Vectice Docs
API Reference (Latest)Vectice WebsiteStart Free Trial
25.1
25.1
  • 🏠Introduction
    • Vectice overview
      • Autolog
      • Next-Gen Autolog [BETA]
      • AskAI
      • Vectice for financial services
  • 🏁Quickstart
    • Getting started
    • Quickstart project
    • Tutorial project
    • FAQ
  • ▶️Demo Center
    • Feature videos
  • 📊Manage AI/ML projects
    • Organize workspaces
      • Create a workspace
      • Workspace Dashboard
    • Organize projects
      • Create a project
      • Project templates best practices
    • Invite colleagues
    • Define phase requirements
    • Collaborate with your team
  • 🚀Log and Manage Assets with Vectice API
    • API cheatsheets
      • Vectice Python API cheatsheet
      • Vectice R API cheatsheet
    • Connect to API
    • Log assets to Vectice
      • Autolog your assets
      • Log datasets
      • Log models
      • Log attachments and notes
      • Log code
      • Log a custom data source
      • Log assets using Vectice IDs
      • Log dataset structure and statistics
      • Log custom metadata in a table format
      • Log MLFLow runs
    • Retrieve assets from app
    • Manage your assets
    • Manage your iteration
    • Preserve your code and asset lineage
  • 🤝Create Model documentation and reports
    • Create model documentation with Vectice Reports
    • Streamline documentation with Macros
    • Auto-document Models and Datasets with AskAI Prompts
    • Document phase outcomes
  • 🗂️Admin Guides
    • Organization management
    • Workspace management
    • Teams management
    • User management
      • User roles and permissions
      • Update a user role in your organization
      • Activate and deactivate users
      • Reset a user's password
    • Manage report templates
  • 🔗Integrations
    • Integrations Overview
    • Integrate Vectice with your data platform
  • 💻IT & Security
    • IT & Security Overview
    • Secure Evaluation Environment Overview
    • Deployment
      • SaaS offering (Multi-Tenant SaaS)
      • Kubernetes self-hosted offering
        • General Architecture & Infrastructure
        • Kubernetes on GCP
          • Appendices
        • Kubernetes on AWS
          • Appendices
        • Kubernetes on Azure
          • Appendices
        • GCP Marketplace deployment
        • On premise
        • Configuration
      • Bring Your Own LLM Guide
    • Data privacy
    • User management
    • SSO management
      • Generic SAML integration
      • Okta SSO integration
    • Security
      • Data storage security
      • Network Security
        • HTTPS communication
        • Reverse proxy
        • CORS/CSRF
        • VPC segregation
      • Sessions
      • Secrets and certificates
      • Audit logs
      • SOC2
      • Security updates
      • Best practices
      • Business continuity
    • Monitoring
      • Installation guide
      • Customizing the deployments
    • Maintenance & upgrades
    • Integrating Vectice Securely
  • ⭐Glossary
    • Concepts
      • Workspaces
      • Projects
        • Setup a project
      • Phases
      • Iterations
        • Iterative development
      • Datasets
        • Dataset resources
        • Dataset properties
        • Dataset lineage and versions
      • Models
      • Reports
  • 🎯Release notes
    • Release notes
  • ↗️References
    • Vectice Python API Reference
    • Vectice R API Cheatsheet
    • Notebooks and code samples
    • Vectice website
Powered by GitBook
On this page
  • What is Multi-Tenant architecture?
  • Understanding our Multi-Tenant architecture
  • Benefits of our Multi-Tenant approach
  • Security in a Multi-Tenant environment
  • Transparency and control
  • Conclusion
  1. IT & Security
  2. Deployment

SaaS offering (Multi-Tenant SaaS)

What is Multi-Tenant architecture?

In a multi-tenant architecture, a single application instance serves multiple customers, each called a tenant. Imagine a high-rise apartment building. The core structure (electrical, plumbing) is shared, but each apartment (tenant) has its own space and security measures. Similarly, our core software infrastructure is shared, but your data and configuration are private and secure.

Understanding our Multi-Tenant architecture

Our goal is to ensure your data is secure and performance is reliable. Here, we highlight how our multi-tenant approach delivers both with our Software as a Service (SaaS) offering.

Benefits of our Multi-Tenant approach

  • Cost-Effectiveness: By sharing resources, we can offer our solution at a competitive price point. You benefit from economies of scale without sacrificing functionality.

  • Scalability: Our infrastructure is built to handle multiple tenants seamlessly. As your needs grow, additional resources can be readily provisioned.

  • Automatic updates: We manage the underlying infrastructure and application updates. You receive the latest features and security patches automatically, reducing your IT burden.

  • Focus on your business: Our multi-tenant architecture frees you from managing servers and software upgrades. You can focus on core business activities while we ensure the software stays up-to-date and secure.

Security in a Multi-Tenant environment

Security is our top priority. Here's how we ensure your data remains secure:

  • Data isolation: Your data is logically separated from other tenants' data. We employ robust access controls to ensure each tenant can only access their own information.

  • Regular security audits: We conduct regular penetration testing and vulnerability assessments to identify and address any potential security risks.

  • Secure infrastructure: Our infrastructure is hosted in secure data centers with industry-standard security measures.

Transparency and control

We understand the importance of transparency and control. Here's what you get:

  • Detailed Audit Logs: Track all user activity within your account to maintain accountability.

  • Role-Based Access Control (RBAC): Define user permissions within your organization, ensuring only authorized personnel can access specific data or functionalities.

  • Dedicated Support: Our support team can assist you with any questions or concerns about our multi-tenant architecture or your account.

Conclusion

Our multi-tenant architecture offers a secure, scalable, and cost-effective solution for your business needs. We are committed to providing a robust platform that empowers you to focus on your core business objectives with complete peace of mind regarding your data security.

PreviousDeploymentNextKubernetes self-hosted offering

Learn more about the security measures implemented by Vectice in .

💻
our dedicated section