Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 9 Next »

Devo is a data analytics platform designed to improve access to data across an enterprise—both streaming and historical, in real-time and at scale—enabling businesses to use this data to reveal the analytic insights contained in operational data from all kinds of sources such as devices, machines, applications, and users. A powerful query engine and an intuitive user-interface combine to enable all kinds of professional profiles within an organization to carry out even the most complex data operations.

In this article you can find the answers to the following questions about Devo:

What kind of data can Devo manage?

Devo can ingest event data from any kind of data source, including: 

  • IT network devices and endpoints

  • Network components

  • Cloud services

  • IoT devices 

  • Business and consumer applications

  • Social network data feeds

  • Databases

Devo already supports events generated by several hundred commonly-used public technologies. Check out the list.

How is data sent to Devo?

Devo supports the delivery of encoded data using standard protocols including TLS/SSL, TCP, UDP, HTTP, and more. Data can be sent directly from the event source to the Devo cloud using X.509 public-key certificates for secure data transmission, as long as the corresponding Devo tag can be applied at the source. Otherwise, the data can be sent to a Devo relay, which can apply the correct Devo tag and forward the data securely to the Devo Cloud.

Data is sent in real-time, unless otherwise configured for deferred delivery.

What about data security and access control?

Data transmission

All data sent to the Devo cloud repository over the internet, including data sent using a Devo relay, uses TLS/SSL encryption and X.509 public-key authentication.

REST API access

Queries made using the Devo REST API are secured using token-based authorization with API keys. Read more here.

Data integrity

In Devo, all data is saved with an eventdate that records the moment when the event was ingested by the platform. The events are saved in raw format, unparsed. The original data is never changedyou will always have a perfect record of the data that was received by Devo.

Devo web application access

In addition to the required password-based authentication, domain administrators can choose to implement SAML, OpenID and/or MFA protocols for logins to the Devo web application. Learn more.

Application features and resources

Role-based permissions let domain administrators control who can access Devo features and functionality, as well as resources like shared Activeboards, applications, alerts, and lookups. This provides an exceptional level of access control. Learn more about users and roles.

Access to data tables

Finders are the main mechanism for accessing data tables in Devo. Admin users can customize the default and custom finders so that each one grants access to limited and specific sets of data tables. A single user's access to data tables is therefore determined by the finders permitted for the role(s) they have in the domain. It's a flexible system that allows for all the granularity of control that you need. To learn more about finders, start here.

How does Devo help you leverage your data?

Devo simplifies the use of your enterprise data by performing the following critical functions:

  1. Collect and centralize - Store all of your data in a single, secure repository
    All data collected in the repository is stored in its raw format and is never indexed to allow quick access.

  2. Search and analyze - Fast access to data and easy-to-use features to build powerful queries
    Browse, search, and analyze your information in visually-driven data tables. No programming knowledge is required, but users familiar with LINQ can use scripting to complement their work in the UI.

  3. Inform - Real-time or scheduled alerts make sure you know about important events
    Stay on top of your systems and the data they generate by building alerts based upon queries. When triggered, alerts can be distributed through several channels, including email, PagerDuty, Jira, and Slack—all according to a schedule that you control.

  4. Visualize - Build powerful dashboards that are always up-to-date
    Use a wide array of charts, tables, and maps to communicate the insights you've gained for your data analysis efforts. Customize the look and feel of these visual reports and share them within your organization.

  • No labels