Security
Trusted Solutions Partner
Data Security, Backup & Recovery
Security is first and foremost with Intraratio, ensuring we are a trusted partner in protecting your critical operations
Our solutions are deployed within the customer’s on-premises or cloud network, fully under the control of the customer’s IT network security
Application user accounts are encrypted, and completely separate from server OS and database access credentials, thereby representing additional barriers to entry for any hacking attempt when your network has been penetrated
Deployments require the implementation of at least one backup server, where production data is replicated in real-time, for near instant failover recovery should a production server fail or be compromised
This real-time replication of factory data can be relayed to an offsite Cloud site to support full disaster recovery
Input sanitization prevents SQL Injection and Remote Code Execution, while URLs are rewritten to obfuscate directory structures and by implementing the principle of 'Least Privilege', data cannot be deleted with standard user account roles

User Access
Leverage simple yet powerful user access management and work traceability utilizing encrypted user accounts which allow access to the application, with settings for defining each role
Users can be restricted to certain product lines, as well as to only specific work operations within a product line
Audit logs provide visibility into when users log on and off, while transaction logs capture what work was performed and when
For product, process, and BOM updates, change logs are captured with each update and release, for full audit purposes
-1.png?width=900&height=525&name=User-Access%20(1)-1.png)
API Access
Take operations to the next level with secure systems API based integration
REST, SOAP, WebSocket and file-based API connectivity are fully supported
Set up API access per user, machine, sensor, or external application, with unique access keys generated per each account for security
Leverage existing libraries to enable remote transactions, with any protocol or data structure supported
Sanitize and validate inbound data to ensure transactional data integrity
Leverage Python and other scripting and application programming languages to expand reporting and transaction automation
Detailed trace logs provide critical tools for debug and monitoring of API data interchange

Application & Database Management
Enterprise infrastructure reimagined, with zero dedicated ongoing IT support required
Our solutions are self monitoring and managing, effectively removing the costs and need for dedicated IT support
Realtime data replication ensures production data is mirrored to a backup, for redundancy and disaster recovery
From single factory line to global multi-line factories, just add additional low-cost commodity Linux servers to support transactional and IoT data growth
Data warehouse integration ensures automated archiving for data growth management
