Trusted by Canadian defence suppliers

CPCSC Readiness Starts Here.

Canadian defence suppliers, subcontractors, and MSPs use Solymus to turn compliance evidence into cryptographically signed, independently verifiable records — ready before the assessor asks.

CPCSCITSP.10.171NIST 800-171CMMC (Roadmap)

The question isn't if regulators will ask. It's when.

DND asks for your CPCSC evidence.

Your defence contract requires Level 1 certification by April 2026. Your team has evidence scattered across shared drives and email threads.

With Solymus, you export a complete evidence index with per-artifact verification links — ready for the assessor.

An assessor reviews your ITSP.10.171 controls.

They need evidence for 97 controls. Your team has 30 days. Last time it took three months of back-and-forth.

With Solymus, every artifact is cryptographically signed and mapped to controls. Export the package in minutes.

A prime asks if you handle specified information properly.

You're a subcontractor bidding on a defence contract. The prime needs proof your security controls meet CPCSC requirements — not a promise, evidence.

With Solymus, you hand them a self-verifying evidence package they can check independently.

Your Team Spends Weeks on Evidence That Nobody Can Verify

Your compliance team collects screenshots, policies, and scan reports across shared drives and email threads. When an assessor asks for proof, someone spends weeks assembling a binder. When DND or a prime asks for CPCSC evidence, you send a PDF that nobody can independently verify.

The result: delayed audits, repeated evidence requests, and no way for regulators, assessors, or your own board to independently confirm that your evidence hasn't been altered.

Show the board what you can prove

See evidence coverage across every framework at a glance — no spreadsheet required.

End the binder scramble

Upload once. Controls map automatically. Export when the assessor or regulator asks.

Hand your assessor a link, not a binder

Every artifact includes a verification link regulators and auditors can check independently.

One Vault. Every Framework. Verifiable Receipts.

ProlixoTech stores your compliance evidence, signs every artifact with AWS KMS, maps it to controls in your selected frameworks, and generates shareable verification links anyone can check — without accessing your systems.

One Engine

Upload evidence once. Enable framework packs to map artifacts to the controls that matter to you.

Cryptographic Receipts

Every artifact gets a SHA-256 hash, a KMS signature, and a position in a Merkle chain. Any modification is detectable.

Verifiable by Anyone

Share a verification link with your assessor, buyer, or regulator. They confirm integrity independently.

Exportable Packages

Generate an evidence index with per-artifact verification URLs. Hand it to your auditor as a self-verifying binder.

Four Steps to Audit-Ready Evidence

1

Upload

Upload policies, screenshots, scan reports, or training records. PDF, Office docs, images, text. Each upload goes to encrypted storage (S3 with SSE-KMS).

2

Sign

ProlixoTech computes a SHA-256 hash, signs it with AWS KMS (ECDSA_SHA_256), and links it to a Merkle chain. You get a tamper-evident receipt with a unique event ID.

3

Map

Your framework pack maps the artifact to relevant controls automatically. Policy documents map to AC-1, SC-1. Identity configs map to AC-2, IA-2. Adjust or tag as needed.

4

Export & Share

Generate an evidence index — every artifact, its hash, control mappings, and a verification URL. Share the package or individual links with anyone.

Enable the Frameworks You Need. Add More Anytime.

Framework packs configure how your evidence is organized, which controls artifacts map to, and what your exports look like. Same vault, same receipts, different lenses.

CPCSC / ITSP.10.171

For Canadian defence suppliers, subcontractors, and consultants handling specified information. Maps artifacts to ITSP.10.171 controls (Canada's adaptation of NIST SP 800-171 Rev 3). Exports produce evidence indexes aligned to CPCSC assessor expectations.

CPCSCITSP.10.171NIST 800-171

Additional Frameworks (Roadmap)

CMMC 2.0 cross-border support and AI governance frameworks (EU AI Act, NIST AI RMF) are on our roadmap. The same evidence vault and cryptographic receipts will extend to additional frameworks as they become available.

CMMC (Roadmap)EU AI Act (Roadmap)NIST AI RMF (Roadmap)

CPCSC is the primary framework today. Additional framework packs are on the roadmap. Your underlying evidence — and its cryptographic receipts — stays the same regardless of which packs are active.

Evidence Packages Assessors Can Actually Use

Your evidence index export includes:

Artifact metadataName, upload date, and evidence type
SHA-256 content hashCryptographic fingerprint of the artifact contents
Mapped controlsPer your enabled framework packs
Verification URLA link the assessor can open to independently confirm the artifact's signature and chain linkage
Export metadataWorkspace, generation date, artifact count

Assessors get a structured index they can walk through artifact by artifact, clicking verification links to confirm integrity without requesting access to your systems.

Verification Links Anyone Can Check

Every artifact in ProlixoTech has a verification URL. When someone opens that link, the system:

1
Retrieves the KMS signature for the artifact's event
2
Verifies the signature against the stored hash
3
Confirms the event's position in the Merkle chain
4
Displays the result: valid or tampered

No login required. No access to your workspace. The verifier sees the artifact's hash, signature status, and chain linkage — not the artifact contents. You decide what to share; the verification link proves it hasn't changed.

Built on AWS Cryptographic Infrastructure

KMS Signing

Every receipt is signed with ECDSA_SHA_256 using a dedicated AWS KMS key. Signing keys are never exported.

Encrypted Storage

Artifacts are stored in S3 with SSE-KMS encryption at rest.

Merkle Chain

Events are linked in a hash chain with daily attestations producing a Merkle root. Modifying any event breaks the chain.

Workspace Isolation

Each workspace has its own artifacts, exports, API keys, and access controls. No cross-workspace data leakage.

Tamper-Evident

We make modifications detectable. We do not claim modifications are impossible. That distinction matters, and we respect it.

Upload From Any Source. No Connectors Required.

Automated connectors pull data on their own schedule and transform it behind the scenes. Manual upload gives you full control over what enters your evidence chain, when, and from where.

Full Provenance

You know exactly which file, from which system, at which point in time entered the vault.

No Credential Sharing

No OAuth tokens or IAM roles granted to a third party. Your identity provider stays under your control.

Works With Any Tool

Export from CrowdStrike, Qualys, Splunk, Entra, AWS Console, or any tool you already use. Upload the file directly.

Assessor-Friendly

Assessors and auditors see artifacts you deliberately submitted — not opaque sync dumps they can't trace back to a source.

Supported File Types

PDFDOCXXLSXPNGJPGJSONCSVTXT

Upload up to 100 MB per file. Every artifact — regardless of type or source — gets the same SHA-256 hash, KMS signature, control mapping, and Merkle chain linkage. The cryptographic receipt is identical whether you upload a screenshot from your phone or a 50-page policy document.

Getting Started in Ten Minutes

From sign-up to your first signed receipt and shareable verification link.

1

Create your account

Go to app.prolixotech.com/sign-up. Enter your work email and password, or use Google SSO. Every account starts on Solymus Starter (C$1,500/mo, 1,000 events/month, 7-day retention).

2

Complete onboarding

Enter your company name and select CPCSC as your compliance framework. CMMC and AI governance frameworks are on the roadmap. This creates your workspace with a unique tenant ID.

3

Generate an API key

Go to Settings > API Keys and click "Generate New Key." Copy it immediately — it's shown only once. You'll need this for SDK/API access or testing verification endpoints directly.

4

Upload your first artifact

Click "Upload Evidence" in the dashboard. Drop a policy document, scan report, screenshot, or training record. Select the evidence type (e.g., policy_document, vulnerability_scan, audit_log) — this determines which controls are auto-mapped.

5

Finalize and receive your receipt

Click "Finalize." The system computes a SHA-256 hash, signs the digest with AWS KMS (ECDSA P-256), maps it to controls in your selected frameworks, and writes an immutable record to the evidence ledger. You see your signed receipt immediately.

6

Verify the artifact

Click the verification link on any artifact. The system re-verifies the KMS signature, confirms the hash, and validates the Merkle chain position. Every artifact also has a public verification URL (no login required) that your assessor can check.

7

Upload more evidence

One artifact isn't a compliance program. Upload access reviews, configuration screenshots, incident reports, vulnerability scans, training records, and risk assessments. Each gets the same cryptographic receipt and auto-maps to the relevant controls.

8

Export your evidence package

Go to Exports and generate an Evidence Index (JSON grouped by control family), SSP (System Security Plan), or POA&M (Plan of Action & Milestones). Every artifact in the export includes a public verification URL your assessor can click to confirm integrity.

9

Hand off to your assessor

Send the export to your assessor, prime, or DND. They receive a self-contained package where every artifact is independently verifiable via its public URL. No VPN, no shared credentials, no trust assumptions.

Simple Pricing. Three Tiers.

Solymus Starter

C$1,500/mo

For Level 1 readiness

  • 1,000 events/month
  • 7-day retention
  • Verification links
  • Evidence Index + CPCSC Readiness report
  • API access
  • 1 workspace · 3 seats · 1 API key
Get Started
Most Popular

Solymus Guided

C$10,000/mo

For Level 2 preparation

  • SSP + POA&M exports included
  • 100,000 events/month
  • 365-day retention
  • Certificates of Truth
  • Integrations (Beta)
  • 3 workspaces · 10 seats · 10 API keys
Start Solymus Guided

Solymus Enterprise

Custom pricing

For primes, MSPs, and multi-entity orgs

  • 1,000,000 events/month
  • Unlimited retention & workspaces
  • GovCloud + GCC High (Roadmap)
  • SSO/SAML (Roadmap)
  • Board-ready reports
  • Dedicated support + SLA
Contact Sales

All plans include: KMS-signed receipts, shareable verification links, exportable evidence indexes, workspace isolation, and API access.

What We Do & What We Don't

What ProlixoTech does

  • Organizes compliance evidence in a structured, searchable vault
  • Signs every artifact with AWS KMS and links it to a verifiable hash chain
  • Maps artifacts to controls in your selected frameworks
  • Generates exportable evidence packages with per-artifact verification URLs
  • Provides shareable verification links for independent third-party confirmation

What ProlixoTech does not do

  • Guarantee certification, authorization, or compliance outcomes
  • Replace legal counsel, assessors, or certification bodies
  • Make legal claims about liability reduction or audit pass rates
  • Serve as a full compliance management replacement (Solymus is a CPCSC readiness platform focused on evidence and verification)

We support audit readiness by making your evidence organized, signed, and independently verifiable. Compliance outcomes depend on your controls, your assessor, and your organization's practices.

Frequently Asked Questions

Be Ready Before the Assessor Asks

Give your compliance team a single place where every piece of CPCSC evidence is signed, mapped to ITSP.10.171 controls, and verifiable by anyone — including your assessors and DND.