Security

Information security is at the center of everything we do.

How We Protect You From Cybersecurity Threats

The Anti-Cloud Service has been designed from the ground-up to block cybersecurity breaches and other security incidents. It is secure against ransomware, MITM (Man in the Middle), DoS (Denial of Service), brute-forcing, eavesdropping, spoofing, and other kinds of attacks.

Secure Connections

We use world-class encryption and authentication to protect your data as it transits from your local computer to the Anti-Cloud data center, and from server to server within our data center. No third parties, foreign governments, ISPs (Internet Service Providers), Big Tech companies, or other malicious actors can snoop on your data.

Secure Data Center

The Anti-Cloud data center is a hardened, purpose-built facility that’s safe from natural disasters, and locked down to prevent unauthorized physical access. Its features include:

  • SSAE 18 & SOC 2 certified
  • 24/7 surveillance & on-site security personnel
  • Biometric security access
  • Multiple 100 Gbps fiber with physically diverse routes
  • EMP (Electro-Magnetic Pulse) hardened
  • Three stories underground
  • Separate power grid from any major metro
  • Diesel generators with two weeks of fuel

Secure Hardware

Our hardware experts hand-select the chips, cards, drives, and other components that go into our servers to build the most secure, reliable, and performant servers that you will find anywhere. All data is encrypted at rest, and all infrastructure is updated regularly with the latest patches.

Isolated Environments

Each Anti-Cloud customer is provisioned with their own private infrastructure. Client data is never co-mingled. Each environment is locked down with firewalls, intrusion detection & prevention systems, and controlled access points.

Industry Best Practices and Certifications

We follow the industry best practices on security from OWASP, NIST, CIS, and CSA. Additionally, the Anti-Cloud data center is SSAE 18 and SOC 2 certified.


Our Secure Services

Our services are built around a secure software development lifecycle, and have been carefully designed to keep your data secure.

Anti-Cloud Secure Connect

ACSC (Anti-Cloud Secure Connect) provides foundational network security controls. ACSC enforces Zero Trust Network Access (ZTNA) for computers and other devices enrolled into ACSC, allowing you to meet HIPAA, PCI, and other compliance requirements with powerful technical controls. ACSC’s security features includes:

  • ACSC secures all network traffic between enrolled devices, using encrypted connections with mutual authentication.
  • ACSC authentication always requires 256-bit keys, generated randomly, never reused, and rotated frequently.
  • ACSC can optionally require MFA or smart cards for maximum security.
  • ACSC limits network access using the principle of least privilege.
  • ACSC enforces cryptokey routing, binding each ACSC identity to a unique private IP address.
  • ACSC monitors and logs all network traffic.

Anti-Cloud Secure Meet

ACSM (Anti-Cloud Secure Meet) keeps your private conversations private. With ACSM, you don’t have to worry about foreign governments, competitors, data brokers, or other Big Tech companies snooping around your meetings, and stealing your proprietary or confidential IP (Intellectual Property).

ACSM encrypts all meeting traffic, securing it from prying eyes. Additionally, if you choose to record a meeting (and to store that recording in the Anti-Cloud data center), your recordings will be encrypted and retrievable only by you.

Anti-Cloud Backup & Restore

ACBR (Anti-Cloud Backup & Restore) protects your data from ransomware and other disasters. ACBR automatically backs-up data from enrolled computers, and enables point-in-time restore – so you can always restore to the last good version of your data if disaster strikes.

ACBR encrypts data on the client before sending it to the Anti-Cloud data center. This means your back-ups are always encrypted, and can be decrypted only by the same computer from which the back-up originated.

Your back-ups are stored on dedicated hardware, and we’ll never delete your data. If service is discontinued for any reason (including non-payment), your Anti-Cloud hard drives are shipped to you using next-day delivery.


How to Report a Vulnerability

To report a security issue related to the Anti-Cloud Service, email security@myanti.cloud. We take all reports seriously, and will respond as soon as possible. We ask that, if you do discover a vulnerability, please:

  • Contact us as soon as possible
  • Do not attempt to access other users' data
  • Do not attempt to disrupt other users' network traffic
  • Give us time to fix it before disclosing publicly