---
title: "Services — ICS - Sheridan"
url: https://sheridan.hu/services/
description: "On-premises AI integration, SCADA modernization, NIS2 readiness, and infrastructure hardening. EU-wide consulting."
lang: [en, hu]
---

# Infrastructure. Intelligence. Independence.

We build systems that keep working when everything else stops. On-premises AI, industrial control, and infrastructure designed for independence.

---

## 1. On-Premises AI Integration *(Lead Offering)*

Run 70B-class language models on your own hardware. No cloud dependency, no data leaving the building. We assess your needs, design the architecture, deploy a working pilot, and hand you the keys.

**For Whom:** Organizations handling sensitive data — legal, medical, financial, government — who want AI without cloud exposure. Anyone concerned about GDPR, data sovereignty, or vendor lock-in.

**Evidence:** Running 70B-class Llama models locally on a single workstation with full desktop workload. Production-proven AI workflows across 30+ projects with persistent context continuity. No cloud dependency whatsoever.

### How It Works

1. Needs assessment — map workflows, data sensitivity, and hardware to determine the right model and architecture
2. Architecture design — local inference stack tailored to your environment, with security and maintenance in mind
3. Pilot deployment — working system installed on your hardware, tested with your actual use cases
4. Handoff — full documentation, operations manual, and training for your team. You own everything.

### Deliverables

- Needs assessment report
- Architecture design document
- Working pilot installation on your hardware
- Operations manual and team training
- Post-deployment support period

**Timeline:** 2–4 weeks, assessment through pilot handoff
**Investment:** From 1.5M HUF, depending on scope and complexity

**In Practice:** A single workstation running 70B-parameter language models locally, handling full desktop workload in parallel — no cloud calls, no data leaving the premises. Deployed for production use across multiple knowledge-intensive workflows, replacing cloud API dependencies entirely.

---

## 2. AI Knowledge Architecture

Your AI assistant forgets everything between sessions. Your team's knowledge lives in people's heads. We build the systems that make institutional knowledge persistent, searchable, and compounding — so AI becomes a partner that learns, not a tool that resets.

**For Whom:** Teams using AI-assisted development losing context between sessions. Organizations with high knowledge turnover. R&D teams needing systematic knowledge capture across projects and people.

**Evidence:** 160+ tracked human-AI collaboration sessions across 30+ projects. Measurable reduction in context re-orientation time. Production-validated methodology for structured knowledge externalization.

### How It Works

1. Knowledge audit — map how your team captures, shares, and loses institutional knowledge today
2. Architecture design — structured knowledge systems tailored to your workflows, with AI integration points
3. Deployment — working system with knowledge capture protocols, search, and cross-session context continuity
4. Adoption support — team training, workflow integration, and 1-month support to ensure the system becomes part of daily practice

### Deliverables

- Knowledge management system deployment
- Context continuity protocols and documentation
- AI integration configuration for your team's tools
- Team training and adoption playbook
- 1-month post-deployment adoption support

**Timeline:** 2–3 weeks setup + 1 month adoption support
**Investment:** From 1M HUF, depending on team size and complexity

**In Practice:** Across 160+ tracked sessions spanning 30+ projects, we developed and validated a methodology for structured knowledge externalization that turns AI from a stateless tool into a compounding partner. Context re-orientation dropped from 10–15 minutes per session to near zero. Knowledge from one project informs decisions in others. The system pays for itself within weeks — in time saved, mistakes avoided, and decisions that don't need to be re-made.

---

## 3. SCADA / ICS Modernization

Legacy SCADA systems are a ticking clock — aging software, security gaps, lost institutional knowledge. We analyze your current state, identify risks, and design a migration path. No downtime. No disruption.

**For Whom:** Industrial operators running aging control systems — water management, manufacturing, energy. Contractors serving critical infrastructure clients.

**Evidence:** Complete SCADA modernization delivered for active critical infrastructure. Proven zero-downtime parallel-running methodology. 20+ years in industrial systems.

### How It Works

1. System analysis — full documentation of current SCADA/PLC architecture, communication protocols, and software stack
2. Risk assessment — security vulnerabilities, obsolescence risks, single points of failure, institutional knowledge gaps
3. Migration roadmap — phased plan with technology recommendations, cost structure, and risk mitigation for each stage
4. Parallel-run implementation — new system runs alongside the old one until proven, then cutover. Zero surprise downtime.

### Deliverables

- Comprehensive system analysis report
- Risk and vulnerability assessment
- Technology stack recommendation
- Phased migration roadmap with cost estimates
- Implementation available separately

**Timeline:** Assessment: 2–3 weeks · Implementation: 3–6 months
**Investment:** Assessment from 1M HUF; implementation quoted separately

**In Practice:** A critical infrastructure water management operator with 11 remote PLC stations needed their legacy SCADA system assessed before NIS2 deadlines. We delivered a comprehensive system analysis covering architecture, communication protocols, security gaps, and a phased migration roadmap — without a single hour of unplanned downtime.

---

## 4. NIS2 Readiness & OT Security

NIS2 deadlines are here and most organizations aren't ready. We help you prepare — practical gap analysis, security hardening, and the documentation you need before the auditors arrive. Not a checkbox exercise.

**For Whom:** Critical infrastructure operators and their contractors preparing for NIS2 compliance. Water management, energy, transport, manufacturing. Anyone who needs to get audit-ready.

**Evidence:** 9 ITSEC planning documents authored covering IEC 62443, ISO 27001/27019, and NIS2 mapping. Hands-on OT security hardening across production SCADA systems. Presented at Magyar Hidrológiai Társaság.

### How It Works

1. Current state assessment — mapping your IT/OT landscape, existing security measures, and organizational readiness
2. Gap analysis — systematic comparison against NIS2 requirements, IEC 62443, and applicable standards
3. Prioritized remediation plan — what to fix first, what's critical vs. nice-to-have, realistic timelines
4. Documentation preparation — the evidence package your auditors will need to see

### Deliverables

- NIS2 gap analysis report with severity rankings
- Prioritized remediation roadmap
- Security hardening implementation guidance
- Compliance documentation package
- Ongoing support available for remediation phase

**Timeline:** 1–3 weeks depending on scope
**Investment:** From 800K HUF, depending on scope

**In Practice:** Authored 9 ITSEC planning documents for a critical infrastructure operator, mapping IEC 62443 zones/conduits, ISO 27001/27019 controls, and NIS2 requirements to their actual OT environment. Hands-on security hardening across production SCADA systems — not theoretical compliance, but tested configurations on live infrastructure.

---

## 5. Infrastructure Architecture & Hardening

You've outgrown the single server. We audit your infrastructure, find the single points of failure and security gaps, then design and build something production-grade.

**For Whom:** Growing organizations with fragmented infrastructure. Companies preparing for compliance audits or scaling operations.

**Evidence:** Scaled single-office setup to 10-server enterprise supporting 300+ users. Docker-first architectures, multi-tier security, 1PB+ managed storage with automated backup.

### How It Works

1. Infrastructure audit — full inventory of servers, networking, storage, backup, monitoring, and security posture
2. Risk and bottleneck analysis — single points of failure, capacity limits, security gaps, compliance readiness
3. Redesign proposal — target architecture with technology choices, migration path, and effort estimates
4. Implementation — hands-on build-out available, or detailed enough specs for your team to execute

### Deliverables

- Infrastructure audit report
- Architecture redesign proposal
- Implementation plan with phases and priorities
- Monitoring and backup strategy
- Hands-on implementation available separately

**Timeline:** Audit + design: 2–3 weeks
**Investment:** Audit + design from 1M HUF; implementation quoted separately

**In Practice:** Scaled a single-office setup into a 10-server enterprise architecture supporting 300+ users. Docker-first containerization, 802.1X network access control, multi-tier security zones, VPN mesh, automated monitoring, and 1PB+ managed storage with automated backup — built incrementally without disrupting daily operations.

---

Complex or multi-site project? Engagements spanning multiple services or locations are scoped individually. [Let's talk.](mailto:info@sheridan.hu)

## Credentials

| Metric | Value |
|--------|-------|
| Years in industrial systems | 20+ |
| Users on self-built infrastructure | 300+ |
| Years in critical infrastructure | 11+ |
| Availability | EU-wide |

## Contact

Every engagement starts with a conversation. Tell us what you're dealing with — we'll tell you honestly whether we can help.

info@sheridan.hu | [sheridan.hu](https://sheridan.hu)
