Data Security Cloud
Building the world’s most secure cloud infrastructure platform.
Our highest security. Your peace of mind.
Data Security Cloud is a multi-tenant, secure-hosted cloud infrastructure platform built in collaboration with Intel® and VMware®. Through a secure hardware foundation, strict virtualization and segmentation controls, threat intelligence, and advanced physical security, the platform provides multi-layered data protection. Encryption and access controls inherent in the platform further help maintain the integrity and authenticity of the data in your environment.
Secure by Design
All the benefits of in-house security design with none of the complex work or need for risk management.
Low overhead. High value.
Enterprise-grade infrastructure at a cloud-based resource model to maximize your IT investments.
Trusted Experience.
Offload the time and risk associated with designing, installing, maintaining and protecting complex infrastructure.
Testimonial
“Our partnership with phoenixNAP has allowed us to speed up delivery of key services to our users. The solution gives us the control we need without the burden of supporting the whole infrastructure. This is key to our strategy of delivering service to a global organization with a small IT team.”
– Jeremy Nutting, Director of IT, Ascent Aerospace
View Case StudyHow Data Security Cloud Works
Data Security Cloud leverages the latest security technologies to ensure advanced data protection. By breaking away from the legacy of the past, we designed an entirely new networking fabric, leveraging the most modern, feasible Software-Defined Networking (SDN) technologies to create a reliable, resilient, and responsive communication platform.
Data Security Cloud is segmented into a management cluster and a compute cluster to optimize the resource availability to customer environments. It also minimizes the impact maintenance activities have on the compute platform. The result is the best performance characteristics to benefit your workloads and ensure cloud data security.
- Security beyond perimeter
- Zero-trust policies
- Scalable solution
- Top-notch performance
- Industry-Leading Threat Intelligence
- Multiple opex-friendly plans
- Lowered TCO's and Time-to-Market
- Minimum upfront investment costs
- Quick and easy workload migration
- Expert 24/7 SOC support
Hardware-Enhanced Security
Data Security Cloud is powered by Intel Xeon Scalable processors with Intel® Advanced Encryption Standard New Instructions that helps accelerate some of the compute-intensive steps of AES encryption in hardware. Additional Intel technologies are used to enable Zero Trust policies.
Micro-segmentation
VMware NSX provides networking and security foundation for Data Security Cloud. By enabling isolation of your virtual machines, it helps contain the impact in case of network penetration. Data Security Cloud is a VMware Cloud Verified solution.
End-Point Protection
In addition to this, we enabled deployment of industry-leading threat intelligence system to provide you with comprehensive insight into your platform. Directly integrated into Data Security Cloud, Sophos provides you with always-updated threat intelligence feeds and end-point protection.
Managed Detection and Response
Through our partnership with Alert Logic, we enabled you to add Managed Threat Detection and Response (MDR) features to your Data Security Cloud platform. This enables early intrusion detection of malware and malicious activity in your network, providing additional layer of cloud data security.
Integrated Backups
Your Data Security Cloud environment is integrated with Veeam backups, automatically creating copies of your data in the cloud. This enables you to quickly recover your data in case of cyber breaches, disaster, or accidental deletion.
Integrated with Encryption Management Platform
Another layer of security to Data Security Cloud could be added through our Encryption Management Platform (EMP) powered by Fortanix. As the world’s first unified key management platform built on HSM-grade security, Fortanix Self-Defending Key Management System (SDKMS) provides a secure single-pane-of-glass for managing all your keys, secrets, and tokens. The platform ensures the highest level of data protection, while simplifying infrastructure and key management.
LOCATIONS
Now available in Phoenix, AZAshburn, VA
Features and Plans
On-premise infrastructure requires space, power, environmental controls, security controls, and appropriate resources. Our Data Security Cloud gives you an opportunity to move your sensitive workloads from an on-premise, or colocation-based model, to secure cloud-based infrastructure with minimal upfront costs. This model lets you eliminate your CapEx while optimizing your OpEx costs: no need to buy hardware, software licenses, or hire IT professionals and deploy systems to manage and monitor your Infrastructure.
SECURITY FEATURE | DSC Essentials | DSC Advanced | DSC Advanced + MDR* |
Powered by: |
---|---|---|---|---|
- Optional
- Included
|
||||
VMware Software Defined Data Center |
|
|
|
VMware |
High Grade Compute, Network & Storage |
|
|
|
phoenixNAP |
Veeam Backup Standard: Up to 50% of the allocated storage |
|
|
|
Veeam |
Veeam Backup Standard: Up to 100% of the allocated storage |
|
|
|
Veeam |
Sophos Central Intercept X Advanced for Server ** |
|
|
|
Sophos |
Sophos Central Intercept X Advanced for Server with Endpoint Detection and Response ** |
|
|
|
Sophos |
Encrypted VM Storage (HSM) |
|
|
|
Fortanix |
Encryption Management Platform (KMS/Tokens/Secrets) |
|
|
|
Fortanix |
Alert Logic Endpoint Protection |
|
|
|
Alert Logic |
Expert 24/7 SOC Support |
|
|
|
Alert Logic |
SOC 24/7 Incident Management |
|
|
|
Alert Logic |
Security Posture Report |
|
|
|
Alert Logic |
Always-updated threat intelligence feeds |
|
|
|
Alert Logic |
Vulnerability Scanning |
|
|
|
Alert Logic |
Vulnerability and remediation intelligence |
|
|
|
Alert Logic |
Machine learning and behavioral analytics |
|
|
|
Alert Logic |
Threat risk intelligence |
|
|
|
Alert Logic |
PCI scanning ASV support |
|
|
|
Alert Logic |
File Integrity Monitoring |
|
|
|
Alert Logic |
FEATURES
VMware Software Defined Data Center |
- Included
|
Powered by VMware |
---|---|---|
High Grade Compute, Network & Storage |
- Included
|
Powered by phoenixNAP |
Veeam Backup Standard: Up to 50% of the allocated storage |
- Included
|
Powered by Veeam |
Veeam Backup Standard: Up to 100% of the allocated storage |
- Optional
|
Powered by Veeam |
Sophos Central Intercept X Advanced for Server * |
- Included
|
Powered by Sophos |
Sophos Central Intercept X Advanced for Server with Endpoint Detection and Response * |
- Optional
|
Powered by Sophos |
Encrypted VM Storage (HSM) |
- Optional
|
Powered by Fortanix |
Encryption Management Platform (KMS/Tokens/Secrets) |
- Optional
|
Powered by Fortanix |
Alert Logic Endpoint Protection |
|
Powered by Alert Logic |
Expert 24/7 SOC Support |
|
Powered by Alert Logic |
SOC 24/7 Incident Management |
|
Powered by Alert Logic |
Security Posture Report |
|
Powered by Alert Logic |
Always-updated threat intelligence feeds |
|
Powered by Alert Logic |
Vulnerability Scanning |
|
Powered by Alert Logic |
Vulnerability and remediation intelligence |
|
Powered by Alert Logic |
Machine learning and behavioral analytics |
|
Powered by Alert Logic |
Threat risk intelligence |
|
Powered by Alert Logic |
PCI scanning ASV support |
|
Powered by Alert Logic |
File Integrity Monitoring |
|
Powered by Alert Logic |
VMware Software Defined Data Center |
- Included
|
Powered by VMware |
---|---|---|
High Grade Compute, Network & Storage |
- Included
|
Powered by phoenixNAP |
Veeam Backup Standard: Up to 50% of the allocated storage |
|
Powered by Veeam |
Veeam Backup Standard: Up to 100% of the allocated storage |
- Included
|
Powered by Veeam |
Sophos Central Intercept X Advanced for Server * |
|
Powered by Sophos |
Sophos Central Intercept X Advanced for Server with Endpoint Detection and Response * |
- Included
|
Powered by Sophos |
Encrypted VM Storage (HSM) |
- Included
|
Powered by Fortanix |
Encryption Management Platform (KMS/Tokens/Secrets) |
- Optional
|
Powered by Fortanix |
Alert Logic Endpoint Protection |
- Optional
|
Powered by Alert Logic |
Expert 24/7 SOC Support |
- Optional
|
Powered by Alert Logic |
SOC 24/7 Incident Management |
- Optional
|
Powered by Alert Logic |
Security Posture Report |
- Optional
|
Powered by Alert Logic |
Always-updated threat intelligence feeds |
- Optional
|
Powered by Alert Logic |
Vulnerability Scanning |
- Optional
|
Powered by Alert Logic |
Vulnerability and remediation intelligence |
- Optional
|
Powered by Alert Logic |
Machine learning and behavioral analytics |
- Optional
|
Powered by Alert Logic |
Threat risk intelligence |
- Optional
|
Powered by Alert Logic |
PCI scanning ASV support |
- Optional
|
Powered by Alert Logic |
File Integrity Monitoring |
- Optional
|
Powered by Alert Logic |
VMware Software Defined Data Center |
- Included
|
Powered by VMware |
---|---|---|
High Grade Compute, Network & Storage |
- Included
|
Powered by phoenixNAP |
Veeam Backup Standard: Up to 50% of the allocated storage |
|
Powered by Veeam |
Veeam Backup Standard: Up to 100% of the allocated storage |
- Included
|
Powered by Veeam |
Sophos Central Intercept X Advanced for Server * |
|
Powered by Sophos |
Sophos Central Intercept X Advanced for Server with Endpoint Detection and Response * |
- Included
|
Powered by Sophos |
Encrypted VM Storage (HSM) |
- Included
|
Powered by Fortanix |
Encryption Management Platform (KMS/Tokens/Secrets) |
- Optional
|
Powered by Fortanix |
Alert Logic Endpoint Protection |
- Included
|
Powered by Alert Logic |
Expert 24/7 SOC Support |
- Included
|
Powered by Alert Logic |
SOC 24/7 Incident Management |
- Included
|
Powered by Alert Logic |
Security Posture Report |
- Included
|
Powered by Alert Logic |
Always-updated threat intelligence feeds |
- Included
|
Powered by Alert Logic |
Vulnerability Scanning |
- Included
|
Powered by Alert Logic |
Vulnerability and remediation intelligence |
- Included
|
Powered by Alert Logic |
Machine learning and behavioral analytics |
- Included
|
Powered by Alert Logic |
Threat risk intelligence |
- Included
|
Powered by Alert Logic |
PCI scanning ASV support |
- Included
|
Powered by Alert Logic |
File Integrity Monitoring |
- Included
|
Powered by Alert Logic |
** Full feature list of Sophos Central Intercept X Advanced for Server available here.
*** Download spec sheets with the full list of Alert Logic features for Essentials, Professional and Enterprise plans.
FREE E-BOOK
Anatomy of a Secure Cloud Service
According to Heng & Kim (2016) of Gartner in 2020, 60% of businesses will suffer a failure of some sort, directly attributed to their internal IT team’s inability to manage risk effectively. 87% of nearly 1200 global C-Level executives surveyed by E&Y say they needed 50% more funding to deal with the increased threat landscape. Download our free e-book to learn more about the current threat landscape and how Data Security Cloud helps you fight the risk.
We live and breathe security.
So you don’t have to.
Information, if lost, could be detrimental to your business. It is therefore prudent to assume that no organization is immune to cyber-attacks.
The fact that cyber attacks constantly grow in number testifies that it is not the question of if you will encounter an attack, but when. DSC allows you to minimize the attack vector, and in the unfortunate event of a successful attack such as Cryptoware, our additional cloud backup services enable quick recovery, without the need to deal with the uncertainty of paying a ransom in the hopes of recovery.
How to get started?
Our technical resources do the heavy-lifting to provision your environment for you. Contact us and our team will start working with you to:
- Create the appropriate security-conscious design
- Guide you in the configuration as you deploy your services into the environment
- Keep a watchful eye on the security of your network, alerting you of anything we see at the infrastructure level
- Optionally take on the operational responsibility of your server platform, monitoring and responding to Incidents of Compromise (IoC)
- Managed Service contract with our Network Operations Center (NOC) or a Managed Security Services (MSS) contract with our Security Operations Center (SOC)
Ready for a new level of security?