Hosting Options

Decomplex is designed for secure, scalable, and reliable deployment, offering a robust hosting environment tailored to the needs of discerning families and organizations. Our primary hosting model leverages cutting-edge cloud infrastructure to ensure optimal performance and data protection.

Secure Swiss Cloud Hosting

Decomplex is hosted on a secure Kubernetes environment with a trusted Swiss Cloud Provider. This strategic choice underscores our commitment to:

Data Sovereignty :

Your data remains within Switzerland, adhering to some of the world's strictest data protection laws.

High Security Standards :

Benefit from robust physical and network security measures, regular security audits, and compliance with international security best practices.

Reliability & Performance :

Leverage a highly available and performant cloud infrastructure designed for demanding applications.

Core Hosting Components

Our hosting environment is built upon a foundation of advanced technologies:

Kubernetes :

For container orchestration, ensuring efficient deployment, scaling, and management of all Decomplex services.

Namespace Isolation :

Each customer (family) is hosted in a dedicated Kubernetes namespace, providing unparalleled data isolation and resource separation. This means your data and applications are logically and physically separated from others.

PostgreSQL Database :

Serving as both the relational database and vector store, ensuring robust data management.

S3 Object Storage :

For secure and scalable storage of all documents and objects.

Keycloak :

Centralized authentication for secure user access.

APISix :

For centralized Ingress Management, controlling external access to the platform.

Memgraph :

A graph database used for visualizing complex relationships.

Security Measures

Security is paramount in our hosting strategy:

Data Encryption :

All data is encrypted at rest and in transit, protecting your sensitive information from unauthorized access.

Network Policies :

Strict network policies enforce isolation between namespaces, preventing unauthorized inter-namespace communication.

Role-Based Access Control (RBAC) :

Granular access controls are implemented at every layer of the infrastructure.

Optional VPN :

Customers can opt for a dedicated VPN connection to their namespace for enhanced security and direct access.

Scalability and Reliability

Our Kubernetes-based architecture ensures that Decomplex can scale seamlessly to meet your family's growing needs. The distributed nature of Kubernetes provides high availability, minimizing downtime and ensuring continuous access to your critical information.

Custom Solutions

For specific requirements or on-premise deployment considerations, please contact our team to discuss tailored hosting solutions. We are committed to finding the best fit for your unique operational and security needs.