Skip to content

Introduction to ADP Solution#

Solution Overview#

The ADP solution is entirely focused on streaming analytics, that is, analyzing data in motion. It is optimized for collecting data close to the source and then analyze the data in real-time. The results can be delivered to machines, storage systems, or other local systems as well as to the cloud by using pre-built connectors for common systems and services.

c-Solution

The ADP Solution consists of two parts:

  • The ADP Edge - A software platform that runs in a Docker container close to the sources of data. This is where data is collected, processed, and results are delivered to different receivers. Either on-premise or in the cloud.
  • The ADP Cloud - A web service that is used to design the processing flows to run in ADP Edge nodes by using the Flow Studio visual designer. The Edge Director is then used to deploy and update flows running on ADP Edge nodes and to monitor the operation of all installed ADP Edge nodes.

Security Overview#

The ADP solution is designed with security as a top priority. Security comes into play in different places: - Who has access to what data? - Who has access to what systems?

The following security principles have been implemented in the ADP solution:

  • All communication between ADP Edge nodes and the cloud service is initiated at the ADP Edge nodes. This is to avoid having to open ports in firewalls for inbound internet traffic.
  • ADP Edge nodes must register with the cloud service using a unique ID and access key before any management operations can be performed.
  • All communication between ADP Edge nodes and the cloud service is encrypted using HTTPS on standard ports.
  • Data outputs from flows running on ADP Edge nodes implement the security mechanisms supported by the receiving end.
  • Endpoints for receiving data into an ADP Edge node, such as MQTT and HTTP, can be configured to require authentication and encryption.
  • Sensitive information, such as credentials, is stored securely in the cloud service and the information is never exposed to end users, except when first entered into the system.