XVICA · Infrastructure Group

Enterprise Integration Fabrics.

Connectivity layers that bridge legacy systems with modern infrastructure. Event streaming, synchronous APIs, batch, and protocol translation in one governed fabric.

Overview

Integration is where strategy meets reality. Most transformation programmes stall here.

XVICA builds integration fabrics that combine event streaming, synchronous APIs, batch transfer, and protocol translation in a single governed layer. The fabric replaces legacy middleware or coexists with it, supporting incremental modernisation without the big-bang migration that institutional estates cannot tolerate. Every message is observable, replayable, and scoped to a policy that is version-controlled rather than tribal knowledge.

01Why it matters

Middleware decisions outlive the people who make them.

The integration layer is the part of an enterprise estate that accumulates the most technical debt and the fewest owners. Point-to-point integrations proliferate; ESBs become vendor lock-in with support obligations attached; ETL jobs run unattended until they don’t. When the estate needs to change for a regulatory deadline, a counterparty migration, or a cloud shift, the integration layer is the work.

A well-engineered fabric turns integration into an asset instead of a liability. Message contracts are versioned, schemas are catalogued, access is policy-controlled, and every hop is traceable. Legacy systems continue to participate; modern services plug in through the same interface patterns; migration is incremental and reversible.

02Scope

What we build

The fabric replaces legacy middleware or sits alongside it. Deployments land in whatever cloud, data centre, or hybrid shape the estate requires.

Event streaming

Kafka, Pulsar, or managed equivalents with governed topics, schema registry, and exactly-once semantics where required.

API and service mesh

REST, gRPC, GraphQL, and SOAP gateways with mTLS, rate limiting, and policy-as-code authorisation at the edge.

Batch and file transfer

SFTP, AS2, and managed file transfer with message-level auditing, not just delivery receipts.

Protocol translation

SWIFT, ISO 20022, FIX, HL7, EDIFACT, and X12 with schema-level validation and structured error handling.

End-to-end observability

OpenTelemetry tracing across every hop, correlation IDs that span batch and real-time, and structured error routing.

Governance and tenancy

Policy-as-code access controls, per-tenant isolation, and audited cross-tenant access where required.

03Approach

How we build integration fabrics

We design the fabric as a contract-driven, observable platform from day one. Nothing goes into production without an owner, a contract, and an observability signal.

01

Contract-first design

Message schemas and API contracts are authored, versioned, and reviewed before implementation. Breaking changes follow documented deprecation policy.

02

Coexistence, then migration

The fabric is introduced alongside existing middleware; new integrations route through the fabric; legacy flows migrate against prioritised business value.

03

Observable by default

Every message is correlated; every hop emits traces, logs, and metrics. Dead-letter handling and replay are part of the platform rather than retrofits.

04

Operated under SLA

Integration flows are monitored against freshness and success-rate SLOs with documented incident response.

Technical standards

Contract versioning

Semantic versioning on schemas with deprecation policy.

OpenTelemetry everywhere

Traces, logs, and metrics in a standard format.

Idempotent by design

Replay and retry produce the same effect as first delivery.

mTLS service-to-service

Workload identity and mutual auth across the fabric.

SOC 2 and ISO 27001 aligned

Controls from specification, evidenced continuously.

Multi-region resilient

Failover tested under load, not only in runbooks.

04Use cases

Where organisations deploy this

Representative deployments across regulated sectors.

Banking

Core banking modernisation

A retail bank running a legacy core alongside a new cloud-native core needed a fabric to route customer events, posting instructions, and regulatory reports consistently across both. The fabric carries the migration; no big-bang cutover required.

Industrial

OT to IT convergence

An energy operator unified operational technology telemetry with enterprise analytics via a governed fabric. Real-time streams, historian exports, and event-driven control integrations coexist with strict tenancy and safety boundaries.

Healthcare

Regional interoperability

A regional healthcare network built HL7 v2 and FHIR-based integration across trust boundaries, integrated with Spine and GP Connect, with clinical safety evidence captured per DCB0129/0160.

05Why institutions choose XVICA

Fabric discipline

End-to-end visibility

Every message traced from origin to consumer, every retry accounted for.

Secure by default

mTLS, workload identity, and scoped policy on every flow.

Auditable by design

Message-level evidence suitable for regulatory examination.

Replay and repair

Dead-letter queues, replay tooling, and idempotent consumers.

07FAQ

Integration fabrics

The questions that come up most often during briefings.

What is an integration fabric, and how is it different from an ESB or API gateway?

An integration fabric combines event streaming, synchronous APIs, batch file transfer, and message translation in one governed layer. Unlike a traditional ESB, it is stateless at the edge and treats every hop as observable and reversible. Unlike a pure API gateway, it handles asynchronous, batch, and legacy protocols as first-class concerns.

Can this replace existing middleware, or does it coexist?

Both patterns are common. Greenfield deployments replace legacy middleware with a single fabric. Brownfield deployments keep existing middleware in place and route new integrations through the fabric, migrating legacy flows as part of planned modernisation.

Which protocols and formats do you support?

REST, GraphQL, gRPC, SOAP, WebSockets, AMQP, Kafka, MQTT, SFTP, AS2, SWIFT MT and ISO 20022, FIX, HL7 v2 and FHIR, EDI X12, and JSON, XML, Avro, Protobuf, CSV, and fixed-width. Additional transports are added as plug-ins.

How is observability handled across a heterogeneous fabric?

Every message is assigned a correlation ID at ingress and carried through every hop. Traces, logs, and metrics are emitted in OpenTelemetry format to the customer-owned observability stack. Dead-letter handling, replay, and idempotent re-processing are built in.

What about access control and tenancy?

Controls are expressed as policy-as-code with per-integration scoping. Multi-tenant deployments enforce strict tenancy boundaries on storage, compute, and network, with independent keys per tenant and audited cross-tenant access.

Related reading: data orchestration, security infrastructure, and our Co-Build + Operate model.

A governed fabric instead of accumulated middleware.

Request a confidential briefing to discuss your integration estate and modernisation plan.

Talk to sales