NetOrca · Netautomate

The standard front door for infrastructure services.

Consumers declare what they want in Git. Service owners keep their existing automation. NetOrca handles the interface, validation, lifecycle, and governance in between.

Netautomate platform Enterprise-grade In production since 2022
10,000+
Changes / year
1,400+
Teams onboarded
£20M+
Reported savings
10×
ROI on ~£2M cost
02 — What NetOrca is

A standard interface between the people who need infrastructure and the teams who deliver it.

NetOrca is not an automation tool. It's the way you offer automation as services. If you already have Ansible and Terraform, you keep them. What you stop building is the custom request layer in front of them.

Layer 1

Consumers

Developers, project teams, app owners — the people with deadlines.

  • Declare intent in YAML / Git
  • No vendor knowledge needed
  • Status in the same place
You adopt this

NetOrca

Request → validate → approve → track. Replaces the bespoke portal / intake / microservice layer every infra team builds for itself.

  • Schema-defined services
  • Git-native workflow
  • Audit + governance built in
Layer 3

Infrastructure

Ansible, Terraform, vendor APIs, scripts. Your stack stays yours.

  • Keep existing automation
  • No rip-and-replace
  • Swap backends without breaking consumers
✓ What it replaces

The bespoke intake, portal and microservice layer every infrastructure team builds for itself — forms, ticket templates, approval workflows, status pages, request tracking, cross-team glue.

✗ What it doesn't replace

Your automation tooling. Your vendors. Your teams. Your CI/CD. It sits in front of what you already have. Deployed in 2 weeks.

03 — What a consumer writes

One file. No vendor detail. No implementation knowledge required.

The consumer commits YAML to their Git repo. NetOrca validates, creates a Change Instance, and the service owner's automation picks it up. Success, failure, and structured feedback come back to the same place.

payments-api / netorca / internal-web-app.yaml ⎇ main
# declare what you need — not how to build it
service: internal-web-app
config:
  name: payments-api
  environment: production
  port: 443
  backend_servers:
    - 10.1.1.10
    - 10.1.1.11
01

Commit

Consumer pushes YAML to their repo.

02

Validate

Schema-validated in CI. Fast feedback, no back-and-forth.

03

Execute

Service owner's automation picks up the Change Instance — CREATE / MODIFY / DELETE.

04

Status

Success, failure, or structured feedback — same place they submitted.

04 — The core problem

In modern organisations, developers are the customer.

Every release depends on teams they don't control. The bottleneck isn't capacity — it's the door they have to walk through.

Source of demand
Developer teams
payments-api risk-ml mobile-web ledger-core fraud-svc kyc-onboard notify-gw data-lake
1,400+ teams 10k+ requests / yr
Multi-stage ticketed process
avg dwell14 days
FORM CAB SEC NET CHG HAND
Networks
vpc · firewall · dns · lb
42 open
Platform
kube · runtime · secrets
28 open
Security
iam · policy · scan
61 open
Cloud
aws · gcp · azure
19 open
Source of demand
Developer teams
payments-api risk-ml mobile-web ledger-core fraud-svc kyc-onboard notify-gw data-lake
same teams same demand
Standard interface · one schema
avg dwellhours, not weeks
SCHEMA declare intent VALIDATE policy · guardrails EXECUTE existing tooling
Networks
vpc · firewall · dns · lb
automated
Platform
kube · runtime · secrets
automated
Security
iam · policy · scan
policy-checked
Cloud
aws · gcp · azure
automated
01 — CAUSE

They depend on teams they don't control.

Every release needs network, platform, security, cloud — all outside the developer's repo and outside their timeline.

02 — SYMPTOM

Vital requests sit behind a wall of process.

Tickets, forms, CABs, hand-offs. Developers spend more time requesting than building, while infra teams triage a queue.

03 — FIX

The fix is structural, not technical.

Infra teams aren't the bottleneck. The door is. Standardise how requests enter, and the rest follows.

01 — DOOR

One schema. One request surface.

Developers declare intent in a file they own. No ticket forms, no Confluence hunts, no "which team do I ask?"

02 — GUARDRAILS

Policy runs before anything ships.

Validation, naming, security, approvals — enforced by the schema, not by hand. Audit comes free.

03 — OUTCOME

Infra teams build services, not tickets.

They own a standard interface. Execution plugs into the tooling they already have. Hours, not weeks.

05 — Before / After

The same developer. A different door.

Developer A — today

Three tickets. Three teams. Two security holds. Rework.

Nothing here is "bad people" — it's a structural problem every prospect will recognise.
  • Searches Confluence / ServiceNow / Jira to find the right request path
  • Submits multiple requests for the same outcome (firewall + LB + DNS + zero-trust)
  • Security asks for justification twice, in two different processes
  • Spreadsheet templates arrive late, with fields the requester can't answer
  • Approval is rubber-stamped, implementation happens, it still breaks
Developer B — with NetOrca

One YAML. One MR. Schema validates. Status visible. Done in days.

Same security standards. Same compliance. Nothing bypassed. The difference is structure.
  • Service catalogue shows what's available and what inputs are required
  • Consumer copies a working example, changes values, commits
  • CI validates schema immediately — fast feedback, no back-and-forth
  • Service owners receive clean, structured requests that fit automation
  • Full lifecycle in one place: create, modify, delete through the same repo
06 — Why this happens

Every request has three layers. Most investment goes into the wrong one.

We were automating day 13.7 of a 14-day process. Halving the config-push step doesn't move the business. Collapsing intake and translation does.

LAYER 01 — Input / Request

Find, understand, submit, track.

Where most customer pain and rework lives.

Standardised by NetOrca
LAYER 02 — Processing / Translation

Validate, clarify, approve, route.

Where most hidden cost sits — every team rebuilds it from scratch.

Standardised by NetOrca
LAYER 03 — Implementation

Push config via API / Ansible / Terraform.

Where most automation budget already goes. Already works.

Your existing tooling, unchanged
NetOrca standardises Layers 1 and 2 — your implementation tooling stays yours.
07 — The true cost of DIY

DIY isn't a script. It's a stack. Per domain. Per team.

People underestimate this by an order of magnitude because it's decentralised. Each team thinks they're building a small thing — the total spend is enormous and invisible.

What every team rebuilds

  • Intake — forms, portals, ticket templates
  • Validation and schema handling
  • Workflow, approvals, status tracking
  • Audit trail and reporting
  • Integrations to ITSM, IAM, CMDB, Git, CI/CD
  • Ongoing support, patching, licensing
  • Plus: delivery teams waiting.
Build-your-own cost
£200–500K / service / year
… before any automation is actually written.
£3.4–8.5M / year
at 17 services — on integration glue alone.
08 — The economics

Reference customer: Tier-1 UK bank. 3+ years in production.

The £20M is the bank's own reported figure — not a model. The key insight: the platform pays for itself after the second service.

Total annual cost
£2M
Platform + consultancy
Reported annual savings
£20M+
Bank's own reported figure
Return on investment
10×+
Improves with every service added

Effective cost per service

1 service
Full platform cost
5 services
~£400K / service
17 services
~£118K / service
30+ services
< £70K / service
Bespoke alternative
£200–500K / service
09 — Cost calculator

Model it against your own numbers.

Adjust the inputs. Defaults reflect the reference deployment — a Tier-1 UK bank running NetOrca for three years.

Infrastructure services automated17
12040
Avg bespoke build cost / service / year400K
£150K£400K£600K
NetOrca platform + delivery / year£2.0M
£1M£3M£5M
Years to build in-house before developers see value2.0 yrs
02 yrs4 yrs
Build-your-own isn't just more expensive — it's years late. While the team builds intake, every downstream developer and customer waits. That delay is the cost nobody puts on the slide.
Bespoke run cost
£6.8M/yr
17 services × £400K · once built
With NetOrca
£2.0M/yr
Flat — same cost at 1 service or 40 · live in weeks
Opportunity cost while waiting
£13.6M
2 years of developer and customer value never recovered
Total gap over 3 yrs
£28.0M
2.4× run-cost ROI · break-even at 5 services
Run-cost gap: £4.8M/yr
Reference: bank reports £20M+ saved · 3 yrs in production
09 — Proof at scale

Not a lab demo. A Tier-1 regulated bank, running at scale.

Infrastructure changes automated annually
10,000+
Internal teams onboarded
1,400+
Firewall requests via Decision Engine
25,000+
Applications managed declaratively
3,000+
Internal users actively using automation
400+
Cross-charging enabled (first 12 months)
£1.5M
Bespoke services published
17

"NetOrca is a critical infrastructure component paving the way for automated networking and enabling delivery of the Bank's 10× faster outcome."

— Tier-1 UK bank

"Using the GitOps model and verifying the status of the network changes saves us a lot of time and made timelines more predictable."

— Principal Software Engineer

"I would be very disappointed if we lost this solution."

— Senior Software Engineer
10 — Integrations

You don't adopt NetOrca instead of your tools. You adopt it in front of them.

Git
GitOps-native · CI/CD
Ansible
Galaxy module
Terraform
provider
Backstage
Spotify IDP plugin
ServiceNow
ITSM workflows
Python SDK
custom integration
Any CI/CD
standard API
Cloud / Vendor APIs
AWS · GCP · Azure · F5 · Palo Alto
New product integrations delivered within 5 working days. — If you've already invested in automation, NetOrca makes it accessible. If you're about to invest, NetOrca ensures what you build is reusable across domains.
11 — Security & governance

Self-service because it's governed. The schema is the contract.

Full auditability from day one

Every change logged: who requested, when, what happened, full decision chain.

Schema validation

Consumers can only request what's defined. No free-text, no ambiguity.

Configurable approval chains

Per service — match the controls you already operate under.

Multi-framework regulatory support

Several regulatory frameworks supported within a single toolset.

12 — Engagement model

Netautomate delivery. Outcome-based. Fixed price. First value in weeks.

No big-bang. Keep existing teams and tooling. Add NetOrca in front. Most customers reach first production service inside a month.

Discovery
2–4 weeks

Assess environment, identify opportunities, deliver roadmap.

PoC / PoV
2 weeks

NetOrca deployed, first service live, value demonstrated.

Pilot
4–6 weeks

Consumer teams onboarded, real requests flowing, metrics captured.

Scale
Ongoing

Add services and domains, enable cross-charging, track quarterly.

Netautomate brings

The NetOrca platform, Pack AI engine, product development, and new vendor integrations in 5 working days.

Delivery partners bring

Vendor expertise, lab environments, implementation and ongoing support, enterprise procurement — chosen per region and account.

Next step

Pick one painful change journey. We'll fix it end-to-end.

We don't need a strategic decision today. We need a painful use case and two weeks.

01

Choose a domain

Firewall flows, proxy rules, microsegmentation, LB, DNS, cloud.

02

Define together

Service + schema + governance, shaped to your environment.

03

Onboard teams

1–3 consumer teams, real requests flowing through NetOrca.

04

Measure

Lead time, rework rate, cost per change — before vs after.

Appendix — for deeper conversations

Slides to go to, based on what the audience asks.

Appendix A

Company background

Netautomate, founded 2019. NetOrca launched 2023. Privately funded. HQ London, distributed team across UK, Europe, USA, Australia. Technology agnostic. Established partnerships with leading infrastructure vendors.

Use when: procurement / vendor-risk audience asks "who are you"  →
Appendix B

NetOrca Pack (AI-augmented)

An agentic AI layer on top of any NetOrca service: Config (AI reads API docs, generates structured config), Verify (a second model independently validates), Execute (automated deployment with a self-healing loop). The Universal Executor automates any infrastructure with an API. Pack works because NetOrca changes are already schema-defined and verifiable.

Use when: audience asks about AI or has an AI-first mandate  →
Appendix C

Ideal customer profile

  • Shift-left services to customer Git repos
  • Automation at scale across multiple teams
  • Building microservices / APIs for inter-team requests
  • Had failed or low-value automation projects
  • Multi-vendor infrastructure estates
Sectors: FSI · Telco · Pharma · Insurance · Manufacturing · Aerospace · Retail · MSPs · Cloud providers  →
Appendix D

How it works — step by step

  • Service Owner defines a service + schema on the platform
  • Consumer gets a Git repo with a standard structure
  • Consumer declares YAML / JSON — no implementation detail
  • NetOrca validates, creates a Change Instance
  • Service Owner's automation picks it up and executes
  • Consumer sees the result in the same interface
Use when: technical audience wants to see the mechanism first  →
Appendix E

Value proposition summary

Consultancy & Discovery

3-month scaled automation consultancy: discovery, analysis, roadmap. Expert consultants embedded immediately.

NetOrca Platform

Self-service orchestration. Define services, standardise interfaces, automate delivery. Up and running in 2 weeks.

NetOrca Pack (AI)

AI-driven config generation, verification, self-healing execution. Universal Executor for any API.

Integration Expertise

Technology agnostic. Demo library across leading vendors. New integrations in 5 working days.

Security & Compliance

Full auditability from day one. Multi-framework regulatory support. Enforced governance.

Cost Recovery

Built-in cross-charging. Self-funding automation programme. Measurable ROI.

Open the full value summary  →