The shift to distributed infrastructure needs a new security model

Unified. Cloud-Native. Interoperable.

The Distributed Computer makes governance and security management simpler across the breadth of enterprise IT. It unifies all aspects of security behind a single pane of glass, significantly simplifying administration while reducing cost and risk.

Greater Control, Less Responsibility

The Distributed Computers lets enterprise enforce a comprehensive security policy. Its private networks expand on-premise computing bandwidth for your most sensitive workloads, while the public network provides granular control over elements like encryption and data residency.

Infrastructure Agnostic

Your security policy is rigorously applied across different hardware and vendors, from a five nines datacentre to the 5G edge

Cloud Native

Security tools are intuitive and easy to manage up and down the entire stack, and are constantly updated to reflect the cutting edge

Central Management

Visibility is extended across the physical and virtual hardware that your computing happens on

With support for managing everything from user authentication to device and network security, your organization can easily create the right strategy for keeping your data safe.

Easy to Scale & Administer

A larger attack surface means even minor gaps in enforcement across diverse hardware and software create opportunities for cyber criminals.

Only the Distributed Computer lets enterprise enforce the same security framework across any deployment configuration. Its platform provides enterprise-grade, cloud-native security tools for everything from authentication to disaster recovery management.

Welcome to the only point of control that scales effortlessly with your applications.

Security Whitepaper

A Multi-Factor Security System

The Distributed Computer provides enterprise with two complementary security models

Encryption Control

All data transferred across the Distributed Computer is protected with SSH encryption, with support for user-defined encryption.

Isolation Control

All workloads are computed in isolated sandboxes that cannot interact with each other or underlying hardware. Dedicated server resources can also be provided.

Location Control

The Distributed Computer provides granular control over the location and jurisdiction that any workload is completed in.

Compliance Control

Vendors on the Distributed Computer that compute sensitive data must submit compliance and security certifications such as HIPAA, FedRAMP, and SOC 2.

Data Control

Users have clear visibility over where their data is at all times, with best-in-class tracking, non-repudiation, and deduplication tools.

Homomorphic Encryption will also soon be added to the Distributed Computer via the Microsoft SEAL Library, enabling secure computations on encrypted data.

Public Networks →

Private networks with the Distributed Computer are completely internal to the organization, combining the security of on-premise with the composable infrastructure of a cloud environment.

With a private network, all data can be transmitted over the organization’s intranet. Data and access can also be isolated at any level from the business unit on down, so only those with correct encryption keys can access your computational processes.

Private Networks →

A Responsibility to Protect

As the software provider, Kings Distributed Systems maintains the responsibility to ensure the security of its network. KDS never knows or interferes with customer data within any cloud environment, simply orchestrating the underlying network and compute resources.

KDS implements industry-leading security practices to ensure the protection of your data and all participants on the Distributed Computer.

For information, please refer to our comprehensive privacy policy and terms of service.

Privacy Policy → Terms of Service →

Secure Hosting

The main server stack for the Distributed Computer is hosted in a five-nines, ultra-secure co-located server in Toronto, Canada.

Disaster Recovery

Backup, offsite storage, and DRMs are in place and regularly checked for their operational status.

Encrypted Access

Access to the main server is only done via an industry-leading SSH private/public key regime.

Veteran Admins

KDS administrators have extensive experience with real-time critical business systems, and hold the Cloud Security Alliance’s STAR accreditation or equivalent.

Protecting Payments & Financial Information

Payment services are handled through third party payment processors operated by PayPal Holdings Inc. that conform to ISO/IEC 27001:2013, and ensure KDS is outside the scope of PCI DSS requirements.

For more information on how KDS and its payments partners protect against crime, please refer to our Marketplace Compliance & Monitoring Plan.

Compliance Plan →

Get Started Today

Contact us to learn how the Distributed Computer provides the secure, hyperscale resources your organization needs to succeed.