logo

RESTHeart Cloud

RESTHeart Cloud is fully managed by the core development team.

No one can run it better!

Contact Us

contact us

RESTHeart Cloud is the cloud-based service that provides you with the infrastructure to run RESTHeart applications.

Best of breed Cloud

RESTHeart Cloud runs on AWS and Mongo Atlas. It is crafted from the experience of SoftInstigate matured on the ground in dozens of real world projects.

SoftInstigate is the company behind RESTHeart and an ISV Partner of MongoDB

Out-of-the-box features

You get all the out-of-the-box features of RESTHeart.

  • JWT, Basic and Digest Authentication
  • Powerfull Declariative Authorization
  • A superb Data API, with REST, GraphQL and Websocket API on MongoDB

Plugins

You can deploy and run your RESTHeart plugins.

  • Services to implement Web Services
  • Interceptors to snoop and modify requests at different stages of the request life cycle
  • Initializers to execute custom logic and schedule recurring tasks on service startup

Plans

RESTHeart Cloud comes in two standard plans, for most of small to medium sized applications needs, plus a custom plan with a tailored infrastructure.
RESTHeart instance Database storage
Cloud standard 0,5GB RAM, 0,5 vCPU 5GB
Cloud Plus 1GB RAM, 1vCPU
10GB

Security

RESTHeart Cloud adopts the best security practices.
RESTHeart instance Database instance
Network Isolation RESTHeart instances are deployed in a unique Virtual Private Cloud (VPC). Access is granted to an HTTP load balancer only. Instances are not directly accessible from the public Internet. Databases are deployed in a unique Virtual Private Cloud (VPC) with dedicated firewalls. Access is granted by VPC Peering. The database is not directly accessible from the public Internet.
Role-based access management RESTHeart provides Authentication and Authorization services. It can handle different authentication and authorization schemes, including handling users and permissions stored in MongoDB collections. role-based access rules to control which users can access, manipulate, and delete data in your databases.
End-to-end encryption All network traffic is encrypted via HTTPS protocol, using Transport layer Security (TLS). All network traffic is encrypted using Transport layer Security (TLS). Encryption for data at rest is automated using encrypted storage volumes.