Developed in response to overreaching Big Tech corporations, ALTERNcloud is a global Cloud IaaS (Infrastructure as a Service) provider that enables websites, mobile applications, databases, email communications, and secured messaging apps to operate online without interruption. ALTERNcloud was primarily designed to provide a secure and private Cloud architecture for clients to host their data, without fear of cancellation. Businesses and organizations of all types and creeds can rely on ALTERNcloud to provide them with multi-jurisdictional, technology, and Cloud infrastructure redundancy. Learn more about the building-blocks of ALTERNcloud’s infrastructure.
ALTERNcloud: Security by Design
Clients choose to utilize our products because they know that ALTERNcloud was designed with security from inception. For example, our products include:
Multi-Factor Authentication
The ALTERNcloud Provisioning Portal provides for multiple Multi-Factor Authentication methods such as Two Factor Authentication (2FA).
Secure Socket Layer Certificates
Utilizing SSLs is our standard procedure when encrypting traffic and maintaining secure connections. This prevents information that is being sent from one source to another from being intercepted by malicious persons.
Open-Source Software
ALTERNcloud Cloud infrastructure is built on open-source technologies like OpenStack and Ceph. Open-source software is often considered to be more trustworthy and secure than closed-source proprietary solutions, with entire communities of security and software experts scrutinizing code as it is submitted for inclusion. Open-source software projects are much more accountable to their members than monolithic closed-source platforms such as Big Tech vendors.
Shared and Dedicated Control Planes
At ALTERNcloud, clients select either multi-tenant or single-tenant Clouds: EZ Cloud & Virtual Private Cloud (VPC) versus Hosted Private Cloud (HPC). Each HPC has its own fully isolated and private bare metal hardware and control plane.
Network Security
While many Cloud service providers route customer traffic through the same network or otherwise co-mingle customer traffic to save on costs, each ALTERNcloud instance has its own set of entirely private virtual networks for its network traffic. Private virtual networks and network segregation, especially when combined with other technologies like HTTPS/TLS, ensure that your traffic is protected from snoopers or potentially malicious actors on the same physical network.
Data Center Security
Our data centers are positioned in fully secure locations complete with video surveillance and are physically defended 24/7 by security personnel, while on-site entry requires biometric and key card access. Equipped with UPS and backup diesel-generators, our data centers are able to provide a continuous supply of electricity through undefined power outages of up to 48 hours, and HVAC, fire detection and suppression systems, alarms, and monitoring by surveillance cameras (CCTV) allow us to provide a reliable infrastructure.
Data Center DDoS Protection
ALTERNcloud provides DDoS detection and mitigation based on Corero SmartWall DDoS Protection deployment at the edge, including: its Threat Defense System, which automatically inspects every packet to protect inbound traffic from DDoS attacks before they cause downtime; its Edge Thread Defense System, which mitigates attacks at scale, offering surgical protection using network routing at the edge to redirect or scrub malicious traffic; and its Threat Defense Cloud, a cloud-scale defense which safeguards clients from large attacks with automated, real-time, on-premise protection.
CDN & Global DDoS Protection
ALTERNcloud’s CDN provides a wide range of features specifically designed for global DDoS protection, including over 1 Tbps of total filtering capacity and server protection against DDoS attacks at the network (L3), transport (L4), and application (L7) layers around the world. This entails: server protection against volumetric attacks (such as UDP Flood, ICMP Flood, IP/ICMP Fragmentation, IPSec Flood, Amplification Attacks, and Ping of Death) and connection attacks (like SYN Flood, SYN+ACK Flood, ACK Flood, RST Flood, and TCP Attacks) at the L3 and L4 layers, and server protection against application attacks (such as L7 UDP Flood, L7 TCP Attacks) at the L7 layer.