Armor Complete Logo

Embrace the cloud with Armor Complete

Yes, cybersecurity is complex. Yes, compliance is also complex. Yes, there is a solution that makes managing both feel simple. Yes, it is Armor Complete.

Armor Complete is our secure hosting solution. It is a virtual private cloud (VPC) with built-in security controls that provides the industry’s leading prevention, detection, and response services—keeping your sensitive, regulated data safe and secure. Armor Complete is cybersecurity that goes beyond alerting—beyond compliance—blocking 99.999% of all malicious security events; holding a 4% false positive rate in an industry that considers 30-40% exceptional; and reducing threat actors’ dwell time from days (industry average) to minutes.

How do we do it? It’s a combination of things, including people, passion, creativity, tools, technology, smarts, humor, caffeine, and experience—among others. We tested software, hardware, solutions, tools, people, processes—all the things there are to test when building an environment so secure that regulatory compliance was an outcome, not a goal. We did all that so our clients wouldn’t have to—that’s how we make cloud security simple.

Data Sheets

Armor Complete – Technical Solution Brief

Download the Armor Complete Technical Solution Brief for an overview of Armor Complete’s security capabilities, add-ons, shared responsibility operating model, and details about the Spartan threat prevention and response platform and the Armor Management Portal.

Amy Bakameyer Image

Amy Bakameyer

A CLOUD SO SECURE, COMPLIANCE COMES NATURALLY

ARMOR COMPLETE, MAKING COMPLIANCE SIMPLE

Armor Complete actively reduces your security and compliance burden by providing the highest level of managed security for your customers’ data. Our uncompromised security approach enables you to more easily meet HIPAA/HITRUST, PCI DSS, and GDPR cloud compliance requirements.

With nearly a decade of hosting compliance-driven applications, we have built an audit-friendly reputation that simplifies compliance.

Components of everything from the datacenter to the application layer are protected by Armor’s uncompromised security approach. Leveraging Armor’s experience enables your business to achieve the highest level of compliance more easily, for less cost and with less management overhead than doing it yourself.

ACHIEVE COMPLIANCE WITH ARMOR COMPLETE:

  • Physical Security
  • Application Security
  • Server Security
  • Data Backup
  • Security Audits
  • Data Management
  • Perimeter Security
  • Network Security
  • Administrative Security
  • Secure Data Deletion
  • Access Control
  • Incident Response (IR)
Data Sheets

Compliance Matrix – Armor Complete

Review Armor Complete’s logical breakdown of security controls and how they map to respective compliance requirements.

IDEAL FOR DEVOPS ORGANIZATIONS AND SAAS PROVIDERS

FLEXIBLE AND AGILE
Self-provision servers, IPs, firewall rules and more.

Learn More

EXTENSIVE API LIBRARY
Automate your cloud with Armor’s RESTful HTTP API.

Learn More

DELIVERING SECURITY, COMPLIANCE, SUPPORT, & PERFORMANCE

You know how star athletes and musicians; prize-winning academics or celebrity chefs make hard things look so easy? Don’t believe it; it’s not. That’s why we want to slow your DIY roll and tell you about Armor Complete, a solution that provides complex cybersecurity and compliance management—but makes it look and feel simple.

Multilayered Cloud Security

Armor Complete provides secure hosting through multiple cybersecurity layers—providing 24/7/365 managed security and service that protects your critical data and workloads from cyberthreats and criminals. The following components of our industry-leading infrastructure and integrated security layers helps organizations reduce threat actor dwell time to near zero.

BRAND AND REPUTATION MONITORING (DTB/IPRM)

Monitors public and deep and dark webs for threat activity against our Armor client base using a mix of automation and targeted threat research.

DENIAL OF SERVICE/DISTRIBUTED DENIAL OF SERVICE (DOS/DDOS) MITIGATION SERVICES

DoS protection is provided at every datacenter location. Once a DoS attack is detected, Armor’s security team directs traffic through a series of filters effectively mitigating the threat.

FILE INTEGRITY MONITORING (FIM)

FIM is designed to monitor critical system file locations and alert you when your files have changed. It also monitors critical operating system (OS) files for changes that may allow threat actors to control your environment. FIM uses OS-specific policies and provides Armor with log visibility to assist in reviewing security events.

INTRUSION DETECTION (IDS)

With visibility to inbound and outbound activity at the host, Armor inspects anomalous traffic against predefined policies—detecting attacks like generic SQL injections, generic XSS attacks, DoS, and generic web app attacks. This service provides an agent-based IDS on the installed host for network traffic analysis and reporting based around policies defined by Armor.

LOG MANAGEMENT

Log management captures and documents, analyzes and reports on log events from firewalls, servers, OS logs, and other applications to determine their validity and severity. Customers can view 30 days of logs in the Armor management portal (AMP) and store up to 13 months of log events consistent with applicable regulatory requirements.

MALWARE PROTECTION

Armor protects your environment from harmful malware and botnets deployed to capture your data, monitor your activity or leverage your servers for illicit activity. In the event an alert is created, Armor’s threat analysts begin an in-depth investigation. Armor uses an enterprise-class malware protection application and deploys the application agent within the Armor Complete agent.

PATCH MONITORING

Patch monitoring provides visibility into your environment to identify critical OS-level patches for resolution. Armor provides visibility into your environment running the Armor Complete agent, so you can ensure your OS is consistently up to date.

THREAT HUNTING

Proactive threat hunting within our data lake identifies threat actor activity not alerted to by our security incident and event management (SIEM) leveraging the research and expertise of the Threat Resistance Unit (TRU), as well as threat intelligence derived from a variety of sources.

VULNERABILITY SCANNING

Armor scans for potential points of risk to help reduce the surface area of attack. Weekly scheduled scans provide you a visible audit report to identify the vulnerabilities that attackers could use to penetrate your network, so you can develop your remediation plan.

Web Application Firewall (WAF)

WAF provides protection from layer-7 oriented attacks targeted toward customer applications.

Get Pricing Request Demo

24/7/365 Customer Support & Solutions

Armor Complete customers have all the access—from hosting management to insightful security discussions and effective incident response (IR)—we start at onboarding and just don’t stop, ever:

  • Access to consultative and certified engineers
  • Compliance specialists on staff
  • Accredited SOC
  • Incident monitoring and proactive response
  • Security policies, reporting, and monitoring
  • Network and information security
  • Flexible support channels: ticket, phone, and chat
  • Client portal with self-service hosting, security management, and support ticketing
  • Managed operating systems, hardened to the highest standards
  • SSL VPN access with two-factor authentication
  • Backup and recovery

ARMOR COMPLETE: EMPOWERING CLOUD PERFORMANCE

NATIVE PERFORMANCE CAPABILITIES FOR AN AGILE, SCALABLE, AND DEVOPS-READY CLOUD

Armor Complete is managed for performance. We don’t oversubscribe; we over-deliver network, compute, and storage performance. It’s simple math: fewer clients sharing the same resources result in higher performance for each client.

  • HIGH-AVAILABILITY ARCHITECTURE—Fully redundant architecture provides quick recovery from hardware failures
  • FLEXIBLE STORAGE TIERS—From high performance to low cost, our three storage tiers meet every need
  • VERTICAL SCALABILITY—Increase processors, memory, and storage resources through the client portal or API
  • GEOGRAPHIC REDUNDANCY—Domain name service (DNS) hosting options help multi-national customers achieve better continuity
    and speed
  • HORIZONTAL SCALABILITY—Mitigate single points of failure and infinitely scale performance by load balancing servers
  • RESOURCE MONITORING—We closely monitor our resources to ensure we consistently deliver on our promise of speed

HOW DO YOU COMPARE CLOUD POWER?

Cloud oversubscription is the ratio of virtual server resources to physical server (host) resources. For example, a physical host (the bare metal host) equipped with two processor sockets of 12 cores each has a capacity of 24 physical CPUs (or pCPUs). However, your cloud provider may provision as many virtual CPUs (vCPUs) on that host as they wish. This performance variability stems from the fact that different cloud providers operate at different levels of oversubscription—further complicating the process of comparing clouds.

VIRTUAL PRIVATE CLOUD

WE DON’T BUILD YOU A SERVER, WE BUILD YOU A FORTRESS

ARMOR COMPLETE – HOW IT WORKS
Armor Complete is built on the powerful and proven VMWare NSX platform, the network virtualization and security platform for the Software-Defined Data Center (SDDC). Every Armor Complete customer receives their own virtual private cloud; within that environment, IP addresses are private, as part of our zero-trust architecture. The operating system running your cloud servers is hardened following industry and proprietary best practices.

ARMOR AGENT
The Armor agent leverages best-of-breed security capabilities to secure your environment. Armor Complete is powered by Spartan, the industry’s leading threat prevention and response platform that outthinks and outpaces threats at the speed of cloud. Spartan integrates advanced analytics, global threat intelligence, and continuous response capabilities into a single solution that bolsters your defenses, uncovers hidden threats, and prevents security breaches. Telemetry from over 1,200 customers drives community insights.

Edge Security

Protection against External Threats ​ ​Web application firewall, IP reputation management, intrusion detection, DDoS

Private Gateway

Protection for your Environment ​ ​Firewall, private network address translation, routing

Security Agent

Protection at the Core ​ File integrity monitoring, O/S hardening, malware detection, vulnerability scanning, log management

SHARED RESPONSIBILITY

ACHEIVE UNCOMPROMISED SECURITY, TOGETHER

Armor allows you to outsource your risk by sharing the responsibility. Armor complete is purpose-built to achieve a secure and compliant posture for your data that enables your business to innovate in the cloud. Armor reduces the burden of these challenges for your organization by sharing both risk and responsibility.

Data Sheets

Armor Complete Shared Responsibility

Security and compliance is a shared responsibility between Armor and our customer.

Amy Bakameyer Image

Amy Bakameyer

Armor Management Portal

The Armor Management Portal (AMP) provides you with a single-pane-of-glass visibility into your security program providing real-time visibility and management of your security controls.

Security Metrics to Benchmark Your Success
Integrated within AMP, the Security Analytics dashboard delivers real-time visibility powered by advanced correlation and analytics to help you make smarter decisions.

Angled screenshot of Armor Security Dashboard

  • Instantly add and scale cloud resources such as virtual servers and storage
  • Make instant firewall policy changes with self-service rules
  • Manage their IP space (public and private)
  • Create and manage site-to-site (L2L) VPN tunnels
  • Control access to the environment by managing users, roles and permissions
  • Create and interact with support tickets
  • Shop for additional services such as additional IP addresses, data replication, backups, encryption and many others in
    theArmor Marketplace
  • Real-time visibility into security metrics through the Security Dashboard

WHAT MAKES ARMOR SOLUTIONS SO COMPLETE, EASY AND EFFECTIVE AGAINST TODAY'S CYBER THREAT?

The Armor Spartan threat prevention and response platform is how Armor delivers security outcomes for our customers. The Armor Spartan platform is purpose-built to leverage the agility and speed of the cloud, scaling up to drive new community insights against an ever-changing threat landscape as well as scaling out to provide unified visibility across an ever-changing IT landscape.

WANT TO TRANSFORM YOUR SECURITY?

US +1 877 262 3473 | UK +44 800 500 3167