Catalyst Catalyst

The data mesh for contested environments. Post-quantum, zero-trust.

Catalyst is the secure data layer beneath CODA™ — a decentralized mesh that connects organizations without a central server, VPN, or shared certificate authority. When the network is hostile, Catalyst routes your data anyway.

Catalyst overview · 2:30
FIPS 203 (ML-KEM) DoD Zero Trust / NIST 800-207 CNSA 2.0 Compliant FedRAMP Moderate View Trust Center

The network is hostile. Assume it's already compromised.

Russia-Ukraine proved the internet survives sustained operations — but adversaries reroute traffic, hijack BGP, forge TLS certificates, and record encrypted data today for quantum decryption later. Standard zero-trust breaks in DDIL environments where there's no center to trust.

Post-quantum. Decentralized. No center required.

Catalyst encrypts every link with X25519MLKEM768 — a hybrid post-quantum cipher combining X25519 (ECDHE) with ML-KEM-768 (formerly Kyber768) — with no central CA or VPN tunnel required. Nodes peer directly, establish trust out-of-band, and operate autonomously when connectivity is lost.

How Catalyst Works

Each workspace manages its own data. Catalyst routes data through the Common Operational Data Layer — protected in transit — and delivers it to the operators who need it. Users click any workspace to connect or disconnect data sharing.

Producer Workspaces
Workspace Alpha
UAV Telemetry
CCTV Feeds
Workspace Bravo
Text Messages
UAV Imagery
Sensor Alerts
Workspace Charlie
CCTV Feeds
SIGINT Reports
Catalyst Protocol
CODL
CODL
Orbis AI Routing
Data Protected in Transit
Common Operating Pictures
COP — Tactical Map
COP — Threat Overlay
MIRC Chat — Alerts
Workspaces: 0 Nodes: 0 Connections: 0
Workspace Licenses
Sovereign data management
Node Licenses
Managed sensor integration
Unmanaged Nodes
Bring your own infrastructure

Core Capabilities

The Common Operational Data Layer — a decentralized service mesh that connects organizations into a unified data-sharing fabric without centralized infrastructure, without trusting the network, and with protection against both current and quantum-era threats.

Post-Quantum Encryption on Every Link

Every byte travels inside a QUIC tunnel encrypted with X25519MLKEM768 — a hybrid cipher combining classical X25519 with post-quantum ML-KEM-768. Always present, not optional. Applications that add mTLS get a second, independent encryption layer with different CAs and key material.

Zero Trust Without a Center

Each node generates its own Root CA on first boot. Trust is established through out-of-band certificate exchange — no central CA server needed. Certificate-bound tokens (RFC 8705), SPIFFE identity on every service, and 1-hour certificate lifetimes eliminate the need for revocation infrastructure.

BGP-Style Routing

Modeled after the protocol that routes the internet, Catalyst nodes discover each other through direct peering. Routes propagate organically. When connectivity is lost, each node continues operating with its last-known state.

Multi-Party Coordination by Design

When two organizations decide to share data, they exchange Root CA certificates out of band and mint tokens defining access. No shared infrastructure, no common identity provider, no VPN tunnel to a joint operations center. Each organization maintains full sovereignty.

Deployment Model

Catalyst's default deployment runs on Orbis-managed commercial cloud infrastructure - but its decentralized architecture means it can run on any infrastructure your mission requires.

Default: Managed Commercial Cloud

Out-of-the-box, Catalyst runs on Orbis-managed commercial cloud infrastructure - providing global reach, DDoS resilience, and zero-trust network controls with no client infrastructure required to get started.

On-Premises Deployment

Catalyst nodes can be deployed on client-managed hardware - bare metal, VM, or container - in any facility. No dependency on external services once deployed. Fully air-gappable for classified and sensitive compartmented environments.

Sovereign & Private Cloud

Deploy on AWS GovCloud, Azure Government, C2S, or any sovereign cloud of choice. Catalyst has no hard dependency on a specific cloud provider - it runs wherever Envoy and Linux run.

Tactical Edge & DDIL

Catalyst nodes operate autonomously without persistent connectivity - designed for denied, disrupted, intermittent, and limited (DDIL) environments at the tactical edge where centralized architectures fail.

Services That Deliver Catalyst

Products don't deliver outcomes. People do. Orbis engineers build the adapters, deploy the nodes, and design the architecture that makes Catalyst operational for your mission — not just installed.

Producer Adapter Development

Custom adapters that connect your existing sensors, systems, and data sources into Catalyst nodes — translating protocols and normalizing data so it flows into the CODL automatically.

Consumer Adapter Development

Purpose-built adapters that deliver CODL data to your mission applications, dashboards, and C2 systems — in the format and cadence your operators need.

Node Integration & Deployment

End-to-end deployment of Catalyst nodes into your environment — from architecture design through operational handoff, including cross-domain and coalition configurations.

Architecture & ICD Design

C2 architecture, CODL design, data strategies, and interface control documents — we design the environment your Catalyst deployment thrives in.

Explore All Services

Post-quantum. Zero trust. Decentralized. Deployed today.

For organizations that operate where the network is hostile, the infrastructure is unreliable, and the adversary is already listening.