A refinery with 4,000 pressure vessels under API 510 is a fundamentally different engagement than an offshore platform with 600 tagged items under DNV. We scope every deployment to the actual program — starting with a conversation.
Start a ConversationA refinery with 4,000 pressure vessels and a NORSOK Z-008 compliance obligation is a fundamentally different engagement than a chemical plant running 300 assets under ISO 31000. Publishing a single number for both would either overcharge one or underserve the other.
Every Reliatic deployment is scoped to the actual program: asset count, facility count, regulatory regime, damage mechanism library, and required integrations. You pay for what your program needs, not a generic tier.
These factors drive scope. Scope drives pricing.
Three program types — each scoped to where your integrity program is today and where it needs to go.
Single facility · Proof of value
Scoped for organizations evaluating whether a governed integrity program replaces their current spreadsheet-and-email workflow. Covers one facility with a defined asset set.
Full facility · Active integrity program
For operations teams running structured integrity programs with ongoing RBI, reliability analytics, and compliance reporting requirements.
Multi-facility · Mission-critical scale
For multi-facility operators with complex governance hierarchies, regulatory reporting obligations, and integration requirements into existing CMMS or ERP systems.
Regardless of which engagement level you choose, every Reliatic deployment includes these fundamentals.
Transparent pricing means knowing what you will not be charged for.
Add engineers, inspectors, and managers without per-seat pricing anxiety.
Your inspection data, thickness readings, and compliance records are included.
API access, webhook configuration, and CSV import/export are standard.
Moving from Pilot to Professional to Enterprise requires zero migration. Your data, configurations, and audit history carry over automatically.
From first conversation to live deployment — a structured engagement, not a self-serve checkout.
We understand your current integrity program, regulatory obligations, and the gap between where you are and where you need to be.
We configure a demo using your asset types, damage mechanisms, and governance hierarchy — not a generic walkthrough.
You run a time-boxed pilot on a defined asset set. We measure the value and identify the integration points before full commitment.
We scope the full engagement based on facility count, asset volume, and compliance requirements. Pricing reflects your program, not a seat count.
From contract signature to live governance events — a structured rollout, not a big bang.
We ingest your existing asset register, map your equipment hierarchy, and configure tagging conventions. Your data is validated, deduplicated, and loaded into the production tenant.
Your facility-specific damage mechanisms are mapped to the risk engine. RPN thresholds are calibrated to match your risk appetite and regulatory obligations — so governance events fire at the right severity level.
Inspectors, reliability engineers, and administrators receive hands-on training. Approval gates, escalation rules, and notification channels are configured to match your organizational hierarchy.
First governance events fire on live asset data. Risk scores are calculated, inspection intervals are generated, and the escalation engine is active. Your integrity program is now running on a governed platform.
We don't offer self-serve free trials. Instead, we run scoped pilot deployments with supported onboarding — which gives you a more accurate picture of what the platform does in your context than a free account on generic sample data.
Most pilots run 6–10 weeks from data import to first governance event. We configure the asset taxonomy, damage mechanism library, and RPN thresholds to your facility during onboarding.
Enterprise deployments include custom integration development scoped during discovery. We provide a REST API, outbound webhooks, and CSV/Excel import out of the box. For CMMS or ERP connectivity (SAP PM, IBM Maximo, etc.), we scope and deliver bespoke integration work as a professional services engagement.
Your data is yours. If you don't proceed after a pilot, we export everything in standard formats (CSV, JSON) and permanently delete your tenant data within 30 days of contract end.
Enterprise pricing is based on total program scope across all facilities. Multi-facility deployments typically benefit from shared asset taxonomy and compliance report infrastructure — which we factor into the proposal.
Most pilot deployments are live within 4-6 weeks from contract signature. We handle data migration from your existing spreadsheets or CMMS, configure your asset hierarchy and damage mechanism library, set up RPN thresholds, and train your inspection team. Full enterprise deployments with bespoke CMMS integration work typically take 8-12 weeks depending on scope.
Yes. Reliatic supports CSV and Excel bulk import with intelligent column mapping. You upload your asset register, inspection history, or risk assessment data and map columns to Reliatic fields using a visual interface. Validation rules flag data quality issues — duplicate tags, missing criticality scores, and malformed dates — before the import runs. For enterprise customers, we scope custom integration connectors as part of onboarding — contact us for details.
Reliatic natively supports API 580/581 (Risk-Based Inspection), ISO 31000 (Risk Management), IEC 60812 (FMEA Methodology), ISO 55000 (Asset Management), NORSOK Z-008 (Risk-Based Maintenance for offshore), and API 571 (Damage Mechanisms in refining). Every risk calculation and compliance report traces back to a published standard — no proprietary black boxes.
Completely. Every database query is scoped by tenant ID through PostgreSQL Row-Level Security — enforced at the database engine, not application code. Tenant A cannot read, write, or even detect Tenant B's asset data. The audit log is cryptographically hash-chained: database triggers reject any UPDATE or DELETE attempt on historical records. AES-256 encryption at rest, TLS 1.3 in transit.
Every deployment includes structured onboarding: platform walkthrough for administrators, hands-on workshops for inspectors and reliability engineers, and a reference library of short-form documentation. Enterprise customers get a dedicated success contact for ongoing training as their team grows or their program scope expands. We also offer periodic refresher sessions before turnaround seasons.
The pilot covers a single facility with a defined asset set. You get the full asset registry with hierarchy and tagging, FMEA risk matrix with S/O/D scoring, decision journals and governance inbox, basic inspection workflow and action tracking, data quality scoring, and supported onboarding with data migration assistance. The goal is to prove value on a real asset set before you commit to a full deployment.
A 30-minute discovery call covers your asset register size, regulatory environment, and current tooling gaps — enough to determine fit and outline a scoped deployment.