Armored Servers' Flagship Secure Dedicated Server

1000$/mo - all inclusive including your own dedicated UNIX and Security administrators

Contact us for more information or to test-drive our service!



Can we always trust those who attempt to communicate with our web services?

Utilizing Solaris 10's Trusted Extensions, Armored Servers' design will work in a Trusted Environment utilizing a heirarchy of sensitivity labels.

The Hardware:

  • SUN Enterprise E4500 Server
       Benefits: All components are hot-swappable. No downtime for failed hardware.

  • 10 CPU's with 8mb Cache on 'each' chip
       Benefits: Rock solid performance. Handle load far better than faster competitors'
       Dual Intel based CPU's which only have a single shared cache.

  • 10GB RAM
       Benefits: JAVA Apps and several Oracle instances can run flawlessly

  • 1TB RAID Array
       Benefits: Mirrored Root drives and RAID5 for data integrity. No downtime or lost data.

  • Fiber Channel Array
       Benefits: I/O Performance at light speed with fiber optics

    Data Security and Integrity:

  • Daily Backups
       Benefits: In the event of a software error or failure, your data can be recovered.

  • OS and Applications are armored and hardened by experts. Proactive security.
       Benefits: Find out immediately when a security incident is happening, not after the fact.

  • Firewall at the router level:
       Benefits: Security from the outside-in. No load on your server to handle packet filtering

  • 7, or more, unique isolated zones/containers:
       Benefits: Supreme security ensuring data protection and integrity

  • Labeling and Mandatory Access Controls:
       Benefits: Kernel level security ensuring who is allowed to access what

    The Design:

  • Labeling Setup:
    In a nutshell.. WURD.. Write-Up, Read-Down.
    The Database can 'write up' for its logs where they will be secure and tamperproof at a higher classification. The database can 'read down' to the filesystem level but is unable to write to anything, even the root user.

  • Zone Setup:
    Hackers enter through the Email Server or Web Server Zone. The root filesystem is read-only. Web content is read-only. Email is append only and also unable to read email data as it is a one-way pipe. Database is protected in another virtual zone. Database storage is only accessible from the database zone. Logs and Audit data are safely recorded and unable to be modified. Armored Servers' administrators are notified immediately of the intrusion, and the hackers have no ability to modify anything.. such as infiltrating trojan horses or backdoors.