JarvisCore Enterprise¶
JarvisCore is open source under Apache 2.0. You can self-host it, run it on any cloud, and operate it entirely on your own infrastructure — forever, for free.
JarvisCore Enterprise is a managed deployment service. Prescott Data runs, operates, and supports the full JarvisCore stack on your behalf — the same way MongoDB Atlas runs MongoDB or Redis Cloud runs Redis. Your team builds agent systems; we handle the infrastructure that runs them.
OSS vs. Enterprise¶
| JarvisCore OSS | JarvisCore Enterprise | |
|---|---|---|
| Who runs it | You | Prescott Data |
| Deployment | Self-managed | Fully managed |
| Licensing | Apache 2.0 — free | Commercial agreement |
| Uptime SLA | — | 99.9% guaranteed |
| Support | Community (GitHub Issues) | Dedicated engineering + SLA |
| Security hardening | Framework defaults | Enterprise-grade (see below) |
| Data isolation | You configure it | Enforced at the infrastructure layer |
| Backup & DR | You configure it | Automated, cross-region, RPO < 1h |
| Agent governance | None | Policy engine, rate limits, allow/deny lists |
| LLM flexibility | Any provider via config | Bring-your-own LLM, on-prem model support |
| Professional services | — | Onboarding, architecture review, migrations |
What Enterprise Covers¶
Managed Deployment¶
Prescott Data provisions, configures, and operates the complete JarvisCore stack — agents, mesh, Redis, blob storage, and observability — on your chosen cloud (AWS, Azure, GCP) or in your private network.
- Zero-ops onboarding: your team connects to a running system, not a setup guide
- Automated patching, dependency upgrades, and rollbacks
- Capacity planning and horizontal scaling handled on your behalf
- Private networking, VPC peering, and on-premises deployment options
- Kubernetes-native deployment with Helm charts and an operator
Typical deployment topology:
Your Infrastructure (VPC / Private Network)
┌───────────────────────────────────────────────────────────┐
│ │
│ ┌─────────────┐ ┌─────────────┐ ┌─────────────┐ │
│ │ Agent Mesh │ │ Workflow │ │ Nexus OSS │ │
│ │ (K8s Pods) │←───│ Engine │ │ (Auth GW) │ │
│ └──────┬──────┘ └─────────────┘ └─────────────┘ │
│ │ │
│ ┌──────▼──────┐ ┌─────────────┐ ┌─────────────┐ │
│ │ Redis │ │ Blob │ │ SIEM / │ │
│ │ (HA Pair) │ │ Storage │ │ Observ. │ │
│ └─────────────┘ └─────────────┘ └─────────────┘ │
│ │
│ Managed by Prescott Data · Your data never leaves │
└───────────────────────────────────────────────────────────┘
Uptime SLA¶
Enterprise deployments carry a 99.9% monthly uptime SLA (≤ 43.8 minutes unplanned downtime per month), with the following terms:
| Metric | Commitment |
|---|---|
| Monthly uptime | ≥ 99.9% |
| Measurement window | Calendar month, per region |
| SLA credit | Pro-rated service credit if missed |
| Exclusions | Scheduled maintenance (pre-announced ≥ 48h), force majeure, customer-caused outages |
| Status page | Provided — real-time and historical incident data |
Full SLA terms are included in the commercial agreement.
Backup & Disaster Recovery¶
| Parameter | Value |
|---|---|
| Recovery Point Objective (RPO) | < 1 hour |
| Recovery Time Objective (RTO) | < 4 hours |
| Backup frequency | Continuous (Redis AOF + hourly snapshots) |
| Backup retention | 30 days rolling |
| Cross-region replication | Available on Professional and Enterprise plans |
| Failover | Automated — no manual intervention required |
Backups are encrypted with your tenant key and stored in isolated, access-controlled storage separate from the primary deployment.
Security & Authentication¶
- SSO via SAML 2.0 or OIDC, federated against your existing identity provider
- SCIM provisioning and automatic deprovisioning
- Role-based access control (RBAC) across agents, tools, data sources, and workflows
- Secrets management via HashiCorp Vault, AWS KMS, Azure Key Vault, or GCP KMS
- Encryption at rest and in transit; bring-your-own-key (BYOK) option
- Audit-grade event logs, tamper-evident, exportable to your SIEM
Tenant Isolation¶
Enterprise enforces strict separation at every layer for multi-tenant deployments serving multiple business units or customers.
- Workspace-level partitioning: each tenant's agents, workflows, and memory are fully separated
- Network isolation: no shared data paths between tenants
- Per-tenant encryption keys
- Redis namespaces and blob storage prefixes enforced at the platform layer — not in application code
- Verified isolation documentation available as part of the security review pack
Agent Governance & Policy Controls¶
Enterprise adds a platform-level policy engine that sits above your agent code. This gives platform and security teams controls that don't require modifying agent implementations.
- Rate limiting — per-agent, per-workflow, and per-tenant request caps with configurable burst allowances
- Capability allow/deny lists — restrict which tools, APIs, and data sources each agent role can access
- LLM provider policy — enforce which LLM providers and model versions agents may use; block unapproved models
- Output filtering — platform-level PII redaction and content policy enforcement on all agent outputs before they leave the mesh
- Workflow approval gates — require human sign-off before specific workflow steps execute in production
- Cost guardrails — per-workspace LLM token budget with configurable alerting and hard caps
LLM Flexibility¶
Enterprise does not lock you into a single AI provider. You bring the models your team has approved.
- Use any LLM via the existing JarvisCore provider config (OpenAI, Anthropic, Mistral, Cohere, and others)
- Bring-your-own-model — connect to on-premises or VPC-hosted models (Ollama, vLLM, Azure OpenAI private endpoint)
- Per-agent model routing — different agent roles can use different models and providers
- Model fallback chains — if a primary provider is unavailable, agents fail over to a configured backup automatically
- All LLM calls are logged, attributable, and subject to your governance policy
Data Privacy & Compliance¶
- PII detection and redaction on agent inputs, outputs, and memory writes
- Field-level encryption for sensitive workflow data
- Configurable data residency: choose the region where data is stored and processed
- Retention policies and deletion workflows, including right-to-delete (GDPR Art. 17)
- Full provenance metadata on all memory reads and writes
- Compliance documentation available under NDA: SOC 2 Type II report, architecture overview, threat model
Observability & Tracing¶
- OpenTelemetry export — metrics, traces, and logs — to your existing stack (Datadog, Grafana, Splunk, and others)
- SIEM-ready audit streams with tamper-evident event records
- Long-retention, searchable workflow traces with replay tooling
- Prometheus metrics aggregated across all nodes and exportable to your monitoring platform
Professional Services¶
Beyond the managed platform, Prescott Data offers scoped professional services for teams that need hands-on help:
| Service | Description |
|---|---|
| Onboarding programme | Guided migration from OSS to Enterprise: infra hand-off, agent review, integration setup (2–4 weeks) |
| Architecture review | A senior JarvisCore engineer reviews your agent design, workflow DAGs, and memory strategy and provides a written recommendations report |
| Custom integrations | Prescott Data builds and maintains integrations with internal systems (data warehouses, internal APIs, observability stacks) |
| Training | Hands-on workshops for your engineering team covering agent design patterns, workflow modelling, and production operations |
Professional services are scoped and priced separately from the managed platform subscription.
Support Tiers¶
| Plan | Response time | Coverage | Included |
|---|---|---|---|
| Standard | Next business day | Business hours | GitHub + email, documentation |
| Professional | 4 hours | 24 × 5 | + Named engineer, Slack/Teams channel |
| Enterprise | 1 hour | 24 × 7 × 365 | + Quarterly architecture reviews, on-call escalation |
All paid plans include a named support engineer and a dedicated Slack or Teams channel.
Pricing Model¶
JarvisCore Enterprise is priced on a subscription basis — a flat annual fee based on deployment size (number of active agents and workflow volume), not per-seat or per-API-call. This means your costs are predictable as you scale agent usage, and you don't get billed every time an agent completes a workflow step.
Pricing is scoped per engagement. Factors include:
- Number of active agent nodes
- Monthly workflow execution volume
- Cloud region and redundancy requirements
- Support tier
- Professional services scope
[!NOTE] Contact us with your cloud provider preference, approximate agent count, and any compliance requirements. We'll prepare a scoped proposal within 2 business days.
Who Enterprise Is For¶
Enterprise is the right choice when any of these apply:
- You don't want to run infrastructure. Your team should build agent systems, not operate Redis clusters, manage blob storage, or debug Kubernetes rollouts.
- You have compliance requirements. SOC 2, GDPR, HIPAA, or internal data governance policies require audited, isolated, documented deployments that pass security review.
- You need a guaranteed uptime SLA. Your agent workflows are in the critical path of production systems and cannot tolerate unplanned downtime.
- You operate at multi-tenant scale. Multiple business units or customers need strict data separation without the cost of running completely separate deployments.
- You need a support SLA. When a production incident happens, you need a guaranteed response time and an engineer who knows your deployment — not a GitHub issue queue.
- You need model and vendor governance. Your organisation requires policy controls over which LLMs agents can call, with auditable records of every call.
How Teams Typically Adopt¶
- Build on JarvisCore OSS. Every framework primitive — agents, memory, orchestration, HITL, Nexus — is available and unrestricted. Validate your architecture on your own infrastructure first.
- Move to Enterprise when operational overhead, compliance requirements, or uptime SLAs become the constraint — not the framework's capabilities.
- Onboarding typically takes 1–2 weeks from a signed agreement to a fully running managed environment.
Security Review Pack¶
The security review pack is available to qualified enterprise evaluators under NDA. It includes:
- Architecture overview and data flow diagrams
- Threat model and mitigations
- SOC 2 Type II report (latest period)
- Penetration test summary (latest annual test)
- Encryption key management documentation
- Shared responsibility model
Request the pack via the email below and reference "security review" in your subject line.
Get In Touch¶
Email: jarviscore-enterprise@prescottdata.io
Include your cloud provider preference, approximate agent count, and any specific compliance framework requirements in your first message — it helps us prepare the right materials and route your enquiry to the right team.
We respond to all enterprise enquiries within one business day.