Industry-leading security at every step
Security is built into all aspects of the Automox platform. Driven by transparency, Automox addresses security across the entire life-cycle of its capabilities and features.
From industry-standard practices and processes to technology, Automox provides customers with the confidence that security is ingrained across every element of the platform. This is to facilitate the development of secure code, guarantee the highest levels of protection, and ensure the availability of customer data.
Key security criteria
When adopting a new technology, security is top of mind. Given its decades of collective security experience, the Automox engineering team has implemented a comprehensive end-to-end security strategy that spans the early development of its code to the security of Automox agents across your endpoints.
No stone is left unturned when it comes to addressing security, including:
High availability. With Automox, there are no single points of failure (SPOF) in environments.
Stringent access policies. Automox maintains rigid access control to keep access creep at bay.
Secure data transmission. Data exchanged with Automox stays secure in flight.
Cloud security. Automox aligns with the highest standards of our AWS partnership.
Data protection. Securing stored sensitive data at rest minimizes risk.
Endpoint protection. The platform was architected so your endpoints are never vulnerable.
Putting together security pieces for your peace of mind
Security is mission-critical, and that’s why we created an industry-leading program to facilitate the development of secure code and to protect customer data.
Downtime is never an option with highly available architecture
All services are run on two or more servers with load balancers distributing the load evenly to eliminate any single point of failure. The Automox architecture uses clustered services to ensure high availability and reliability. This also allows for the ability to quickly scale on demand.
Stringent access management and permissions ensure only authorized use
With robust access management policies in-house, even Automox developers are restricted in the platform infrastructure with role-based controls.
For users with access, stringent password protocols are enabled such as a 12-character minimum, mandatory multi-factor authentication (MFA), screening against common and compromised passwords, as well as optional SAML single sign-on (SSO).
In-transit data is secured via multiple methods
To access Automox’s infrastructure and production environments, the platform requires both VPN access, which is logged and audited regularly, as well as encryption of that data exchanged across secure channels.
This includes all enabled cipher suites utilizing Perfect Forward Secrecy (PFS) for key negotiation and AES-128 or higher encryption. In addition, our website and APIs communicate using TLS 1.2 over the standard HTTPS port 443.
Automox is built and secured in the AWS Cloud
Developed in the cloud, Automox selected AWS, the only cloud provider secure enough for top-secret workloads. Automox leverages AWS cloud security capabilities, such as location redundancy for high availability, firewalls and load balancers, cloud workload protection, and distributed denial of service (DDoS) protection – to name a few.
The highest standards of data protection to guard your most critical assets
The data that we protect at Automox is first replicated across regions and encrypted. We use modern salted cryptographic algorithms to secure stored sensitive data-at-rest with Advanced Encryption Standard (AES) 256.
For enhanced resilience, Automox leverages AWS replication in addition to its own Business Continuity and Disaster Recovery (BCDR) plan to ensure customers experience continuous access to their data.
Endpoint protection via the lightweight Automox agent
The Automox agent requires privileged access to each endpoint. Because of this privilege, the agent ensures security and its modern systems language prevents common coding errors.
With communications encrypted with TLS and authenticated with public-key cryptography, your endpoints are not vulnerable to replay or MITM attacks.
Automox doesn’t just implement these security protocols – we test and test again.
From static to dynamic application security testing, secure coding practice, and regular third-party penetration testing to staffed purple team and adversary emulation testing, we take security seriously and validate that security measures are working optimally continually.
As a Microsoft Active Protections Program (MAPP) member, Automox receives early insights into emerging threats and vulnerabilities from Microsoft, giving your organization a decisive edge in crafting timely and effective remedies.
Want to learn more about Automox security? Visit the Automox Trust Center to learn about security posture, follow Trust Center updates, and request access to security documentation.