Connectiware products are designed as purpose-built software components and appliances intended to operate as part of a controlled enterprise or operational technology environment. Depending on the product, functionality is delivered through one or more of the following components:
- A background service or agent responsible for runtime operation.
- A local configuration or management application, used only when authorized
configuration or maintenance is required. - Optional appliance hardware provided by the integrator or vendor.
Runtime Operation
During normal operation, Connectiware products execute as a non-interactive background service or agent. They do not require an active user session, desktop interaction, or continuous administrative access.
The runtime component is designed to:
- Start automatically with the operating system.
- Operate without user intervention.
- Continue functioning independently of local user logins.
This model reduces attack surface and aligns with enterprise expectations for unattended infrastructure components.
Configuration and Maintenance Model
Configuration, programming, and administrative tasks—where applicable—are performed through a separate local application or interface. This configuration capability:
- Is not required for normal runtime operation.
- Is intended for use by authorized personnel only.
- May require elevated privileges depending on system configuration.
- Is typically used during installation, commissioning, or planned maintenance.
This separation ensures that operational runtime remains isolated from configuration activities.
Service Health Endpoints
Connectiware and Connectimon expose local-only health endpoints to support external monitoring and service supervision.
These endpoints:
- Bind exclusively to the local loopback interface (localhost).
- Are not accessible remotely or over the network.
- Provide read-only health and readiness information.
- Do not expose configuration, credentials, or control functionality.
Health endpoints are intended solely for use by local monitoring tools and supervisory processes to verify service liveness, readiness, and operational status.
Remote Access Characteristics
Connectiware products do not include embedded remote command-and-control functionality. Remote access, if required, is:
- Provided by customer-approved tools and processes.
- Governed by customer security policy.
- External to the Connectiware product itself.
This design ensures that customers retain full control over how, when, and whether remote access is permitted.
Deployment Context
Connectiware products are deployed:
- On customer-owned or customer-approved infrastructure.
- By Certified Integration Partners.
- Within environments governed by customer security controls.
They are designed to coexist with enterprise security tooling such as endpoint protection, firewall enforcement, logging infrastructure, and monitoring systems.
Security Implications of the Architecture
This operating model:
- Minimizes interactive attack surface.
- Supports least-privilege execution.
- Separates configuration authority from runtime behavior.
- Enables customers to layer additional security controls without functional impact.
The specific data processed by Connectiware is defined entirely by customer configuration and the systems being integrated.