About this environment

Our Advantage application environment is best suited to applications that require a high-degree of scalability, such as a mobile application.  Applications in this environment can serve as little as 50 users, and scale up to as many as you need. 

This environment is made up of containers that  can be deployed in the same or different availability zones based on your requirements. You can realize cost-savings through a shared, multi-tenant architecture, without comprising your security. 

Looking for something else?

Check out our Business or Enterprise  application environments, or return to our overview

Service level agreement

  • Availability: varies from 98%—99.995%
  • Recovery point objective (normal/catastrophic): 4/24 hours

  • Recovery time objective (normal/catastrophic): 12/48 hours

Environment characteristics

  • Application deployment model: application containers
  • Application server tenancy: multi-tenant
  • Database deployment model: active-passive

Security and reliability

All of our application environments are protected by an integrated security system that covers user, application, infrastructure and data security. This pre-integrated system includes (but is not limited to):

  • Firewalls
  • Certificates
  • Encryption infrastructure
  • Two-factor authentication
  • Network monitoring tools
  • Access control lists
  • User tokens

Disaster recovery and business continuity is also built into all of our application environments as standard.  See Managed Services for more information.

Tailor your environment


The Advantage application environment comes in value, standard or premium editions. Performance and availability varies with each edition, giving you the opportunity to select an environment that meets your needs and budget.


In addition to increasing performance and availability, you can tailor your environment with the following features:

  • Test and development instances and pre-production environment
  • Increased storage
  • Increased back-up and disaster recovery storage
  • Dedicated private nodes
  • Dedicated identity store / directory services
  • Private network connections
  • VPN connections
  • Additional user entitlements
  • Virtual desktops
  • Two-factor authentication
  • Additional transformation containers
  • Additional application containers

Request a consultation

Choosing the right environment for your applications is not always easy. We can help.

As part of our free consultation service we will work with you to determine the cloud architecture and availability requirements that best suit your application needs.