Secure Architecture
Automic Automation's system architecture boosts security at multiple levels.
Multitenancy
A single instance of the software centrally serves multiple Clients (tenants). A Client can be an environment (QA/DEV/PROD), a business unit or any other organizational or operational unit. Both the core instance and its Clients provide their own security resources.
Centralized Architecture
- Database independence through the clear separation of management and data storage. The information is not stored in flat files, which avoids potential security risks.
- The JCL is always centrally available, which significantly reduces possible operational risks.
- The server layout allows the centralized control unit to be distributed across any number of CPUs and physical servers. Resources are only used on dedicated servers without affecting the production systems in any way.
- The server design caters for 24/7 availability and full scalability without increasing the complexity of the system and compromising its security.
Automation Engine Design
The Automation Engine consists of multiple self-contained, small units (Work Processes and Communication Processes) with limited and specific functionality, which makes it extremely stable and reliable. For more information, see Processes and Utilization.
Reliable Data Transfer
The Automation Engine uses the TCP/IP protocol family for data transmission, which caters for highly available and fail-safe networks.
See also: