The Only Trust-Native Technology for AI-Based Application Development
A purpose-built stack where authorization is language primitives, and security and auditablity are ensured by design.
The NOUMENA stack
Four layers, one coherent model. Each layer builds on the guarantees of the layer below. Choose the products you need and use them together or independently.
Auth, Observability, Scaling
Blockchain Adapter, HTTP Connector, Mail Connector
Transactions, Persistence, Audit, APIs
Protocols, Parties, Permissions, State Machines
Why NOUMENA
Security, compliance, and correctness. Structural guarantees by design.
| Traditional approach | NOUMENA approach |
|---|---|
| Authorization scattered across services | Compiler-enforced permissions: if it compiles, the permission model is correct |
| Manual state management, partial updates | Transactional execution: atomic operations, no inconsistent states |
| Audit trails bolted on after the fact | Automatic audit logging: every action captured to a tamper-proof trail |
| Security reviews as archeological expeditions | Security as grammar: parties and permissions are language primitives |
| APIs drift from business logic | Generated APIs: REST endpoints, OpenAPI specs, and TypeScript clients from your protocols |
NPL and Runtime
Deterministic language plus secure execution engine. The foundation layer.
NPL (Noumena Protocol Language) is a deterministic, domain-specific language where parties, permissions, and protocols are first-class constructs. The Runtime executes NPL code with transactional guarantees.
Authorization is not a library. It is grammar. Define who can do what directly in your protocol definitions. The compiler verifies your permission model; the runtime enforces it.
Parties and permissions
Authorization is grammar, not library code. Define who can do what directly in your protocol definitions.
Finite state machines
Model workflows as explicit states and transitions. No hidden states, no impossible transitions.
Transactional execution
Atomic state changes. Either everything succeeds or nothing changes.
Automatic persistence
Protocol instances stored with full version history. No ORM, no migrations required.
@api to REST endpoints
Annotate protocols and get production-ready APIs with OpenAPI specs and TypeScript clients.
Complete audit trail
Every permission check, every state change, logged automatically.
Code example
@api protocol[issuer, holder] SimpleToken(var balance: Number) { permission[issuer] mint(amount: Number) { balance = balance + amount } permission[holder] transfer(to: Party, amount: Number) requires balance >= amount { balance = balance - amount } permission[issuer] burn(amount: Number) requires balance >= amount { balance = balance - amount } }
What you get: Compile-time verification that only issuer can mint/burn. Runtime enforcement of balance checks. Automatic audit trail. Generated REST API with proper authorization.
Best for: Complex multi-party workflows, high-stakes transactions, regulated environments requiring fine-grained access control and complete audit trails.
NOUMENA Cloud
Managed infrastructure. Deploy in seconds, scale with confidence.
A fully managed hosting environment for NPL applications. Banking-grade infrastructure without the DevOps overhead.
Get instant access and use IntelliJ, VSCode, Codespaces, or Cursor to start building. The platform handles authentication, deployment, API generation, and monitoring automatically.
Secure authentication
Keycloak-based identity management, SSO, MFA out of the box
One-click deployment
Push to deploy from your repository
Enterprise security
Encryption at rest/transit, network isolation, regular pen testing
Monitoring & ops
Prometheus metrics, structured logging, health endpoints
Automatic backups
Daily backups included, on-demand for Pro tier
GDPR tooling
Built-in anonymization and data removal capabilities
Quick start
# Install NPL CLI brew install NoumenaDigital/tools/npl # Initialize project npl init --project-dir my-project # Local development # Edit with your favourite IDE # Deploy locally npl deploy
NOUMENA Adapters
Connect NPL to external systems. HTTP APIs, email, and blockchain networks.
Adapters extend NPL protocols beyond their own runtime. Call external REST APIs, send transactional emails, or integrate with blockchain networks and payment rails. Each adapter is fully integrated with NPL's permission model and audit trail.
HTTP Connector
Connect NPL protocols to any REST API. Trigger webhooks, fetch data, and orchestrate third-party services directly from your protocol logic.
- ✓Outbound REST calls from NPL actions
- ✓Configurable authentication (API keys, OAuth, mTLS)
- ✓Automatic retry and circuit-breaker patterns
- ✓Request/response mapping to NPL types
Mail Connector
Send transactional and notification emails from NPL protocols via any SMTP server. Template-driven, audit-logged, and fully integrated with the permission model.
- ✓SMTP integration with TLS support
- ✓Template-based email composition
- ✓Attachment support from protocol data
- ✓Delivery tracking in audit trail
NOUMENA Pulse
Blockchain Adapter
Digital asset middleware connecting NPL applications to blockchain networks, payment systems, and financial infrastructure. One interface for multiple chains.
- ✓Multichain support (EVM, Stellar, Polkadot, Cardano, Near)
- ✓Wallet abstraction and key management
- ✓Lifecycle services: issuance, redemption, transfer, settlement
- ✓KYC/compliance hooks and regulatory alignment
How the products work together
Choose the combination that fits your use case.
| Use Case | Products Needed |
|---|---|
| Secure enterprise software | NPL & Runtime + NOUMENA Cloud |
| Regulated stablecoin | NPL & Runtime + NOUMENA Cloud + NOUMENA Pulse (Blockchain Adapter) |
| RWA tokenization platform | NPL & Runtime + NOUMENA Cloud + NOUMENA Pulse (Blockchain Adapter) |
| Self-hosted secure backend | NPL & Runtime (on-premise) |
| Blockchain integration for existing app | NOUMENA Pulse (Blockchain Adapter, standalone) |
Security and compliance architecture
Defense in depth. Security guarantees at every layer.
Defence in depth
Language Level
Compiler-enforced permissions. If it compiles, authorization is correct.
Runtime Level
Permission checks on every action. Transactional isolation.
Infrastructure Level
Network isolation, encryption (transit + rest), secret management.
Operations Level
Tamper-proof audit logging, monitoring, alerting, incident response.
Compliance capabilities
Deployment options
Choose the deployment model that fits your requirements.
Managed
NOUMENA Cloud
Best for: Startups, PoCs, teams without DevOps
Hybrid
Best of both
Best for: Data sovereignty + managed operations
On-Premise
Full control
Best for: Regulated institutions, max control
On-premise requirements: Kubernetes 1.24+ or Docker, PostgreSQL 14+, 4+ CPU cores, 8+ GB RAM
Getting started
For developers
Get up and running in minutes.
# Install brew install NoumenaDigital/tools/npl # Initialize npl init --project-dir my-project # Run locally cd my-project && docker compose up
For architects and technical leaders
Evaluate the platform for your use case.
- Technical deep dive: 60-minute session with our engineering team
- Guided POC: Build a proof-of-concept with your specific use case in 1 day
- Architecture review: Discover how NOUMENA technology fits your stack
Trusted by leading organizations










Blockchain partners








Implementation & technology partners









Ready to build secure and compliant applications with AI?
Start building in NOUMENA Cloud today or talk to our team about your specific requirements.
