
Technologies
At SiteOne, technology is an operational control layer: a system built to convert signals into verified decisions—and verified decisions into traceable action. Our suite combines multimodal analytics, event correlation, and human-verified response (24/7 SOC) to reduce noise, accelerate intervention, and sustain continuity across critical environments.
Each product follows a core principle: operational certainty. We don’t stop at “detection”; we orchestrate the full cycle detect → verify → intervene → document → improve, governed by policies, SOP playbooks, and a defensible chain of evidence. This standardizes execution across sites, lowers false alarms, and strengthens control over access, identity, and risk events.
This section brings together our core technologies—from cognitive guarding and advanced vision to identity, cognitive access control, and corporate defense—engineered to integrate as a single platform. The result is a governable operation with measurable performance and auditability: detection/verification/intervention times, alert quality, escalation success, and service availability.

Dive into the technology
OMNIRIXâ„¢
Cognitive AI Guard
OMNIRIX™ is SiteOne’s 24/7 Cognitive AI Guard system: an intelligent defense platform designed to operate under critical-operations doctrine— disciplined execution, continuity under adverse conditions, and senior
operational-command judgment applied to the protection of real-world
environments. Its purpose is not passive observation, but to create
operational advantage: anticipate behaviors, reduce uncertainty, and
mitigate risks before they become incidents.
OMNIRIX™ functions as a Command & Control system for the physical
world. It integrates multiple environmental data sources (computer vision, IoT, network telemetry, power, access control, and operational variables) and converts them into actionable intelligence. Our algorithms go beyond the obvious: they model site-specific normality, recognize behavioral patterns, and detect pre-incident sequences—intent-driven loitering, prior reconnaissance, repetitive routes, atypical dwell times, stepped approaches, individual–vehicle–environment coordination, and progressive shifts that indicate preparation and imminent risk. Where other systems react to an isolated event, OMNIRIX™ reconstructs the full story that precedes it and elevates situational awareness in real time.

​
Cognitive Edge Core
HELIX™ is SiteOne’s cognitive edge core: a tactical computing
platform designed to run Artificial Intelligence on-site (Edge AI)
and turn any deployment—security, access control, IoT, energy,
and connectivity—into an autonomous, measurable, and
governable system. It is not just a “device” inside the facility; it is
the layer that gives the entire operational ecosystem judgment,
continuity, and the ability to evolve.
In real-world environments, what matters isn’t simply seeing data;
what matters is interpreting it and acting with speed and
consistency. HELIX™ exists to solve that: it integrates information
streams, normalizes them, analyzes them with AI models, and e
xecutes operational logic with low latency. This way, the facility
no longer depends on delayed reaction, improvised decisions,
or perfect connectivity: it operates with local intelligence and
critical-operations discipline.
​
The local brain: AI in the field, real-time judgment
​
HELIX™ functions as the site’s brain. It connects cameras, sensors, and systems; correlates metadata; detects patterns; identifies deviations; and generates operational decisions based on defined policies. Its approach is cognitive because it doesn’t work on “isolated events,” but on context and sequence: it understands normality, recognizes anomalies, and prioritizes what matters.

HELIXâ„¢
FACIXâ„¢
​
Cognitive Facial Recognition
FACIX™ is SiteOne’s Cognitive Facial Recognition system: an advanced identity layer designed to turn the face into an operational criterion. It doesn’t stop at “identifying”; it verifies, prioritizes, and records with control-discipline, so the organization can operate with certainty: who the person is, whether they are authorized, which policy applies, what exception is detected, and what evidence is captured.
FACIX™ is built for real-world environments, not laboratory conditions. It operates in real time and is designed for scenarios where ambiguity is costly: high-throughput access points, critical areas, distributed facilities, 24/7 operations, visitors, vendors, and personnel with different permission levels. Instead of relying on shareable credentials or manual procedures, FACIX™ establishes an identity standard: verifiable presence, with traceability and control.

Identity with judgment: from “face” to control
FACIX™ doesn’t “look for faces” based on simple matches. It models identity with a cognitive approach: increasing certainty, reducing noise, and turning recognition into decisions. This enables two game-changing capabilities:
• Identity verification: confirm that a person matches an authorized profile, with rules by zone, schedule, criticality, and context.
• Alerting on identities of interest: detect relevant exceptions in real time (unauthorized, restricted, or policy-subject individuals) to trigger an immediate response.
Both layers operate under a higher principle: identity is not data; it is a decision. And every decision is documented.
​
​
AURIX GATEâ„¢
Cognitive Access Control
AURIX Gate™ is SiteOne’s Cognitive Access Control system: a solution designed to govern entries, exits, and interaction points (residents, visitors, vendors, deliveries, and operations) under defined operational policies, remote execution, and traceable evidence. Its function isn’t to “open a door”; it is to manage access as a critical process—with judgment, 24/7 continuity, and measurable control.
In today’s reality, access stopped being a physical point and became a flow. And any flow without governance becomes risk. That’s why AURIX Gate™ consolidates reception and control into a high-efficiency framework that integrates two-way communication, supervision, logging, and protocol-driven response—raising the standard of control without operational friction.
AURIX Gate™ enables a modern remote reception capable
of managing:
• Real-time visitor handling and verification
• Authorizations and door/gate releases under procedure
• Vendor and delivery management as a controlled flow
• Incident and emergency escalation per protocol
Everything is recorded as operational evidence: who requested, who authorized, under what criteria, and what the outcome was.
Command Center + HELIX™: stable on-site control
AURIX Gate™ is reinforced by your architecture: HELIX™ as the on-site core for immediate response and stability, and the 24/7 Command Center as the layer for disciplined protocol execution. The machine reduces friction and accelerates judgment; the human team coordinates, confirms, and closes each situation with complete traceability.
​

celestrixâ„¢
Intelligent Multi-Orbit Link
CELESTRIX™ – Intelligent Multi-Orbit Link is SiteOne’s managed
connectivity layer built for remote environments and operations
where availability is non-negotiable. More than “internet,”
CELESTRIX™delivers operational continuity, control, and technical
evidence: best-link selection, traffic prioritization (QoS) for
CCTV/voice/critical systems, proactive monitoring, incident
logging, and procedure-driven support. Its Essential, Pro, and
Ultra plans scale from “stable connectivity without complications”
to high availability with automatic failover, advanced telemetry,
SLA-backed support, and controlled change management, with
enterprise add-ons such as VPN/SD-WAN, network segmentation,
and cyber hygiene policies. In short, CELESTRIX™ keeps your
operation connected, measurable, and governable—even when
terrestrial networks fail.
​
CELESTRIX™ Essential: managed satellite connectivity with commissioning, essential monitoring, and standard support—ideal for remote sites needing stable service and reporting without complexity.
CELESTRIX™ Pro: adds continuity and performance—feasible redundancy, QoS to prioritize CCTV/voice/critical systems, expanded monitoring, and extended support—built for operations where downtime has real cost.
CELESTRIX™ Ultra: critical-operations grade—automatic failover, advanced telemetry with technical evidence, SLA-backed management/support, and controlled change management—made for 24/7 environments demanding maximum availability and traceability.
​

aegisrixâ„¢
Corporate Intelligence & Defense
AegisRIX™ is SiteOne’s Corporate Intelligence & Defense unit: a service designed to protect what truly sustains an organization—assets, operations, information, reputation, and continuity—when risk comes without warning, without a single dimension, and without a single actor.
In practice, the most damaging threats rarely appear as an isolated event. They tend to emerge as progressive deviations, operational inconsistencies, compromised decisions, improper access, collusion, internal fraud, information leakage, silent sabotage, extortion, or reputational deterioration. AegisRIX™ exists to reduce that uncertainty: it transforms corporate security into strategic defense, with a tactical mindset and critical-operations discipline. The result is not just a “diagnosis”; it is executive clarity with concrete actions and defensible evidence.
From perception to operational certainty
Many approaches rely on impressions: “it seems,” “there’s suspicion,” “probably.” AegisRIX™ operates differently: it builds certainty from verifiable signals. Where others see separate incidents, AegisRIX™ identifies patterns, relationships, and sequences. Because a threat is rarely a moment; it is usually sustained behavior with an operational footprint.
The company as a system: normality, deviation, and exposure
​
Every stable organization has a rhythm: flows, access, approvals, routes, schedules, operating habits, reasonable variations, and unwritten rules that sustain continuity. When a threat appears, it often disrupts that balance subtly: pattern shifts, repeated exceptions, atypical access, decisions that don’t add up, or movements that don’t explain their purpose.
AegisRIX™ applies advanced analytics to detect:
• Operational deviations (processes breaking without an apparent cause)
• Access deviations (who accesses what, when, from where, and with what pattern)
• Financial deviations (inconsistencies suggesting leakage, fraud, or manipulation)
• Relationship and collusion networks (recurrences, synchrony, and indirect indicators)
• Insider-threat behaviors (early signals of human risk)
• Exposure surface (what can break, how, and with what impact)
This is where AegisRIX™ differs from a conventional review: it doesn’t only evaluate controls—it evaluates operational reality.