The control plane for agent cognition.
Autonomous agents are the next compute substrate. Every previous compute wave spawned a defense layer worth tens of billions. This one has not. We are building it — from Lausanne, Switzerland.
Every compute wave produces a defense substrate. This wave has not — yet.
- 1WEBencrypted transportTLS + CA$10B+
- 2ENDPOINTprocess integrityAV → EDR$50B+
- 3CLOUDbrokered accessCASB + IAM$30B+
- 4SaaSidentity-bound policySSO + zero-trust$40B+
- 5AGENTcognitive integritySENTISECopen
The agent wave breaks all prior substrates. The attack surface is the computation itself. Text firewalls, framework permissions, endpoint tools — all structurally blind to it. A new substrate is necessary. The only question is who defines it.
Cognitive Integrity Monitoring.
A defense class that watches the computation a model performs under autonomous execution — not the text it reads or writes — and gates consequential actions on that reading. Analogous in role to control-flow integrity for compiled binaries.
IN → user intent, proposed actions, retrieved content
└── [ COGNITIVE INTEGRITY CONTROL PLANE ] ──┐
▼
OUT → verdict · intervention · signed traceThe window opens once. It is opening now.
Composition + operation + standard + evidence.
Falsification-first. Every phase is a go / no-go.
- PHASE00Concept demo (done)A visual compress of the thesis. Used to book briefings with CISOs and platform leads.Now
- PHASE01Production MVP — closed-model subsetA deployable SDK + proxy running on Claude / GPT / Gemini. Five ship-ready components. First design partner in production. Catches a meaningful attack class without requiring activation access.4 weeks
- PHASE02Deep stack — open-weight full pipelineAdd the computation-layer signals against open-weight models. Published benchmarks vs AgentDojo / InjecAgent. Competitive separation from text-layer vendors becomes indefensibly clear.Month 2–4
- PHASE03Enterprise scale2–3 design partners in production. SOC 2 Type I. First paid contracts. Red team operational. First public case study.Month 5–9
- PHASE04Category leadershipOpen protocol v1.0. TEE-attested deployment. Multi-agent session graphs. Series A on category dominance.Month 10–18
Every primitive we use is published. No one has composed them for this problem.
Sentisec stands on roughly two decades of research across four fields. Our edge is the composition, the engineering, and the threat-intel operation around it — not a single unproven idea.
Founder-led. Research-rooted. Swiss-based.
Pre-seed.
- 01Round: pre-seed, target close Q2 2027
- 02Use of funds: founding research engineers + red team + two design-partner deployments + closed-model shadow-mode validation
- 03Lead and strategic angels welcome. Timing matters more than valuation.
- 04Meetings in person at our Lausanne office or remote — your call.