Armor Complete Logo

Embrace the cloud with Armor Complete

Yes, cybersecurity is complex. Yes, compliance is also complex. Yes, there is a solution that makes managing both feel simple. Yes, it is Armor Complete.

Armor Complete is our secure hosting solution. It is a virtual private cloud (VPC) with built-in security controls that provides the industry’s leading prevention, detection, and response services—keeping your sensitive, regulated data safe and secure. Armor Complete is cybersecurity that goes beyond alerting—beyond compliance—blocking 99.999% of all malicious security events; holding a 4% false positive rate in an industry that considers 30-40% exceptional; and reducing threat actors’ dwell time from days (industry average) to minutes.

How do we do it? It’s a combination of things, including people, passion, creativity, tools, technology, smarts, humor, caffeine, and experience—among others. We tested software, hardware, solutions, tools, people, processes—all the things there are to test when building an environment so secure that regulatory compliance was an outcome, not a goal. We did all that so our clients wouldn’t have to—that’s how we make cloud security simple.

Data Sheets

Armor Complete – Technical Solution Brief

Download the Armor Complete Technical Solution Brief for an overview of Armor Complete’s security capabilities, add-ons, shared responsibility operating model, and details about the Spartan threat prevention and response platform and the Armor Management Portal.

Amy Bakameyer Image

Amy Bakameyer

A CLOUD SO SECURE, COMPLIANCE COMES NATURALLY

ARMOR COMPLETE, MAKING COMPLIANCE SIMPLE

Armor Complete actively reduces your security and compliance burden by providing the highest level of managed security for your customers’ data. Our uncompromised security approach enables you to more easily meet HIPAA/HITRUST, PCI DSS, and GDPR cloud compliance requirements.

With nearly a decade of hosting compliance-driven applications, we have built an audit-friendly reputation that simplifies compliance.

Components of everything from the datacenter to the application layer are protected by Armor’s uncompromised security approach. Leveraging Armor’s experience enables your business to achieve the highest level of compliance more easily, for less cost and with less management overhead than doing it yourself.

ACHIEVE COMPLIANCE WITH ARMOR COMPLETE:

  • Physical Security
  • Application Security
  • Server Security
  • Data Backup
  • Security Audits
  • Data Management
  • Perimeter Security
  • Network Security
  • Administrative Security
  • Secure Data Deletion
  • Access Control
  • Incident Response (IR)
Data Sheets

Compliance Matrix – Armor Complete

Review Armor Complete’s logical breakdown of security controls and how they map to respective compliance requirements.

IDEAL FOR DEVOPS ORGANIZATIONS AND SAAS PROVIDERS

FLEXIBLE AND AGILE
Self-provision servers, IPs, firewall rules and more.

Learn More

EXTENSIVE API LIBRARY
Automate your cloud with Armor’s RESTful HTTP API.

Learn More

ARMOR COMPLETE CORE SECURITY FEATURES

INTERNET PROTOCOL REPUTATION MANAGEMENT (IPRM)

Our Threat Resistance Unit team provides actionable cyber threat intelligence that allows us to anticipate and block a large majority of the cyber-attacks against our customers and provide unparalleled protection in the cloud. IPRM leverages that intelligence and filters public internet traffic matched to an IP blacklist.

DDOS PROTECTION

Denial-of-Service and Distributed Denial-of-Service protection is provided at every datacenter location. Once a DDoS attack is detected, Armor’s security team directs traffic through a series of filters effectively mitigating the threat.

INTRUSION DETECTION

With visibility into inbound and outbound activity at the host level, Armor inspects anomalous traffic against predefined policies – detecting attacks like generic SQL injections, generic XSS attacks, DoS and generic web app effects. This service provides an agent-based Intrusion Detection System on the installed host for network traffic analysis and reporting based around policies defined by Armor.

FILE INTEGRITY MONITORING

(FIM) is designed to monitor critical system file locations and alert when your files have changed. Monitor critical operating system (OS) files for changes that may allow threat actors to control your environment. File integrity monitoring (FIM) utilizes OS-specific policies and provides Armor log visibility to assist in reviewing security events.

MALWARE PROTECTION

Armor protects your environment from harmful malware and botnets deployed to capture your data, monitor your activity or leverage your servers for illicit activity. In the event an alert is created, Armor’s threat analysts begin an in-depth investigation. Armor utilizes an enterprise-class malware protection application and deploys the application agent within the Armor Anywhere Agent.

PATCH MANAGEMENT

Patch Management provides visibility into your environment to identify critical OS-level patches for resolution. Armor provides you visibility into your environment running the Armor Agent, and coordinates software updates with your team so you can ensure your OS is consistently up to date.

LOG MANAGEMENT

Log Management captures, documents, analyzes and reports on log events from firewalls, servers, operating system logs, and other applications to determine their validity and severity. Customers can view 30 days of logs in the Armor Management Portal and store up to 13 months of log events consistent with applicable regulatory requirements.

VULNERABILITY SCANNING

Armor scans for potential points of risk to help reduce the surface area of attack. Weekly scheduled scans provide you a visible audit report to identify the vulnerabilities that attackers could use to penetrate your network, so you can develop your remediation plan.

CONTINUOUS THREAT HUNTING

Proactive hunting within our data lake identifies threat actor activity not alerted to by our SIEM leveraging the research and expertise of Armor’s Threat Resistance Unit team as well as threat intel from a variety of sources.

Web Application Firewall (WAF)

WAF provides protection from layer-7 oriented attacks targeted toward customer applications.

Get Pricing Request Demo

24/7/365 Customer Support & Solutions

Armor Complete customers have all the access—from hosting management to insightful security discussions and effective incident response (IR)—we start at onboarding and just don’t stop, ever:

  • Access to consultative and certified engineers
  • Compliance specialists on staff
  • Accredited SOC
  • Incident monitoring and proactive response
  • Security policies, reporting, and monitoring
  • Network and information security
  • Flexible support channels: ticket, phone, and chat
  • Client portal with self-service hosting, security management, and support ticketing
  • Managed operating systems, hardened to the highest standards
  • SSL VPN access with two-factor authentication
  • Backup and recovery

ARMOR COMPLETE: EMPOWERING CLOUD PERFORMANCE

NATIVE PERFORMANCE CAPABILITIES FOR AN AGILE, SCALABLE, AND DEVOPS-READY CLOUD

Armor Complete is managed for performance. We don’t oversubscribe; we over-deliver network, compute, and storage performance. It’s simple math: fewer clients sharing the same resources result in higher performance for each client.

  • HIGH-AVAILABILITY ARCHITECTURE—Fully redundant architecture provides quick recovery from hardware failures
  • FLEXIBLE STORAGE TIERS—From high performance to low cost, our three storage tiers meet every need
  • VERTICAL SCALABILITY—Increase processors, memory, and storage resources through the client portal or API
  • GEOGRAPHIC REDUNDANCY—Domain name service (DNS) hosting options help multi-national customers achieve better continuity
    and speed
  • HORIZONTAL SCALABILITY—Mitigate single points of failure and infinitely scale performance by load balancing servers
  • RESOURCE MONITORING—We closely monitor our resources to ensure we consistently deliver on our promise of speed

HOW DO YOU COMPARE CLOUD POWER?

Cloud oversubscription is the ratio of virtual server resources to physical server (host) resources. For example, a physical host (the bare metal host) equipped with two processor sockets of 12 cores each has a capacity of 24 physical CPUs (or pCPUs). However, your cloud provider may provision as many virtual CPUs (vCPUs) on that host as they wish. This performance variability stems from the fact that different cloud providers operate at different levels of oversubscription—further complicating the process of comparing clouds.

VIRTUAL PRIVATE CLOUD

WE DON’T BUILD YOU A SERVER, WE BUILD YOU A FORTRESS

ARMOR COMPLETE – HOW IT WORKS
Armor Complete is built on the powerful and proven VMWare NSX platform, the network virtualization and security platform for the Software-Defined Data Center (SDDC). Every Armor Complete customer receives their own virtual private cloud; within that environment, IP addresses are private, as part of our zero-trust architecture. The operating system running your cloud servers is hardened following industry and proprietary best practices.

ARMOR AGENT
The Armor agent leverages best-of-breed security capabilities to secure your environment. Armor Complete is powered by Spartan, the industry’s leading threat prevention and response platform that outthinks and outpaces threats at the speed of cloud. Spartan integrates advanced analytics, global threat intelligence, and continuous response capabilities into a single solution that bolsters your defenses, uncovers hidden threats, and prevents security breaches. Telemetry from over 1,200 customers drives community insights.

Edge Security

Protection against External Threats ​ ​Web application firewall, IP reputation management, intrusion detection, DDoS

Private Gateway

Protection for your Environment ​ ​Firewall, private network address translation, routing

Security Agent

Protection at the Core ​ File integrity monitoring, O/S hardening, malware detection, vulnerability scanning, log management

SHARED RESPONSIBILITY

ACHEIVE UNCOMPROMISED SECURITY, TOGETHER

Armor allows you to outsource your risk by sharing the responsibility. Armor complete is purpose-built to achieve a secure and compliant posture for your data that enables your business to innovate in the cloud. Armor reduces the burden of these challenges for your organization by sharing both risk and responsibility.

Data Sheets

Armor Complete Shared Responsibility

Security and compliance is a shared responsibility between Armor and our customer.

Amy Bakameyer Image

Amy Bakameyer

Armor Management Portal

The Armor Management Portal (AMP) provides you with a single-pane-of-glass visibility into your security program providing real-time visibility and management of your security controls.

Security Metrics to Benchmark Your Success
Integrated within AMP, the Security Analytics dashboard delivers real-time visibility powered by advanced correlation and analytics to help you make smarter decisions.

Angled screenshot of Armor Security Dashboard

  • Instantly add and scale cloud resources such as virtual servers and storage
  • Make instant firewall policy changes with self-service rules
  • Manage their IP space (public and private)
  • Create and manage site-to-site (L2L) VPN tunnels
  • Control access to the environment by managing users, roles and permissions
  • Create and interact with support tickets
  • Shop for additional services such as additional IP addresses, data replication, backups, encryption and many others in
    theArmor Marketplace
  • Real-time visibility into security metrics through the Security Dashboard

WHAT MAKES ARMOR SOLUTIONS SO COMPLETE, EASY AND EFFECTIVE AGAINST TODAY'S CYBER THREAT?

The Armor Spartan threat prevention and response platform is how Armor delivers security outcomes for our customers. The Armor Spartan platform is purpose-built to leverage the agility and speed of the cloud, scaling up to drive new community insights against an ever-changing threat landscape as well as scaling out to provide unified visibility across an ever-changing IT landscape.

WANT TO TRANSFORM YOUR SECURITY?

US +1 877 262 3473 | UK +44 800 500 3167