Key Features include:
Turn VMware onsite deployments into multi-tenant ready private clouds by easily integrating CMDB, networks, IPAM, DNS, Load Balancers, and more with no code required.
Networks will auto-populate from hypervisors and can be configured for DHCP or Static IPs.
Integrate SDN technologies such as Cisco ACI, and VMware NSX-V / NSX-T.
Leverage advanced cloud-native services in the ContourCloud, Azure, and other hyperscale clouds without compromise and without requiring IT teams to learn multiple public cloud toolsets.
Cinch exposes cloud native IaaS, DaaS, DRaaS, DBaaS and BaaS though a unified console and API. Enable a single public cloud account to be shared by everybody. Contour can manage the governance and reporting to simplify life for IT Operations.
There is a lot of noise about the Internet of Things (or IoT) and its impact on everything from the way we travel and do our shopping to the way manufacturers keep track of inventory. But what is the Internet of Things? How does it work? Is it Important? Devices and objects with built in sensors are connected to an Internet of Things platform, which integrates data from the different devices and applies analytics to share the most valuable information with applications built to address specific needs.
These powerful loT platforms can pinpoint exactly what information is useful and what can safely be ignored. This information can be used to detect patterns, make recommendations, and detect possible problems before they occur. Cinch enables the deployment of IOT by giving you full visibility into each device and allowing you to support, manage and deploy IOT with confidence.
Edge Computing is a distributed computing platform that brings computation and data storage closer to the location where it is needed to improve response times and save bandwidth. These platforms have evolved to host applications and components at edge servers, resulting in commercial edge computing services that hosted applications such as dealer locators, shopping carts, real-time data aggregators and ad insertion engines. Cinch allows for data to be processed before it crosses any wide area network (WAN) and therefore is NOT processed in a traditional data center, whether it be a private or public cloud data center.
All logins are protected by MFA (multi factor authentication) thereby requiring a second method of authorization to access the account with a code being confirmed over either email or text. Therefore, a user is only given access to the system by providing two or more pieces of information that uniquely identifies them.
A function-based segregation is applied from within the application. This allows for a user to be given a role (or number of roles) within an organization. The permissions throughout the application is then granted based on the scope of these roles.
Role optimization is available to advanced users for larger enterprises requiring more granular control over the roles available within Cinch.
Maintaining your active accounts is always a challenge within an organization and leaving accounts open after users transition away poses one of the major security risks. Cinch has automated features that will look for accounts that have been inactive for a period and report back to the admin and inactivate the user thus reducing the attack surface on your company account.
Application Programming Interface (API) is a messenger that will process requests and ensure seamless functioning of enterprise systems. An API enables interaction between data, applications, and devices from disparate systems through a single, known data definition. It delivers data and facilitates connectivity between devices and systems.
Cinch uses our API to perform a collection of data, protocols, definitions, and tools that permit the interaction and communication between Cinch components and third-party suppliers. This allows the Cinch Application to communicate with many different data formats and access points, anything from a web-based tool or application to CSV files collected from an FTP. With an API, clients can use an interface to request information from the application or perform an action on an individual object for example. Then, the application will pass the data to an API, which will interpret the information and provide a response. An API converts the returned data into something that the user can understand while maintaining a secure channel of communication and allowing access to automation for our customers.
Connectors provide the leverage to prebuild, reusable connectors to integrate with any data or system
Build your own connectors with our SDK
Use REST protocol through HTTPS
Certify your connector to make it available to any customer or partner through the Cinch Marketplace.
Cinch provides a web-based interface for designing, documenting, and testing APIs live within our Sandbox environment.
Sample code in various languages is available as part of the Cinch SDK
Stay up to date with Cinch's progress and what we have to offer! Please sign up for our regular updates.