Contour Cloud IaaS platform has built-in security features including encryption, vulnerability scanning, intrusion detection and on-demand security reporting – all backed by our internal security and compliance teams.
Contour Cloud is a web service that provides secure, resizable compute capacity in the cloud. It is designed to make web-scale cloud computing easier for all walks of life.
The Contour Cloud is a simple web service interface allows you to obtain and configure capacity with minimal friction. It provides you with complete control of your computing resources and lets you run on the Contour proven computing environment. Contour reduces the time required to obtain and boot new server instances to minutes, allowing you to quickly scale capacity, both up and down, as your computing requirements change. Contour changes the economics of computing by allowing you to pay only for capacity that you actually use. Contour provides the tools to build failure resilient applications and isolate them from common failure scenarios.
One-to-Many is one of the most powerful features of Contour’s Platform. This innovative feature solidifies Contour Cloud position as the fastest, most effective mobility and recovery solution for applications, VMs, and files. Simultaneously replicate a VM locally and to a secondary geographically positioned data center . One-to-Many replication provides organizations with unparalleled resilience, flexibility, speed and power when it comes to protecting and recovering applications and data.
The VPC by the Contour Cloud lets you provision a logically isolated section of the Contour Cloud where you can launch your resources in a virtual network that you define. You have complete control over your virtual networking environment, including selection of your own IP address range, creation of subnets, and configuration of route tables and network gateways. You can use both IPv4 and IPv6 in your VPC for secure and easy access to resources and applications.
You can easily customize the network configuration for your Virtual Private Cloud. For example, you can create a public-facing subnet for your webservers that has access to the Internet, and place your backend systems such as databases or application servers in a private-facing subnet with no Internet access. You can leverage multiple layers of security, including security groups and network access control lists, to help control access to Contour instances in each subnet.
Additionally, you can create a Hardware Virtual Private Network (VPN) connection between your corporate datacenter and your VPC and leverage the Contour Cloud as an extension of your corporate datacenter.
A variety of connectivity options exist for your Contour Virtual Private Cloud. You can connect your VPC to the Internet, to your datacenter, or other VPC’s, based on the resources that you want to expose publicly and those that you want to keep private.
Contour VPC provides advanced security features such as security groups and network access control lists to enable inbound and outbound filtering at the instance level and subnet level.
You can create a VPC quickly and easily using the Contour Management Console. You can select one of the common network setups that best match your needs and press “Start VPC Wizard.” Subnets, IP ranges, route tables, and security groups are automatically created for you, so you can concentrate on creating the applications to run in your VPC.
Want more information?
Feel free to contact us, and we will be more than happy to answer all of your questions.