Skip to main content

iCATs
IT Process Automation

iCATs is a webapplication with which you can easily centralize, automate and schedule your IT
processes and run them on as many remote systems as you want without the need of agents!
Controlling and monitoring your IT processes via iCATs webbrowser interface makes it easy to handle
processes and be up to date about their status at any time.

USABILITY

The use of iCATs happens exclusively via Web browser, intuitively and logically.
The integrated quick links make it possible to jump from one site to another within the application without loosing time to look for the page in the menu.

SCRIPT EXECUTION

Scripts of any kind and user-defined commands can be uploaded, versioned and stored in iCATs. They can be run locally (where iCATs is installed) and on as many remote target systems (Linux / Windows) as you want, immediately or in the future, once or at regular intervals, manually triggered or controlled by a job scheduler. iCATs can also be used to copy files of any kind, stored in iCATs, from iCATs to remote target systems.

API EXECUTION

All iCATs tasks can be executed directly on the command-line with the same Authentication and Authorisation features as on the Web Interface. Each user has it's own random generated API-KEY.

MULTI-TENANT CAPABILITY

Projects and their processes are defined for each client. Each iCATs user has access to exactly those clients and their processes for which he is entitled to. A tenant may be a customer or a department within the company.

JOB SCHEDULING

Job schedules can easily be created, combined with each other, and assigned to any task.

PROCESS MONITORING

Processes, triggered manually or via schedule, are recorded according to the chosen log level. Tracking the progress of a process is very simple via Web browser GUI at any point of time. Process monitoring also happens automatically via email notification.

SECURITY

Each connection of iCATs to a remote target system is made via secure ssh2 tunnel. There is no need to install agents in order to run a script on the target system. All passwords whether iCATs user passwords or passwords of stored connections to remote target systems are encrypted.

VERSIONING

All files that are uploaded into iCATs are versioned. The versioning functionality of iCATs enables you to store any files in iCATs centrally and identified by a version number.