Automox Security

Operational cloud experience at scale

The Automox team has over three decades of operational experience designing and securing multi-tenant cloud and internet applications at scale. Our team comes from some of the most successful and sought after internet companies including, SendGrid, SolidFire, StillSecure, and LeftHand Networks. All team members undergo mandatory background checks prior to employment.

No single points of failure

The Automox architecture uses clustered services to ensure high-availability and reliability as well as the ability to quickly scale with demand. All services are run on two or more servers with load balancers distributing load evenly. Loss of a server is not an issue as a new one is quickly provisioned to take its place.

All data is replicated to at least one additional server in a different geographic region and all data is backed up on a scheduled basis with regular testing of the restore process.

Data Encryption: Modern and mandatory

All private data exchanged with Automox takes place over encrypted channels. Our website and APIs communicate using TLS 1.2 over the standard HTTPS port 443. All enabled cipher suites utilize Perfect Forward Secrecy (PFS) for key negotiation and AES-128 or higher encryption.

The Automox agent uses PKI encryption to authenticate the endpoint to our servers. Upon mutual authentication, all communication between Automox and the endpoint is secured.

All access to production infrastructure is established through encrypted VPN connections. SSH sessions are regularly used for terminal sessions and data transfer between our servers.

We use modern salted cryptographic algorithms to secure selected sensitive data stored in our database.

Payment processing managed on our behalf by Stripe

All credit card processing is handled by Stripe, and no credit card numbers are stored or handled by Automox or its employees. Stripe has PCI Compliant security architecture in place to ensure your payment information is kept secure.

Development process focused on quality and security The Automox software is developed using a modern quality-driven process and mindset to ensure high reliability. All product changes undergo rigorous automated and manual testing in a staging environment to detect and eliminate operational and security issues before deployment to production.

Endpoint Agent: Secure by design

The Automox endpoint agent is responsible for monitoring and controlling the endpoint patch and management process. To facilitate this, the agent requires privileged access to the system in order to access secured locations of the system. Because of this privilege, we have architected the agent with multiple security features to protect the endpoint.

The agent is written in a modern systems language with features to prevent common coding errors that can lead to security vulnerabilities. As mentioned above all communications are encrypted with TLS and authenticated with public-key cryptography. We have automated test suites that test agent integrity and ensure the agent is not vulnerable to replay or MITM attacks.

Always evolving and improving

We know security is not a one-and-done effort so we’re always working to improve our security. Here’s a peek at some of our latest enhancements:

Role Based Access Controls
SAML Single Sign-On
SOC 2 Type 2 Certification

Need-based access policies, mandatory logging

At Automox, we implement IAM policies and partition access to our systems to give our team members the least amount of access to perform their development and maintenance tasks. Need-based access is granted on a per-employee basis and regularly reviewed. VPN access is required to access the production environment, and all access to infrastructure and systems are logged and audited on a regular basis.

Production servers are completely isolated from all staging, development, and build systems.

Automox uses monitoring software to track all server logins and privileged command execution, alerting on any anomalous activity. All log files are written to centralized log hosts which are hardened and monitored using OSSEC and other tools.

We appreciate responsible disclosure

If you believe you have found a security vulnerability in our product we would appreciate your help in disclosing it to us at

You may encrypt your communications with this PGP key:


Version: GnuPG v1

mQENBFZeK4gBCAClnB5SzVLnQFJPSnAfnEzEPTTKIakGnBSjymqoO49U9asZ0jwC ZTtie+Zu1ZQEfU6pB7VcRhu5FeSxHSb/ES0Zv8YvNdvlidmsoA5LKge4SLue7UmA eG0BdNVB2HK1zwM29gIk9q7xEAYRRTHaXphtRcfx1hWJUjZ526QalMVJyH75PXr1 wPeqcxJUHObGkPLTvZnJIF6F8uPQvGYwtjPvlN5YG2ThzWJ0KkxZF3xOca6xxU+n 1JUuK4hWowQ1/TRCDNrXbKI3Eb5ugZAGyWhUmTCKupRqaJXVLNkWPiiDJBrmg4KW mIKXOoZnLzt1Wmg9k8jpdABw7sHsljR9PxRfABEBAAG0MVBhdGNoU2ltcGxlIEVu Z2luZWVyaW5nIDxzdXBwb3J0QHBhdGNoc2ltcGxlLmNvbT6JATkEEwEIACMFAlZe K4gCGwMHCwkIBwMCAQYVCAIJCgsEFgIDAQIeAQIXgAAKCRBV2RuRzmdpqzhVB/98 vop4nzK7pujClah7RRHcrzVyhmQQaSnfy70DMZxUrhfWMy9NrfyKffwFL3k6PHlo ea/HnqLXLF6vrbovtwyoE7+PPs/oIb0aGwS8eYN+Pu++1FvM5yDMdfQ4gbIjhvJo YqZtAIGzkV/tNOZr+3o/+xGQvEl8dPwRT6ROHW0mqXMVqdHI3Mnf/565thlLgnX0 uOxoS47VqsW/tnbyHXfngAzlkTuW7wGNB+YWJ3UjiNmfztms2wFhsn6JDF07SL6U E5wQIOz6cVCCzn1sFiVlYP0yZwx8FZ+GTbNyueI5+Ggcc7CMwkkhmqDM5c3af+sT Qqh+3koLfl3zNz1YDYxttClBdXRvbW94IEVuZ2luZWVyaW5nIDxzdXBwb3J0QGF1 dG9tb3guY29tPokBNwQTAQgAIQUCXRTwtwIbAwULCQgHAgYVCAkKCwIEFgIDAQIe AQIXgAAKCRBV2RuRzmdpqxXvB/4kZ4JqSj3McxqOXvrrhD/x7c1fF2yBAoB4QhYw Xp6XW5vB1ptzM9mY3Rgw0jvinWgmnrkuGF0i5GnCar/+ZBQwG6ZC7dylvGJBGYaW 36I09OtqU0xumpdFdeFTb9TQ96nT9N4P0oFuqIPe4NFhH3Y2V/GkgOrzfxa7gzj+ lqL2R7r1vJvFlu/YejfAGzZnfJfHyrwfL/lKhimCST0wWf8NPI6ZQQm30TTuEGxV g4032rfB9WA0kHe61GVhfNE9fgZRHP9xUZeD5CxCsFGkCqL+TAovZfRMh2dHx475 L97lKBRsgT2Mot0AkHWEnzYyVur2koeXIXj6z6dW4KpBMrqEuQENBFZeK4gBCADZ irqdmR39Z2FSE2pIKJc3glydU6/lIRxn1R1XGkjtaSRv69fUBoJcc2iRcSuXXYjb KSCMKQQZOhanZw/oRYOYZckO8IEjXdWLTW+8ln1g5kHpVBGEeeTpmOVg9BR3ipWK RuDSiXLYE5vu2k+0Pi3dZsVHqGnNqDMc0rrQp5ktUDwL6+9nW5H3hjBS/ZNoovOt UoRyVDsZxtcOKWhyh6ACuc/2WaUbyhN5mMKSPa4YpprpFWbjmltB6KFkPGwCyaM0 Hi6wCLgr2sTakGWqyHorziBaHfI4spA23Mr6LMNaXQpwiD8wM5JjpYqxe+0pVCQt HkGiPH9rRJyUGR1SK2WBABEBAAGJAR8EGAEIAAkFAlZeK4gCGwwACgkQVdkbkc5n aauEuQf/b04h6fn6CUB8TCblgd7jvXzJEYKD3YKXZooiSmqnyNnDzrIRixyjaABl j1RGK4sV99sW7FbZe4/h3vRqtuoEozA2dhJoVMyy0wYSKscN5XDdx+D+OI1VkVsY jptPjDc5dk97JwFwHbvU6ytnIaKlAWJ0p2cIuCHTq5Ok3/hu0DP7jCw2zBodNiJd XWIyyTPHsmt97cGKNRUSXLPGrJ6q1yoRUICD64ZMJTzVSYNnI8ftdnD780Ew45l7 iVRhjVMNLpnJTTmQgy0f6r3a5wGmCas1L6ON1/eHl/uYHAAhcNiPjfPOnvORYCkA uP8KQ7aunrf43FBjvMcsrC8iz9QaHQ== =7TK/


More About Automox

Check out our documentation library for more details on how Automox works.

Read more about the Fundamentals of Cyber Hygiene and product features on our blog.

Rather watch a video? Browse our library of How To videos that showcase Automox solutions.

Ready to get started?

See the vulnerability status of your infrastructure and start patching systems and software in minutes.