Permissioned network deployment
Hyperledger Besu, Polygon Edge, or Ethereum-based permissioned chains. KYC-gated participation, validator-set governance, audit-grade tracing, and integration with existing identity infrastructure.
Blockchain & Web3 · MESH
Permissioned chain deployments, oracle bridges to public networks, audit-grade tracing, and compliance-aware on-chain integration for institutional and regulated clients. Engineered against the procurement reality, not the conference-stage demo.
The problem
The pattern that produces it: a procurement-driven blockchain mandate uncoupled from a real use case; a permissioned-chain deployment that nobody integrates with the existing back-office; a 'consortium' that's two members and a steering committee; a public-chain integration scoped as 'phase 2' that never ships; and an audit-trail pattern that produces JSON nobody can validate against the data warehouse. Enterprise blockchain fails when it's solving for a procurement mandate rather than for a workload.
We engage on enterprise blockchain only where there's a real workload and the trust model genuinely benefits from on-chain settlement, immutable audit, or cryptographically-verifiable provenance. We design with explicit answers to 'why on-chain', integrate to existing back-offices through documented contracts, deploy with the regulatory frame in mind, and stand up the bridge architecture to public networks where secondary liquidity matters. We will tell you when 'put it on chain' is the wrong answer.
Where it ships
Specific applications we’ve built and operated. Not speculative — every example below is grounded in a real shipped engagement.
Hyperledger Besu, Polygon Edge, or Ethereum-based permissioned chains. KYC-gated participation, validator-set governance, audit-grade tracing, and integration with existing identity infrastructure.
$120M
issuance year one
Asset issuance on a permissioned chain with audited bridge to Ethereum mainnet for secondary liquidity. ERC-3643-aligned compliance, jurisdictional access controls, and explicit liquidity-management strategy.
Cryptographic provenance tracking for high-value goods, with off-chain ERP integration, oracle bridges to public networks for verification, and audit reporting that survives regulator inquiry.
Multi-party workflows where on-chain consensus genuinely improves trust (trade finance, multi-bank reconciliation). We tell you when off-chain message-passing achieves the same outcome at lower complexity.
On-chain audit trails for regulated workflows, integrated with existing audit and reporting systems through documented contracts. Privacy-preserving where the regulatory frame requires it.
How we engage
Each phase has a deliverable, an owner, and an acceptance criterion. Not slogans — operating rules.
Discovery starts with that question. We model the workload, identify the trust assumptions, and assess whether on-chain settlement / audit / provenance genuinely improves the operational reality. Some engagements end with 'use a database with a Merkle tree' — and we say so.
Permissioned vs public, EVM vs non-EVM, validator topology, identity model, audit-trail format, and the integration story to existing back-offices. Architecture lands in writing including explicit answers to procurement and InfoSec questions.
Compliance-aware contracts (ERC-3643, ERC-1404 patterns where applicable), KYC-gated participation, sanctioned-address screening, jurisdictional access controls, and the audit-trail tooling that integrates with existing reporting.
Bridge monitoring, validator-set health, audit-trail reconciliation, and the runbook for incident response. Many engagements continue under Managed Services for ongoing operations and quarterly architectural review.
Capabilities
Stack
Selected work
Common questions
Most of the time, no. We tell you in discovery. Blockchain genuinely improves the operational reality when (1) settlement requires multi-party consensus without a trusted intermediary, (2) immutable audit trails serve a regulatory or legal frame, (3) cryptographic provenance is the use case (high-value goods, art, credentials), or (4) tokenization unlocks secondary liquidity. Most other use cases are better served by a database with a Merkle tree.
Permissioned for use cases where participants are known, regulatory frame requires gated access, and confidential data flows on-chain. Public for use cases where secondary liquidity, censorship resistance, or open ecosystem participation matters. Many institutional setups use both — issuance on a permissioned chain with bridge to a public chain for liquidity.
Besu for use cases where EVM compatibility, public-chain interoperability, or smart-contract portability matters. Fabric for use cases where channel privacy, MSP-based identity, and the IBM / Oracle support ecosystem are critical. The architecture decision lands in writing during discovery — including explicit tradeoffs.
ERC-3643 (T-REX) is our default for compliant token issuance — KYC-gated transfers integrated with the issuer's compliance partner, jurisdictional access controls, sanctioned-address screening, and audit-trail tooling that reports to the regulator's expectations. We've shipped this for institutional issuers in financial services and real estate.
Yes — and that's where most enterprise blockchain projects fail. We design back-office integration as primary scope, not phase 2. SAP, Oracle, Dynamics 365, and custom ERP integrations through documented APIs. Treasury, audit, reporting, and identity systems integrated through the same documented contracts.
Architecture and 'why on-chain' analysis: 4–8 weeks, $80K–$250K. Permissioned-chain deployment with back-office integration: 6–12 months, $800K–$2.5M. Tokenization platform with bridge: $1M–$3M. Multi-party consortium programs: $2M–$6M+. External audit fees pass through. Managed Services: $50K–$200K monthly retainer. Brackets published honestly so visitors self-qualify before the first call.
Within Blockchain & Web3
Talk to us
A senior engineer plus the MESH department lead joins the first call. No discovery gauntlet, no junior reps.