Foundation Package

Fast start. Standard integrations. No heavy lift.

The Foundation Package is perfect for teams who want to get x2i running quickly with minimal effort. You get our standard integrations and ready-to-use agents. You can begin with monitoring and insights immediately, then train agents over time as your operation evolves.

Best for:

  • small and medium size companies with simple supply chain

  • companies wanting quick time-to-value

  • organizations that want to train the system themselves later

  • operations using mainstream WMS/TMS/ERP tools

What’s included:

  • Standard API integrations (WMS/TMS/ERP/LMS)

  • Pre-trained models & agents

  • Enterprise Memory starter layer

  • Monitoring + recommendations

  • Optional automation when ready

Time to live:
2–4 weeks

Performance Package

Automated efficiency

Deeper intelligence. Tailored agents. Your knowledge encoded from day one.

The Performance Package is designed for teams that want more sophisticated automation, custom agent behaviors, or support integrating in-house tools. We work with you to capture rules, SOPs, tribal knowledge, and operational constraints - building a richer Enterprise Memory from day one.

Best for:

  • medium and large companies, having more complex supply chain

  • organizations with in-house or legacy systems

  • clients who want us to help train the model

What’s included:

  • All Foundation features

  • Integration with internal systems or custom tools

  • Customized agent behaviors

  • Deep Enterprise Memory configuration

  • Advanced automation enablement

Time to live:
4–6 weeks

Scalable Infrastructure

Your systems. Your infrastructure. Your rules. x2i adapts.

Your systems. Your infrastructure. Your rules. x2i adapts.

Every warehouse is different. That’s why x2i can run in our cloud, your cloud, or on-prem. No matter which option you choose, you get the same Fulfilment Operations engine, the same agent intelligence, and the same performance - without changing your existing IT setup.

x2i Infrastructure

Fastest to deploy. Fully managed. Zero overhead. x2i hosts and manages the entire platform in our secure cloud environment.

x2i Infrastructure

Fastest to deploy. Fully managed. Zero overhead. x2i hosts and manages the entire platform in our secure cloud environment.

x2i Infrastructure

Fastest to deploy. Fully managed. Zero overhead. x2i hosts and manages the entire platform in our secure cloud environment.

Your Infrastructure

Your cloud infrastructure. Our intelligence engine. x2i runs directly inside your AWS, Azure, or GCP environment - following your security controls, policies, and network rules.

Your Infrastructure

Your cloud infrastructure. Our intelligence engine. x2i runs directly inside your AWS, Azure, or GCP environment - following your security controls, policies, and network rules.

Your Infrastructure

Your cloud infrastructure. Our intelligence engine. x2i runs directly inside your AWS, Azure, or GCP environment - following your security controls, policies, and network rules.

Enterprise Grade Security

Security You Can Trust. Transparency You Can Verify.

x2i is built with enterprise security at its core. Our Agentic AI operates inside verified data boundaries, follows SOC 2–aligned controls, and never accesses data or systems without explicit permissions.

Governed System Access

Agents interact with your ERP, WMS, and TMS only through permission-controlled APIs - nothing outside your rules or boundaries.

Governed System Access

Agents interact with your ERP, WMS, and TMS only through permission-controlled APIs - nothing outside your rules or boundaries.

Governed System Access

Agents interact with your ERP, WMS, and TMS only through permission-controlled APIs - nothing outside your rules or boundaries.

Governed System Access

Agents interact with your ERP, WMS, and TMS only through permission-controlled APIs - nothing outside your rules or boundaries.

Private Enterprise Memory

Your workflows, rules, and tribal knowledge are stored in an isolated memory layer that’s private to your organization and never shared.

Private Enterprise Memory

Your workflows, rules, and tribal knowledge are stored in an isolated memory layer that’s private to your organization and never shared.

Private Enterprise Memory

Your workflows, rules, and tribal knowledge are stored in an isolated memory layer that’s private to your organization and never shared.

Private Enterprise Memory

Your workflows, rules, and tribal knowledge are stored in an isolated memory layer that’s private to your organization and never shared.

Transparent Reasoning

Agents reason only over your real operational data - never the public internet - ensuring traceable, auditable decisions.

Transparent Reasoning

Agents reason only over your real operational data - never the public internet - ensuring traceable, auditable decisions.

Transparent Reasoning

Agents reason only over your real operational data - never the public internet - ensuring traceable, auditable decisions.

Transparent Reasoning

Agents reason only over your real operational data - never the public internet - ensuring traceable, auditable decisions.

SOC 2 | ISO27001 Controls

Encryption, monitoring, access control, and audit logging are built into our platform from day one. Our data management and access processes are aligned with SOC 2 and ISO 27001 requirements.

SOC 2 | ISO27001 Controls

Encryption, monitoring, access control, and audit logging are built into our platform from day one. Our data management and access processes are aligned with SOC 2 and ISO 27001 requirements.

SOC 2 | ISO27001 Controls

Encryption, monitoring, access control, and audit logging are built into our platform from day one. Our data management and access processes are aligned with SOC 2 and ISO 27001 requirements.

SOC 2 | ISO27001 Controls

Encryption, monitoring, access control, and audit logging are built into our platform from day one. Our data management and access processes are aligned with SOC 2 and ISO 27001 requirements.