The RyvitAgent is the technological doorway that allows data to move securely between your systems and the Ryvit Platform.
PLEASE READ IF YOU ARE A SAGE CUSTOMER:
As of July 1, 2021, Ryvit will no longer guarantee compatibility with Sage versions older than 18. For best results, please make sure your instance of Sage is 18+. Thank you!
Ryvit is the Marketplace for Construction Technology. Ryvit works with many Construction Technology software companies to co-develop integration solutions that are pre-built and ready to activate for Customers in the Marketplace. Those integration solutions are available in the Marketplace and can be subscribed to and customized based on available configuration options.
One key aspect of being able to use and receive benefit from the use of an integration solution in the Ryvit Marketplace is the ability to establish a connection to certain systems available in the RyvitNetwork, especially those systems that are still installed on local server infrastructure that reside on-premise, behind a firewall, with no web-based connectivity available.
The RyvitAgent is the feature of the Ryvit platform that establishes secure connections to these types of systems. The RyvitAgent is responsible for controlling the overall security profile for the Ryvit platform to communicate with the local system and its respective data source, whether that is in the form of a database, files, or many others.
At a more technical level, the RyvitAgent is a streamlined and lightweight Windows service that can be installed, monitored, and maintained within a Windows server environment. This service that is installed and setup to run, once the Agent is installed, can be utilized to broker connectivity between the local system’s data and the Ryvit platform. The RyvitAgent routinely checks in with the platform to maintain communication and receive instructions. If instructions are provided, the Agent is responsible for simply executing those instructions, placing the results into an encrypted packet that can be issued back to the platform via a response stream for efficient processing.
The RyvitAgent is setup via a simple installation wizard in just a few quick and intuitive steps. The average time to download and install the Agent takes less than 5 minutes. The RyvitAgent security profile is outlined as follows:
- All communication occurs via HTTPS; this means no additional firewall ports need to be touched, and ensures that data in motion is encrypted and secured via well accepted and universal communication protocol.
- Functionally, communication is performed between the Agent and the platform via an internal API that enables a secure and private authorization mechanism for an added security layer.
- Because processing occurs within the Ryvit platform vs. in the local environment, local resources are protected from expanded or inappropriate use.
- The RyvitAgent has a monitoring feature for the platform to establish, maintain, and monitor the connection between the Agent and platform.
- For versioning and updates, the Agent is programmed to automatically maintain and update itself to the latest versions available, as available, from the platform.
Current Version - 1.0.623.0
- Updated service and monitoring restart capabilities, eliminating customer interaction for connector and monitoring app restarts.
Ryvit Agent System Requirements
Your device must meet all minimum requirements to install:
|Operating System||Windows Server 2008 or more recent|
|.NET Framework||4.6.1 or Higher (download here)|
Agent Installation Instructions
- Ensure that your server meets the minimum requirements specified in this guide.
- Download the zip file from the email you received from firstname.lastname@example.org
- if you did not receive an email, please reach out to email@example.com
- Move the zip file to the server where your ERP is hosted
- Run the Install
- Follow the instructions in the wizard. When prompted, use the activation code provided in the email to activate the Ryvit Agent and complete the installation.
- Follow up your assigned implementation point of contact on the Ryvit team once the Agent is installed so that Ryvit can ensure the connection is established and work with you to set up credentials or necessary credentials to the system/data source being connected to.
The RyvitAgent comes complete with security to protect your pertinent data. Below outlines the measures Ryvit takes to ensure your data is secure and protected. Additionally, there is a list of FAQs at the bottom of this document highlighting some additional questions our team commonly receives.
Data is passed through HTTPS web services and via private REST API’s designed specifically to enable communication with the Ryvit platform. All data, whether in transit or at rest is encrypted via AES256. This allows for your data, regardless of the state, to be protected and encrypted at all times. Once data is streamed from the Agent into the Ryvit platform, data is persisted, cached, and processed as specified by the specific use cases of any single integration solution.
|Are APIs exposed to the tenants?||Yes. APIs are available to assigned customers/tenants. They are protected with access and authorization controls, and they may be disabled.|
|What's the key chain size?||2048|
|How is tenant/client data and metadata accessed, analyzed, and shared with cloud partners and providers? Specifically, is metadata sent to advertising and external analytics?||Tenant/client data and metadata are not collected, analyzed, or shared with other parties.|
|Is data segregated between different tenants that are stored in a shared environment?||Yes. Data is logically segregated using a tenant ID with strong validated access controls.|
|Does the application provide anti-virus and malware scanning capabilities before storing files on destination servers?||No. Shared files are text files (i.e. configuration files) with strict parsing controls and input parameter validation.|
|Is there a policy in place with technical measures to prevent the execution of malware on organizationally-owned or managed end-point devices used by administrators (i.e., issued workstations, laptops, and mobile devices)?||Yes.|
|Does your software development standard address the OWASP Top 10 and CVE common web application coding mistakes?||Yes.|
|What is the expiry date of the SSL certificate?||Less than one year.|
What is the method of SSL certificate management?
|SSL Certificate signed by Trusted Certificate Authority.|
|What is the signature algorithm for the SSL certificate?||SHA-2|
|Authentication & Authorization Criteria||Answer|
|Does your service authenticate and verify user access rights prior to disclosing information or granting access to business functionality and/or data?||Yes.|
|What are the standards followed to store user passwords?||Hashed with SHA-256 or PBKDF2|
|Does your service enforce password expiration and password rotation policies for all users, local, administrative and system account passwords?||Yes.|
What type of administrative access is allowed to the hosted service?
|Only internal access is granted.|
Has restricted root and sudo access been implemented?
|Do you have controls and processes to ensure immediate removal of system access which is no longer required for business purposes?||Yes.|
|Privacy and Data Security Criteria||Answer|
|What protocol is used for data transfer from the customer to Ryvit and vice versa?||
HTTPS web services/REST API
|Do you maintain backup copies of "sensitive" tenant and "essential business" data?||Yes. But only for data that must maintain state and/or does not expire.|
|Does the service encrypt backup copies of sensitive data?||
Yes. Backup data is encrypted both at rest and in transit.
|What is the encryption mechanism for "Back-Up Data"?||AES256|
|What are your retention policies for tenants' data?||Tenants' data is archived/stored based on country-specific business, legal, or global regulatory specifications.|
|Do you isolate the management network from the application network?||Yes.|
|What is your hosted infrastructure service provider?||Microsoft Azure Platform|
|Do you allow tenants to perform an independent 3rd party vulnerability assessment on the system(s)?||This procedure does not currently exist. But, exceptions can be made upon request, with appropriate approvals, change control, and cost reimbursement.|
|Do you track third-party software and libraries in your product/service and identify vulnerabilities?||Yes.|
|Do you have the ability to rapidly patch "zero-day" vulnerabilities?||Yes.|
|Do you have the capability to rapidly patch vulnerabilities across all of your computing devices, applications, and systems?||Yes.|
|When was the last run of your "Application Vulnerability" report?||Within the last 12 months.|
|Logging and Auditability||Answer|
|How do you log changes to the system(s)?||We use multiple methods, depending on the functional process, including local files, database tier, development work management, and tracking tools.|
Do logs contain sensitive data?
|Is access to audit logs restricted to authorized users only?||Yes.|
How long are audit logs retained?
|More than 60 days.|
|Support and Operations||Answer|
|How are your environments set up to support the platform and overall solution?||
We provide local, development, test, staging, and production environments for each phase of the development process.
|Is there a “Change Control Board” in place that reviews and authorizes Routine and Emergency modifications to the systems?||Yes.|
|What's the source of test data in testing (or non-production) environments?||No production data is ever copied into Ryvit testing environments. When customer/tenant testing environments are leveraged for Use Case / Validation / Usability testing, Ryvit does not have control of the dataset as it belongs to each tenant.|
|Incident Analysis and Forensic||Answer|
|Does Ryvit have a notification process to inform impacted tenants in case of a “Security Incident/Breach”?||Yes.|
Have there been any “Security Incidents/Breaches” in the last six months?
Didn't get the help you were looking for? Ask us anything at firstname.lastname@example.org.