Is the auto-generated API secure? Does AXYS provide a secure token for each endpoint?
Yes, all auto-generated APIs in AXYS are designed with enterprise-grade security. Each API endpoint is protected by a unique, secure token that controls access and permissions. You can easily manage, rotate, or revoke these tokens at any time for full security and compliance. This ensures that every API, whether for an individual, department, or custom
Read More
Can I see a report of what data AXYS is indexing?
Yes, AXYS provides clear, real-time reporting on what data is being indexed from all your connected sources. You can view detailed summaries of indexed fields, tables, document types, and recent changes through the platform’s dashboard. This transparency ensures you always know exactly what data is available for search, analytics, or AI workflows, supporting compliance and
Read More
Can I control which fields and data are indexed after connecting sources?
Yes, AXYS gives you full control over which fields and data are indexed from each connected source. Using the no-code interface, you can select or exclude specific fields, tables, or document sections both during initial setup and at any time afterward. You can easily add or remove fields—including new fields that appear in your sources—without
Read More
Can AXYS operate behind my corporate firewall with no outside access?
Yes, AXYS can be deployed entirely within your corporate firewall with no need for external access. The platform runs securely on your own infrastructure—cloud or on-premises—so all data processing, indexing, and orchestration stay fully private and under your control. This setup ensures strict compliance with internal security policies and regulatory requirements, keeping your business data
Read More
How does AXYS ensure data privacy and security within my environment?
AXYS is deployed directly in your own cloud or on-premises environment, inheriting all your existing security controls, firewall rules, and compliance policies by default. The platform operates entirely within your private infrastructure, so your data never leaves your environment. AXYS works with your established security groups, identity management, and DevOps standards, ensuring seamless alignment with
Read More