Skip to content
Platform ExplainerApr 20229 min read

Multi-Tenant IoT: How VX-Olympus Manages Hundreds of Sites From One Platform

VX-Olympus
multi-tenantvx-olympusdata-isolationrbacwhite-labelsystems-integratorsite-managemententerprise-iothierarchical-tenancy

You built your first IoT deployment for one customer. It worked. So you built a second. Then a third. Each new site got its own deployment, its own login, its own support ticket queue. Twelve customers later, you have twelve platforms to maintain, twelve credential sets, and zero visibility across all twelve from a single screen.

This is not an IoT problem. It is an architecture problem — and it is the reason most systems integrators hit a ceiling between 5 and 15 customers. The expansion model never scaled because multi-tenancy was never built into the foundation.

VX-Olympus was architected differently. Multi-tenancy is not a feature added on top. It is the structural model the platform was built around from day one.


The Scaling Problem in Managed IoT

When a systems integrator or enterprise operations team manages IoT across multiple sites, they face a choice: deploy one platform instance per customer, or find a platform that handles isolation at the software layer.

Per-site deployment seems simpler at first. Each customer has their own environment. But every new customer adds: a server to provision, a platform instance to update, credentials to manage, a support queue to monitor, and no way to see all sites. At five sites, this is painful. At fifty, it is a full-time operation before a single engineering task gets done.

True multi-tenancy inverts that math. One platform instance. Unlimited tenants. Each tenant sees only their own data. Your admin sees everything. Updates deploy once, not N times.


How VX-Olympus Multi-Tenancy Works

Hierarchical Tenant Structure

VX-Olympus implements a hierarchical tenant model. The top level — the platform administrator — holds full visibility across all tenants. Below that, you can create tenant hierarchies as deep as your business model requires.

A common structure for systems integrators:

graph TD A[Platform Admin] --> B[Region: Central US] A --> C[Region: West US] B --> D[Customer A — 8 sites] B --> E[Customer B — 3 sites] C --> F[Customer C — 12 sites]
Scroll to see full diagram

Each node in the hierarchy can have its own users, its own devices, its own dashboards, and its own notification rules. A regional administrator sees all customers in their region. A customer administrator sees only their own sites. A floor technician sees only the devices assigned to them.

The hierarchy can be restructured without data loss. If a customer expands from one region to two, their tenant moves — the historical data moves with it.

Complete Data Isolation

Tenant isolation in VX-Olympus is not row-level database filtering. Each tenant operates in an isolated data namespace. A misconfiguration at the application layer does not expose one tenant’s data to another.

Device telemetry, alert history, user activity logs, dashboard configurations, and API keys are scoped to the tenant. There is no query path from Tenant A to Tenant B’s data — not through the API, not through the dashboard, not through the rule engine.

This is the architecture you need when your customers have compliance requirements. Healthcare facilities, government agencies, and defense contractors cannot share infrastructure with other tenants in a way that creates even theoretical data exposure. The isolation model closes that risk.

Role-Based Access Control (RBAC)

Within each tenant, VX-Olympus applies granular RBAC. Access is defined at the role level, not the user level — assign a user to a role, and permissions follow.

Standard role categories:

Role Access Level
Platform Admin All tenants, all operations
Tenant Admin Full access within their tenant
Operator View + acknowledge alerts; cannot modify config
Read-Only Viewer Dashboard viewing only; no control access
Device Manager Device provisioning only; no alert or rule access

Roles are composable. A site manager at a 12-site customer might have Tenant Admin rights on 3 sites they own and Operator rights on 9 sites shared with other managers. RBAC handles that without requiring a role for every possible combination.


White-Labeling: Your Brand, Not Ours

Systems integrators and OEM hardware manufacturers often sell IoT capabilities under their own brand. Their customers should see the integrator’s name and logo, not Viaanix’s.

VX-Olympus supports per-tenant white-labeling:

  • Custom domainiot.yourbrand.com instead of viaanix.com
  • Logo and color scheme — your brand identity applied at the tenant level
  • Email notifications — sent from your domain with your template design
  • Login page — custom background, branding, and copy per tenant
  • In-app headers — product name and visual identity are yours

Each tenant can have a different brand identity. A systems integrator managing customers in both the retail and agriculture verticals can present a different brand face to each customer group — all running on one VX-Olympus instance.


Cross-Tenant Visibility for Administrators

The tenant isolation model is about what customers see. It is not a limit on what your administrators can see.

A platform administrator or systems integrator account in VX-Olympus has an aggregated view across every tenant:

  • Device count by tenant — how many active endpoints per customer
  • Alert status across all sites — active alerts in any tenant surface to the admin dashboard
  • Gateway health across all networks — offline gateways in any tenant are visible at the top level
  • Usage metrics — data volume, API call rates, active users per tenant

This cross-tenant view is the operational layer that makes managed services economically viable. One engineer monitors 50 deployments from a single screen — escalating to individual tenant context only when a specific site needs attention.

graph LR A[Admin Dashboard] --> B[All Tenants Health] B --> C[Tenant: Alert Active] B --> D[Tenant: Normal] B --> E[Tenant: Gateway Offline] C --> F[Drill Into Tenant]
Scroll to see full diagram

Multi-Tenancy in Practice: The Systems Integrator Model

Here is how a systems integrator structures a VX-Olympus deployment for a managed services business:

Provisioning a new customer takes under an hour. Create a tenant, assign a subdomain, set the brand identity, provision initial users, and create the first device group. The customer receives login credentials to their isolated portal. The integrator adds a new row to their admin view.

Supporting a customer issue requires no credential shuffling. The integrator clicks into the customer’s tenant from the admin view. Full context: device status, recent alerts, historical telemetry, active rule chains. Issue resolved; return to the admin view.

Rolling out a platform update deploys once. Every tenant receives the update simultaneously. No deployment pipeline per customer. No version drift across tenants.

Onboarding 50 customers requires 50 tenant provisioning events — not 50 infrastructure deployments. The platform scales to the number of tenants without linear infrastructure growth.


When You Should Care About Multi-Tenancy

Multi-tenancy is not a feature that matters for a single-site deployment. If you are monitoring one factory for your own operations, a single-tenant deployment is simpler and entirely appropriate.

Multi-tenancy becomes critical in three scenarios:

  1. You are a systems integrator or managed services provider deploying IoT for multiple customers. The question is not whether you need multi-tenancy — it is whether you want to build it yourself or use a platform that has it.

  2. You operate across multiple business units, facilities, or brands that require separate data environments. A retail group with 8 regional brands does not want Brand A’s store managers seeing Brand B’s operational data.

  3. You have compliance requirements for data isolation. Healthcare, government, and defense deployments often have contractual or regulatory requirements that prohibit shared data environments. Multi-tenancy at the architecture level satisfies those requirements in a way that application-layer filtering does not.


The Outcome

Building on VX-Olympus’s multi-tenant architecture changes the economics of managed IoT:

  • Each new customer is a provisioning event, not a deployment project
  • Support overhead does not scale linearly with customer count
  • Platform updates deploy once, not N times
  • Cross-customer analytics are available without data exports
  • Compliance-grade data isolation is an architecture characteristic, not a configuration toggle

The platform was built to grow with the business that runs on it. From 5 customers to 500, the operational model stays the same. What scales is revenue — not the complexity of keeping the lights on.


Ready to Build on Multi-Tenant Architecture?

If you are managing multiple IoT deployments today and feeling the friction of per-site operations, the answer is not more automation scripts — it is a different platform architecture.

Explore VX-Olympus multi-tenancy or talk to our team about mapping your current deployment model to a multi-tenant architecture that scales.

Ready to see how this applies to your operations?

Every article describes real capabilities you can deploy today.