Skip to main content

Accessing evoML

Below are the five comprehensive deployment options for accessing the evoML platform, each tailored to different organizational needs and security requirements.

Option 1: Web Access via evoml.ai

Description: Access our fully-managed SaaS platform instantly through any standard web browser.

Key Benefits:

  • Zero installation requirements
  • Automatic updates and maintenance
  • Immediate access to new features
  • Globally optimized performance

Getting Started:

  1. Navigate to https://evoml.ai
  2. Create your secure evoML account with enterprise-grade authentication
  3. Begin using the platform immediately with our Quick Start Guide

Option 2: Deployment on a Dedicated Environment (TurinTech Cloud)

Description: A private, isolated instance of evoML hosted within our secure cloud infrastructure.

Key Benefits:

  • Dedicated computational resources
  • Enhanced security isolation
  • Customizable configuration options
  • Fully managed by TurinTech operations team

Getting Started:

  • You will receive a unique access URL for your environment
  • Estimated setup time: 1 hour

⚠️ Please note:
Associated costs may apply. For pricing and setup details, contact your TurinTech representative or email us at support@turintech.ai.


Option 3: Deployment on Your Own Cloud Infrastructure

Description: Deploy evoML within your existing cloud environment (AWS, Azure, GCP, or other supported providers).

Key Benefits:

  • Leverage your existing cloud security policies
  • Data remains within your infrastructure boundaries
  • Integration with your existing cloud services
  • Custom network configuration options

Available Deployment Methods:

Kubernetes Deployment

For enterprise-scale deployments with high availability requirements.

Docker Deployment

For smaller deployments or evaluation environments.

Estimated setup time: 2-4 hours depending on deployment method


Option 4: On-Premise Deployment

Description: Full installation of evoML within your organization's private infrastructure behind your firewall.

Key Benefits:

  • Maximum data sovereignty and security control
  • Compliance with strict regulatory requirements
  • No external network dependencies possible
  • Integration with internal authentication systems

Available Deployment Methods:

On-Premise Kubernetes

  • Ideal for enterprise environments with existing Kubernetes infrastructure
  • For detailed installation instructions, see our Kubernetes Deployment Guide

On-Premise Docker

  • Simpler deployment for smaller installations
  • For detailed installation instructions, see our Docker Deployment Guide

Estimated setup time: 4-8 hours depending on existing infrastructure