SYS · MyOfficeOS / 2026.04 NODE · PEXEOS-ZRH-01 UPLINK · STABLE 12 ms
LAT +47.37° LON +8.54° ZOOM 1.00×
Drag to rotate · scroll to navigate
myofficeOS v2.4
Sign in Start free
Live · Beta 2026.04 Powered by Pexeos

An OS with a brain. For your entire company.

MyOfficeOS observes, decides and executes across CRM, Finance, HR, Legal and Operations — in one canonical source. Your team approves what matters, the brain handles the rest.

Start 14 days free
14toolsIn daily use
per knowledge worker
2.5hWasted searching
per person, per day
1OSReplaces them all
with one brain
01 · Brain

The brain. Always on.

Autonomous agents observe every signal across your business, decide what to do, and execute — within the rules and rings you define. You stay in control of the irreversible. The brain handles the rest.

  • Observe

    Every email, ticket, doc, payment, and event lands in the canonical source.

  • Decide

    Agents reason, plan, and propose actions — always with citations and audit log.

  • Execute

    Run workflows, send invoices, draft contracts, route approvals — on your behalf.

  • Audit

    Every decision is sealed, timestamped, and replayable — forensically verifiable.

02 · Inside

A look inside.

One canonical interface for your operators. The brain proposes — your team approves. Every action carries citations, an audit trail, and rollback.

  • One inbox. Every signal across CRM, Finance, HR, Legal & Ops becomes a proposal — or an executed action.
  • Always cited. Every brain action ships with sources, rule checks, and a one-click audit trail.
  • You own the irreversible. Rings define what auto-runs, what asks. Switch a ring with one toggle.
02 · System

Three layers. One lifecycle.

From the first private note to a public release — three layers cover the entire knowledge cycle.

01Core · Manage

Capture.Your private knowledge vault.

Everything lives in a single canonical source — UID-based, locally encrypted, cryptographically sealable.

  • UID-based objects
  • Hierarchical categorization
  • Local-first architecture
  • Full-text search & versions
  • SHA-256 sealing
02Connect · Share

Collaborate.Four-ring permissions.

Granular sharing for teams and organizations — with a continuous audit trail and cross-entity linking.

  • Team workspaces & projects
  • Real-time collaboration
  • Granular share controls
  • Graph view of all links
  • Secure data rooms
03Cast · Publish

Distribute.One source, many channels.

Turn internal knowledge into public content with one click. Multi-channel distribution with a feedback loop.

  • One-click publishing
  • Multi-channel distribution
  • Audience analytics
  • Performance feedback
  • Built-in SEO
03 · Modules

Every operation. One platform.

Ten modules, one canonical source. Each one inherits permissions, audit, and the brain — automatically.

CRM & Sales

Pipeline, deals, contacts, comms.

Finance

Invoicing, ledger, forecasts.

Project Hub

Tasks, milestones, timelines.

HR Suite

People, payroll, onboarding.

Legal Cockpit

Cases, contracts, sealing, court export.

Data Room

Due diligence, NDAs, sealed exports.

Executive OS

KPIs, board reports, P&L.

AI Brain

Agents, classification, retrieval.

Automation

Workflows, triggers, n8n-grade.

Publishing

Multi-channel cast with analytics.

04 · Architecture

Six principles. No compromise.

Architectural differentiators — no other tool combines them. This isn't a feature comparison, it's a different foundation.

02 · ONE

Canonical source

One truth, many views. Edit once, updated everywhere.

03 · 4R

Four-ring access

Private, Group, Org, Public — concentric permissions.

04 · LF

Local-first

Data on your device. Offline-capable, sync when ready.

05 · GRAPH

Dependency graph

Visualize how information connects.

06 · LOOP

Performance feedback

What lands flows back to the knowledge base.

05 · Security

Enterprise-grade. Forensically verifiable.

Three layered defenses — encryption, cryptographic sealing, compliance & audit. Built in, not bolted on.

Layer 01 · Encryption

Encrypted at rest & in transit

AES-256 for stored data, TLS 1.3 for every transfer. Hardware-backed encryption on compatible devices.

  • AES-256 for stored data
  • TLS 1.3 on the wire
  • Local-first — sovereignty stays
  • Zero-knowledge for sensitive objects
Layer 02 · Sealing

Cryptographic sealing

Seal any document with SHA-256 hash verification. Once sealed, any tampering is instantly detectable.

  • SHA-256 hash per object
  • Tamper-evident
  • Time-stamped seals
  • Court-admissible
Layer 03 · Compliance

GDPR compliance & audit trail

Full compliance with immutable audit logs, retention policies, and the right to be forgotten.

  • Immutable audit trail
  • GDPR-compliant retention
  • Role-based access control
  • SOC 2 Type II-ready
06 · Pricing

Transparent. Scalable.

Start free. Scale when you need it. No hidden fees, no vendor lock-in. Switch tiers any time.

A · Trial CHF0 14 days · full access
  • Full Core access
  • Up to 500 objects
  • Local-first storage
  • Desktop app
  • Full-text search
Try for free No credit card
C · Team CHF19 per seat / month
  • Everything in Pro, plus:
  • Team workspaces
  • Role-based access
  • Shared graphs
  • Admin & audit log
  • Secure data rooms
Start team Min. 3 seats
D · Enterprise Custom tailored
  • Everything in Team, plus:
  • SSO & SAML 2.0
  • On-premise
  • Custom SLA
  • Account manager
  • API & webhooks
Talk to sales Custom onboarding
→ Start

Run your company on autopilot.

Every operation, one canonical source. Four rings of permissions. Three layers of security. An always-on brain that observes, decides, and executes — so you can lead.

Swiss Made GDPR SOC 2 Powered by Pexeos