As part of our software development process, we carry out regular testing throughout our platform, which encompasses several measures. These include Static Application Analysis Scans (SAST) and Dynamic Application Analysis Scans (DAST), with their outcomes published on our Platform Security page at XMPro.

Additionally, we conduct Vulnerability Testing and Penetration Testing to ensure the platform’s overall security. Furthermore, Application Logging is made available to our users to facilitate the detection and analysis of any potential threats.

XMPro can be Deployed to any cloud ecosystem (Azure, AWS, Google Cloud Platform) or On Prem. And can run on IaaS or PaaS 

The Platform is comprised of several products which are compatible with programmatic deployment methods common in DevOps, including containerization and manual deployment options available via installers.

On-prem deployments can skip or resume regular software releases, without the need to historically install all prior versions missed.

As part of the Dell Validated Design (DVD) for Manufacturing Edge, XMPro runs an advanced edge solution to empower manufacturers to deploy, manage, and scale advanced Digital Twin technologies.

Depending on the Use Case, XMPro can run on different Topologies. Often a blended approach with some components of our platform running on both yields.

Examples:

XMPro platform integrates between components via API requests over HTTPS. The Platform has a large and growing number of custom Connectors and Plugins that can be used to integrate to 3rd party systems. These can be added by an administrator at their discretion and monitored and managed through a centralized view.

 This ever-growing list of integrations can be viewed here Integrations

 

The XMPro platform features an Out-of-the-box Role Based Access Control (RBAC) mechanism that can be customized further using Product Rights. This means that an “Admin Role” can have multiple access levels, which can be applied to artifacts generated within the platform. Moreover, these Roles can be managed through third-party identity providers that facilitate Single Sign-On (SSO).

Users are managed via a least-privilege access approach, and all exposed functionality is restricted by just-in-time and just-enough access protocols. The platform also offers Automatic Registration Approval Flows to simplify the registration process.

 
 
 

In our Subscription Manager Product, Authentication and Authorization are conducted through OpenID Connect to verify each request based on all available data points. Moreover, the platform is segmented, offering a layered security approach to every aspect of the platform.

Any exported artifacts are encrypted using a key that the user provides on export, and the platform allows for the easy rotation of keys in case of a possible breach.

Want To Know More?

Let’s Get Started