Skip to main content

60 million lines of COBOL documented

Enterprise COBOL knowledge,source-backed and AI-ready

A deterministic platform for COBOL documentation, architecture mapping, business-rule extraction, and governed AI workflows

  • BPALC
  • Sparda-Bank
  • Cetelem
  • Mediobanca
  • Provinzial
  • Groupama Asigurari
  • Sanlam
  • Netto
  • Penny
  • Coop Estonia
  • Kalev
  • IKI Lietuva
  • Air Serbia
  • Tarom
  • Balnak Logistics Group
  • Gulf Freight Logistics
  • OTE
  • PLDT
  • Turkcell
  • COBEE
  • ENDE
  • Medela
  • Biotronik
  • Stallergenes Greer
  • MISUMI Group
  • Bruckner Group
  • Multivac
  • Mosca

By the numbers

The evidence is already in the code.

We've worked inside the estates that enterprise COBOL runs on in banking, insurance, logistics, and energy across four continents.

60M

Lines of COBOL documented

95%

Faster than manual

82%

Lower cost

100%

Business rule extraction

0%

AI hallucinations

Customers by sector

Trusted across regulated industries that still run on COBOL.

Banking, insurance, retail, airlines, logistics, telcos, and energy teams use COBOLpro to document the systems their business depends on.

Banking & Financial Services

European and Latin American banking estates with high-volume core, cards, lending, and payments workloads running on COBOL.

  • BPALC
  • Sparda-Bank
  • Cetelem
  • Mediobanca

What we document in banking

  • Core banking program flows and dependency maps
  • Payment calculation rules and threshold logic
  • Cards, lending, and settlement batch jobs
  • SME runbooks and expert knowledge capture
  • Audit-ready rule catalogs and evidence packages

What you receive

Source-backed artifacts your teams can actually use.

Every output is tied to source evidence — not summarized from memory, not paraphrased from interviews. Traceable to the line of code.

01

Program documentation

Purpose, logic flow, inputs, outputs, copybooks, data stores, and error behavior — documented from source.

  • Program purpose and business context
  • Dependency maps and data flow diagrams
  • Job streams and batch sequence
  • Error paths and exception handling

02

Rule catalog

Business rules, calculations, validations, thresholds, and exceptions — each tied to source code evidence.

  • Calculation logic with source references
  • Validation rules and threshold definitions
  • Exception handling and override conditions
  • Owner decisions and regulatory triggers

03

SME retention package

Expert context captured before it walks out the door — operating knowledge, test practices, and ownership records.

  • Structured interview records
  • Operating procedures and run notes
  • Known issues and workaround history
  • Onboarding material for incoming teams

04

Handoff & audit package

A complete evidence package for application teams, auditors, operations, and incoming maintainers.

  • Runbooks for operations and support
  • Ownership and accountability map
  • Audit-ready evidence bundles
  • Reviewer sign-off and validation records

All artifacts delivered in structured formats — ready for your document management system.

See artifact examples

How it works

A controlled process. Predictable output.

Start with one bounded system and the SMEs who know it. We take it from there.

  1. 01

    Scope

    Define the systems, programs, jobs, SMEs, and open questions the audit must answer. Set the boundary before the work starts.

    1–2 weeks
  2. 02

    Analyze & interview

    Review source artifacts to build program notes, dependency maps, and rule candidates. Run structured SME sessions to capture operating context, exceptions, and ownership.

    Core engagement
  3. 03

    Validate

    Review findings with application, operations, audit, and business owners before anything is published. Evidence is confirmed, not assumed.

    Sign-off required
  4. 04

    Publish

    Deliver program documentation, rule catalogs, dependency maps, runbooks, interview records, and a structured retention package.

    All artifacts delivered

Security & compliance

Built for banks, insurers, and regulators. By design.

Read more

SaaS, private VPC, or air-gapped. Your security requirements are a starting point, not a negotiation.

SOC 2 Type II

Third-party audited controls for security, availability, and confidentiality.

ISO 27001

International information security management certification.

HIPAA

Healthcare data controls, access governance, and auditability.

GDPR

Data residency, purpose limitation, and subject rights workflows.

Ready to start?

Start with one system. See what's been undocumented.

Book a scoped knowledge audit — define the systems, the SMEs who know them, and the documentation gaps that carry the highest business risk.

No commitment required
Scoped to one system
Results in weeks, not months