Highest Data Security
Learn how to ensure the safety of your critical data

Inside our Data Centers
Take a look at our state-of-the-art Data Centers
News and Updates


PCIDSS 3.2 Certified

Credit and debit card payment options are vital and convenient for businesses to provide, especially banks and e-commerce vendors. When Customers pass on their information to your business, it’s critical that there are robust levels of protection to ensure it is safe from all threats.

In the past, DDoS attacks focused on layers 3-4, and network firewalls were able to provide a basic line of defense. In response to that defense, attackers are moving up the stack and focusing on using SSL and application-layer attacks to overwhelm resources.

RapidCompute understands the immense responsibility of hosting mission critical data on its cloud. In addition to being ISO 27001:2013 certified and TIA 942 Compliant, RapidCompute has recently acquired the PCIDSS 3.2 certification.

This allows customers who want to develop a cardholder environment or card processing service to leverage RapidCompute’s validation and ensure they can store and manage data in a in a secure and compliant manner.

What Does This Mean For You

Create Your Own CDE
For the first time in Pakistan

You now have the ability to create your own cardholder data environment (CDE) that can store, transmit or process cardholder data on the cloud. Hosting this critical data on the RapidCompute cloud can actually help meet the demand for a higher level of security.

Get Control Of Your Data Centers
Great amount of visibility and transparency

A major benefit of moving to the cloud is that you have greater control over in which of our 3 multi regional data centers your data resides. You also have a great amount of visibility and transparency into which controls are applied to which resources, and how those controls are operating.

Centralized Log Collection
Challenge to keep up with high volume log data

Another advantage is the requirement for centralized log collection and monitoring which ensures that as your company grows and expands, there is little challenge to keep up with high volume log data.

What It Involves
  • Maintenance

    Maintenance of a secure network by using robust firewalls

  • Protection

    Protection of vital data while it is transmitted via effective digital encryption

  • Updates

    Regular and frequent updates for anti-virus software, anti-spyware programs, and other anti-malware solutions.

  • Security Policy

    Formal information security policy defined, maintained, and followed at all times and by all participating entities.

  • Controlled Access

    Controlled access to system information and operations. Unique and confidential identification name or number assigned to all users.

  • Constant Monitoring

    Constant monitoring of networks to ensure all security measures and processes are in place.

      • Our 100% Compliance Guarantee reduces your regulatory risk.
      • Multiple layers of security reduce your risk of non-compliance.
      • High availability and scalability helps you maximize your IT budget particularly during peak seasons.
      • Transparent pricing
      • Reduce the associated effort and costs of getting your own PCI DSS certification
      • Expedite the time to deploy on your solutions.

ISO27001:2013 Certified

RapidCompute is the only ISO 27001:2013 certified Cloud Service Provider in Pakistan. This certification helps us to establish, implement, maintain and continually improve our information security management system.

This adoption of an ISMS is a strategic decision for RapidCompute. We understand the immense responsibility of hosting mission critical data on our cloud and this certification preserves the confidentiality, integrity and availability of information by applying a risk management process to them.

The certification involves 114 controls in 14 groups and 35 control objectives.

      • Information security policies (2 controls)
      • Organization of information security (7 controls)
      • Human resource security – 6 controls that are applied before, during, or after employment
      • Asset management (10 controls)
      • Access control (14 controls)
      • Cryptography (2 controls)
      • Physical and environmental security (15 controls)
      • Operations security (14 controls)
      • Communications security (7 controls)
      • System acquisition, development and maintenance (13 controls)
      • Supplier relationships (5 controls)
      • Information security incident management (7 controls)
      • Information security aspects of business continuity management (4 controls)
      • Compliance; with internal requirements, such as policies, and with external requirements, such as laws (8 controls)

TIA 942 Compliant

All of RapidCompute’s data centers are TIA 942 compliant. The advantages this includes standard nomenclature, failsafe operation, robust protection against natural or humanmade disasters, and long-term reliability, expandability and scalability.

The TIA-942 specification data center requirements for applications and procedures such as:

      • Network architecture
      • Electrical design
      • File storage, backup and archiving
      • System redundancy
      • Network access control and security
      • Database management
      • Web hosting
      • Application hosting
      • Content distribution
      • Environmental control
      • Protection against physical hazards (fire, flood, windstorm)
      • Power management

Data Access Security

RapidCompute provides each customer with a unique VLAN, which makes it virtually impossible for potential attackers to snoop on our customers’ data. Important account information is stored externally in a secure billing platform. RapidCompute does not store any customer credit card or bank account information anywhere on its system.

RapidCompute provides network management tools through its customer portal to help customers configure remote access to their RapidMachines. Internet access to RapidCompute may be obtained through any ISP (and internet connection through Cybernet is not necessary). However, the security controls related to internet traffic in such a case are covered under the contracted ISP’s own domain.

The hypervisor used by RapidCompute is a secure, trusted and highly supported commercial platform. Furthermore, RapidCompute administrators, with decades of experience managing and securing data of Cybernet customers, follow best practices to protect customer access information such as user accounts, passwords and admin user IDs.

The RapidCompute network is also protected by a state-of-the-art Unified Threat Management (UTM) firewall cluster that provides effective protection from a multitude of threats emanating from the internet.

Finally, RapidCompute encourages its customers to take simple additional steps that go a long way in further improving the security and data recovery of its RapidMachines:

      • Although customer stored data cannot be accessed either by RapidCompute administrator or by other customers, customers are recommended to employ data encryption features of their cloud OS.
      • Create frequent snapshots of RapidMachines and store them locally, separate from the RapidMachines to ensure quick rebuild in the case of failures.
      • Manage and protect access to RapidMachines by frequently reviewing authorization rights (including regularly changing passwords) of organizational users and tracking access records.
      • Authorize only specific (and necessary) users to perform financial transactions through the RapidCompute customer portal.
      • Implement additional security controls on your RapidMachines such as protection against viruses, Trojans, worms and root kits at the OS level.
      • Manage secure log-ins through Remote Desktop or VNC.
      • Since all traffic is blocked by default, customers must configure OS level firewall policies according to their security needs.

Physical Security

RapidCompute infrastructure is housed in Cybernet’s state-of-the-art data center. This data center has the following features:

      • Two layer physical security comprising armed guards on each floor and the entrance to the building available around the clock to restrict access to authorized users only.
      • Three layer Digital Identity check mechanism in place before reaching the actual facility to ensure restricted and authorized access.
      • 24/7 monitoring through CCTV cameras monitored locally and remotely. Each aisle and corner of the inside facility is monitored whereas all entry and exit points outside are also observed.
      • World’s leading fire suppression system Inergen in N+1 configuration and intelligent smoke detectors

Self Service Portal

With our intuitive self-service cloud portal, users have immediate access to information like logs, usage or monitoring files; without having to wait for an email response or a returned telephone call. The portal also allows customers to provision IT services on their own. It offers 24 hour-a-day support and service where the customers have the freedom to reserve, provision, recycle, and modify virtual servers and storage and launch applications as and when they require, without going through a lengthy process.

• Optimize allocation of virtualized resources so that organizations can rapidly scale up and scale down to satisfy their requirements.
• Reduce or limit the amount of time it takes to deploy new virtual machines.
• More efficient use of existing resources, which saves you IT costs
• Reduce or limit the costs of procuring and managing virtual machines.
• Reduce or limit the variations in the deployment and configurations of virtual machines


At RapidCompute you pay for what you consume. Customers pay on a per-use basis, typically by the hour. With us you pay only for what you need – no standard bundled servers, no lock-ins, no out of bundle extras.

You specify your processing resources required for your server or multiple servers:
• CPU in core GHz
• Memory in GB (charged by GB per hour)
• Disk in GB (charged by GB per month)

You add your networking requirements:
• Data transfer requirement in GB (charged in GB transferred)
• Static IPs (charged by no of IPs per month)
• VLAN’s (charged by no of VLANs per month)

If required, you add any additional licensing. These can vary on per user, per month or per year basis.

Our standard VM prices are listed below.



Virtual MachineCoresRAMBandwidth (Mbps) Price ($)
RC-2G 1 2 GB 5 0.156/ho
RC-4G 2 4 GB 5 0.283/ho
RC-4G-HiMem 2 8 GB 5 0.347/ho
RC-6G 3 6 GB 5 0.406/ho
RC-8G 4 8 GB 5 0.536/ho
RC-8G-HiMem 4 16 GB 5 0.643/ho
RC-10G 5 10 GB 5 0.660/ho
RC-12G 6 12 GB 10 0.786/ho
RC-12G-HiMem 6 24 GB 10 0.915/ho
RC-16G 8 16 GB 10 1.042/ho
RC-16G-HiMem 8 32 GB 10 1.214/ho
RC-20G 10 20 GB 10 1.295/ho
RC-8C-48G 8 48 GB 10 1.472/ho
RC-24G 12 24 GB 15 1.572/ho
RC-24C-96G 24 96 GB 15 3.427/ho
RC-30C-128G 30 128 GB 15 4.382/ho
RC-32G 16 32 GB 15 1.949/ho
RC-32G-Himem 16 64 GB 15 2.419/ho