Every engagement starts with a free 30-minute scoping call. We tell you exactly what we will build, what it will cost, and what you will get. No RFP process, no procurement committee, no six-month implementation timeline.
One product. One price. Everything included. We design, deploy, and hand off the full RusticAgentic stack — encrypted document vault, proprietary AI chat, and a multi-node mesh that scales as your firm grows. Your IT team takes ownership at handoff. No ongoing retainer. No ticket queue. No vendor dependency.
Multiple sole-tenant sovereign compute nodes deployed in GCP, each running the full proprietary stack. Each node processes queries independently — the gateway coordinates but does not own. If any node goes offline, the others continue. Masterless by design. As your attorney headcount grows, you add nodes — not seat licenses, not tier upgrades. Each additional node adds an estimated 6–8 concurrent users to your capacity. Additional nodes are provisioned by us as a separate engagement — no changes required to existing nodes. See Add a GCP Query Node in Post-Deployment Support below.
Nodes can be deployed across GCP regions — us-central1, us-east1, europe-west1 — for latency optimization. Each region handles local attorney traffic. The encrypted vault index stays synchronized across regions via GCS. A New York associate and a Dallas partner query the same corpus at the same performance profile.
Custom ingest connectors built for your document management system. New matters filed in iManage or NetDocuments are automatically ingested and searchable within minutes — no manual upload step, no associate responsible for remembering to sync. Our ingest daemon polls your DMS and your GCS bucket continuously.
After handoff, your firm's IT department manages day-to-day operations through the GCP console — the same way they manage any other server infrastructure. There is no ongoing retainer and no ticket queue. If an issue arises, see Post-Deployment Support below.
This is the highest-security deployment we offer. Your data never leaves your building. No cloud provider, no GCP, no third-party infrastructure of any kind — the hardware is yours, the network is yours, and every byte of your document vault remains under your physical and legal control at all times. There is no egress path. There is no shared infrastructure. There is no external API. Your documents, your queries, and your answers exist only on hardware that sits in your server room.
The system runs identically to the cloud deployment: same post-quantum vault encryption, same ML-DSA signed audit chain, same proprietary AI inference. This option satisfies the strictest state bar ethics opinions on data residency, any jurisdiction requiring firm-controlled hardware, and any client confidentiality or regulatory requirement that prohibits cloud storage of privileged documents.
After handoff, your firm's IT department manages day-to-day operations — the same way they manage any other server on your network. No ongoing retainer. No managed service. No ticket queue. If an issue arises, see Post-Deployment Support below.
The training visit requires the presence of our team at your facility. The team travels as two persons. Our lead engineer is disabled and travels with a caregiver and assistant — he is ambulatory with arm braces but does not drive. These requirements are non-negotiable and must be accommodated as a condition of any on-premises engagement.
We build and hand off. Your IT team manages operations. If an issue arises, we diagnose it — and the fee structure is designed to be fair: if it's our code, we fix it at no further charge.
Provision additional sovereign compute nodes on your GCP account — at signing or any time after. Each node is built from our pre-baked sovereign image, vault keys distributed, all services verified, and the node confirmed operational. Remote only — no travel required. Includes PQC hardware-bound license token issuance. Existing nodes are untouched — no downtime, no reconfiguration.
Full on-premises sovereign deployment — additional office locations or expanded capacity. Same proprietary stack, same post-quantum vault, same build process. Client procures all travel and accommodation per the standard on-premises travel requirements.
All fees USD. Bank wire transfer only — no credit cards, no payment processors. Full milestone schedule, late payment terms, and refund policy: Payment Structure →
Relativity, Kira, Luminance, and every LLM API wrapper encrypt data with standard TLS — the same encryption that quantum computers will break within the decade. RusticAgentic uses post-quantum cryptography by default on every deployment, every tier, every query.
Every document shard encrypted with AES-256-GCM. The encryption key for each shard is wrapped with ML-KEM Kyber-768 — a lattice-based key encapsulation mechanism standardized by NIST in August 2024. A quantum computer cannot decrypt your vault.
Every answer, every document access, every deliverable signed with ML-DSA-65 — a lattice-based digital signature standardized by NIST in August 2024. The signature is verifiable by anyone with our public key. Tamper-evident chain of custody that survives quantum computing.
Every report we deliver includes a .sig.json sidecar. Use our public key to verify the signature independently — in court, in due diligence, or for bar ethics compliance. Opposing counsel can verify. Auditors can verify. Anyone can verify.