Neurisense
Menu
01SERVICES

Four services. One outcome: deployable AI.

From conformity audit to continuous operations — each service ends with a document, a deployment, or both.

EU AI Act Compliance

Map your system against Annex IV, classify it under Article 6, and return a clause-mapped conformity gap report. The starting point for any AI under EU jurisdiction.

WHAT YOU GET
  1. 01Article 6 high-risk classification
  2. 02Annex IV technical-file audit
  3. 03Chapter III obligations mapping (Articles 9–15)
  4. 04Prioritised remediation roadmap
TYPICAL DURATION
3–5 weeks
WHAT WE HANDLE
We handle the regulatory mapping, the architectural diagnosis, and the translation between them.
Fig. 01 — Conformity pipeline
SystemClassifyMapRoadmap
Classification, mapping, gap analysis, roadmap — one linear engagement, one defensible file.

Sovereign AI Deployment

Rebuild your AI stack on EU-controlled infrastructure. Compatible with SecNumCloud-certified providers. Data, inference and logs stay on the continent.

WHAT YOU GET
  1. 01EU-hosted inference (Scaleway, OVHcloud, Clever Cloud)
  2. 02SecNumCloud-compatible architecture
  3. 03Data residency and transfer-impact assessment
  4. 04French-incorporated legal operator
TYPICAL DURATION
6–14 weeks
WHAT WE HANDLE
We handle the migration plan, the provider selection, and the sovereignty documentation.
Fig. 02 — Sovereign topology
ClientEdgeModelStore
Inference, storage, and logs resolve to EU-controlled operators — by architecture, not by policy.

Audit-Ready AI Engineering

Build or refactor the AI system so conformity is an architectural property. Retrieval with citations. Reasoning with traces. Verification with human oversight points.

WHAT YOU GET
  1. 01Retrieval pipeline with cited sources
  2. 02Eval harness with drift and accuracy metrics
  3. 03Human-in-the-loop oversight surfaces (Article 14)
  4. 04Annex IV technical file produced continuously
TYPICAL DURATION
10–24 weeks
WHAT WE HANDLE
We split retrieval, reasoning and verification. We document as we build. Nothing is retrofitted.
Fig. 03 — Audit-ready topology
InputRetrieveReasonVerifyOutput
Every output carries a trace: what was retrieved, what was reasoned, what was verified, what was escalated.

Continuous AI Operations

Once in production, the regulation, the system and the threat surface all keep moving. We keep the conformity posture current — monitoring, incidents, retraining, filings.

WHAT YOU GET
  1. 01Post-market monitoring (Article 72)
  2. 02Serious-incident reporting playbooks (Article 73)
  3. 03Eval re-runs on every retrain
  4. 04Quarterly conformity review
TYPICAL DURATION
Monthly
WHAT WE HANDLE
We keep the technical file live, the SLOs defensible, and the incident surface observable.
Fig. 04 — Operations loop
MonitorDetectDecideFileRetrain
Monitor, detect, decide, file — the activities that convert a compliant deployment into a durable one.

Not sure which service you need?

Every engagement starts with a readiness audit. It tells you which of the other three — if any — you actually need.