Skip to main content
UlexIoTy
Conduitby UlexIoTy
Features
OT Engineers
Query data across historians
IT Directors
Security-first data access
Plant Managers
Real-time operational KPIs
Division Directors
Multi-facility visibility
Routing Intelligence
AI-learned decision routing
All Solutions
View all roles
Use Cases
Blog
Insights and tutorials
ROI Calculator
Calculate your savings
Glossary
Industrial data terminology
ContactRequest Demo
Features
Use Cases
ContactRequest Demo

Footer

UlexIoTy

Conduit — Industrial Context Mesh

The Industrial Context Mesh that adds meaning to your OT data without moving it.

Meaning without movement.

Product

  • Features
  • How It Works
  • Integrations

Resources

  • Use Cases

Company

  • About
  • Contact

Legal

  • Privacy
  • Terms

© 2026 UlexIoTy LLC. All rights reserved.

For IT Directors

Enable OT Access.Without the Risk.

The business needs OT data. Security says no to data movement. OT won't give IT access to their systems. Sound familiar? Conduit solves this impossible triangle.

Schedule Security ReviewHow It Works

The IT/OT Convergence Challenge

Traditional approaches force you to choose between business value and security. Conduit eliminates the trade-off.

ChallengeTraditional ApproachWith Conduit
Business wants access to OT data for analyticsBuild data lake, spend 18 months on ETL pipelinesQuery data in place, deliver value in weeks
Security team concerned about OT network exposureComplex DMZ architecture, months of security reviewsRead-only translators, no inbound connections to OT
Compliance requires data residencyExpensive regional data centers and replicationData never moves, automatic compliance
OT team resists IT-driven initiativesYears of organizational frictionOT keeps control, IT gets access—both win

Security-First Architecture

Built from the ground up for enterprise security requirements.

Zero Data Movement

OT data never leaves OT networks. Queries execute at the edge and only results are returned. No data lakes, no replication, no governance nightmares.

Read-Only Access

Conduit connects to source systems with read-only credentials. There's no possibility of writes affecting production systems.

Complete Audit Trail

Every query is logged with user identity, timestamp, systems accessed, and data returned. Export to your SIEM for compliance reporting.

Zero Trust Architecture

Every request is authenticated and authorized. Fine-grained RBAC controls who can access what data down to the tag level.

AI-Mediated Routing

Questions route through organizational hierarchy with AI mediation at each level. No more telephone game - intent is tracked and preserved as information flows.

Thread-Level Privacy

Every conversation is isolated at the thread level. Data expires after 30 days while abstract context persists, ensuring compliance without losing organizational knowledge.

How It Works

Data stays in OT. Only query results cross the boundary.

CONTROL PLANE
PortalReact UI

React 18 + TypeScript. Query interface, UNS browser, data explorer.

API GatewayREST + Auth

Fastify REST API. JWT auth, RBAC, rate limiting.

Query PlannerDAG Engine

DAG-based execution planner. Partial results, Redis caching.

UNS ResolverNamespace

Dynamic namespace resolution. Tag proposals, source bindings.

Context StorePG + DuckDB

PostgreSQL + pgvector + DuckDB. Multi-source correlation.

Mesh RegistryTopology

Manages translator instances, federation links, and tool aggregation.

Query PlaneMCP / HTTP
NQE queries
Tool calls
Bulk history
Real-Time PlaneNATS
Live tag values
Subscriptions
Push alerts
TRANSLATORS
Translator
Splunk●
SPL CompilerProduction
Translator
MQTT●
mqtt.js v5Production
Translator
OPC-UA●
node-opcuaProduction

Compliance Built In

Conduit's architecture simplifies compliance by eliminating data movement and providing complete audit trails.

  • SOC 2 Type II certification in progress
  • GDPR-compliant data architecture
  • NERC CIP compatible deployment options
  • ISO 27001 aligned security controls
  • No PII in transit or at rest
  • Configurable data retention policies
In Progress

SOC 2 Type II

Service Organization Control audit for security, availability, and confidentiality

Planned

ISO 27001

Information security management system certification

In Progress

GDPR Compliant

General Data Protection Regulation compliance — architecture designed for GDPR, formal certification in progress

In Progress

NERC CIP Compatible

Critical Infrastructure Protection standards for energy sector — designed for compatibility, validation in progress

Ready for a security deep-dive?

Schedule a technical review with our security team. We'll walk through the architecture, deployment options, and compliance considerations.

Schedule Security ReviewHow It Works