INFRASTRUCTURE / V1.0.4

YOUR
GROUND.
YOUR RULES.

ARIA RUNS ON INFRASTRUCTURE THE CLIENT OWNS AND OPERATES — FACTORY SERVERS, PRIVATE CLOUDS, OR EDGE NODES AT THE PLANT FLOOR. THE DEPLOYMENT MODEL IS NOT AN AFTERTHOUGHT. IT IS THE FOUNDATION.

MODELS

3

TENANCY

SINGLE

CONTROL

CLIENT

SHARED

NOTHING

INFRA_PRINCIPLE

DEPLOY ON INFRASTRUCTURE YOU OWN. NOT INFRASTRUCTURE THAT OWNS YOU.

01 / PROBLEM_FRAME

MOST BUSINESSES
DO NOT CHOOSE
THEIR HOSTING.

THE TYPICAL DEPLOYMENT STORY IS NOT A DECISION — IT IS A DEFAULT. THE VENDOR PICKS THE HOSTING MODEL, THE DATA LOCATION, THE UPDATE SCHEDULE, AND THE ACCESS BOUNDARIES. THE CLIENT ADAPTS. THAT IS THE PROBLEM.

PROBLEM_01

THE SYSTEM LIVES FAR FROM THE OPERATION.

BUSINESS-CRITICAL WORKFLOWS RUN ON SHARED CLOUD INFRASTRUCTURE THAT DOES NOT MATCH THE FACILITY, THE NETWORK TOPOLOGY, OR THE LATENCY REQUIREMENTS OF A PHYSICAL OPERATION.

PROBLEM_02

DATA BOUNDARIES ARE UNCLEAR OR ABSENT.

WHEN THE BUSINESS DOES NOT CONTROL WHERE ITS DATA IS STORED, WHO CAN ACCESS IT, OR HOW BACKUPS ARE MANAGED, RISK MANAGEMENT BECOMES GUESSWORK.

PROBLEM_03

UPDATES ARRIVE ON THE VENDOR'S TIMELINE.

FORCED UPDATE WINDOWS THAT DO NOT FIT PRODUCTION SCHEDULES, MAINTENANCE CYCLES, OR INTERNAL APPROVAL PROCESSES. THE CLIENT ADAPTS TO THE VENDOR — NOT THE OTHER WAY AROUND.

INFRA_RESPONSE

THE ANSWER IS NOT BETTER CLOUD HOSTING. IT IS CLIENT-OWNED INFRASTRUCTURE.

THAT IS THE DEPLOYMENT MODEL ARIA IS BUILT FOR.

02 / DEPLOYMENT_MODELS

THREE MODELS.
YOUR CHOICE.

ARIA SUPPORTS THREE DEPLOYMENT PATTERNS. THE CLIENT CHOOSES THE MODEL THAT FITS THEIR INFRASTRUCTURE REALITY, LATENCY REQUIREMENTS, AND DATA RESIDENCY POLICY. ALL THREE SHARE THE SAME PRINCIPLE: THE BUSINESS OWNS THE ENVIRONMENT.

MODEL_01

ON-PREMISE INSTALLATION.

RUN ARIA ON LOCAL SERVERS INSIDE YOUR FACILITY. MAXIMUM LATENCY CONTROL, SIMPLEST DATA RESIDENCY, AND DIRECT ACCESS FROM THE SHOP FLOOR. THE SYSTEM WORKS WITHOUT INTERNET DEPENDENCY FOR CORE OPERATIONS.

IDEAL FOR: SINGLE-SITE MANUFACTURERS, WAREHOUSES, AND OPERATIONS WHERE LATENCY AND PHYSICAL PROXIMITY TO MACHINES MATTER MOST.

LOCAL SERVER RACK / FACILITY LAN
NO INTERNET DEPENDENCY FOR CORE OPS
DIRECT IIoT SENSOR CONNECTIVITY
SIMPLEST DATA RESIDENCY MODEL
LOWEST LATENCY FOR FLOOR OPERATIONS
FULL OFFLINE CAPABILITY

MODEL_02

PRIVATE CLOUD TENANT.

DEPLOY INSIDE A VPC OR DEDICATED PRIVATE CLOUD ACCOUNT THAT THE CLIENT OWNS, WITH ISOLATED NETWORKS, STORAGE, AND SECURITY POLICY. NOT A SHARED SAAS ENVIRONMENT — A PRIVATE, CLIENT-CONTROLLED CLOUD INSTANCE.

IDEAL FOR: MULTI-SITE OPERATIONS, COMPANIES WITH EXISTING CLOUD INFRASTRUCTURE, AND TEAMS THAT NEED REMOTE ACCESS ALONGSIDE DATA CONTROL.

CLIENT-OWNED VPC / CLOUD ACCOUNT
ISOLATED NETWORKS & STORAGE VOLUMES
CLIENT-DEFINED SECURITY GROUPS
MULTI-SITE ACCESS WITHOUT SHARED TENANCY
ENCRYPTION AT REST AND IN TRANSIT
COMPATIBLE WITH AWS, AZURE, GCP VPCs

MODEL_03

HYBRID EDGE MODEL.

PROCESS MACHINE EVENTS LOCALLY AT THE EDGE AND SYNCHRONISE BUSINESS WORKFLOWS TO A CENTRAL INSTANCE. IIoT DATA DOES NOT DEPEND ON NETWORK UPTIME. BUSINESS RECORDS STAY CONSISTENT ACROSS SITES.

IDEAL FOR: IIoT-HEAVY OPERATIONS, MULTI-FACILITY SETUPS, AND ENVIRONMENTS WHERE NETWORK RELIABILITY VARIES BETWEEN SITES.

EDGE NODE AT EACH SITE
CENTRAL SYNC INSTANCE
LOCAL BUFFERING & STORE-AND-FORWARD
NETWORK-TOLERANT SIGNAL CAPTURE
CROSS-SITE DATA CONSISTENCY
SPLIT LATENCY: FAST LOCAL, RELIABLE CENTRAL

MODEL_COMPARISON

CHOOSING THE
RIGHT FIT.

THE DEPLOYMENT MODEL IS NOT A TECHNICAL PREFERENCE — IT IS AN OPERATIONAL DECISION. EACH MODEL FITS A DIFFERENT INFRASTRUCTURE REALITY.

SINGLE FACTORY, LOCAL NETWORK: ON-PREMISE. THE SYSTEM RUNS WHERE THE WORK HAPPENS. NO EXTERNAL DEPENDENCY.
MULTI-SITE, REMOTE TEAMS: PRIVATE CLOUD. CENTRALISED ACCESS WITH CLIENT-CONTROLLED ISOLATION. ACCESSIBLE FROM ANY AUTHORISED LOCATION.
IIoT + INTERMITTENT CONNECTIVITY: HYBRID EDGE. MACHINE SIGNALS CAPTURED LOCALLY. BUSINESS RECORDS SYNCHRONISED CENTRALLY.
MIXED ENVIRONMENTS: MODELS CAN BE COMBINED. A FACTORY CAN RUN LOCAL EDGE NODES WHILE HQ ACCESSES THE SAME DATA THROUGH A PRIVATE CLOUD INSTANCE.

WHAT_ALL_MODELS_SHARE

EVERY MODEL RUNS ON INFRASTRUCTURE THE CLIENT OWNS OR CONTROLS.

SHARED TENANT

NONE

VENDOR HOSTING

NONE

DATA RESIDENCY

CLIENT

ACCESS POLICY

CLIENT

DESIGN_DECISION

THE CLIENT PICKS THE MODEL. THE SYSTEM ADAPTS.

ARIA WAS NOT BUILT FOR ONE HOSTING PATTERN AND THEN RETROFITTED FOR OTHERS. ALL THREE MODELS WERE DESIGNED AS EQUAL FIRST-CLASS DEPLOYMENT TARGETS.

03 / CLIENT_CONTROL

WHAT THE
CLIENT OWNS.

DEPLOYMENT IS NOT JUST ABOUT WHERE THE SOFTWARE RUNS. IT IS ABOUT WHO CONTROLS THE NETWORK, THE DATA, THE ACCESS, AND THE TIMING. WITH ARIA, THE ANSWER IS ALWAYS THE CLIENT.

CONTROL
DOMAINS.

01

NETWORK POLICY & PRIVATE ZONES.

DEFINE NETWORK SEGMENTATION, FIREWALL RULES, AND PRIVATE NETWORK ZONES. ARIA OPERATES WITHIN THE CLIENT'S EXISTING NETWORK POLICY — IT DOES NOT IMPOSE ITS OWN.

02

STORAGE LOCATION & BACKUP SCHEDULE.

CHOOSE WHERE DATA IS STORED, HOW OFTEN IT IS BACKED UP, HOW LONG BACKUPS ARE RETAINED, AND HOW RECOVERY WORKS. ALL DATA STAYS WITHIN THE CLIENT PERIMETER.

03

ROLE-BASED ACCESS PATHS.

EXPLICIT PERMISSIONS PER ROLE. OPERATORS SEE PRODUCTION DATA. FINANCE SEES FINANCIAL DATA. IT MANAGES SYSTEM CONFIGURATION. NO IMPLICIT TRUST MODEL. NO SHARED ACCESS.

04

UPDATE & PATCH TIMING.

NO FORCED UPDATE WINDOWS. CLIENTS REVIEW CHANGELOGS, TEST IN STAGING IF NEEDED, AND DEPLOY PATCHES ON THEIR SCHEDULE — ALIGNED WITH PRODUCTION CYCLES AND MAINTENANCE WINDOWS.

05

DATA RESIDENCY & SOVEREIGNTY.

OPERATIONAL DATA, CUSTOMER RECORDS, AND MACHINE HISTORY REMAIN ON INFRASTRUCTURE THE CLIENT APPROVES. COMPLY WITH LOCAL REGULATIONS ON YOUR OWN TERMS.

SYSTEM
ADMINISTRATION.

ARIA IS DESIGNED TO BE OPERATED BY THE CLIENT'S OWN IT TEAM OR A DESIGNATED ADMINISTRATOR — NOT BY PIVOTR. THE FOLLOWING AREAS ARE UNDER CLIENT CONTROL FROM DAY ONE.

USER & ROLE MANAGEMENT — CREATE USERS, ASSIGN ROLES, SET MODULE-LEVEL PERMISSIONS PER TEAM
BACKUP & RECOVERY — CONFIGURE AUTOMATED BACKUPS, TEST RESTORES, DEFINE RETENTION WINDOWS
PATCH MANAGEMENT — APPLY SECURITY PATCHES ON YOUR SCHEDULE, REVIEW CHANGELOGS BEFORE DEPLOYMENT
OBSERVABILITY — SYSTEM LOGS, PERFORMANCE METRICS, AND AUDIT TRAILS WITHOUT EXPORTING DATA
CONFIGURATION — ENTITIES, WORKFLOWS, APPROVAL CHAINS, INVENTORY RULES, AND MODULE SETTINGS
IIoT SIGNAL MANAGEMENT — SENSOR MAPPING, THRESHOLD RULES, ALERT CONFIGURATION, AND DEVICE REGISTRY

KEY_DISTINCTION

PIVOTR DOES NOT HAVE STANDING ACCESS TO YOUR SYSTEM.

ONCE DEPLOYED, THE SYSTEM OPERATES ENTIRELY WITHIN THE CLIENT'S INFRASTRUCTURE AND AUTHORITY. SUPPORT IS PROVIDED ON REQUEST — THROUGH EXPLICITLY GRANTED, TIME-BOUNDED ACCESS.

SECURITY_MODEL

YOUR PERIMETER.
YOUR RULES.

ARIA'S SECURITY POSTURE BEGINS WITH THE DEPLOYMENT MODEL ITSELF. SINGLE-TENANT, CLIENT-OWNED INFRASTRUCTURE ELIMINATES ENTIRE CATEGORIES OF VULNERABILITY THAT SHARED HOSTING CREATES.

ROLE-BASED ACCESS CONTROL WITH EXPLICIT PERMISSIONS — NO IMPLICIT TRUST MODEL.
NO SHARED TENANT INFRASTRUCTURE. NO MULTI-TENANT VULNERABILITY SURFACE.
CLIENT-CONTROLLED BACKUP AND RECOVERY PATHS — NOT DEPENDENT ON VENDOR AVAILABILITY.
OBSERVABILITY AND LOGS AVAILABLE WITHOUT EXPORTING DATA OUTSIDE THE CLIENT PERIMETER.
NO TELEMETRY, NO PHONE-HOME, NO USAGE METERING SENT TO PIVOTR.

THE_PRINCIPLE

THE SAFEST SYSTEM IS THE ONE YOU OWN AND OPERATE.

SHARED INFRASTRUCTURE CREATES SHARED RISK. ARIA ELIMINATES THIS BY DESIGN — EVERY DEPLOYMENT IS ISOLATED, SINGLE-TENANT, AND UNDER CLIENT AUTHORITY.

→ READ THE FULL SECURITY REFERENCE

04 / CUSTOMIZATION_&_ADAPTATION

SHAPED TO
YOUR OPERATION.

ARIA IS NOT A GENERIC PLATFORM YOU SHAPE YOUR BUSINESS AROUND. IT IS CONFIGURED TO MATCH YOUR WORKFLOWS, YOUR ENTITY STRUCTURES, YOUR IIOT SIGNALS, AND YOUR DEPLOYMENT ENVIRONMENT. CUSTOMIZATION IS THE STRENGTH — NOT THE LIMITATION.

A

ADAPT_AREA

WORKFLOW CONFIGURATION.

APPROVAL CHAINS, ROUTING RULES, NOTIFICATION TRIGGERS, AND PROCESS FLOWS ARE DEFINED BY YOUR OPERATIONS TEAM — NOT BY A DEFAULT TEMPLATE. EACH WORKFLOW CAN MIRROR YOUR ACTUAL APPROVAL HIERARCHY AND OPERATIONAL SEQUENCE.

MULTI-STEP APPROVAL CHAINS PER MODULE
CONDITIONAL ROUTING BASED ON VALUES
NOTIFICATION TRIGGERS PER EVENT
PROCESS FLOW SEQUENCING
B

ADAPT_AREA

ENTITY STRUCTURES.

CUSTOM FIELDS, CATEGORIES, TAXONOMIES, AND CLASSIFICATION SCHEMES THAT REFLECT YOUR BUSINESS — NOT A GENERIC INDUSTRY TEMPLATE. YOUR INVENTORY CATEGORIES, ASSET CLASSES, AND HR HIERARCHIES MAP TO YOUR ACTUAL OPERATION.

CUSTOM FIELD DEFINITIONS PER MODULE
CATEGORY & TAXONOMY CONFIGURATION
REPORTING HIERARCHY MATCHING
CLASSIFICATION SCHEMES
C

ADAPT_AREA

IIoT SIGNAL MAPPING.

SENSOR INPUTS ARE MAPPED TO YOUR SPECIFIC MACHINES, THRESHOLD VALUES, ALERT RULES, AND BUSINESS RECORD TRIGGERS. THE IIoT LAYER DOES NOT ASSUME A STANDARD FACTORY — IT IS CONFIGURED TO YOUR EQUIPMENT AND PROTOCOLS.

PER-MACHINE SENSOR ASSIGNMENT
CUSTOM THRESHOLD & ALERT RULES
SIGNAL → BUSINESS RECORD TRIGGERS
PROTOCOL CONFIGURATION (MODBUS, MQTT, REST)
D

ADAPT_AREA

DEPLOYMENT ENVIRONMENT.

THE HOSTING MODEL, NETWORK TOPOLOGY, BACKUP STRATEGY, AND INTEGRATION ENDPOINTS ARE SHAPED TO YOUR INFRASTRUCTURE. ARIA FITS YOUR ENVIRONMENT — YOUR ENVIRONMENT DOES NOT NEED TO FIT ARIA.

HOSTING MODEL SELECTION
NETWORK TOPOLOGY ADAPTATION
BACKUP & RECOVERY STRATEGY
INTEGRATION ENDPOINT CONFIGURATION

MODULAR_ADOPTION

START WHERE
IT MATTERS MOST.

ARIA DOES NOT REQUIRE A COMPLETE DEPLOYMENT OF ALL MODULES ON DAY ONE. CLIENTS CAN START WITH THE MODULES THAT ADDRESS THEIR MOST PRESSING OPERATIONAL GAPS AND EXPAND AS THE BUSINESS GROWS.

PHASE 1

START WITH INVENTORY. GET STOCK VISIBILITY AND PROCUREMENT UNDER CONTROL.

PHASE 2

ADD MES WHEN PRODUCTION TRACKING BECOMES A PRIORITY.

PHASE 3

BRING IN CRM AND HRMS AS TEAMS AND PROCESSES MATURE.

PHASE 4

CONNECT IIoT SIGNALS AND ACTIVATE AI ASSISTANCE ACROSS MODULES.

THE_POSITION

CUSTOMIZATION IS THE STRENGTH. NOT A LIMITATION.

GENERIC SOFTWARE FORCES THE BUSINESS TO ADAPT TO THE TOOL. ARIA ADAPTS TO THE BUSINESS. THE DEPLOYMENT IS CONFIGURED TO YOUR WORKFLOWS, YOUR EQUIPMENT, YOUR TEAMS, AND YOUR INFRASTRUCTURE.

THIS IS NOT CUSTOMIZATION AS A CONSULTING PROJECT. IT IS CUSTOMIZATION AS A PRODUCT CAPABILITY — BUILT INTO THE SYSTEM FROM THE BEGINNING.

05 / RELIABILITY_&_PERFORMANCE

BUILT TO
RUN EVERY DAY.

A BUSINESS MANAGEMENT SYSTEM THAT IS DOWN WHEN YOU NEED IT IS WORSE THAN NO SYSTEM AT ALL. ARIA'S INFRASTRUCTURE MODEL IS DESIGNED FOR THE OPERATIONAL REALITY OF MANUFACTURING — WHERE UPTIME IS NOT OPTIONAL.

LOCAL LATENCY.

ON-PREMISE AND EDGE DEPLOYMENTS KEEP OPERATIONAL FLOWS ON THE LOCAL NETWORK. NO ROUND TRIPS TO EXTERNAL SERVERS FOR EVERYDAY TRANSACTIONS. INVENTORY CHECKS, WORK ORDERS, AND MACHINE SIGNALS RESPOND AT LOCAL SPEED.

OFFLINE CAPABILITY.

CORE OPERATIONS DO NOT DEPEND ON INTERNET CONNECTIVITY. ON-PREMISE DEPLOYMENTS FUNCTION FULLY OFFLINE. EDGE NODES BUFFER AND STORE LOCAL DATA DURING CONNECTIVITY GAPS AND SYNCHRONISE WHEN THE LINK IS RESTORED.

CLIENT-OWNED BACKUPS.

BACKUP SCHEDULES, RETENTION POLICIES, AND RECOVERY PROCEDURES ARE UNDER CLIENT CONTROL. NO DEPENDENCY ON VENDOR INFRASTRUCTURE FOR DISASTER RECOVERY. YOUR BACKUPS LIVE WHERE YOU DECIDE.

NON-DISRUPTIVE UPDATES.

PATCHES AND UPDATES ARE APPLIED ON THE CLIENT'S SCHEDULE. NO SURPRISE MAINTENANCE WINDOWS DURING PRODUCTION SHIFTS. CHANGELOGS ARE REVIEWED BEFORE DEPLOYMENT, NOT AFTER.

INTERNAL OBSERVABILITY.

SYSTEM LOGS, PERFORMANCE METRICS, AND AUDIT TRAILS ARE AVAILABLE WITHIN THE CLIENT'S INFRASTRUCTURE. NO NEED TO EXPORT OPERATIONAL DATA TO THIRD-PARTY MONITORING SERVICES.

GROWTH WITHOUT REBUILD.

ADD USERS, MODULES, LOCATIONS, OR IIoT INPUTS WITHOUT REBUILDING THE INFRASTRUCTURE FOUNDATION. THE SYSTEM SCALES WITH THE BUSINESS — NOT AGAINST IT.

INFRASTRUCTURE
GUARDRAILS.

CLEAR BOUNDARIES BETWEEN WHAT THE INFRASTRUCTURE PROVIDES AND WHAT IT PROTECTS.

NETWORK ISOLATION: PRIVATE NETWORK ZONES FOR BUSINESS TRAFFIC, ADMIN ACCESS, AND DEVICE INPUTS. NO SHARED NETWORK PATHS WITH EXTERNAL SERVICES.
ACCESS CONTROL: ROLE-BASED PERMISSIONS SO OPERATORS, FINANCE, AND IT TEAMS SEE ONLY WHAT THEY NEED. NO BLANKET ADMIN ACCESS.
DATA BOUNDARIES: ALL BUSINESS DATA — TRANSACTIONS, DOCUMENTS, IIoT SIGNALS — STAYS INSIDE THE CLIENT-APPROVED STORAGE AND BACKUP MODEL.
AUDIT TRAILS: EVERY SIGNIFICANT ACTION IS LOGGED AND TRACEABLE WITHIN THE CLIENT'S OWN INFRASTRUCTURE. NO EXTERNAL LOG SHIPPING REQUIRED.
UPDATE SOVEREIGNTY: PATCHES, EXTENSIONS, AND INTEGRATIONS FIT THE CLIENT'S CHANGE WINDOW — NOT A VENDOR'S GLOBAL RELEASE CYCLE.

WHAT THE
INFRASTRUCTURE
BUYS YOU.

01

COST DISCIPLINE.

THE SYSTEM STAYS INSIDE A CAPEX-FIRST MODEL. GROWTH DOES NOT GENERATE RECURRING PLATFORM COST. ADD USERS, LOCATIONS, AND MODULES WITHOUT BILLING EVENTS.

02

DATA SOVEREIGNTY.

CUSTOMER DATA, OPERATIONS DATA, AND MACHINE HISTORY REMAIN ON INFRASTRUCTURE THE CLIENT APPROVES. NO SHARED TENANCY. NO EXTERNAL DATA FLOW.

03

OPERATIONAL CONTINUITY.

THE SYSTEM DOES NOT DEPEND ON VENDOR AVAILABILITY, INTERNET CONNECTIVITY, OR EXTERNAL SERVICE UPTIME. BUSINESS OPERATIONS CONTINUE REGARDLESS.

AUDIENCE

WHAT MSMEs
ACTUALLY NEED.

THE INFRASTRUCTURE MODEL IS DESIGNED FOR GROWING BUSINESSES — NOT ENTERPRISES WITH DEDICATED DATACENTRE TEAMS AND NOT STARTUPS WITHOUT A PHYSICAL FOOTPRINT. IT IS BUILT FOR BUSINESSES THAT HAVE MACHINES, INVENTORY, AND PEOPLE ON A FLOOR.

A PRACTICAL FOOTPRINT.

NO OVERBUILT ENTERPRISE MAZE. JUST ENOUGH INFRASTRUCTURE TO STAY SECURE, FAST, AND IN CONTROL. A SINGLE SERVER CAN RUN THE ENTIRE SYSTEM. ADD CAPACITY AS THE BUSINESS GROWS.

CLEAR OPERATIONAL OWNERSHIP.

IT TEAMS KEEP AUTHORITY OVER HOSTING, ACCESS, BACKUPS, AND CHANGE WINDOWS. THE SYSTEM DOES NOT OUTSOURCE CONTROL TO A VENDOR. THE CLIENT IS THE OPERATOR.

ROOM TO GROW.

ADD USERS, MODULES, LOCATIONS, OR IIoT INPUTS WITHOUT REBUILDING THE ENTIRE FOUNDATION. THE INFRASTRUCTURE SCALES WITH THE BUSINESS — NOT AGAINST IT.

ARCHITECTURE

THREE-LAYER CORE, MODULE MAP, DATA FLOW, AND DESIGN PHILOSOPHY.

→ VIEW ARCHITECTURE

IIoT ADAPTERS

MODBUS, MQTT, REST INGESTION, EDGE PROCESSING, AND SIGNAL ROUTING.

→ VIEW IIoT REFERENCE

SECURITY ENCLAVE

ACCESS CONTROL, NETWORK ZONES, AUDIT TRAILS, AND PATCH SOVEREIGNTY.

→ VIEW SECURITY

DOCUMENTATION

FULL OPERATING MANUAL: MODULES, DEPLOYMENT, AND GETTING STARTED.

→ VIEW DOCS

CONTACT / DEPLOYMENT_CONSULT

PLAN YOUR
ARIA ROLLOUT.

Share your current setup and deployment goals. We will respond with licensing clarity, infrastructure fit, and practical next steps for your team.

RESPONSE WINDOW: 1 BUSINESS DAY
CHANNEL: TECHNICAL + COMMERCIAL HANDOFF
DEPLOYMENT MODES: ON-PREM / PRIVATE CLOUD

* REQUIRED FIELDS