Welcome to IntegriCloud™ — Your Home for Secure Data Processing

Why IntegriCloud™?

At Raptor Data Solutions, we believe that using cloud services shouldn't require loss of privacy or the data breach risks currently present on other cloud platforms. Our IntegriCloud™ platform has been designed from the ground up to respect your rights over the data you process on our platform — and helps ensure compliance with new data privacy laws, including the EU's General Data Protection Regulation (GDPR).

Unlike other providers, if basic security practices are followed by our clients inside their leased systems, we have no way to access their data stored on our platform. However, we don't expect you to take our word — or our hardware vendors' word — blindly. Instead, for your inspection and security audit purposes, we provide full source code for the exact firmware, kernel, and userspace stack running on our platform at any given time. Furthermore, using the new, patent-pending FlexVer™ technology from Raptor Engineering, we can prove that the source code you receive is exactly what was built and is running on the remote systems to which you are connected. This is an unprecedented level of transparency and security in the cloud services space, and is designed specifically to keep you in control of your data at all times.

We like to think of it as "the cloud the way it should have been." No frills, no invasion of privacy, no hidden fees, just raw computational power and fast network access to power your critical applications.

→  See how it works.

No Hidden Backdoors

Our IntegriCloud™ platform makes exclusive use of platforms for which full control down to the firmware level is possible, such as the Opteron series of 64-bit x86 CPUs. We do not use systems that require vendor black boxes, like the ME or PSP, in which backdoors and security vulnerabilities may hide undetected, waiting to be exploited. The firmware source we provide is sufficient to boot our compute nodes without requiring additional binary components. This means that, unlike nearly every cloud provider currently on the market, full source and binary level security audits can be executed by our clients without any place for malware or backdoors to hide. As part of our pledge to transparency and auditablity, we plan to add IBM POWER9 systems to our cloud service offerings in 2018 to further expand our next-generation cloud platform.

→  Compare against other providers.

Modern Functionality

Using a secure cloud platform doesn't require that you give up convenience or features. We offer numerous features as part of our base service level, including automatic "Oops!" backups on several different timescales, an API for service event notifications, and migration of active systems between nodes in a given datacenter. You are in control at all times, and are able to authorize or deauthorize any given compute node based on your analysis of the software stack running on any particular node. Furthermore, if your application requires a bare metal machine lease, we can accommodate your needs while retaining the security advantages of our multitenant systems. Simply send us an Email at sales@integricloud.com to discuss bare metal colocation options.

Convenient Billing

Use of the IntegriCloud™ platform is billed on a demand basis for maximum flexibility. If you find that you need more CPUs, more RAM, or additional storage, you can simply alter your leased system parameters on our management console. You will be billed for the time that your systems are active, based on the configuration of those systems. You can spin up as many systems as you need for a given task, and tear them down just as easily, while only being billed for what you use on a demand basis. A listing of all current rates is available in the Management Console, so you can decide how to obtain the best value for your particular workload. We also provide charts of resource use and billing to allow you to see exactly where charges originate and to fine tune your leased system settings based on historical data.

Secure Communication

Thanks to FlexVer™ technology, Man In The Middle (MITM) and other communication channel-based attacks on cloud services can be a relic of the past! Each of our nodes generates an SSH host key automatically on boot, the public key of which is loaded into the FlexVer™ system. Because the firmware and software generating the key is known to be trustworthy, preferably based on one or more client security audits of that stack, it is known that the private key never leaves the given compute node. The public key, in turn, is authenticated by the FlexVer™ system integrated into that node as part of the initial cryptographic handshake. If the public key is tampered with during initial transmission, the signature checks on the FlexVer™-provided data will fail. As a result, the public key of the node being connected to is known before an initial SSH connection has been established, leaving no route for an SSH-based MITM attack to succeed.

This initial authentication mechanism is another first for cloud services; instead of relying on a centralized authentication scheme for initial key material transmission and authentication (e.g. X.509 CAs), IntegriCloud™ uses a fully decentralized scheme that is highly resistant to attack even by determined adversaries.

Public Services Welcome

The IntegriCloud™ platform is ready to host your publicly available applications and services. Our base service level imposes no data caps, and transmission speeds on our dedicated fiber network reach up to 50Mbps symmetric at the base service level, with higher speeds available if needed. We offer both IPv4 and IPv6 static addresses, and with our fully redundant power systems, uptimes generally exceed 99.999% with overall availability typically at or above 99.9%.

Get Started!

Get started with a secure IntegriCloud™ system today by topping up and following our easy Quick Start Guide!

NOTE: For POWER8 VPS availability and pricing, please contact sales@integricloud.com to request a quote.
Early access to POWER8 is handled via a different system than the final POWER9 VPS offerings.

Graphics and targeted content copyright © 2018 Raptor Data Solutions, LLC. All rights reserved. No pages or files may be distributed without express written permission.
Site design, contents, and implementation copyright © 2018 Raptor Engineering, LLC. All rights reserved, used under license.
This product is covered by one or more U.S. patents or patent applications. Unauthorized duplication of any component, in part or in whole, is strictly prohibited.

This website makes minimal use of cookies. Use of this site constitutes acceptance of this policy. Terms and conditions of use. / contact information.  v2.02.2