Deployment Types
Secure60 offers three flexible deployment options to meet diverse organizational requirements, security policies, and operational preferences. All deployment types include high availability (HA) configuration and comprehensive support plans to ensure optimal platform performance and reliability.
SaaS (Software as a Service)
Overview
Secure60 SaaS is our fully managed cloud service, providing immediate access to the complete security platform without infrastructure management overhead. Deploy globally with regional data residency options to meet compliance requirements.
Key Features
- Global Availability - Available in multiple regions worldwide
- Instant Deployment - Get started in minutes with no infrastructure setup
- Automatic Updates - Continuous platform updates with latest features and security patches
- Elastic Scaling - Automatically scales to handle varying data volumes and user loads
Regional Availability
- North America - US East, US West
- Europe - UK, Germany and more
- Asia Pacific - Australia, Indonesia, Thailand, Philippines, Mongolia, Kyrgyzstan
- Data Sovereignty - Data processed and stored within selected region
Benefits
- Zero Infrastructure Management - No servers, storage, or networking to manage
- Predictable Costs - Subscription-based pricing with no capital expenditure
- Rapid Time-to-Value - Start detecting threats immediately
- Global Scale - Leverage Secure60’s enterprise-grade infrastructure
- Continuous Innovation - Access to latest features as soon as they’re released
Ideal For
- Organizations seeking rapid deployment and minimal operational overhead
- Companies with distributed or remote teams requiring global access
- Businesses prioritizing cost predictability and operational simplicity
- Teams that want to focus on security operations rather than platform management
Dedicated SaaS
Overview
Dedicated SaaS provides the benefits of cloud deployment with additional isolation and customization. Your Secure60 instance runs on dedicated infrastructure within our cloud environment, offering enhanced security and performance control.
Key Features
- Dedicated Infrastructure - Isolated compute, storage, and networking resources
- Enhanced Security - Additional network isolation and security controls
- Custom Configuration - Tailored platform configuration for specific requirements
- Performance Optimization - Dedicated resources ensure consistent performance
- Regional Flexibility - Deploy in your preferred geographic region
Advanced Capabilities
- Custom Integration - Specialized integrations with your existing tools and workflows
- Compliance Certification - Enhanced compliance features for regulated industries
- Private Networking - Direct network connections to your infrastructure
- Backup & Recovery - Customized data protection and recovery procedures
- Performance Monitoring - Dedicated monitoring and optimization services
Benefits
- Security Isolation - Complete logical separation from other customers
- Performance Predictability - Guaranteed resource allocation and performance
- Regulatory Compliance - Enhanced controls for strict compliance requirements
- Custom Configurations - Platform tuning for specific use cases and workflows
- Priority Support - Dedicated support team with specialized expertise
Ideal For
- Organizations with strict security or compliance requirements
- Companies requiring predictable performance for critical operations
- Businesses needing custom integrations or specialized configurations
- Regulated industries requiring enhanced data protection and audit capabilities
On Premise
Overview
On Premise deployment provides complete control over your Secure60 environment, with the platform installed and managed within your own infrastructure. Features a modular architecture that allows you to enable specific capabilities based on your use case requirements.
Modular Architecture
The On Premise deployment uses a flexible, modular approach where you can enable specific platform components:
- Data Ingestion Engine - Collect and normalize security data from all sources
- Data Storage Engine - Securely stores, indexes, and manages all ingested security data, ensuring high availability and rapid access for analytics and compliance needs.
- Search & Analytics - Advanced search capabilities and basic analytics
- User Management - Role-based access control and user administration
- Dashboard & Reporting - Core visualization and reporting capabilities
Optional Modules
Select additional modules based on your specific requirements:
Deployment Characteristics
- Complete Control - Full control over hardware, software, and configuration
- Data Sovereignty - All data remains within your infrastructure
- Custom Integration - Deep integration with existing security and IT infrastructure
- Air-Gapped Support - Can operate in completely isolated environments
- Flexible Sizing - Scale from small appliances to large enterprise deployments
Benefits
- Maximum Security - Data never leaves your environment
- Regulatory Compliance - Meet strict data residency and control requirements
- Custom Performance - Optimize hardware and configuration for your workload
- Integration Flexibility - Seamless integration with existing infrastructure
- Cost Predictability - One-time licensing with predictable maintenance costs
Ideal For
- Organizations with strict data sovereignty requirements
- Government agencies and defense contractors
- Companies operating in air-gapped or highly secure environments
- Businesses requiring deep integration with existing infrastructure
- Organizations preferring capital expenditure over operational expenditure
High Availability Across All Deployments
All Secure60 deployment types include built-in high availability configuration to ensure continuous operation and data protection.
SaaS HA Features
- Load Balancing - Distribute traffic across multiple service instances
- Auto Scaling - Automatically adjust resources to meet demand and ensure high availability
Dedicated SaaS HA Features
- Dedicated Redundancy - Dedicated failover infrastructure
- Enhanced Monitoring - Proactive monitoring and alerting
- Custom Recovery - Tailored backup and recovery procedures
- Performance Optimization - HA configuration tuned for your workload
- Auto Scaling - Dynamically scale resources based on your specific workload and usage patterns
On Premise HA Features
- Clustered Architecture - Multi-node clustering for fault tolerance
- Data Replication - Real-time data replication across cluster nodes
- Automatic Failover - Seamless failover between cluster nodes
- Backup Integration - Integration with your existing backup infrastructure
Release Schedule
SaaS & Dedicated SaaS
- Continuous Updates - New features and improvements deployed automatically
- Security Patches - Critical security updates applied immediately
- Feature Releases - Major feature releases deployed monthly
- Maintenance Windows - Scheduled maintenance with advance notification
On Premise
- Regular Releases - New software versions released every 6 months
- Critical Patches - Security and critical bug fixes provided immediately
- Update Flexibility - Control over when updates are applied to your environment
- Long-Term Support - Extended support for previous versions during transition periods
Choosing Your Deployment Type
Consider these factors when selecting your Secure60 deployment option:
Data Requirements
- Data Sovereignty - Do you need data to remain within specific geographic boundaries?
- Compliance - What regulatory requirements must you meet?
- Integration - How deeply do you need to integrate with existing systems?
Operational Preferences
- Management Overhead - Do you prefer managed services or direct control?
- Scaling Requirements - Do you need elastic scaling or predictable capacity?
- Update Control - Do you need control over when updates are applied?
Financial Considerations
- Cost Structure - Do you prefer operational expense (SaaS) or capital expense (On Premise)?
- Predictability - How important is cost predictability for your budget planning?
- ROI Timeline - What’s your expected return on investment timeline?
For detailed deployment guidance and best practices, visit our Guides section.