Skip to main content
The Platform

One Platform. Three Appliances. Complete Control.

Merideon is an AI-native security platform built from the ground up to govern AI agents, manage network infrastructure, and secure the network edge โ€” as a single integrated system.

Architecture

Three Tiers. One System.

Each appliance owns a distinct layer of your security infrastructure. Together they form a closed loop โ€” govern, manage, enforce.

๐ŸŒ Internet External traffic โš™๏ธ AI Router Multi-WAN failover ยท nftables firewall ยท HAProxy load balancer ยท DHCP ยท DNS ยท Traffic analysis Andrew AI โ€” natural language operations ยท agent policy enforcement Policy push DNS sync Internal LAN(s) AI agents ยท containers ยท VMs ยท services ๐Ÿ›ก๏ธ Security Office Agent registry Badge management Policy authoring ๐ŸŒ IPAM IP address tracking Service directory DNS management governs agents tracks IPs ๐Ÿ“œ Unified Audit Trail Every action, every appliance โ€” immutable, attributed, timestamped
โš™๏ธ
Edge Layer โ€” AI Router

Sits between the internet and your internal networks. Handles all ingress/egress traffic, enforces firewall rules, manages WAN failover, and runs Andrew AI for natural language operations.

AI Router details
๐Ÿ›ก๏ธ
Governance Layer โ€” Security Office

The authoritative registry for every AI agent. Manages the full agent lifecycle โ€” registration, approval, credentialing, behavioral assessment, and policy definition.

Security Office details
๐ŸŒ
Intelligence Layer โ€” IPAM

Maintains live awareness of every IP address, service, and DNS record across your infrastructure. Feeds the router with current DNS state and flags unknown devices automatically.

IPAM details
Integration

How the Appliances Work Together

Each appliance is useful standalone. Together they form a closed security loop that no component can provide alone.

๐Ÿ”
Security Office โ†’ AI Router: Policy Enforcement

When an admin authors a policy in the Security Office and clicks Push, it travels directly to Andrew on the AI Router. Andrew applies the rules to nftables in under 2 seconds. Badge revocations trigger immediate enforcement โ€” revoked agents are blocked at the network edge instantly.

๐Ÿ”
AI Router โ†’ Security Office: Andrew Events

Every significant event Andrew observes or action he takes โ€” policy applications, traffic anomalies, WAN failovers, autonomous decisions โ€” is surfaced in the Security Office's Andrew Events feed in real time. The SO sees everything the edge sees.

๐Ÿ”
IPAM โ†’ AI Router: DNS Consistency

DNS records managed in IPAM are applied directly to the AI Router's Unbound resolver. When IPAM adds a host, the router knows its name. When a container is removed by Docker sync, its DNS record can be cleaned up automatically.

๐Ÿ“œ
Shared Audit Philosophy

Every appliance maintains its own immutable audit log with the same principle: every action, attributed to an actor, with timestamp and outcome. Security reviews can trace a complete chain of events across all three appliances โ€” from agent registration through badge issuance to policy enforcement to network event.

Andrew AI

The AI That Runs the Edge

Andrew lives in the AI Router. He monitors the network, responds to natural language commands, enforces policies from the Security Office, and takes autonomous action โ€” always with your explicit approval before changing anything.

๐Ÿ”’ Approval-gated writes
๐Ÿ“Š Real-time state awareness
๐Ÿ“œ Immutable audit trail
๐Ÿ”— Policy enforcement
Meet Andrew โ†’
Deployment

On-Premises. Your Infrastructure. Your Control.

Merideon runs entirely on your hardware. No cloud dependency, no data leaving your network.

Docker Compose

Each appliance ships as a Docker Compose application โ€” backend, nginx, and database in isolated containers. Deploy on any Linux host with Docker installed.

TLS Everywhere

All three appliances serve exclusively over HTTPS. Self-signed certs provided out of the box. Replace with your CA certs for production โ€” paths are fully configurable.

Persistent Data

All data persists on Docker named volumes. Survives container restarts, rebuilds, and updates. PostgreSQL for the Security Office, SQLite for IPAM and AI Router.

Minimum Hardware Requirements

Appliance CPU RAM Disk NICs
๐Ÿ›ก๏ธ Security Office 2 vCPU 4 GB 40 GB 1
๐ŸŒ IPAM 2 vCPU 4 GB 40 GB 1
โš™๏ธ AI Router 4 vCPU 8 GB 100 GB 5 (1 mgmt + 2 WAN + 2 LAN min)

Ready to deploy Merideon?

All three appliances. On your infrastructure. Under your control.