BUILT BY DEFENSE INTELLIGENCE PROFESSIONALS

A single email
cost Boeing
$2,500,000,000

Every organization believes it won't happen to them. Goldman Sachs believed it. Volkswagen believed it. Enron believed it. Praelyx intercepts legal, regulatory, and reputational risk in outbound communications before the message reaches anyone. Semantic analysis by litigation-grade AI. Not keyword matching. Not another DLP tool. The question is not whether your employees will send a liability. The question is whether you will catch it before opposing counsel does.

$65,423,000,000 Documented damages
from email evidence
95 Court cases
analyzed
0 Bytes of email
content stored
Limited early access -- 5 organizations onboarded per month. Current cohort: 3 of 5 slots filled. Each deployment requires custom integration and dedicated threat calibration.
CASE FILES // CLASSIFIED

95 documented court cases.
$65,423,000,000 in damages.
All from emails that should
never have been sent.

PHARMACEUTICAL
$8,300,000,000
Purdue Pharma / OxyContin
Internal emails proved executives knew OxyContin was addictive and deliberately misled doctors. "We knew." Two words. Eight billion three hundred million dollars.
EXHIBIT A: "We've known since [DATE]"
AUTOMOTIVE
$30,000,000,000
Volkswagen / Dieselgate
Engineer emails describing defeat device strategy. "Risk of discovery" and "survive a finding of intentional manipulation" became criminal evidence. Executive imprisonment followed.
EXHIBIT A: "risk of discovery"
AEROSPACE
$2,500,000,000
Boeing / 737 MAX
"Designed by clowns, supervised by monkeys." Internal emails mocking regulators and concealing MCAS flaws. Congressional hearings. Criminal settlement. 346 lives.
EXHIBIT A: "designed by clowns"
FINANCIAL SERVICES
$2,900,000,000
Goldman Sachs / 1MDB
Personal email used to evade compliance monitoring. "Widows and orphans" showed contempt for clients. Regulatory fines across four jurisdictions. Criminal charges.
EXHIBIT A: "widows and orphans"
TECHNOLOGY
$3,400,000,000
Epic v. Apple
Internal emails revealed anti-competitive intent. Private communications became primary evidence in landmark antitrust proceedings that reshaped the industry.
EXHIBIT A: "cut off their air supply"
ENERGY
$7,200,000,000
Enron
"Torch the files." "Something funky." "House of cards." Trader emails celebrating California energy manipulation. Complete corporate collapse. Arthur Andersen destroyed.
EXHIBIT A: "house of cards"
OFF-CHANNEL COMMS
$2,000,000,000+
SEC/CFTC Enforcement Wave
Since 2021, the SEC and CFTC have fined 100+ financial firms over $2,000,000,000 for moving business discussions to WhatsApp, Signal, and personal email. The fines are still accelerating.
ENFORCEMENT: 100+ firms sanctioned
SEMICONDUCTOR
$415,000,000
Silicon Valley No-Poach
"Don't want to create a paper trail." "Terminated within the hour." The attempt to avoid documentation was itself the documentation. The email was the evidence.
EXHIBIT A: "don't create a paper trail"
Total documented damages from email evidence analyzed by Praelyx
$65,423,000,000
Every one of these started with a single employee pressing send.
COST OF INACTION // DECLASSIFIED

What happens when you decide
your outbound email is "fine"

These organizations had compliance teams. They had legal departments. They had email archiving. They did not have pre-send risk interception. This is what it cost them.

Volkswagen / Dieselgate
$14,700,000,000
Engineer emails describing defeat device strategy became criminal evidence. Executive imprisonment followed.
Wells Fargo / Fake Accounts
$3,000,000,000
Internal emails revealed executives knew about fraudulent account practices. CEO resigned. Criminal referrals issued.
Goldman Sachs / 1MDB
$2,900,000,000
Personal email used to evade compliance monitoring. Regulatory fines across four jurisdictions. Criminal charges filed.
Boeing / 737 MAX
$2,500,000,000
"Designed by clowns, supervised by monkeys." Internal emails became congressional evidence. 346 lives lost.

Every one of these companies had a compliance department. None of them had Praelyx.

Request Access Before Your Next Email Becomes Exhibit A
THREAT INTELLIGENCE BRIEFING

What Praelyx intercepts
before it becomes evidence

29 risk detection patterns derived from forensic analysis of 95 documented court cases and $65,423,000,000 in damages. Semantic analysis, not regex. Praelyx understands what an email means, not just what data it contains. Every pattern maps to a real case where a real email became Exhibit A.

Critical
01

Privilege Waiver

Attorney-client privilege destroyed by forwarding protected content, copying external parties, or discussing legal strategy outside protected channels. Semsysco v. GlobalFoundries: one forwarded email waived privilege for the entire thread.

"As our lawyers advised us last week, we should settle before trial."
Critical
02

Discoverable Admissions

Statements acknowledging fault, admitting policy violations, or conceding liability. "We knew." "Between us." "Off the record." These become Exhibit A. In Purdue Pharma, two words proved $8,300,000,000 in corporate knowledge of harm.

"We probably should have caught that in QA, but we shipped it anyway."
High
03

Contractual Exposure

Implied commitments, unofficial guarantees, delivery promises, and scope expansions made casually that courts have held as legally binding. A single "we guarantee" creates enforceable obligations regardless of formal contract terms.

"We guarantee this will be resolved by end of week."
High
04

Regulatory Violations

HIPAA PHI exposure ($16,000,000 -- Anthem). SEC MNPI violations (minutes between receipt and trading -- SEC v. Panuwat). FINRA off-channel communications ($2,000,000,000+ in fines since 2021). Industry-specific compliance landmines.

"I'd recommend buying before the announcement."
High
05

Evidence Destruction

"Delete after reading." "Don't put this in writing." "This conversation never happened." In Silicon Valley No-Poach ($415,000,000), the instruction to avoid creating a paper trail was itself the paper trail that proved conspiracy.

"Let's take this offline -- text me on my personal."
Medium
06

Tone Escalation

Language construed as threatening, discriminatory, or harassing. Predatory competitive language. In United States v. Microsoft, "cut off their air supply" was exhibit A in the antitrust case. $200,000,000,000+ market cap impact.

"If you don't comply by Friday, there will be consequences."

The Praelyx Guarantee

If Praelyx fails to flag a risk pattern that leads to documented legal liability, we will cover your legal costs up to $1,000,000. No other email tool on the market makes this commitment. We built our detection on 95 court cases and $65,423,000,000 in documented damages. We know what we catch because we studied what everyone else missed.

SECURITY ARCHITECTURE // TOP SECRET

Quantum-proof encryption.
Zero-knowledge by design.
Not by policy.

Designed by professionals who built systems for environments where data exposure means national security failure. We sit between your people and their send button. Our architecture was built from day one around a single principle: even we cannot read your email. Technical controls make data exposure impossible, not merely improbable.

QUANTUM-RESISTANT ZERO-KNOWLEDGE DATA FLOW
EMAIL CLIENT
Content tokenized locally
ML-KEM-768 + TLS 1.3
PRAELYX ENGINE
Ephemeral analysis
ZERO CONTENT STORED
Attested + chain-linked
RISK VERDICT
Score + signed attestation
01

Post-Quantum Key Encapsulation

All API communication wrapped in ML-KEM-768 (CRYSTALS-Kyber, NIST FIPS 203) quantum-resistant envelope. Even if an adversary records encrypted traffic today, quantum computers of the future cannot decrypt it. Hybrid X25519 + ML-KEM for defense-in-depth.

NIST FIPS 203 // ML-KEM-768 // AES-256-GCM
02

Client-Side Content Tokenization

Before email content reaches our API, sensitive entities (names, numbers, addresses, account numbers) are replaced with typed tokens: [PERSON_1], [AMOUNT_1], [DATE_1]. The API analyzes tokenized text. Original values never leave your device. Ever.

NER-based entity detection // Typed placeholders // Zero PII transmission
03

Cryptographic Attestation

Every analysis returns a signed HMAC-SHA256 proof that: (a) analysis was performed, (b) no content was stored, (c) no content was logged, (d) content was deleted, with exact deletion timestamp. You verify this independently. No trust required.

HMAC-SHA256 // Independent verification // Tamper-evident
04

Split-Key Architecture

Dual-key encryption: you hold one key, Praelyx holds another. Both are required to decrypt any analysis context. If either party revokes their key, all data encrypted with it becomes permanently, mathematically inaccessible. Not deleted. Destroyed.

HKDF-SHA256 // Dual custody // Irrevocable destruction
05

Canary Hash Chain

Every analysis generates a cryptographic hash chained to the previous one. If any analysis is tampered with, secretly stored, or modified after the fact, the chain breaks and the tampering is mathematically detectable. An append-only transparency ledger for every interaction.

SHA-256 chain // Append-only // Publicly verifiable
06

Zero Message Storage

No email content stored at rest. No content in logs. No content used for training. Analysis happens in ephemeral memory and is wiped immediately after risk scoring. We architected it so nobody can read your emails. Including us. Contractual commitment.

Ephemeral processing // No persistence // No model training
SOC 2 Type II in progress
Quantum-resistant encryption
Cryptographic attestation
Zero data retention
GDPR-ready architecture
Split-key custody
PROVENANCE

Built by defense intelligence professionals.

Co-founded by a Ph.D. specializing in counterespionage screening, with experience across the Department of Defense and major defense contractors. The same analytical rigor that protects national security now protects your communications.

Risk detection informed by 95 documented court cases and $65,423,000,000 in damages. Every detection pattern in Praelyx traces back to a real case where a real email destroyed a real company. This is not theoretical. It is forensic.

Background DoD Counterespionage Screening
Education Ph.D. (Defense/Intelligence)
Clearance Level Defense Contractor Cleared
Analysis Basis 95 Cases / $65.4B Documented
OPERATIONAL DEPLOYMENT

Three steps. Zero friction.
Invisible when not needed.

01

Compose

Your team writes in Outlook, Gmail, or Apple Mail. Nothing changes about their workflow. No new apps. No behavior modification required.

02

Analyze

Praelyx tokenizes content locally, then runs multi-pass semantic analysis through quantum-encrypted channels. 29 risk patterns. Sub-2-second response. Content never stored.

03

Resolve

Risk detected: the sender sees specific, actionable guidance with suggested revisions. No risk: nothing happens. Invisible when not needed. Signed attestation confirms zero retention.

COMPETITIVE INTELLIGENCE

We don't replace your security stack.
We complete it.

Layer Direction What It Catches
Inbound SecurityProofpoint, Mimecast Incoming Phishing, malware, spoofing, spam
Data Loss PreventionPurview, Symantec Outgoing (pattern) SSNs, credit card numbers, classified data labels
Compliance ArchivingGlobal Relay, Smarsh Post-send Records everything after the fact. Forensic, not preventive.
Praelyx Outgoing (semantic) Implied promises, regulatory language, privilege breaches, discoverable admissions, tone escalation. Quantum-encrypted. Zero storage.

Proofpoint catches phishing. Purview catches SSNs leaving the building. Praelyx catches your VP admitting fault to opposing counsel, wrapped in quantum-proof encryption, with a signed cryptographic attestation that the content was never stored.

SECTOR ANALYSIS

If your people send external email,
you have outbound risk

Law Firms

Privilege waiver, inadvertent disclosure, client confidentiality, communication with represented parties.

Top risk: Privilege waiver via accidental CC

Financial Services

Forward-looking statements, MNPI signals, unauthorized investment advice, FINRA violations, off-channel communications.

Benchmark: Goldman Sachs, $2,900,000,000

Healthcare

HIPAA violations, patient data in email, treatment discussions outside secure channels, research confidentiality breaches.

Benchmark: Anthem HIPAA, $16,000,000

Insurance

Coverage commitments, bad faith indicators, claims handling language, adjuster communications that create implied obligations.

Top risk: Implied coverage commitment

Technology

Anti-competitive communications, product liability admissions, IP discussions, regulatory compliance across jurisdictions.

Benchmark: Epic v. Apple, $3,400,000,000
RESTRICTED ACCESS // 5 ORGANIZATIONS PER MONTH

Request Classified Access to Praelyx

Access is restricted. We onboard 5 organizations per month, each requiring custom threat calibration, dedicated integration support, and security architecture review. Submissions are reviewed by our team within 48 hours. Priority is given to organizations in high-liability sectors with 500+ email users.

No credit card. No commitment. All form data encrypted via TLS 1.3 and purged after processing. Responses within 48 hours. Your submission is reviewed by a human, not routed to a sales queue.

Clearance request received.

Your submission has been logged, encrypted, and queued for review. We onboard 5 organizations per month with dedicated threat calibration. A member of our team will contact you within 48 hours with next steps.