https://store-images.s-microsoft.com/image/apps.6287.85d933e9-3e94-49b1-af1e-6735b9ee82f0.edcf991f-cbbf-4232-8190-89c7f899bc48.c76b9cc1-0320-4e2d-9888-92cc4df33e88

Vault

Procomix Technology Group

Vault

Procomix Technology Group

VAULT is a perfect fit for financial institutions with sensitive applications that should be segregated from the network and delivered to end users. Our approach is a managed service offer to deploy, secure, and monitor the components of the Vault.

This offer is a "managed service" approach allowing us to deploy all the VAULT Azure Infrastructure on your dedicated subscription.
The offer includes professional services to install, manage, and monitor the components of VAULT including: Azure Virtual Machines, Azure firewalls, Network Security Groups, Web Application Gateways, VPNs, and Azure Monitor where required.
The VAULT infrastructure is agile using Azure and Microsoft Windows Software Defined capabilities; this allows scalability to host different business applications, and insures flexibility for different applications integration.

When you purchase the offer, you will be paying for the professional services necessary to deploy the complete secured infrastructure on your Azure Subscription. The offer does not include Azure resources consumption, OS server licenses, nor client licenses.


With Vault, we will deploy all virtual images, Windows components, security policies, and other third party components and deliver to you an isolated secure infrastructure ready to host your critical applications and securely publish them to your end users.


The VAULT is design mainly in response to ISO27001 and SWIFT Standards & Regulations which touches the Infrastructure, Network, Identity, End-user, in addition to Governance and reporting,

  • The VAULT is deployed on a dedicated infrastructure, and isolated from the other network using Traffic Encryption, and Firewall & Network Zoning with SFTP for secure file IN/OUT file exchange.
  • Users Identities on this platform are provisioned through workflows with a dedicated panel for user management managed and logging for all Identity management activities.
  • End-User Access is controlled and secured using Certificate Based Client Access, and application whitelisting is used to control the executables or applications that are allowed to run.
  • The VAULT is administered by Segregated Admins (PAW) from Operators stations; the admins will have regular user access with elevated privilege using PAM which also records and logs all their activities. The VAULT is designed with containerized approach protecting its resources even if the end-user station is infected.
  • Continuous monitoring of the Vault infrastructure is done using Azure Monitor.