Bastion is available for deployment and technical evaluation in regulated industries under engagement. Here is what a serious evaluation looks like and how to get started.
We do not ship anonymous trial accounts. Bastion is deployed into your infrastructure - your VPC, your PKI, your policy files. A real evaluation means your team has access to the actual artifacts: the IRONLAW doctrine, the deployment runbooks, and a working instance you can verify independently. That is what engagement-based evaluation gives you.
Bastion is designed to be evaluated against claims, not taken on faith. Each of these is verifiable during an evaluation engagement:
/readiness endpoint exposes the active policy hash and load age - you can confirm the policy file on disk matches what the gate is evaluating against. Test structured refusals by submitting directives that violate your policy rules and confirming the PolicyRefusal response includes the correct ruleId and correlationId.Reach out to [email protected] or book a discovery call below. We start with a conversation about your regulatory environment, existing architecture, and what governed agent operations look like in your context - then scope the evaluation to what your team needs to make a real decision.
Understand the evidence architecture first
The audit trail page covers what Bastion records, how the hash-chain works, and what offline verification produces.
Ready to start an evaluation?
Book a discovery call to scope a deployment in your infrastructure.
Was this page helpful?