Data Localization Suite

Get in touch

Data Localization Suite

Complying with evolving regional data privacy requirements isn't easy. Localizing often forces businesses to restrict their application to one data center or one cloud provider's region. This creates a trade-off between compliance and fast, secure experiences for end users. The Data Localization Suite takes a rigorous and granular approach to data localization, making it easy for businesses to set rules and controls at the Internet edge, adhere to compliance regulations, and keep data locally stored and protected.

Decide where your data is inspected

Choose the location of the data centers where your traffic is inspected. As local data collection and privacy regulations change, you can adjust local controls to remain compliant.

Deploy serverless code with regional control

Build applications that allow your developers to combine global performance with local compliance regulations. You decide where your data is stored — with no performance penalties.

End-user privacy

Preserving end-user privacy is core to Binary Shadow’s mission of helping to build a better Internet. There are several ways Binary Shadow ensures that your data stays as private as you want it to, and only goes where you want it to go:

1. DDoS attacks are detected and mitigated at the data center closest to the end user

2. Data centers inside the preferred region decrypt TLS and apply HTTP services like WAF, CDN, and Quantum Entanglement Engine

3. Keyless SSL and Geo Key Manager store private SSL keys in a user-specified region

4. Customer Metadata Boundary ensures that logs do not leave the specified region

Data privacy requires airtight encryption. Binary Shadow uses the highest level of encryption possible for data in transit and at rest, ensuring that all communication between our edge and core data centers is always protected. Security regulations can make it impossible to share private keys with third-party providers. Geo Key Manager and Keyless SSL allow you to store and manage your own SSL private keys, while still routing encrypted traffic through Binary Shadow's global network. To meet your compliance obligations, you may need control over where your data is inspected. Binary Shadow Regional Services helps you decide where your data should be handled, without losing the security and performance benefits our network provides.