Valarian gives organisations real control over how data moves and how trust is enforced — by building on architecture that scales, not assumptions that don't.
Valarian was founded by Max Buchan and Josh McLaughlin to solve a problem they encountered on opposite ends of high-stakes decision-making: when communication breaks down, everything else follows.
Josh spent over a decade as a U.S. Army officer and later led Palantir Technologies in high-risk operating environments, working directly with classified data and mission-critical systems. Max, navigating the complexity of international finance, saw how fragmented tools and siloed systems left sensitive conversations exposed. Both learned the same lesson: in moments that matter, you need total control over how systems behave — and how information flows.
They architected ACRA to enforce that control at the infrastructure level, then built Valarian’s suite of tools on top: secure software for collaboration, compliance, and coordination — trusted across enterprise, and deployed on the same platform built to support bespoke government programmes.
Driven by an Elite Team with Unmatched Expertise
Our elite teamOur mission
We're on a mission to put control back where it belongs.
Too much trust has been outsourced—to apps, clouds, and assumptions that collapse under pressure.
Valarian exists to reverse that trend. We give organisations the ability to communicate, coordinate, and compartmentalise—without relying on brittle tools or improvised workarounds.
Not only do we build tools, we also build the layer beneath everything else: a secure foundation where sensitive data, systems, and decisions stay sealed, auditable, and under your control.
Trust doesn’t scale. Architecture does.
Built on ACRA
Built for discretion. Designed for control. All Valarian applications run on ACRA — our custom-built platform for secure, compartmentalized data storage, access and compute. Designed by a team comprising former soldiers, intelligence officers and security experts, ACRA brings real-world rigor to digital security.
// . 01 . //
Isolation By Design
Every environment stands alone. No crossover. No bleed. No risk.
// . 02 . //
Compartmentalised Access
Data and compute stay sealed to their purpose—no shared surfaces, no lateral movement.
// . 03 . //
Intuitive to Manage
Serious infrastructure. Zero babysitting. Built for action.
// . 04 . //
Push-button Availability
Create a new enclave in seconds—without opening a single door.