Our unique single-tenant design offers greater security and isolation and puts you in control.
Merlin is unique in offering a single-tenant architecture for its clients. With our design, every client’s site sits in its own environment, protected in a virtual private cloud (VPC), and runs on separate hardware and software. It also means that your data is maintained in a separate AWS account with dedicated encryption keys to ensure your data isn’t accessible by others.
With single-tenant architecture, each site’s resources, security measures and hosting location–including your own AWS environment–can be tailored to comply with varying data privacy regulations and your specific business needs.
- Greater Security: Every site resides in its own VPC with dedicated hardware, software and unique encryption keys. No shared computing resources, no risk of accidental data exposure. Your sensitive data is securely siloed, reducing risks from data breaches.
- Customized Control: Bypass the limitations of the one-size-fits-all multi-tenant systems. Our single-tenant architecture allows for complete customization, from server size to additional security measures. Be it HIPAA or GDPR compliance, enhanced access restrictions or individual monitoring, you’re in control.
- Instant Scalability: With the agility to swiftly add or drop servers according to your needs, our single-tenant architecture scales in lockstep with your business requirements. Accommodate unexpected data dumps or sudden scaling of users with just a few clicks, and shrink back when needs diminish.
- Global Hosting: Choose the hosting location that suits you best, from anywhere in the world, even in your own secure AWS environment or a government FedRAMP environment.
- Cost-Effectiveness: By turning matters on and off at will, you enjoy a cost-effective solution that aligns with your operational needs.
In brief, we provide a dedicated, secure, and highly customizable environment tailored to meet your individual needs.
You can learn more about other unique features of DiscoveryPartner here:
Our single-tenant Virtual Private Cloud architecture provides greater security and data isolation.
Quickly scale servers and databases up or down as projects require with dedicated cloud resources.
Meet data privacy, HIPAA and business requirements with local hosting that can be set up overnight.
Secure, Isolated and Personalized
A virtual private cloud (VPC) is a secure, isolated virtual network within the cloud, designed to offer an optimal level of security and control, similar to a traditional on-premise data center but without the associated physical infrastructure costs. A VPC is housed within a public cloud environment, yet maintains a distinct separation from other users of the cloud, providing a personalized computing environment that’s accessible from anywhere in the world.
In a VPC, you get to define and control the virtual network environment including selection of IP address range, creation of subnets, and configuration of route tables and network gateways. It acts as a dedicated space where resources and services are exclusively available to the entities within that environment.
As such, a VPC serves as the backbone for secure and customizable cloud solutions, including additional security measures to meet your needs, control over your environment for HIPAA and data privacy compliance, enhanced access restrictions and individual monitoring.
Scalability is a core strength of a single-tenant VPC. With a VPC, you’re not confined to static physical infrastructure. Instead, you have a dynamic computing environment that can effortlessly scale up or down to meet the ebb and flow of your business requirements.
When demand spikes, whether due to sudden influxes of data or increased review activity, we can instantly scale up the computing resources within your dedicated VPC. We can add more servers or increase the computing power of existing servers with a few simple clicks, ensuring uninterrupted, high-performance operation, even under heavy loads.
When demand recedes, we can easily scale down resources to prevent unnecessary expenditure. This flexibility offers not just an optimal operational environment but also a cost-effective solution. Our goal is to adapt swiftly to your changing needs.
In the world of digital data, the need for robust security and privacy cannot be overstated. Particularly when dealing with PII or data subject to HIPAA, a customized approach to data hosting is not just a nice-to-have, it’s a necessity. Merlin understands this critical requirement and leverages the flexibility of single-tenant architecture to offer highly customizable solutions for each client.
Each VPC acts as an independent fortress, providing a secure environment where data is not only stored but also transmitted and processed under the highest standards of security and privacy. Whether it’s enabling enhanced access restrictions, implementing additional encryption methods, providing special monitoring or securing data transmission channels, we can fine-tune each component of your cloud environment to ensure compliance with GDPR, HIPAA and other data protection regulations.
The freedom to choose the hosting location means you can meet data residency requirements, which is particularly crucial in an era of increasing focus on data sovereignty. From a client’s private AWS environment to government-approved FedRAMP environments, we can host your VPC where it best serves your compliance needs.
Encrypted End to End
Data is encrypted in transit and at rest to ensure maximum security using industry leading protocols including TLS and AES-256. This ensures that data is protected at all times on the Merlin platform and between Merlin and its users.
Requests to view a document must be accompanied by a time-limited Authorization Ticket before access is granted. This keeps users from improperly sharing files and hackers from traversing file servers.
Merlin provides granular Role-based Access Control (RBAC) in which every function in the Merlin software platform is available as a permission that can be assigned to a role. Administrators can limit available fields and actions.
Our site run in dedicated environments without data commingling. Each matter runs in separate database, search and storage servers that can be protected from inside and outside intervention.
We provide private fields and shared folders as standard issue. User groups get private tag sets and shared searches so they can work together while protecting group work products.
Extensive auditing and logging capabilities let administrators track each person's use of the site. Document views, tags, searches and other actions are tracked throughout.
DiscoveryPartner isn’t just hosted on AWS; it was meticulously engineered to leverage the cloud’s full potential, especially its extensive array of security features and services. This purposeful integration ensures that, while our users enjoy all the advantages of the cloud, they also benefit from an enhanced security environment that AWS uniquely offers.
- Physical Security: AWS maintains highly-secure facilities which are locked-down and monitored at all times. We have decades of experience managing our own environments across private data centers and find AWS to be more secure for a number of reasons, including the fact that they are staffed with many of the best information security professionals in the world.
- Certifications: AWS has been providing infrastructure for government agencies and other large entities around the world for more than a decade. As a result, it needs to carry an extensive list of security certifications from multiple ISO badges to FedRAMP to PCI, HIPAA, SOC and dozens of others. AWS carries over 40 U.S. and international audit certifications.
- Encryption: AWS simplifies the use of industry leading encryption technology for securing data in transit and at rest. Encryption ensures that data is only accessible by authorized identities and/or services regardless of the location of that data.
- Redundancy: AWS provides a highly available infrastructure spanning the entire globe. Each AWS region contains several availability zones made up of multiple distinct and highly secure data centers. Deployments on AWS can leverage these data center resources to maximize service availability in ways that couldn’t otherwise be reasonably achieved.
- Security Services: We take advantage of multiple services offered by AWS to protect client data to supplement our security practices. If you need extra security for your site, we can offer a wide range of special options to further strengthen the protections inherent in a single-tenant environment. Ultimately, you can take control of your complete site.
Our goal in developing DiscoveryPartner was to take advantage of all the security advantages offered in the AWS environment, taking it to the next level with our unique single-tenant architecture.