Armor Complete Logo

The complexities of cybersecurity and compliance are daunting for any organization, especially those under pressure to manage their cloud hosting infrastructure with the speed and agility it takes to meet the dynamic needs of a digital economy. For most IT and DevOps teams, security adds a heavy burden to managing the private, public and hybrid cloud environments where their workloads are hosted.

Armor Complete delivers a secure hosting solution featuring our proven secure managed Virtual Private Cloud. Our high-performance cloud infrastructure and its built-in security controls provides the utmost protection for your sensitive, regulated data. With Armor Complete, you can achieve security that goes beyond compliance with the support of a world-class Security Operations Center (SOC).

FULLY FEATURED CLOUD

Servers with up to 16 vCPUs and 69 GB of memory

Flexible storage options from low-cost to high performance

Audit-Ready Compliance

Continuous Detection & Response

Unified Protection & Visibility

IDEAL FOR DEVOPS ORGANIZATIONS AND SAAS PROVIDERS

FLEXIBLE AND AGILE
Self-provision servers, IPs, firewall rules and more.

Learn More

EXTENSIVE API LIBRARY
Automate your cloud with Armor’s RESTful HTTP API.

Learn More

Get Pricing Request Demo

We chose Armor because customer trust is at the heart of what we do at Ultius—and Armor was the only provider that showed security to be its core competency.

Boban Dedovic | Founder and CEO

VIRTUAL PRIVATE CLOUD

WE DON’T BUILD YOU A SERVER, WE BUILD YOU A FORTRESS

ARMOR COMPLETE – HOW IT WORKS
Armor Complete is built on the powerful and proven VMWare NSX platform, the network virtualization and security platform for the Software-Defined Data Center (SDDC). Every Armor Complete customer receives their own virtual private cloud; within that environment, IP addresses are private, as part of our zero-trust architecture. The operating system running your cloud servers is hardened following industry and proprietary best practices.

ARMOR AGENT
The Armor agent leverages best-of-breed security capabilities to secure your environment. Armor Complete is powered by Spartan, the industry’s leading threat prevention and response platform that outthinks and outpaces threats at the speed of cloud. Spartan integrates advanced analytics, global threat intelligence, and continuous response capabilities into a single solution that bolsters your defenses, uncovers hidden threats, and prevents security breaches. Telemetry from over 1,200 customers drives community insights.

Edge Security

Protection against External Threats ​ ​Web application firewall, IP reputation management, intrusion detection, DDoS

Private Gateway

Protection for your Environment ​ ​Firewall, private network address translation, routing

Security Agent

Protection at the Core ​ File integrity monitoring, O/S hardening, malware detection, vulnerability scanning, log management

SHARED RESPONSIBILITY

ACHEIVE UNCOMPROMISED SECURITY, TOGETHER

Armor allows you to outsource your risk by sharing the responsibility. Armor complete is purpose-built to achieve a secure and compliant posture for your data that enables your business to innovate in the cloud. Armor reduces the burden of these challenges for your organization by sharing both risk and responsibility.

Data Sheets

Armor Complete Shared Responsibility

Security and compliance is a shared responsibility between Armor and our customer.

Amy Bakameyer Image

Amy Bakameyer

ARMOR COMPLETE CORE SECURITY FEATURES

curved lines representing reputation management
INTERNET PROTOCOL REPUTATION MANAGEMENT (IPRM)

Our Threat Resistance Unit team provides actionable cyber threat intelligence that allows us to anticipate and block a large majority of the cyber-attacks against our customers and provide unparalleled protection in the cloud. IPRM leverages that intelligence and filters public internet traffic matched to an IP blacklist.

DDOS PROTECTION

Denial-of-Service and Distributed Denial-of-Service protection is provided at every datacenter location. Once a DDoS attack is detected, Armor’s security team directs traffic through a series of filters effectively mitigating the threat.

INTRUSION DETECTION

With visibility into inbound and outbound activity at the host level, Armor inspects anomalous traffic against predefined policies – detecting attacks like generic SQL injections, generic XSS attacks, DoS and generic web app effects. This service provides an agent-based Intrusion Detection System on the installed host for network traffic analysis and reporting based around policies defined by Armor.

FILE INTEGRITY MONITORING

(FIM) is designed to monitor critical system file locations and alert when your files have changed. Monitor critical operating system (OS) files for changes that may allow threat actors to control your environment. File integrity monitoring (FIM) utilizes OS-specific policies and provides Armor log visibility to assist in reviewing security events.

MALWARE PROTECTION

Armor protects your environment from harmful malware and botnets deployed to capture your data, monitor your activity or leverage your servers for illicit activity. In the event an alert is created, Armor’s threat analysts begin an in-depth investigation. Armor utilizes an enterprise-class malware protection application and deploys the application agent within the Armor Anywhere Agent.

PATCH MANAGEMENT

Patch Management provides visibility into your environment to identify critical OS-level patches for resolution. Armor provides you visibility into your environment running the Armor Agent, and coordinates software updates with your team so you can ensure your OS is consistently up to date.

LOG MANAGEMENT

Log Management captures, documents, analyzes and reports on log events from firewalls, servers, operating system logs, and other applications to determine their validity and severity. Customers can view 30 days of logs in the Armor Management Portal and store up to 13 months of log events consistent with applicable regulatory requirements.

VULNERABILITY SCANNING

Armor scans for potential points of risk to help reduce the surface area of attack. Weekly scheduled scans provide you a visible audit report to identify the vulnerabilities that attackers could use to penetrate your network, so you can develop your remediation plan.

CONTINUOUS THREAT HUNTING

Proactive hunting within our data lake identifies threat actor activity not alerted to by our SIEM leveraging the research and expertise of Armor’s TRU team as well as threat intel from a variety of sources.

BRAND AND REPUTATION MONITORING

Monitors the public and dark web for threat activity against our Armor customer base using a mix of automation and targeted threat research.

ACCELERATE COMPLIANCE

BECOME COMPLIANT
Meeting compliance mandates such as PCI, HIPAA, HITRUST and GDPR shouldn’t be so hard. Nor should maintaining compliance be such a burden on IT and IT Security teams.

Armor solutions were built to address many of the control requirements set by these mandates. Combined with our intense focus on securing your organization from an evolving threat landscape, we accelerate compliance while delivering unmatched security protections and expertise in the process.

Data Sheets

Compliance Matrix – Armor Complete

Review Armor Complete’s logical breakdown of security controls and how they map to respective compliance requirements.

Armor Management Portal

The Armor Management Portal (AMP) provides you with a single-pane-of-glass visibility into your security program providing real-time visibility and management of your security controls.

Security Metrics to Benchmark Your Success
Integrated within AMP, the Security Analytics dashboard delivers real-time visibility powered by advanced correlation and analytics to help you make smarter decisions.

Managed Security Services Illistration

Angled screenshot of Armor Security Dashboard

  • Instantly add and scale cloud resources such as virtual servers and storage
  • Make instant firewall policy changes with self-service rules
  • Manage their IP space (public and private)
  • Create and manage site-to-site (L2L) VPN tunnels
  • Control access to the environment by managing users, roles and permissions
  • Create and interact with support tickets
  • Shop for additional services such as additional IP addresses, data replication, backups, encryption and many others in
    theArmor Marketplace
  • Real-time visibility into security metrics through the Security Dashboard

WHAT MAKES ARMOR SOLUTIONS SO COMPLETE, EASY AND EFFECTIVE AGAINST TODAY'S CYBER THREAT?

The Armor Spartan threat prevention and response platform is how Armor delivers security outcomes for our customers. The Armor Spartan platform is purpose-built to leverage the agility and speed of the cloud, scaling up to drive new community insights against an ever-changing threat landscape as well as scaling out to provide unified visibility across an ever-changing IT landscape.

WANT TO TRANSFORM YOUR SECURITY?

US +1 877 262 3473 | UK +44 800 500 3167