Aeterna Pricing.
Proof of concept.
Tailored pricing.
✔ Evaluation and early stage innovation
✔ Proposal for a data solution architecture based on your use case
✔ Working implementation based on the use case
✔ Proof of concept based on your data on your own infrastructure or a public cloud
✔ Delivered by data solutions experts
✔ and more…
Build & deployment.
Tailored pricing.
✔ Development & deployment services for Aeterna application on any cloud or on-prem infrastructure
✔ Dedicated Data Solution Architect and technical manager
✔ Design workshop which includes: solution service architecture design document
✔ Handover & deployment guide
✔ and more…
Training services.
Tailored pricing.
✔ Training sessions by domain experts on the targeted Aeterna solutions
✔ Gain Aeterna solutions expertise
✔ In-person training on how to operate Aeterna solutions
✔ In-person training on how to optimise your deployment
✔ Includes best practices
✔ and more…
Get in touch.
Explore use-cases.
Seeing is believing. With a focus on business enablement learn how we are solving a complex AI ecosystem consisting of multiple stakeholders that poses diverse challenges.
Read All Use Cases
Frequently asked questions.
Covers AI hardware guidance and sizing, Simplified AI networking, Hyper-converged or Converged, Containerized control plane, Block and AI object storage, Regulatory compliance, Encryption in flight and at rest, EPA model tuning, Layer–7 load balancer, Secrets management, and more…
Aeterna platform configuration and installation/configuration of model tooling, registration and monitoring via Aeterna SaaS or on-prem.
Configuration and connection and Group Policy Object (GPO) Integration.
Additional third-party products can be installed and automatically configured depending on the requirements.
CIS Benchmark configuration and support.
Model packages encrypted deployment and local MlOps & LLM package repository.
Workstations configured to mount Aeterna CIFS file systems from a secured source.
Installed software audit, Custom firewall enablement, Security policy enforcement, Anti-virus/anti-malware solution support.
Third party encryption support.