Technology

Predictive Analytics as a Service for the Enterprise

Are you a developer? Looking for technical docs? Visit our Developer Portal.

Developer Portal
Built for Big Data

Built for Your Data

The platform can handle big, small, messy, and/or siloed data.
  • Fault-Tolerant High Availability distributed architecture
  • Scales elastically to accommodate big data volume
  • Compatible with streaming or batch data
  • Data agnostic

Enterprise-Grade Security

We take security very seriously. Your data is safe on the Predikto Enterprise Suite.
  • Encryption at REST API Authentication layer
  • Virtual Private Cloud deployments
  • Encrypted data transfer
  • Encrypted data storage
Integrate. Extend.

Integrate. Extend.

The Predikto Platform is designed to integrate with your systems and extend your existing capabilities.
  • Open-Source Developer SDKs in several languages
  • Well-Documented public REST APIs
  • Web-Hooks for integrating to your operations systems
  • Query DSL for slicing and dicing of sensor and prediction data

Deployment Options

The Predikto Enterprise Suite can be deployed in a variety of configurations to satisfy your requirements.
  • Deployment choices across all continents
  • Virtual Private cloud offering
  • Proven data integration with GE Predix Platform
Deployment Options
  • Predikto's software is fully optimized to run and scale the necessary cloud architecture, including Intel Core technology, to meet the demands of our customers.
  • Predikto also works and integrates with IoT technology solution partners including Intel, AWS, Microsoft Azure, GE Predix, Splunk, and Hitachi Lumada.

More on Security

Data Encryption

At Rest: The Predikto Platform uses file-based and database storage for customer data. This data is automatically encrypted using Advanced Encryption Standard (AES) 256, a secure symmetric-key encryption standard that uses 256-bit keys. In Transit: The Predikto Platform uses encrypted communication channels to receive customer data and also when transmitting that data between application components. SSL over FTP (FTPS) and SSL over HTTP (HTTPS) are protocols in use.

Secure Access

AWS API endpoints and the Predikto Enterprise Suite allow HTTPS so that secure communication sessions can be established using SSL. Firewalls: The AWS compute and storage instances used by the Predikto Platform use an IP address whitelist approach to accessibility. Internal-only instances allow access to only known, whitelisted IP addresses and port ranges. Public-facing instances also apply port range filtering. Unique Users: All users of AWS and Predikto Platform are independent and unique and can be assigned security roles to ensure the appropriate application access and data visibility.

Deployment Options

The Predikto Enterprise Suite is available on a variety of cloud-based locations. The deployment options are designed to benefit from a complete SaaS deployment managed and hosted by Predikto. The Predikto AWS cloud environment encompasses robust security features provided by AWS in addition to our own application security layers. The Predikto Enterprise Suite can be deployed on the Predikto cloud environment hosted on any regional AWS location or on a Amazon Virtual Private Cloud (VPC). When using the Amazon VPC there are four deployment options that can be applied depending on the customer requirements.
  • VPC with a Single Public Subnet Only
  • VPC with Public and Private Subnets
  • VPC with Public and Private Subnets and Hardware VPN Access
  • VPC with a Private Subnet Only and Hardware VPN Access

Start the journey to predictable operations today. Contact Us