All Systems Operational

Updated a few seconds ago

Commerce Manager




Operational

Stores




Operational

ECP Store Fronts




Operational

Web Services




Operational

Backend Commerce Services




Operational

Preorder Services




Operational

Task Scheduler




Operational

Global Address Services




Operational

DNS




Operational

Image Generation




Operational

Tokenization Services




Operational

Tecsys Support




Operational

Developer Virtual Machines




Operational

REST API Layer




Operational

Business Intelligence




Operational

External Services

Locations

Scheduled Maintenance

Schedule

September 28, 2025 9:00PM - 11:59PM EDT
September 29, 2025 1:00AM - 3:59AM UTC

Components

Commerce Manager, Stores, Web Services, Backend Commerce Services, Preorder Services, Task Scheduler, Global Address Services, REST API Layer

Locations

AZ1 (Azure West Europe), AZ3 (Azure East US)

Description

To continue improving service quality and performance, we have planned infrastructure maintenance. Please note that during this maintenance, a brief connectivity interruption may last only a few seconds.

Schedule

September 30, 2025 9:00PM - 11:59PM EDT
October 1, 2025 1:00AM - 3:59AM UTC

Components

Commerce Manager, Stores, Web Services, Backend Commerce Services, Preorder Services, Task Scheduler, Global Address Services, REST API Layer

Locations

AZCA (Azure Canada Central)

Description

We will be performing scheduled infrastructure maintenance to enhance the security of our platform communications. As part of our ongoing security enhancement, starting Sep 30, 2025, TLS1.1 will be permanently disabled in the AZCA environment and we will enforce support for only modern, secure TLS cipher suites used by our platform to communicate over the internet. This change will not be reverted and aligns with industry best practices to support stronger encryption and improved data protection. The following ciphers suites will be supported: <b> TLS_AES_128_GCM_SHA256 TLS_AES_256_GCM_SHA384 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 </b> These changes help ensure: - Stronger protection for data transmitted across the platform - Better compliance with industry security standards (e.g., PCI DSS, SOC 2) - Improved compatibility with the latest browsers, devices, and client libraries <b>What does this mean for you?</b> Clients may need to update their servers before TLS1.1 and weak ciphers are disabled to ensure support for strong ciphers.

Schedule

October 7, 2025 10:00AM - 1:00PM EDT
October 7, 2025 2:00PM - 5:00PM UTC

Components

Commerce Manager, Stores, Web Services, Backend Commerce Services, Preorder Services, Task Scheduler, Global Address Services, REST API Layer, Business Intelligence

Locations

Sandbox (Azure Canada Central)

Description

We will be deploying our Platform release 25.6 to Sandbox on Tuesday October 7th at 10am ET. This release includes upgrades to our Stores and Commerce Manager applications, as well as API upgrades. The release notes are available at https://mailerhub.tecsys.com/hubfs/OD-Release-Notes/Tecsys-OD-Release-Notes-25-6.pdf

Schedule

October 7, 2025 9:00PM - 11:59PM EDT
October 8, 2025 1:00AM - 3:59AM UTC

Components

Commerce Manager, Stores, Web Services, Backend Commerce Services, Preorder Services, Task Scheduler, Global Address Services, REST API Layer, Business Intelligence

Locations

AZ3 (Azure East US)

Description

We will be performing scheduled infrastructure maintenance to enhance the security of our platform communications. As part of our ongoing security enhancement, starting Oct 07, 2025, TLS1.1 will be permanently disabled in the AZ3 environment and we will enforce support for only modern, secure TLS cipher suites used by our platform to communicate over the internet. This change will not be reverted and aligns with industry best practices to support stronger encryption and improved data protection. The following ciphers suites will be supported: <b> TLS_AES_128_GCM_SHA256 TLS_AES_256_GCM_SHA384 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 </b> These changes help ensure: - Stronger protection for data transmitted across the platform - Better compliance with industry security standards (e.g., PCI DSS, SOC 2) - Improved compatibility with the latest browsers, devices, and client libraries <b>What does this mean for you?</b> Clients may need to update their servers before TLS1.1 and weak ciphers are disabled to ensure support for strong ciphers.

Schedule

October 14, 2025 9:00PM - 11:59PM EDT
October 15, 2025 1:00AM - 3:59AM UTC

Components

Commerce Manager, Stores, Web Services, Backend Commerce Services, Preorder Services, Task Scheduler, Global Address Services, Image Generation, Tokenization Services, REST API Layer

Locations

AZ1 (Azure West Europe)

Description

We will be performing scheduled infrastructure maintenance to enhance the security of our platform communications. As part of our ongoing security enhancement, starting Oct 14, 2025, TLS1.1 will be permanently disabled in the AZ1 environment and we will enforce support for only modern, secure TLS cipher suites used by our platform to communicate over the internet. This change will not be reverted and aligns with industry best practices to support stronger encryption and improved data protection. The following ciphers suites will be supported: <b> TLS_AES_128_GCM_SHA256 TLS_AES_256_GCM_SHA384 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 </b> These changes help ensure: - Stronger protection for data transmitted across the platform - Better compliance with industry security standards (e.g., PCI DSS, SOC 2) - Improved compatibility with the latest browsers, devices, and client libraries <b>What does this mean for you?</b> Clients may need to update their servers before TLS1.1 and weak ciphers are disabled to ensure support for strong ciphers.