Public Cloud
ComputeContainersStorageDatabasesAIAnalyticsSecurityDeveloperQuantum

Storage

Public cloud storage with measurable durability and recovery

Object, file, block, and cold archive storage delivered across a managed multi-vendor public cloud. SLA-defined durability, encryption at rest and in flight, geo-redundant replication, and audit-ready restore evidence.

Schedule consultation  ⟶View Storage Options

1,598

Data centers

Storage-capable facilities across 55 countries and 5 continents

99.999%

Availability SLA

Object storage availability with documented service credits

100Gbps

Throughput

Ingest and egress for data-intensive workloads and migrations

24/7

SOC & NOC

Continuous monitoring with tested restore drills and incident playbooks

Public cloud storage — explore solutions

Five storage tiers, one accountable operator

Storage

Cloud Storage Services

End-to-end managed storage across object, file, block, and archive. Unified policy, monitoring, and billing across tiers and vendors.

Storage

Object Storage

S3-compatible scalable object storage for cloud-native applications, backups, media libraries, and data lakes.

Storage

File Storage

Shared NFS and SMB file systems for applications, collaboration, home directories, and persistent workloads.

Storage

Block Storage

High-performance persistent volumes for compute, databases, and latency-sensitive transactional workloads.

Storage

Cold Archive

Long-term low-cost archival storage for compliance retention, legal hold, and historical data preservation.

Storage

A different storage shape?

Parallel file systems, GPU-attached NVMe, tape retention, or sovereign-region storage. We scope and operate the combination.

Overview

Multi-vendor managed public cloud storage

intSignal's public cloud storage services give enterprises one operator across the major hyperscalers, sovereign regional providers, and our own managed platform — delivered with the same SLAs, change control, and reporting model.

Our engineering team selects the right storage class for each workload, sets encryption and lifecycle policy, monitors integrity, and runs scheduled restore drills against documented RTO and RPO targets.

Capabilities

What's in scope

  • S3, NFS, SMB, and iSCSI protocol coverage across regions
  • Multi-vendor: AWS, Azure, GCP, OVHcloud, intSignal platform
  • Encryption at rest (AES-256) and in flight (TLS 1.3)
  • Object versioning, immutability, and object-lock
  • Automated lifecycle policy between hot, warm, and cold tiers
  • SOC 2, ISO 27001, HIPAA, GDPR, PCI DSS, FedRAMP alignment
  • Tested restore drills with audit evidence — not job-complete status

Featured products and solutions

Storage classes, performance, and access

Application PUT / GET / DEL S3 API bucket / key Zone A shard 1 shard 4 parity p1 checksum ✓ Zone B shard 2 shard 5 parity p2 checksum ✓ Zone C shard 3 shard 6 parity p3 checksum ✓

How it works

Erasure-coded across availability zones

Objects are split into data shards and parity shards using Reed-Solomon erasure coding, then distributed across three zones. Any single zone can fail and the object reconstructs from the remaining shards.

Continuous background scrubbing verifies checksums and rebuilds shards before durability is impacted.

API

S3-compatible

Drop-in compatibility with the AWS S3 API surface. Existing SDKs, tools, and ETL pipelines continue to work unchanged.

Durability

11 nines

Erasure-coded across availability zones with continuous integrity scanning. Designed for 99.999999999% annual durability.

Protection

Object lock & versioning

WORM retention, governance and compliance modes, and full version history for regulated workloads and ransomware resilience.

Linux client mount NFS Windows client mount SMB Build farm mount NFS Shared file system POSIX semantics · quotas · snapshots 📁 /projects 📁 app-svc 📄 config.yml 📄 data.csv 📁 build-out 📁 /home 📁 alice 📁 bob AD integration · ACLs

How it works

Shared mount, native protocols

One file system mounted concurrently by Linux, Windows, and clustered workloads over NFS or SMB. POSIX semantics and Active Directory integration let existing applications run unchanged.

Per-share quotas, snapshots, and QoS controls keep noisy neighbors from impacting other tenants on the same volume.

Protocols

NFS v3, v4.1, SMB 3

Native protocol support for Linux, Windows, and mixed environments. POSIX semantics and Active Directory integration available.

Scaling

Elastic capacity

Grow file systems online without provisioning headroom. Per-share quotas, snapshots, and quality-of-service controls.

Workloads

Shared workloads

Engineered for home directories, build farms, content repositories, and applications that need concurrent shared access.

Compute instance Postgres / MySQL OS: /dev/vdb mounted filesystem: ext4 iSCSI / virtio <10ms p95 Block volume NVMe-backed · 500 GB · 20k IOPS snapshot policy: hourly + daily multi-attach available Fixed-size blocks · 4 KB 0x00 0x01 0x02 0x03 0x04 0x05 0x06 0x07 0x08 0x09 0x0A 0x0B 0x0C 0x0D 0x0E 0x0F in use by filesystem free / available

How it works

Raw blocks, filesystem on top

The volume presents fixed-size blocks to the guest OS over iSCSI or virtio-blk. The instance lays its own filesystem on top — ext4, XFS, NTFS — giving full control over allocation and caching.

NVMe-backed storage delivers sub-10ms p95 latency. Snapshots are crash- or application-consistent, and multi-attach supports clustered databases and HA configurations.

Performance

NVMe-backed volumes

Sub-10ms p95 latency on premium volumes. Choose IOPS and throughput independently from capacity for database workloads.

Data protection

Snapshots & clones

Crash-consistent and application-consistent snapshots with instant volume clones for test, dev, and recovery scenarios.

Topology

Multi-attach support

Attach a single volume to multiple compute instances for clustered databases and shared-disk HA designs.

Lifecycle policy age-based · access-based · tag-based Hot tens of ms $$ /GB 30 d Warm hundreds of ms $ /GB 90 d Cold archive min — hr to retrieve $0.0019 /GB Restore on request User restore request Restore queue hydrate from cold progress: 64% Object temp URL 7 d window ⏰ legal hold and retention enforced through full restore

How it works

Tiered lifecycle, restore on demand

Lifecycle policies move objects from hot to warm to cold based on age, access pattern, or object tag. The object's identifier and metadata stay constant — only the storage tier changes.

Retrievals from cold are queued and hydrated within documented restore windows, with legal hold and retention rules enforced throughout the process.

Economics

Sub-cent storage

Sub-cent per GB monthly storage for data accessed less than once a year. Predictable retrieval and egress pricing.

Compliance

Retention & legal hold

Legal hold, retention policies, and tamper-evident logs designed for regulatory archive obligations measured in years.

Redundancy

Cross-region replication

Optional geographic redundancy for archive data with documented restore-time expectations per region pairing.

Operator console / IAM CI/CD Terraform / API intSignal control plane policy-as-code · identity · telemetry · billing lifecycle rules encryption / KMS SLA metrics restore drills AWS S3 · EBS · EFS Glacier us / eu / apac Azure Blob · Disk Files · Archive global regions GCP GCS · PD Filestore global regions OVHcloud Object Block EU sovereign intSignal platform all tiers managed

How it works

One control plane, every vendor

Lifecycle policies, encryption, identity, telemetry, and SLA reporting are defined once in the intSignal control plane and applied uniformly across AWS, Azure, GCP, OVHcloud, and intSignal's own platform.

Operators interact through a unified console; CI/CD pipelines drive infrastructure changes through the same Terraform provider and REST API.

Control plane

Unified console

One control plane across tiers, vendors, and regions. Identity-based access controls and policy-as-code integration.

Observability

Telemetry & alerts

Capacity, latency, error-rate, and durability metrics with thresholds tied to your incident response playbooks.

Automation

Programmatic access

Terraform provider, REST API, and CLI for infrastructure-as-code workflows and CI/CD integration.

How delivery works

From scoping to steady-state operations

Every engagement follows the same four-stage delivery model with documented handoff at each gate.

01

Assess

Inventory workloads, classify data sensitivity, set durability and recovery targets, map regulatory scope.

02

Design

Select storage classes, vendors, and regions. Define encryption, lifecycle, and access policies as code.

03

Deploy

Controlled migration with parallel-run validation. Cutover plan with rollback path and acceptance criteria.

04

Operate

Monthly metrics by business impact, scheduled restore tests, capacity forecasting, optimization reviews.

Compliance & security

Audit-ready evidence, not green dashboards

All storage tiers operate under intSignal's enterprise control framework with documented evidence aligned to common regulatory programs.

SOC 2

Type II

Audited controls for security, availability, and confidentiality across managed storage.

ISO 27001

Certified

International standard for information security management aligned across regions.

HIPAA

BAA available

PHI-ready storage with business associate agreements for healthcare workloads.

GDPR

EU regions

Data residency, controller agreements, and regional hosting for EU workloads.

PCI DSS

Level 1

Payment card industry alignment for cardholder data storage and processing.

FedRAMP

Moderate

Federal Risk and Authorization Management for U.S. government workloads.

FAQ

Common Questions

Frequently asked questions about intSignal's public cloud storage services.

Contact Support   ➔

We operate storage on AWS, Microsoft Azure, Google Cloud, OVHcloud, and intSignal's own managed platform. Multi-vendor design lets us match workload, region, sovereignty, and cost requirements without lock-in.

Object and archive tiers default to erasure-coded storage across multiple availability zones, with continuous background integrity scanning. We document the durability math and provide scheduled restore drill evidence as part of monthly reporting.

Yes. Lifecycle policies move objects automatically based on age, access pattern, or tag. We design these policies during the assess phase and tune them quarterly based on actual access telemetry.

All storage is encrypted at rest with AES-256 and in flight with TLS 1.3. You can use vendor-managed keys, your own KMS, or BYOK with HSM-backed key custody depending on compliance needs.

Our 24/7 NOC and SOC follow pre-agreed playbooks tied to your business-impact priorities. Incident timelines, communications, and remediation are documented and reviewed post-incident — not closed when the alert clears.

Define your storage requirements

Provide environment, constraints, and priorities. We return scope, ownership, and a success criteria document.