Reveal
and Foresee
Threats

Reveal & Foresee Threats

At Aeteos™, our deep commitment to threat intelligence is driven by a core mission: to empower the heroes on the front lines, law enforcement agencies, military forces, forensic experts, and NGOs, with sovereign, ethical, and human-centered tools that transform sensitive textual data into clear, actionable intelligence.

Beyond high-stakes security, Percipion™ also enables organizations across all sectors to significantly improve decision-making and operational efficiency. It allows them to build their own sovereign cognitive platform and modernize a wide range of critical use cases.

Percipion™ delivers real-time, fully sovereign textual intelligence, helping security teams uncover hidden risks and anticipate emerging threats every day.

Whatever your field, Percipion™ accelerates information analysis, enhances decision-making, and complements your teams’ expertise. Operating on your own data and remaining completely under your control, it provides reliable insights even in areas where human expertise is limited, freeing your teams to focus on higher-value activities.

Years of R&D

Software Services

Knowledge Domains

Cognitive Warfare

Percipion detects weak semantic signals, psychological manipulation tactics, disinformation narratives and conspiracy theories in real time on social media and messaging platforms. It assesses whether content is harmful, triggers early warnings and supports swift reasoned counter-responses, a vital pillar of cognitive resilience and democratic defense in Europe.

Proactive Threat Detection

Leveraging advanced weak-signal detection, psychological profiling and contextual knowledge schemas, Percipion anticipates emerging threats, grooming, scams, bullying, radicalization, hate speech, terrorism planning and hybrid attacks, before they materialize. It tracks subtle shifts in semantics, emotion and intent across public and internal sources, delivering early warnings and powering total resilience strategies.

Insider Threats

Percipion identifies grooming, coercion, psychological manipulation, and gradual disloyalty through deep analysis of internal communications. It detects rising negativity, emotional drift, and suspicious behavioral patterns, allowing security teams to intervene early and prevent data leaks, sabotage, or espionage from within.

Industrial Espionage

Percipion monitors internal-supplier communications for signs of data exfiltration, IP theft, and foreign espionage. It uncovers subtle linguistic indicators and psychological coercion patterns, while its advanced document comparison capabilities help protect Europe’s strategic technologies and industrial sovereignty.

Forensic Analysis

In post-incident or judicial contexts, Percipion rapidly processes content of seized devices and communications to reveal evidence of corruption, bribery, fraud, ransomware negotiations, or crime. Its explainable symbolic analysis and evidence report delivers court-admissible, traceable inferences in hours instead of weeks.

Workforce Morale

Percipion detects early signs of disengagement, frustration, or external recruitment pressure in employee communications. In critical sectors (defense, aerospace, energy), early identification of attrition risks protects sensitive knowledge, reduces insider threats, and maintains operational continuity.

Psychosocial Risks Assessment

Percipion analyses internal communications to identify burnout, bore-out, brown-out, and psychosocial risks. By tracking emotional valence and psychological drift at scale, it helps organizations prevent mental health crises, reduce absenteeism, and strengthen workforce resilience, a key component of total organizational resilience.

Supply Chain Risk Monitoring

Percipion monitors supplier and partner communications for early signs of compromise, coercion, bribery, or sabotage intent. It detects psychological pressure, anomalous phrasing, and weak signals of supply-chain attacks, protecting Europe’s critical infrastructure from hidden vulnerabilities.

Crisis Monitoring

Percipion continuously tracks brand perception, competitor narratives, and emerging crises across social media and news. It identifies coordinated attacks, disinformation targeting reputation, and sentiment shifts, enabling rapid crisis response and strategic communication decisions.

Psychological Matrix

Percipion builds dynamic psychological profiles based on affective states, primary/secondary emotions, and human needs. It delivers deep behavioural inferences for threat assessment, radicalization detection, grooming identification, and personnel risk evaluation.

Content Moderation

Percipion provides precise, context-aware moderation of internal and external content, detecting hate speech, violent extremism, grooming, and other inappropriate content with high accuracy and full explainability, essential for platforms, institutions, and organizations operating in regulated environments.

Total resilience

Total resilience is the capacity of a system, organization, or society to prepare for shocks, resist their immediate impact, respond effectively to contain and mitigate damage, and recover swiftly while emerging stronger and better adapted.

It combines proactive anticipation, robust defense mechanisms, agile crisis management, and adaptive learning to maintain core functions and values under severe stress, whether from cyberattacks, disinformation, natural disasters, or geopolitical shocks, ensuring continuity and long-term viability.

Percipion™ acquire textual content, represent it within its internal memory, searches for related engrams across contextually connected knowledge schemas, and links those that are relevant to their parent symbolic object in order to understand, better evaluate threats and act with anticipation.

Prepare

Monitor continuously, identify patterns & flag actors

Resist

Evaluate threat level (survey, warn or alert)

Respond

Extract evidences to support & accelerate human intervention

Recover

Assess contextual semantic noise to uncover overlooked patterns and build long-term resilience (bias-free processing)

Beyond threat intelligence, Percipion™ supports ...

HR and talent teams by analyzing employee communications and feedback to detect low morale, uncover root causes of attrition, identify psychosocial risks, and evaluate motivation, job satisfaction, and transformation initiatives, helping organizations proactively safeguard workforce well-being and retention.

Marketing & sales, protecting brand reputation, uncovers purchase motivations and behavioral profiles, analyzes campaigns and competition in real time, and identifies ambassadors vs. critics, helping organizations prevent client loss, outmaneuver competitors, and drive more targeted, resilient growth.

Customer experience and support, analyzing interactions in real time to identify dissatisfied customers early, monitor complaints, evaluate overall satisfaction, optimize ticket routing, and decode tone/emotions, helping teams reduce churn, boost resolution speed, and deliver more empathetic, proactive service.

A short example : how Percipion supports forensics

Percipion can empower digital forensic analysts to assess in real time and in a fine manner information available in natural language on seized devices. It be daily used to find digital evidences, better understand criminal’s behaviour and contribute to the constitution of the digital identity of the person questioned.

Like Max who is in charge of hunting down pedocriminals. He arrested an individual suspected of child sexual abuse and remanded him in custody for 48 hours. Right now, he is racing against time. He gained a warrant on one chat group, and once the data are extracted and available, he will have to assess it quickly to find relevant illegal content. And today, Max has 373 pages of plain text to read. Just 30 hours are left to find evidences. To properly complete all this work, it would take him 5 days. If he would use Percipion, the same work would be done under 1 minute.

Messages to assess

pages of text

Done under one minute

It is as if this platform employs assistants capable of reading text, understanding, and grasping its nuances, identifying words and associating them with concepts, extracting meaning from text through precise contextual analysis, anticipating, reasoning, and drawing conclusions, producing reports, communicating, and taking action.

Mark

Founder & CEO, Aeteos

Your benefits

Powered by sovereign symbolic cognitive computing, Percipion™ excels at real-time processing of sensitive textual data, unlocking hidden inferences and strategic foresight.

In threat intelligence, forensics, and cognitive defense, it reveals concealed risks while anticipating emerging threats through weak-signal monitoring, accelerating decisions across high-stakes use cases.

Percipion™ delivers explainable expertise where human limits apply, enabling teams to focus on action and resilience while safeguarding sensitive information offline and ethically.

– EU AI Act compliant
– 100% sovereign & developed in France by Aeteos™
– No foreign dependencies or third-party components
– No access, no reuse, no storage of your sensitive data
– Offline real-time processing, zero cloud exposure
– Hosted wherever you choose, on-prem or private cloud infrastructure
– Transparent & fully explainable execution, no black-box risks
– Ethical by design & human-centered
– Knowledge based, bias-resistant, no discriminatory outcomes
– Eco-responsible with a low energy footprint
– Instant value, no learning phase, ready to deliver results from day one
– Superior detection of weak signals
– Advanced psychological & valency analysis
– Precise interpretation of emotions, intent, emojis & Algospeak

Percipion™, our secure Symbolic Cognitive Platform, has been designed using our latest innovations. These innovations are not used to promote our technological advances, but to improve the usability and analytical capabilities of our solutions to enhance professionals’ capabilities.

Béatrice

Founder & CSO, Aeteos

Data security

The security of our customers’ data is a priority.

To ensure its confidentiality and integrity, Percipion™ uses a proprietary encryption service to protect against cyberattacks. Once encrypted, whether at rest or in transit, your data can only be read and used by authorised parties.

Based on none of the known standardised algorithms, this solution provides a form of ‘obscurity’ that will make your data less attractive (HNDL attacks) and undermine cryptanalysis attempts, even post-quantum ones, particularly attacks based on predictable patterns. Therefore, you can dedicate a storage space on your platform for sensitive corporate data.

For customers who wish to do so, our ACrypt™ encryption solution is also available as a standalone software product.

Our knowledge schemas

Percipion™ uses a data structure similar to human long-term memory (the VirtualBrain™), where information is represented symbolically and categorised, enabling the machine to contextualize and process information. Its current version has 1,110 prototypical and abstract objects linked to 33,716 properties.

Psychology

Affective states, primary and secondary emotions, human needs, factors of job satisfaction and dissatisfaction, social skills (soft skills), factors contributing to work-related illnesses (boreout, brownout, burnout), customer experience analysis, and specific business context related knowledge schemas.

Protection

Corruption, conflicts of interest, misinformation, conspiracy theories, scams, coercive control tactics, psychological manipulation tactics (grooming), harassment, self-harm, sex trafficking and related practices, drug trafficking and related uses, trafficking in counterfeit goods and forgeries, trafficking in weapons and explosives, hate speech and hate crimes, ultra-violent content, pedocrimes, porncrimes and paraphilia, ableism, masculinism, and accelerationism.

Technical corner

Percipion™ enables companies to create their own microservices or cognitive computing solutions. It can smoothly be integrated into existing solutions or automated workflows.

At Aeteos™, we are committed to the quality of our software products. We have created all our libraries ourselves, without any dependence on other technologies. We have also produced dedicated applications to generate source code and check for programming errors. This constant pursuit of excellence and obsession with correcting even the smallest details make our software products safe and reliable.

Hans

Lead Software Engineer, Aeteos

Standalone

A proprietary software assistant that does not use any third-party components

Hosting

It can be installed on your workstation or infrastructure in minutes

Files

Can analyse large files (tested with 28 million characters)

Offline use

Highly secure, can be used without a network connection

Eco-friendly

Low footprint, energy consumption of 2.37Wh (2 400 times less energy than an LLM)

Trust

Knowledge-based, cannot be poisoned (secure)

Parallel execution

Can be executed in parallel on multiple cores for faster computation

Performance

Up to 61 files per second and 55 times faster than some of our competitors

Percipion offers optional integration with Nextcloud to simplify uploading files for analysis and retrieving results, while also providing advanced features such as alerts via Nextcloud Talk. This graphical interface also facilitates connections with orchestrators like Make or Zapier. Alternatively, without using Nextcloud, the Percipion platform can be accessed directly via secure protocols such as SFTP or SSH, enabling seamless integration into various cloud ecosystems (Salesforce, OpenAI, Microsoft Office & Dynamics 365, SAP, Oracle NetSuite & Cloud ERP, HubSpot, Zoho CRM & One, Box, Google Workspace, Microsoft OneDrive, Dropbox Business, ServiceNow, Workday, etc.), workflow automation, and optimal interoperability tailored to your specific needs.

Ready to build a safer Europe together?

We would love to hear from you. Whether you want to learn more about Percipion, request a demonstration, or explore how our human-centered cognitive solutions can support your organization, our team is here to help.

White paper

Please click on the button below to display and download a white paper about what we do

Question

Please click on the button below to send us your question via eMail

Demo

Please click on the button below to explain your needs and request a demonstration

We have chosen not to include an online form on this page in order to prioritise your security and privacy. Our top priority is to avoid any automatic collection and storage of sensitive personal information (such as your email address, name, or message) on our servers. This significantly reduces cybersecurity risks, such as data leaks or cyberattacks, and ensures our compliance with strict data protection standards (GDPR in Europe). Instead, we invite you to contact us directly by email. This simpler, more human approach allows us to handle your requests in a personalised manner, with a tailored response.