Skip to main content
Cyberwave Logo
Cyberwave Component

Cloud Platform

A secure, multi-tenant control plane for orchestrating assets, data, and automation programs.

Unified Command Center

The cloud platform anchors every Cyberwave deployment. It provides role-based access, observability, and integrations with enterprise systems.

What the Cloud Platform handles

The control plane that keeps teams, assets, and environments aligned.

Identity & permissions
Workspaces, organizations, invitations, and access controls for teams and automation programs.
Asset & twin registry
Catalog assets, attachments, URDF projects, and instantiate twins inside environments.
Orchestration primitives
Projects/environments, workflows, controller policies, and lifecycle management.
Observability foundation
Telemetry surfaces, event streams, and run artifacts that power monitoring and debugging.

Deployment options

Cyberwave is designed to meet teams where they operate—from modern cloud stacks to regulated environments.

Run Cyberwave where it fits your org

Choose the control-plane deployment model that matches your security, compliance, and procurement needs.

Cyberwave Cloud
Use our managed cloud control plane for the fastest time to value and minimal operational overhead.
Your hyperscaler
Deploy the backend into your AWS/GCP/Azure account to align with existing VPC controls, logging, and identity.
On‑prem / air‑gapped
Run Cyberwave in your datacenter or isolated networks for sensitive environments and strict data residency.
Terraform-based rollout (Enterprise)
Use simple Terraform deployments and enterprise support for production-grade on‑prem or private cloud installs.

Key Functions

  • Workspace management for projects, digital twins, and skills with fine-grained permissions.
  • Data services delivering time-series storage, event streaming, and APIs for analytics tools.
  • Enterprise connectors linking MES, ERP, PLM, and ITSM systems into the automation lifecycle.

Security & Compliance

Built with zero-trust principles, encryption, auditing, and regional deployment options to satisfy regulated industries.