Frequently asked questions
Everything you need to know about AXYS Platform
Data Management and API Features
General AXYS Platform Overview
Integration and Connectivity
Data Management and API Features
Yes, AXYS gives you full control over which fields and data are indexed from each connected source. Using the no-code interface, you can select or exclude specific fields, tables, or document sections both during initial setup and at any time afterward. You can easily add or remove fields—including new fields that appear in your sources—without writing a single line of code or redeploying the backend. This flexibility lets you optimize data storage, maintain privacy, and keep your indexing perfectly aligned with your business and compliance needs.
Yes, AXYS provides clear, real-time reporting on what data is being indexed from all your connected sources. You can view detailed summaries of indexed fields, tables, document types, and recent changes through the platform’s dashboard. This transparency ensures you always know exactly what data is available for search, analytics, or AI workflows, supporting compliance and data governance at every step.
Yes, all auto-generated APIs in AXYS are designed with enterprise-grade security. Each API endpoint is protected by a unique, secure token that controls access and permissions. You can easily manage, rotate, or revoke these tokens at any time for full security and compliance. This ensures that every API, whether for an individual, department, or custom solution, remains safe, private, and fully under your organization’s control.
General AXYS Platform Overview
AXYS is deployed directly in your own cloud or on-premises environment, inheriting all your existing security controls, firewall rules, and compliance policies by default. The platform operates entirely within your private infrastructure, so your data never leaves your environment. AXYS works with your established security groups, identity management, and DevOps standards, ensuring seamless alignment with your organization’s best practices. All AXYS APIs are secured with robust authentication and tokenization, giving you full control over data access and permissions. For extra protection, AXYS can run entirely behind your firewall, maintaining strict privacy and regulatory compliance at all times.
Integration and Connectivity
Yes, AXYS can be deployed entirely within your corporate firewall with no need for external access. The platform runs securely on your own infrastructure—cloud or on-premises—so all data processing, indexing, and orchestration stay fully private and under your control. This setup ensures strict compliance with internal security policies and regulatory requirements, keeping your business data completely isolated from outside networks.