Why choose Intarmour?
- Europe-based
- Security-cleared
- Cross-sector expertise
- Mission-driven mindset
Innovation that’s tested, not theorized.
At Intarmour, research isn’t a buzzword—it’s how I stay ahead. These initiatives are not branding exercises or “labs” in name only. They’re quiet, hands-on programs I carry forward to explore the edges of what’s possible in cloud security, governance, and resilience.
From behavioral threat modeling to defense-in-depth simulation, each initiative reflects the same rigor and curiosity I bring to client work—just free from roadmaps and delivery pressure. These programs aren’t commercialized. They’re conceptualized. But they shape every framework, every decision, and every deployment I lead.
Explore these internal research paths to see how I think—before I build.
R&D-backed delivery
The solutions I propose have been challenged internally first—under worst-case scenarios, not ideal demos.
Critical infrastructure mindset
Many of these projects are built around regulated, high-sensitivity environments, simulating failover, drift, and compliance at scale.
Technology-agnostic by design
I don’t build around tools—I build around problems. These labs help me stay vendor-neutral and outcome-focused.
Strategic Initiatives
Program Name | Status | Focus Area | Description | Last Updated | Documentation |
---|---|---|---|---|---|
Veil Architecture | Scheduled | Stealth Infrastructure | Network micro-obfuscation layer using ephemeral routes, TTL rotation, and side-channel deflection. | Jun 2029 | 📄 veil-architecture.pdf |
Echo Project | Scheduled | Audit Simulation | Dynamic audit rehearsal environment with API-driven artifact synthesis and incident traceback. | Jun 2028 | 📄 echo-project.pdf |
Blacklight Initiative | Scheduled | AI & Risk Forecasting | Risk-based threat forecasting engine combining ML classifiers and historical incident taxonomies. | Jun 2027 | 📄 blacklight-initiative.pdf |
Carbon Lab | Scheduled | Cloud Sustainability | Energy consumption profiler for cloud-native workloads with carbon impact analytics and remediation hooks. | Jun 2026 | 📄 carbon-lab.pdf |
Obsidian Protocol | In Progress | Adversarial Simulation | Cloud adversary simulation framework integrating attack graph pruning and evasion signal injection. | May 2025 | 📄 obsidian-protocol.pdf |
SignalBank | Decommissioned | SIEM Telemetry | Telemetry prioritization layer for SIEM pipelines using signal entropy and dynamic relevance weighting. | Jul 2024 | 📄 signalbank.pdf |
ShieldRun | Decommissioned | CI/CD Attack Surface | CI/CD pipeline inspection agent for GitOps-driven systems focusing on secret sprawl and build integrity. | Oct 2023 | 📄 shieldrun.pdf |
Sentinel Mesh | Decommissioned | Service Mesh Security | Ingress/egress policy validation engine for east-west microservice communications in mesh-based networks. | Jun 2022 | 📄 sentinel-mesh.pdf |
RedFog | Decommissioned | Offensive Emulation | Adversarial simulation toolkit emulating MITRE ATT&CK TTPs across distributed Kubernetes clusters. | Mar 2021 | 📄 redfog.pdf |
CloudPhantom | Decommissioned | Cloud Obfuscation | Infrastructure obfuscation proxy injecting entropy into asset enumeration and cloud indexers. | Oct 2020 | 📄 cloudphantom.pdf |
IronPulse | Decommissioned | Runtime Threat Detection | Runtime anomaly detector leveraging eBPF to identify syscall deviations in Linux container workloads. | Jul 2020 | 📄 ironpulse.pdf |
Ignis | Decommissioned | Serverless Security | Ephemeral function hardening module targeting privilege escalation and event spoofing in FaaS runtimes. | Nov 2019 | 📄 ignis.pdf |
AuditCore | Transferred | Compliance Engine | Regulatory evidence automator with control assertion mapping and exportable audit trails. | Jun 2019 | 📄 auditcore.pdf |
ProtoLayer | Transferred | Microservice Discovery | gRPC-aware service discovery with zero-trust mesh injection and metadata-based traffic shaping. | Nov 2018 | 📄 protolayer.pdf |
HexBridge | Transferred | Multi-Cloud Governance | Federated governance layer for AWS, Azure, and GCP with multi-tenant control plane orchestration. | Aug 2018 | 📄 hexbridge.pdf |
Tau Reactor | Transferred | Policy Stress Testing | IaC chaos engine applying policy violations and compliance stress under simulated load conditions. | Apr 2017 | 📄 tau-reactor.pdf |
DeepCrate | Decommissioned | Encrypted Storage | Encrypted object storage blueprint with integrated evidence immutability and forensic tagging. | Jan 2017 | 📄 deepcrate.pdf |
CloudSpine | Transferred | Identity Graphs | Privileged access graph traversal modeling for cloud-native identity and RBAC segmentation strategies. | Apr 2016 | 📄 cloudspine.pdf |
AtlasEdge | Decommissioned | Geo-Resilience | Resilience testing framework simulating regional edge node failures and geo-distributed recovery behavior. | Oct 2015 | 📄 atlasedge.pdf |
SignalHound | Decommissioned | Noise Modeling | Noise surface analysis engine for telemetry ingestion pipelines using synthetic alert injection techniques. | Oct 2015 | 📄 signalhound.pdf |
Legal Disclaimer
The Strategic Research Initiatives presented on this page are part of Intarmour’s historical and ongoing internal research and development efforts. They are disclosed solely for informational and documentation purposes.
Scheduled initiatives represent early-stage concepts or research directions that are not currently under active development. No guarantees are made regarding their future implementation, commercial viability, or continuity.
In Progress initiatives are undergoing active design, development, or internal validation. Their scope and specifications are subject to change without notice and do not constitute a public commitment or offer.
Transferred initiatives have been sold, assigned, or otherwise integrated into third-party entities or ecosystems. Intarmour no longer holds operational control, maintenance responsibility, or governance authority over these projects.
Decommissioned initiatives have been formally discontinued and are no longer maintained. These efforts may have served as exploratory studies, technical feasibility validations, or were halted due to strategic redirection.
All project names, descriptions, and associated materials remain the intellectual property of Intarmour unless explicitly stated otherwise. Any reference to past initiatives does not imply active service availability, ongoing development, or future endorsement.
For any inquiry regarding licensing, ownership, or historical details, please contact us at info@intarmour.com.