored to your environment, with security and maintenance in mind
  • Pilot deployment — working system installed on your hardware, tested with your actual use cases
  • Handoff — full documentation, operations manual, and training for your team. You own everything.

Deliverables

  • Needs assessment report
  • Architecture design document
  • Working pilot installation on your hardware
  • Operations manual and team training
  • Post-deployment support period
Timeline
2–4 weeks, assessment through pilot handoff
Investment
From 1.5M HUF, depending on scope and complexity

In Practice

A single workstation running 70B-parameter language models locally, handling full desktop workload in parallel — no cloud calls, no data leaving the premises. Deployed for production use across multiple knowledge-intensive workflows, replacing cloud API dependencies entirely.

AI Knowledge Architecture

Your AI assistant forgets everything between sessions. Your team's knowledge lives in people's heads. We build the systems that make institutional knowledge persistent, searchable, and compounding — so AI becomes a partner that learns, not a tool that resets.

For Whom
Teams using AI-assisted development losing context between sessions. Organizations with high knowledge turnover. R&D teams needing systematic knowledge capture across projects and people.
Evidence
160+ tracked human-AI collaboration sessions across 30+ projects. Measurable reduction in context re-orientation time. Production-validated methodology for structured knowledge externalization.

How It Works

  • Knowledge audit — we map how your team captures, shares, and loses institutional knowledge today
  • Architecture design — structured knowledge systems tailored to your workflows, with AI integration points
  • Deployment — working system with knowledge capture protocols, search, and cross-session context continuity
  • Adoption support — team training, workflow integration, and 1-month support to ensure the system becomes part of daily practice

Deliverables

  • Knowledge management system deployment
  • Context continuity protocols and documentation
  • AI integration configuration for your team's tools
  • Team training and adoption playbook
  • 1-month post-deployment adoption support
Timeline
2–3 weeks setup + 1 month adoption support
Investment
From 1M HUF, depending on team size and complexity

In Practice

Across 160+ tracked sessions spanning 30+ projects, we developed and validated a methodology for structured knowledge externalization that turns AI from a stateless tool into a compounding partner. Context re-orientation dropped from 10–15 minutes per session to near zero. Knowledge from one project informs decisions in others. The system pays for itself within weeks — in time saved, mistakes avoided, and decisions that don't need to be re-made.

SCADA / ICS Modernization

Legacy SCADA systems are a ticking clock — aging software, security gaps, lost institutional knowledge. We analyze your current state, identify risks, and design a migration path. No downtime. No disruption.

For Whom
Industrial operators running aging control systems — water management, manufacturing, energy. Contractors serving critical infrastructure clients.
Evidence
Complete SCADA modernization delivered for active critical infrastructure. Proven zero-downtime parallel-running methodology. 20+ years in industrial systems.

How It Works

  • System analysis — full documentation of current SCADA/PLC architecture, communication protocols, and software stack
  • Risk assessment — security vulnerabilities, obsolescence risks, single points of failure, institutional knowledge gaps
  • Migration roadmap — phased plan with technology recommendations, cost structure, and risk mitigation for each stage
  • Parallel-run implementation — new system runs alongside the old one until proven, then cutover. Zero surprise downtime.

Deliverables

  • Comprehensive system analysis report
  • Risk and vulnerability assessment
  • Technology stack recommendation
  • Phased migration roadmap with cost estimates
  • Implementation available separately
Timeline
Assessment: 2–3 weeks · Implementation: 3–6 months
Investment
Assessment from 1M HUF; implementation quoted separately

In Practice

A critical infrastructure water management operator with 11 remote PLC stations needed their legacy SCADA system assessed before NIS2 deadlines. We delivered a comprehensive system analysis covering architecture, communication protocols, security gaps, and a phased migration roadmap — without a single hour of unplanned downtime.

NIS2 Readiness & OT Security

NIS2 deadlines are here and most organizations aren't ready. We help you prepare — practical gap analysis, security hardening, and the documentation you need before the auditors arrive. Not a checkbox exercise.

For Whom
Critical infrastructure operators and their contractors preparing for NIS2 compliance. Water management, energy, transport, manufacturing. Anyone who needs to get audit-ready.
Evidence
9 ITSEC planning documents authored covering IEC 62443, ISO 27001/27019, and NIS2 mapping. Hands-on OT security hardening across production SCADA systems. Presented at Magyar Hidrológiai Társaság.

How It Works

  • Current state assessment — mapping your IT/OT landscape, existing security measures, and organizational readiness
  • Gap analysis — systematic comparison against NIS2 requirements, IEC 62443, and applicable standards
  • Prioritized remediation plan — what to fix first, what's critical vs. nice-to-have, realistic timelines
  • Documentation preparation — the evidence package your auditors will need to see

Deliverables

  • NIS2 gap analysis report with severity rankings
  • Prioritized remediation roadmap
  • Security hardening implementation guidance
  • Compliance documentation package
  • Ongoing support available for remediation phase
Timeline
1–3 weeks depending on scope
Investment
From 800K HUF, depending on scope

In Practice

Authored 9 ITSEC planning documents for a critical infrastructure operator, mapping IEC 62443 zones/conduits, ISO 27001/27019 controls, and NIS2 requirements to their actual OT environment. Hands-on security hardening across production SCADA systems — not theoretical compliance, but tested configurations on live infrastructure.

Infrastructure Architecture & Hardening

You've outgrown the single server. We audit your infrastructure, find the single points of failure and security gaps, then design and build something production-grade.

For Whom
Growing organizations with fragmented infrastructure. Companies preparing for compliance audits or scaling operations.
Evidence
Scaled single-office setup to 10-server enterprise supporting 300+ users. Docker-first architectures, multi-tier security, 1PB+ managed storage with automated backup.

How It Works

  • Infrastructure audit — full inventory of servers, networking, storage, backup, monitoring, and security posture
  • Risk and bottleneck analysis — single points of failure, capacity limits, security gaps, compliance readiness
  • Redesign proposal — target architecture with technology choices, migration path, and effort estimates
  • Implementation — hands-on build-out available, or detailed enough specs for your team to execute

Deliverables

  • Infrastructure audit report
  • Architecture redesign proposal
  • Implementation plan with phases and priorities
  • Monitoring and backup strategy
  • Hands-on implementation available separately
Timeline
Audit + design: 2–3 weeks
Investment
Audit + design from 1M HUF; implementation quoted separately

In Practice

Scaled a single-office setup into a 10-server enterprise architecture supporting 300+ users. Docker-first containerization, 802.1X network access control, multi-tier security zones, VPN mesh, automated monitoring, and 1PB+ managed storage with automated backup — built incrementally without disrupting daily operations.

Complex or multi-site project? Engagements spanning multiple services or locations are scoped individually. Let's talk.

20+
years in industrial systems
1,418
indexed knowledge entries
41
projects tracked
300+
users on self-built infrastructure
11+
years in critical infrastructure
EU
wide availability

Let's Talk

Every engagement starts with a conversation. Tell us what you're dealing with — we'll tell you honestly whether we can help.

info@sheridan.hu