Smarter Intelligence. Clearer Decisions.

An intelligent case management platform that connects incidents, profiles, and operational activity; helping teams see patterns earlier, make faster decisions, and maintain confident oversight across complex environments.

Schedule a Demo
No items found.

Core Capabilities

Visual Link Analysis, Pattern Recognition and Clustering

Reveal meaningful relationships using visual graphs and intelligent clustering, to surface behaviors and patterns.

Case Management and Workflow

Structured case creation with timelines, comments, attachments, supervisor review, and exportable reports.

Profiles and Relationship Mapping

Rich profiles for people or entities with linked incidents, cases, and connections that reveal hidden networks.

Incidents and Signal Intake

Capture, review, and prioritize signals with dynamic forms, attachments, activity logs, and real-time notifications.

Search and Discovery

Search across cases, incidents, profiles, comments, attachments, and notifications; surfacing critical connections instantly.

No items found.

Differentiators

One Platform. Infinite Possibilities.

Faster Investigations

Reduce friction across intake, review, linking, and response for faster operational resolution.

Smarter Decisions

Search, link analysis, pattern recognition, and clustering help teams move beyond isolated events; revealing trends, recurring behaviors, and priority risks that deserve attention.

Scalable Across Any Operation

Flexible data structures, multilingual support, and multi-site capabilities grow with your organization.

High Security and Compliance

RBAC+, ABAC, full audit logs, encrypted cloud hosting, Zero Trust alignment, SSAE 18 SOC 2, PCI-DSS Level 1, CMMC.

Easy to Use. Easy to Configure.

A responsive interface and adaptable workflows let teams mold the system to their operation, not the other way around.

Use Cases

Use Cases That Fit Every Operational Environment

Operational Oversight and Accountability

Maintain visibility across teams, sites, and workflows.

  • Monitor cross-team activity
  • Track timelines and supervisor reviews
  • Identify bottlenecks
  • Maintain transparent accountability trails
  • Provide leadership with real-time status

Internal Risk and Behavioral Patterns

Reveal patterns across people, events, and operational signals.

  • Link related incidents, cases and profiles
  • Detect emerging behaviors through pattern recognition
  • Cluster related activity to reveal recurring issues
  • Visualize relationships across entities
  • Flag anomalies for follow-up

Security Operations and Coordination

Align teams through structured workflows and shared insight.

  • Centralize signals and actions
  • Comment and mention teammates
  • Share controlled summaries externally
  • Maintain evidence and attachment trails
  • Enable cross-shift continuity

Compliance and Audit Readiness

Create complete, defensible records for internal or external review.

  • Retain files with chain-of-custody
  • Export structured reports
  • Enforce role-based access
  • Maintain full audit logs
  • Standardize processes for review

Thought Leadership

Use Cases That Fit Every Operational Environment

The Quiet Ports Problem
Every signal counts but fragmented systems and manual steps slow response and blur accountability. Tapestrii ICM brings everything together in a secure, intelligent platform.
Download File

What Our Clients and
Partners Say

Discover why organizations trust ICM to power operational intelligence and transform fragmented data into actionable insight.

“In port investigations, the biggest challenge isn’t a lack of data, it’s that the data lives across disconnected systems. ICM by Tapestrii is a game changer as it allows investigators to connect to the various systems in a port, pull in data, review past incidents and alerts, view CCTV footage, and then connect that data to give analysts insight into internal conspiracies. This ability to unify and analyze data across multiple systems transforms fragmented information into connected intelligence, enabling investigators to identify patterns and coordinated threats across operations. It is a cutting-edge tool that any investigator would want at their disposal.”

James Kuykendall
Former DEA Assistant Regional Director with extensive Latin America operations experience, Maritime Security Consultant
View Insight

“We are very satisfied with Tapestrii. It has simplified several processes for searching and connecting security events, while also serving as a useful incident repository we review daily. The greatest benefit is that when I look up an entity or profile, I can immediately see every past event it was involved in.”

Terminal Investigator
LATAM
View Insight

“Our experience with Tapestrii has been positive. It has given us better organization and greater visibility into our processes, and helped us optimize our workflow, especially around centralizing information and tracking activities. Tapestrii has made everything better.”

Terminal Operations
LATAM
View Insight

Frequently Asked Questions

What problem(s) does ICM by Tapestrii solve?

ICM is an investigative case management platform purpose-built for port operators and HSE or security teams who need to consolidate fragmented incident, personnel, and intelligence data into a unified workflow.

Instead of relying on disconnected systems, spreadsheets, and informal communication, teams using ICM can investigate incidents, identify patterns, and maintain operational oversight from a single platform.

What is investigative case management for ports and terminals?

Investigative case management is the process of documenting incidents, collecting evidence, analyzing related entities, and coordinating investigations across teams.

ICM provides a structured system where incidents, people, organizations, and intelligence can be connected within a single case record. This creates a clear investigative timeline and audit trail purpose-built for port and terminal environments.

How is ICM by Tapestrii different from EHS or incident reporting tools?

EHS and incident reporting tools are built to log events and close compliance checklists. ICM is built for investigation and operational decision-making. The difference is structural, key differences include:

  • EHS tools capture what happened
    • ICM connects incidents, people, and intelligence across time to explain why it happened and what should follow.
  • Incident reporting tools produce static records
    • ICM builds linked investigative timelines across events and individuals.
  • Compliance platforms support checklist workflows.
    • ICM supports structured case investigations with evidence, entities, and decision history.
How is ICM by Tapestrii different from law enforcement or intelligence platforms?

Traditional investigative platforms are often complex, expensive, and built for trained intelligence analysts. They carry the complexity, cost, and configuration overhead that comes with that design assumption.

ICM is designed for operational teams: safety managers, HSE leaders, and security personnel who need to run structured investigations as part of daily operations, not as a specialized function. The platform supports the same investigative rigor without requiring analyst training or enterprise implementation cycles.

What types of data can ICM by Tapestrii ingest?

ICM can ingest and organize multiple operational data sources including:

  • Port incident and safety reports
  • Employee and contractor information
  • Operational records related to investigations
  • KYC / AML screening and monitoring
  • Adverse media screening
  • Other 3rd party data intelligence sources (ex. LexisNexis)

This allows organizations to consolidate information that would otherwise remain siloed across systems.

Does ICM by Tapestrii replace existing security or operational systems?

ICM is fully configurable and can work either way. For some organizations, ICM serves as a coordination and investigation layer above existing systems, connecting and contextualizing information from tools already in use. For others, it replaces legacy systems entirely. The ICM team works with each organization to determine the deployment approach that best fits their operational needs and existing infrastructure.

Can investigations be conducted discreetly in ICM by Tapestrii?

Yes. ICM allows investigations to be conducted within the platform without notifying employees or contractors.

This allows teams to review incidents, analyze information, and build investigative context while minimizing the risk of alerting potential bad actors.

How does ICM by Tapestrii help reduce operational and security risk?

ICM reduces risk by connecting data that is often fragmented across systems. Specific outcomes include:

  • Earlier pattern detection by linking related incidents across time and location
  • Standardized investigation workflows that reduce inconsistency across teams
  • Accountability through traceable case records and documented decision history
  • Reduced exposure from siloed information by centralizing intelligence inputs
Who typically uses ICM by Tapestrii?

ICM is used by operational and security professionals in port and logistics environments, including:

  • Port operators
  • HSE leaders
  • Safety and security managers
  • Investigation teams
  • Compliance personnel

These roles rely on ICM by Tapestrii to coordinate incidents, investigations, and operational oversight across their organizations.

Can ICM by Tapestrii support multi-terminal or multi-location port operations?

Yes. ICM is designed to support organizations operating across multiple terminals or locations.

Permissions and data access can be structured by location while maintaining centralized oversight across the entire operation.

Does ICM by Tapestrii integrate with existing systems such as CCTV or access control?

Yes. ICM integrates with external systems including access control platforms, CCTV systems, video management systems, and external data sources through APIs and data integrations.

These integrations allow operational data to be included directly within investigations and case records, giving investigators a complete picture without switching between platforms.

How long does it take to implement ICM by Tapestrii?

Most organizations go live with ICM within a few weeks, depending on integration scope and deployment complexity.

Teams often start with a single operational group and expand usage across departments or locations as adoption grows.

How configurable are workflows and case types?

ICM allows organizations to configure case types, workflows, fields, and investigation processes.

This flexibility allows the platform to align with existing operational procedures instead of forcing teams to change how they work.

What types of organizations is ICM by Tapestrii best suited for?

ICM is best suited for:

  • Port terminals and port authorities
  • Logistics and freight-adjacent operations
  • Organizations operating in complex or high-risk environments
  • Customs and law enforcement organizations
  • Teams that need discreet investigations, operational oversight, and documented accountability
Is ICM by Tapestrii cloud-based or available on-premise?

ICM is available as a cloud-based platform, allowing teams to access investigations and case records securely from any location.

Organizations with specific infrastructure requirements can discuss deployment options with the ICM by Tapestrii team.

Does ICM by Tapestrii support compliance and audit requirements?

Yes. ICM maintains a complete audit trail for every case, including documentation of actions taken, decisions made, and evidence collected.

This supports compliance workflows and provides defensible records for internal reviews, regulatory inquiries, or legal proceedings.

This includes support for obligations under the ISPS Code, where port facilities are required to document security incidents, maintain security logs, and demonstrate that threats were assessed and responded to appropriately

How does ICM by Tapestrii handle data security and access permissions?

ICM includes role-based access controls that allow organizations to define who can view, edit, or manage specific cases and records.

Permissions can be configured at the user, role, or location level, ensuring sensitive investigations remain accessible only to authorized personnel.

What software do ports use to manage security incidents and investigations?

Ports often rely on a mix of incident reporting tools, spreadsheets, and internal databases to document security events. While these tools capture basic information, they are not designed to support structured investigations or connect related incidents over time.

ICM is purpose-built as a dedicated investigative case management platform for ports and terminals. It allows teams to track incidents, link related entities, analyze patterns, and maintain a complete investigative record in one place.

How do ports track security incidents and investigations across multiple systems?

Many ports manage incidents using separate systems for safety reporting, access control, and operational records. This makes investigations difficult because relevant information is scattered across multiple platforms.

ICM centralizes these inputs into a single case record, allowing investigators to connect incidents, people, locations, and external intelligence sources. This helps teams build a complete picture of what happened and coordinate response efforts more effectively.

Turn Complex Operations into Clear Insights

See how ICM helps teams move faster, see more, and make smarter decisions.

Schedule a Demo

Experience the Difference

Schedule a demo and discover how we can drive real impact for your business.

Request a Demo