Account for every person and every asset — even off the grid.
For armed forces, defence primes, and the wider public sector. We design and deliver personnel-accountability, mustering, asset and controlled-item chain-of-custody, and contractor-control programmes for secure sites — engineered to run on air-gapped or on-premise infrastructure with sovereign data. Hardware-agnostic across UWB, BLE, active RFID, and RAIN RFID. We are vendor-neutral and security-led, not tied to any platform.
What we keep seeing on secure sites.
Mustering is manual and slow
When an alarm sounds, accountability still depends on a roll-call against a clipboard. Minutes pass before anyone can confirm everyone is out and safe. Incident response needs a verified headcount in seconds, with an audit trail.
Chain-of-custody has gaps
High-value and controlled items move between stores, workshops, and the field on paper sign-out sheets. Reconciliation is periodic, manual, and error-prone — exactly the kind of gap an audit or inspection exposes.
Contractor & visitor control is blunt
Knowing who is on site, which zones they are cleared for, and whether they have left is handled by a gate log and trust. On a secure estate, "trust" is not an access-control policy.
The use cases that consistently pay back.
Personnel accountability & mustering
Every person on site accounted for at the muster point in seconds, time-stamped and audit-trailed for the incident report.
Asset & equipment tracking
Vehicles, plant, comms kit, and high-value equipment located across the estate, with utilisation and dwell analytics.
Controlled-item chain-of-custody
Sealed, audit-grade accountability for controlled and sensitive items from store to field and back — who, what, when, where.
Tool control & FOD prevention
Tool-for-tool accountability in workshops and on the flight line, with foreign-object-debris controls for aviation and MRO units.
Contractor, visitor & zone access
Live on-site register, geofenced clearance zones, lone-worker safety, and automatic exit reconciliation.
Air-gapped & on-prem deployment
The full stack engineered to run with no internet dependency, on sovereign infrastructure, with role-based access and full logging.
Hardware & software ecosystem
Ubisense · Zebra · Impinj · Kontakt.io · Quuppa · active-RFID mustering systems · ruggedised and intrinsically-safe tag families — selected for your security posture and environment, never by price book.
Where we plug in
SAP S/4HANA · IFS · Maximo · ServiceNow · asset-management and logistics systems · access-control and PSIM platforms · incident-management and HR rostering — on-premise where the network demands it.
What good looks like at site level.
What we design and document to
IEC 62443 (OT/IT security) · ISO/IEC 27001 (information security) · data sovereignty and on-premise / air-gapped operation · least-privilege, role-based access and full audit logging · encrypted at rest and in transit · alignment to your accreditation and national security frameworks. We work under mutual NDA and your site's security clearance and vetting requirements from day one.
Defence & public sector — where the payback shows up.
Rapid mustering & accountability
Verified personnel headcount at the muster point in under 60 seconds, fully time-stamped and audit-trailed for the incident report.
Controlled-item chain-of-custody
A sealed, audit-grade trail for controlled and high-value items from secure store to field and back.
Contractor & zone control
A live on-site register with geofenced clearance zones and automatic exit reconciliation across the estate.
We needed accountability and chain-of-custody on an air-gapped network — no cloud, no exceptions. TRACIO delivered automated mustering and asset accountability that cut audit time by around 90%. It succeeded because they designed to our security constraints from the start rather than retrofitting a commercial platform.Programme Lead · defence systems integrator · confidentialAnonymised at the client’s request. Reference available on request.