Cloud Vault 2017-07-06T21:14:25+00:00

cloud safe icon

Cloud Vault

Protect your assets with hardened security implemented at every layer, military-grade encryption, and unparalleled speed of threat detection

Get a Quote

Cloud Vault Illustration

Hardened security at every layer

From hardware to application

Military-grade encryption

Applied to all your data and communications by default

Unparalleled speed of threat detection

Less than 24 hours and not the industry standard of 7 months

If an attack occurs

Countermeasures trap the attacker and mitigate damage while our counter intelligence team responds immediately

Choose Your Level of Cloud Security

Secure Cloud Storage


Cloud Storage Person illustration

Start with data protection

  • Keep your most valuable assets in Secure Cloud Storage.
  • This online safe room has only one way in and one way out for your data, and that gateway is subject to the most stringent cybersecurity in the world.
  • Access it easily yourself as a file share appearing on your own network or via VPN and rest easy in the knowledge that it’s next to impossible for the wrong people to access it.
  • Secure Cloud Storage provides flexible encrypted data storage and air-tight security in one easy extension to your existing network.

Hosted secure servers and clean room

  • Apply the security of Secure Cloud Compute to your computing needs by keeping your servers and data in the same location, so your most sensitive data never needs to cross the network.
  • Secure Cloud Compute accommodates virtual servers and live databases, providing a “clean room” you can use for isolated testing, research and development or disaster recovery.
  • Secure Cloud Compute also includes advanced protection from Distributed Denial of Service (DDoS) attacks, so your critical services remain available even if they’re subjected to this common form of cyber threat.
  • Endpoint security integration ensures that every device with access to your network is subject to a stringent security policy, eliminating any vulnerable points of entry.

Secure Cloud Compute


Secure Cloud Compute illustration

Secure Cloud Advisor


secure cloud advisor illustration

High touch testing and consultation

  • Secure Cloud Advisor combines the most secure managed cloud technology in the world with the most sophisticated counter cyber intelligence team available to the private sector today.
  • Our agents become your ongoing trusted advisors, monitoring your organization’s risk posture and performing penetration tests on a proactive basis.
  • We address organizational concerns and human behavior, such as employees joining and leaving the business, and conduct regular meetings with critical stakeholders like the board of directors and legal advisory team.
  • We ensure your cyber risk roadmap is always in place, and protect your brand with best human and technical resources there are.

Infrastructure Security

  • Unlimited Firewall Zones
  • Intrusion Detection
  • Web Application Firewall (WAF)
  • Log Capturing and Correlation
  • IP Reputation Filtering
  • Secure VPN Access
  • Network Security Layer 3 Firewall
  • Hardened OS, Managed Anti-Virus
  • Security & Event Management
  • Vulnerability Management
  • Hypervisor Firewall Security
  • FIPS140-2 Encryption
  • Security Access Controls
  • Zero Day Malware Protection

Compute and Advisor plans also include:

  • DDoS Protection
  • Endpoint Protection
    • Compute = 100
    • Advisor = 250

Advisor plan also includes:

  • Web Application Firewall (WAF) Multi-Filter
  • Annual Penetration Testing
  • Annual Web Application Security Assessment

Compliance Ready

  • SSAE 16 Type 2 Compliant
  • PCI DSS Compliant Options
  • HIPAA/HiTRUST Compliant Options
  • ISO 27001 Compliant Options
  • Data Sovereignty Guarantee
  • Exeeds Compliance Security Standards
  • Common Criteria Certified
  • FIPS 140-2 Compliant
  • NIST-SP800-131A Compliant
  • NSA Suite B Support
  • Section 508 VPAT Compliant
  • TAA Compliant

Compute and Advisor plans also include:

  • Data Center Audit Rights


  • Managed Support Included
  • Secure Monthly Reporting
  • Encrypted Backup Retention
    • Storage = 1 week
    • Compute = 3 weeks
    • Advisor = 4 weeks
  • 3rd Party Application Support
  • Performance History
  • SLA for Uptime
  • SLA for Threat Detection

Infrastructure Performance

Storage Plan Compute Plan Advisor Plan
High Performance Server vCPUs Included N/A 8 16
Scaling Without Downtime Yes Yes Yes
Encrypted Data Transfer Unlimited Unlimited Unlimited
Encrypted Storage Included 1TB 5TB 10TB
High Performance Encrypted Storage IOPS 5,000 10,000 20,000
Maximum Memory per Server 100GB 250GB 1TB
Maximum vCPU per Server 8 16 64
Maximum Disk Space Unlimited Unlimited Unlimited
High Availability No Yes Yes
Port Speed 100MB/s 250MB/s 1GB/s
Private Circuits Available No Yes Yes
Get a Quote