Hosting Options
Decomplex is designed for secure, scalable, and reliable deployment, offering a robust hosting environment tailored to the needs of discerning families and organizations. Our primary hosting model leverages cutting-edge cloud infrastructure to ensure optimal performance and data protection.
Secure Swiss Cloud Hosting
Decomplex is hosted on a secure Kubernetes environment with a trusted Swiss Cloud Provider. This strategic choice underscores our commitment to:
Data Sovereignty :
Your data remains within Switzerland, adhering to some of the world's strictest data protection laws.
High Security Standards :
Benefit from robust physical and network security measures, regular security audits, and compliance with international security best practices.
Reliability & Performance :
Leverage a highly available and performant cloud infrastructure designed for demanding applications.
Core Hosting Components
Our hosting environment is built upon a foundation of advanced technologies:
Kubernetes :
For container orchestration, ensuring efficient deployment, scaling, and management of all Decomplex services.
Namespace Isolation :
Each customer (family) is hosted in a dedicated Kubernetes namespace, providing unparalleled data isolation and resource separation. This means your data and applications are logically and physically separated from others.
PostgreSQL Database :
Serving as both the relational database and vector store, ensuring robust data management.
S3 Object Storage :
For secure and scalable storage of all documents and objects.
Keycloak :
Centralized authentication for secure user access.
APISix :
For centralized Ingress Management, controlling external access to the platform.
Memgraph :
A graph database used for visualizing complex relationships.
Security Measures
Security is paramount in our hosting strategy:
Data Encryption :
All data is encrypted at rest and in transit, protecting your sensitive information from unauthorized access.
Network Policies :
Strict network policies enforce isolation between namespaces, preventing unauthorized inter-namespace communication.
Role-Based Access Control (RBAC) :
Granular access controls are implemented at every layer of the infrastructure.
Optional VPN :
Customers can opt for a dedicated VPN connection to their namespace for enhanced security and direct access.
Scalability and Reliability
Our Kubernetes-based architecture ensures that Decomplex can scale seamlessly to meet your family's growing needs. The distributed nature of Kubernetes provides high availability, minimizing downtime and ensuring continuous access to your critical information.
Custom Solutions
For specific requirements or on-premise deployment considerations, please contact our team to discuss tailored hosting solutions. We are committed to finding the best fit for your unique operational and security needs.