Sovereign AI
for Ports & Terminals

An introduction to the Prem product stack

Own Your Intelligence.

Prem builds sovereign AI infrastructure that keeps your data private — end-to-end encrypted, hardware-enforced, and post-quantum ready.

From trusted hardware to agentic AI applications, every layer of the Prem stack is designed so that you own every bit of your intelligence.

4 Integrated products
in the stack
E2E End-to-end
encryption
PQ Post-quantum
cryptography

Four Products. One Sovereign Loop.

Each layer depends on the one below. The customer owns every layer.

4

Layer 3 — Application

Prem Fluso + VEREX

Agentic AI workspace. Verifiable reasoning. Self-improving agents, institutional memory, autonomous fine-tuning.

3

Layer 2.5 — Voice

Prem Sotto

Sovereign voice-to-text. <200ms latency. Zero retention. E2E encrypted. Self-hostable.

2

Layer 2 — Developer Interface

Prem API

OpenAI-compatible API with E2E encryption, hardware attestation, post-quantum cryptography. Drop-in replacement.

1

Layer 1 — Foundation

Prem Compute

Hardware-attested AI infrastructure. AMD SEV-SNP, Intel TDX, NVIDIA Confidential Computing. On-prem, air-gapped, or hybrid.

Sovereign intelligence requires a full stack built in a specific order.

Trusted hardware at the base. Private inference in the middle. An application layer that compounds intelligence on top.

The compounding engine runs for the customer. Every workflow, decision, and correction feeds a proprietary intelligence asset owned entirely by the deploying organisation.

On-Premise Air-Gapped Hybrid Post-Quantum

Prem Compute

Hardware-attested AI infrastructure you can trust.

Trusted Hardware

AMD SEV-SNP, Intel TDX, NVIDIA Confidential Computing — processing inside tamper-proof enclaves.

Deploy Anywhere

On-premise, air-gapped, or hybrid. Runs on your infrastructure, in your data center, under your control.

Hardware Attestation

Cryptographic proof that your data runs where you expect — verifiable at every layer.

Prem API

OpenAI-compatible. End-to-end encrypted. Drop-in replacement.

Standard AI API Prem API
Who can see your data? Provider, staff, cloud host Only you
Server compromised? Your data is exposed Attacker sees encrypted bytes
How is privacy verified? Trust the privacy policy Hardware-signed cryptographic proof
Quantum-resistant? Vulnerable in the future Protected today
API compatibility OpenAI-compatible Same interface — no rewrite
Encrypted in Transit  ·  Encrypted at Rest  ·  Encrypted in Use

Prem Sotto

Sovereign voice-to-text. Powered by Deepgram Nova-3.

<200ms

Latency

Zero

Data retention

E2E

Encryption

Self-hostable

Deployment

Use Cases

Real-time transcription of operational communications
Voice commands for terminal equipment interfaces
Training session transcription & knowledge capture
Multilingual support for global port teams
Incident reporting via voice — instant, searchable logs

Prem Fluso + VEREX

Agentic AI workspace with verifiable reasoning.

Agentic AI

Autonomous agents that execute complex workflows — research, analysis, document generation — with full traceability.

VEREX Reasoning

Verifiable, explainable reasoning engine. Every decision produces an auditable evidence chain — no black boxes.

Institutional Memory

Every interaction, workflow, and correction compounds into a proprietary knowledge asset owned by your organization.

Autonomous Fine-tuning

Self-improving models that learn from your corrections and adapt to your domain over time.

Intelligence you own
is intelligence that compounds.

Data Sovereignty

Your operational data, trade secrets, and strategic plans never leave your control. Processing happens in hardware-sealed environments.

Regulatory Confidence

GDPR, nFADP, SOC 2, and emerging AI regulations demand verifiable data protection — not promises.

Strategic Asset

Every AI interaction builds your proprietary intelligence. This becomes a defensible competitive moat over time.

Your infrastructure. Your rules.

On-Premise

Run the full stack inside your data center. No external network dependency. Full physical control.

Air-Gapped

Operate completely disconnected from the internet. Ideal for defense, critical infrastructure, and high-security facilities.

Hybrid

Sensitive workloads on-prem. Less critical tasks in the cloud. Orchestrated as one stack.

Post-Quantum

Quantum-resistant cryptography at every layer. Protected against harvest-now-decrypt-later threats.

Where could AI
make a difference?

Starting points for our conversation — not a prescription.

Terminal Operations Intelligence

AI agents that analyze TOS data, optimize yard planning, and predict bottlenecks — with verifiable reasoning.

Workforce Knowledge Retention

Capture decades of operator expertise into an institutional memory that trains the next generation.

Digital Twin & Simulation

Private AI that powers digital twin platforms — scenario planning without exposing operational data.

Automated Compliance & Reporting

Self-improving agents that draft reports, audit trails, and regulatory submissions.

Voice-Enabled Operations

Real-time, multilingual voice-to-text for crane operators, planners, and ground crews.

24/7 Intelligent Support

AI agents trained on your TOS documentation — instant answers for your global helpdesk.

Let's talk about
what matters to you.

What are your biggest operational challenges today?

Where does data privacy matter most in your workflows?

What would you want an AI agent to handle for your team?

Marco Guerriero — Chief Growth & Operations Officer, Prem AI
marco.guerriero@premai.io

Emanuele Carpanzano — Chief Science Officer, Prem AI
emanuele@premai.io

premai.io  ·  docs.prem.io  ·  sotto.prem.io