The Distributed Computers lets enterprise enforce a comprehensive security policy. Its private networks expand on-premise computing bandwidth for your most sensitive workloads, while the public network provides granular control over elements like encryption and data residency.
Your security policy is rigorously applied across different hardware and vendors, from a five nines datacentre to the 5G edge
Security tools are intuitive and easy to manage up and down the entire stack, and are constantly updated to reflect the cutting edge
Visibility is extended across the physical and virtual hardware that your computing happens on
With support for managing everything from user authentication to device and network security, your organization can easily create the right strategy for keeping your data safe.
A larger attack surface means even minor gaps in enforcement across diverse hardware and software create opportunities for cyber criminals.
Only the Distributed Computer lets enterprise enforce the same security framework across any deployment configuration. Its platform provides enterprise-grade, cloud-native security tools for everything from authentication to disaster recovery management.
Welcome to the only point of control that scales effortlessly with your applications.
The Distributed Computer provides enterprise with two complementary security models
All data transferred across the Distributed Computer is protected with SSH encryption, with support for user-defined encryption.
All workloads are computed in isolated sandboxes that cannot interact with each other or underlying hardware. Dedicated server resources can also be provided.
The Distributed Computer provides granular control over the location and jurisdiction that any workload is completed in.
Vendors on the Distributed Computer that compute sensitive data must submit compliance and security certifications such as HIPAA, FedRAMP, and SOC 2.
Users have clear visibility over where their data is at all times, with best-in-class tracking, non-repudiation, and deduplication tools.
Homomorphic Encryption will also soon be added to the Distributed Computer via the Microsoft SEAL Library, enabling secure computations on encrypted data.Public Networks →
Private networks with the Distributed Computer are completely internal to the organization, combining the security of on-premise with the composable infrastructure of a cloud environment.
With a private network, all data can be transmitted over the organization’s intranet. Data and access can also be isolated at any level from the business unit on down, so only those with correct encryption keys can access your computational processes.Private Networks →
As the software provider, Kings Distributed Systems maintains the responsibility to ensure the security of its network. KDS never knows or interferes with customer data within any cloud environment, simply orchestrating the underlying network and compute resources.
KDS implements industry-leading security practices to ensure the protection of your data and all participants on the Distributed Computer.
The main server stack for the Distributed Computer is hosted in a five-nines, ultra-secure co-located server in Toronto, Canada.
Backup, offsite storage, and DRMs are in place and regularly checked for their operational status.
Access to the main server is only done via an industry-leading SSH private/public key regime.
KDS administrators have extensive experience with real-time critical business systems, and hold the Cloud Security Alliance’s STAR accreditation or equivalent.
Payment services are handled through third party payment processors operated by PayPal Holdings Inc. that conform to ISO/IEC 27001:2013, and ensure KDS is outside the scope of PCI DSS requirements.
For more information on how KDS and its payments partners protect against crime, please refer to our Marketplace Compliance & Monitoring Plan.Compliance Plan →