Secure Hosting
Armor Anywhere with secure hosting provides a secure and compliant high-performance hosting infrastructure for organizations with mission-critical and sensitive workloads.
Armor Anywhere
Armor Anywhere Secure Hosting
SECURITY
INFRASTRUCTURE
COMPLIANCE, DATA PROTECTION & RECOVERY
Advanced Log Management
Vulnerability Scanning
Backup Service
Disaster Recovery
SECURITY, NETWORK, SCALABILITY & PERFORMANCE
Load Balancers
Build and deploy horizontal scalability into your cloud with our flexible virtual load balancer options supporting up to 1 Gbps.
Advanced WAF
Customers who have requirements for WAF rules and performances may deploy a dedicated virtual WAF in their cloud.
MICROSOFT SQL DATABASES
Armor provisions your server with a licensed Microsoft SQL DB server, saving you money up-front and providing you with flexibility for future upgrades. We offer the following editions:
MS SQL Web Edition
Offered in 4, 6, 8, 12 and 16 vCPU (processor) configurations
MS SQL Standard Edition
Offered in 4, 6, 8, 12 and 16 vCPU (processor) configurations
MS SQL Enterprise Edition
Offered in 4, 6, 8, 12 and 16 vCPU (processor) configurations
CORE COMPONENTS
CLOUD SERVERS*
Virtual Processors
Virtual Memory
STORAGE
Tier 1 - Top Performance
Tier 2- Top Value
Tier 3 - High Volume
BUILT-IN NETWORKING
- Native Firewall
- Private IP addresses
- VPN Services-SLL and L2L/IPSec
Simplify Adherence to Major Compliance Frameworks



PCI Compliance
Armor Security Services | PCI DSS 3.2 Controls | Risk Mitigation |
---|---|---|
PERIMETER LAYER | ||
IP Reputation Filtering | Security best practice | Activity from known bad sources |
DDoS Mitigation | Security best practice | Loss of availability due to high volume of malicious activity |
APPLICATION LAYER | ||
Web Application Firewall | 6.6 | Application layer flaws and exploits |
NETWORK LAYER | ||
Intrusion Detection/Prevention | 11.4 | Malicious allowed traffic |
Network Firewall (Hypervisor) | 1.1.5, 1.1.6, 1.1.7, 1.2.2, 1.2.3, 1.3.3, 1.3.5 | Unwanted network connectivity |
Internal Network Vulnerability Scanning | 11.2.3 | Exploits due to missing patches and updates; improper network firewall configuration |
External Network Vulnerability Scanning | 11.2.2 | Exploits due to missing patches and updates; improper network firewall configuration |
Secure Remote Access (Two-factor authentication) | 8.3 | Unauthorized remote use of administrative access |
Encryption in Transit (Armor SSL certificates only | 4.1.c, 4.1.d | Interception of sensitive data in transit |
SERVER LAYER | ||
Hardened Operating System (OS) | 2.1.a, 2.1.b, 2.1.c, 2.2.a, 2.2.b, 2.2.c, 2.2.d | Configuration errors |
File Integrity Monitoring | 11.5 | Monitoring unauthorized changes to critical files |
Secure Remote Administrative Access | 2.3 | Disclosure of administrative credentials |
OS Patching | 6.1, 6.2 | OS weaknesses |
Malware Protection | 5.1, 5.2, 5.3 | Compromise due to virus or malware infection |
Log & Data Management | 10.1, 10.2.2-10.2.7, 10.3, 10.5, 10.6, 10.7 | Detection of malicious activity |
Data At Rest Encryption | 3.4 | Unauthorized disclosure of sensitive information |
Time Synchronization | 10.4 | Facilitates log and forensic analysis |
Capacity Management | Security best practice | Ensures resource availability |
PHYSICAL LAYER | ||
Rogue Wireless Scanning | 11.1 | Unauthorized network access |
Physical Security | 9.1, 9.2, 9.3, 9.4 | Physical theft or compromise of data |
Secure Data Deletion | 9.8.2 | Data recovery from discarded systems |
ADMINISTRATIVE CONTROLS | ||
Change Control | 6.4.5 | Unauthorized network access |
Formal Risk Assessment | 12.2 | Identification of risks and threats |
Incident Response | 12.10 | Response to security incidents |
Array Snapshots | Security best practice | Loss or corruption of data |
Business Associate Contract | N/A | Legal liability for data loss/breach |
Maintain Maintenance Records | Security best practice | System failure |
Access Control | 7.1.1, 7.1.2 | Unauthorized access |
Security Audits | Security best practice | Validation of controls program |
HIPAA/HITECH Compliance
Armor Security Services | HIPAA/HITECH Controls | Risk Mitigation |
---|---|---|
PERIMETER LAYER | ||
IP Reputation Filtering | §164.308(a)(1)(ii)(A) | Activity from known bad sources |
DDoS Mitigation | Security best practice - implied control under 164.306(A) | Loss of availability due to high volume of malicious activity |
APPLICATION LAYER | ||
Web Application Firewall | Security best practice - implied control under 164.306(A) | Application layer flaws and exploits |
NETWORK LAYER | ||
Intrusion Detection/Prevention | Security best practice - implied control under 164.306(A) | Malicious allowed traffic |
Network Firewall (Hypervisor) | Security best practice - implied control under 164.306(A) | Unwanted network connectivity |
Internal Network Vulnerability Scanning | Included in §164.308(a) | Exploits due to missing patches and updates; improper network firewall configuration |
External Network Vulnerability Scanning | Security best practice - implied control under 164.306(A) | Exploits due to missing patches and updates; improper network firewall configuration |
Secure Remote Access (Two-factor authentication) | §164.312(d), §164.312(a)(2)(iii) | Unauthorized remote use of administrative access |
Encryption in Transit (Armor SSL certificates only | §164.312(e)(1) | Interception of sensitive data in transit |
SERVER LAYER | ||
Hardened Operating System (OS) | Security best practice - implied control under 164.306(A) | Configuration errors |
File Integrity Monitoring | §164.312(e) | Monitoring unauthorized changes to critical files |
Secure Remote Administrative Access | §164.312(d) | Disclosure of administrative credentials |
OS Patching | Security best practice - implied control under 164.306(A) | OS weaknesses |
Malware Protection | §164.308(a)(5)(ii)(B) | Compromise due to virus or malware infection |
Log & Data Management | §164.308(a)(1)(ii)(D), §164.308(a)(5)(ii)(C), §164.312(b) | Detection of malicious activity |
Data At Rest Encryption | §164.312(d), §164.312(a)(2)(iii) | Unauthorized disclosure of sensitive information |
Time Synchronization | Security best practice - implied control under 164.306(A) | Facilitates log and forensic analysis |
Capacity Management | Security best practice - implied control under 164.306(A) | Ensures resource availability |
PHYSICAL LAYER | ||
Rogue Wireless Scanning | Security best practice - implied control under 164.306(A) | Unauthorized network access |
Physical Security | §164.310(a)(2)(i), §164.310(a)(2)(ii), §164.310(a)(2)(iii), §164.310(a)(2)(iv) | Physical theft or compromise of data |
Secure Data Deletion | §164.310(d)(1), §164.310(d)(2)(ii), §164.310(d)(2)(ii) | Data recovery from discarded systems |
ADMINISTRATIVE CONTROLS | ||
Change Control | Security best practice - implied control under 164.306(A) | Unauthorized network access |
Formal Risk Assessment | §164.308(a)(1) | Identification of risks and threats |
Incident Response | §164.308(a)(6) | Response to security incidents |
Array Snapshots | §164.308(a)(7)(ii)(A), §164.310(d)(1), §164.310(d)(2)(iv) | Loss or corruption of data |
Business Associate Contract | §164.308(b)(1) | Legal liability for data loss/breach |
Maintain Maintenance Records | §164.310(a)(2)(iv) | System failure |
Access Control | §164.312(a)(1)(12) | Unauthorized access |
Security Audits | §164.308(a)(8) | Validation of controls program |
HITRUST Compliance
Armor Security Services | HITRUST CSF v8 66 Controls Required for Certification | Risk Mitigation |
---|---|---|
PERIMETER LAYER | ||
IP Reputation Filtering | 09.m | Activity from known bad sources |
DDoS Mitigation | 09.m(HT1), 09.h(HT2) (included in Level 2 implementation) | Loss of availability due to high volume of malicious activity |
APPLICATION LAYER | ||
Web Application Firewall | 09.m | Application layer flaws and exploits |
NETWORK LAYER | ||
Intrusion Detection/Prevention | 09.m | Malicious allowed traffic |
Network Firewall (Hypervisor) | 01.m, 01.o, 01.w, 09.m | Unwanted network connectivity |
Internal Network Vulnerability Scanning | 10.m | Exploits due to missing patches and updates; improper network firewall configuration |
External Network Vulnerability Scanning | 10.m | Exploits due to missing patches and updates; improper network firewall configuration |
Secure Remote Access (Two-factor authentication) | 01.j, 05.i, 09.s | Unauthorized remote use of administrative access |
Encryption in Transit (Armor SSL certificates only | 09.m, 09.s | Interception of sensitive data in transit |
SERVER LAYER | ||
Hardened Operating System (OS) | 10.m | Configuration errors |
File Integrity Monitoring | 09.ab, 10.h | Monitoring unauthorized changes to critical files |
Secure Remote Administrative Access | 01.j, 05.i, 09.m, 09.s | Disclosure of administrative credentials |
OS Patching | 10.m | OS weaknesses |
Malware Protection | 09.ab, 10.h | Compromise due to virus or malware infection |
Log & Data Management | 09.aa(8), 09.ab, 09.ac | Detection of malicious activity |
Data At Rest Encryption | 06.d, 10.g | Unauthorized disclosure of sensitive information |
Time Synchronization | 09.af | Facilitates log and forensic analysis |
Capacity Management | 09.h | Ensures resource availability |
PHYSICAL LAYER | ||
Rogue Wireless Scanning | 01.m, 09.m | Unauthorized network access |
Physical Security | 08.b, 08.d, 08.j, 09.ab, 09.q | Physical theft or compromise of data |
Secure Data Deletion | 07.a, 08.l, 09.p | Data recovery from discarded systems |
ADMINISTRATIVE CONTROLS | ||
Change Control | 09.g(10) | Unauthorized network access |
Formal Risk Assessment | 03.a, 03.b, 03.c | Identification of risks and threats |
Incident Response | 05.b, 11.a, 11.c | Response to security incidents |
Array Snapshots | 12.c | Loss or corruption of data |
Business Associate Contract | 05.k, 09.e | Legal liability for data loss/breach |
Maintain Maintenance Records | 08.j | System failure |
Access Control | 01.a | Unauthorized access |
Security Audits | 06.g | Validation of controls program |
We Deliver Security and Compliance Outcomes
Through our cloud security platform, we deliver security and compliance outcomes that allow our customers and partners to move fast, knowing their environments are secure and confident that security isn’t slowing them down.
Armor is your one-stop shop for a secure, fully compliant solution no matter your security needs.

Ready to Get Started?
Get started with our pricing tool or schedule a demo.