Skip to main content

Overview

VulnZap offers flexible deployment options to meet your organization’s security, compliance, and infrastructure requirements.

VulnZap Cloud

Fully managed SaaS

VPC Deployment

Deploy in your cloud

On-Premises

Complete air-gapped

Deployment Comparison

FeatureCloudVPCOn-Premises
Setup TimeImmediate1-2 days1-2 weeks
ManagementFully managedPartially managedSelf-managed
UpdatesAutomaticAutomatic*Manual
Data LocationVulnZap infrastructureYour infrastructureYour infrastructure
Internet RequiredYesYes*No (offline mode)
CostLowestMediumHighest
PlansAllScale+Enterprise only
SupportEmailPriorityDedicated
*Optional: Can be air-gapped

VulnZap Cloud (SaaS)

Overview

Fully managed, multi-tenant SaaS deployment hosted by VulnZap. Ideal for:
  • Startups and small teams
  • Quick setup requirements
  • Standard compliance needs
  • Budget-conscious organizations

Architecture

┌─────────────────────────────────────────────────────────┐
│                  Your Development Environment            │
│  ┌──────────┐  ┌──────────┐  ┌──────────┐              │
│  │   IDE    │  │    CLI   │  │  CI/CD   │              │
│  └────┬─────┘  └────┬─────┘  └────┬─────┘              │
└───────┼─────────────┼─────────────┼────────────────────┘
        │             │             │
        │    HTTPS (TLS 1.3)        │
        │             │             │
┌───────▼─────────────▼─────────────▼────────────────────┐
│              VulnZap Cloud (us-east-1)                  │
│  ┌──────────────────────────────────────────────────┐  │
│  │  API Gateway + Load Balancer                     │  │
│  └────────────────────┬─────────────────────────────┘  │
│  ┌────────────────────▼─────────────────────────────┐  │
│  │  Scanning Service (Kubernetes)                   │  │
│  │  - Auto-scaling                                  │  │
│  │  - Multi-AZ deployment                           │  │
│  │  - In-memory analysis (no storage)               │  │
│  └────────────────────┬─────────────────────────────┘  │
│  ┌────────────────────▼─────────────────────────────┐  │
│  │  Metadata DB (Encrypted)                         │  │
│  │  - Findings metadata only                        │  │
│  │  - No source code stored                         │  │
│  └──────────────────────────────────────────────────┘  │
└─────────────────────────────────────────────────────────┘

Data Residency

Available Regions:
  • us-east-1 (US East - N. Virginia)
  • eu-west-1 (EU - Ireland)
  • ap-southeast-1 (Asia Pacific - Singapore)
Configure region in dashboard:
Dashboard → Settings → Data Residency → Select Region
Region selection available on Standard plans and above.

Security

Data Protection:
  • TLS 1.3 in transit
  • AES-256 encryption at rest
  • No source code storage (metadata only)
  • SOC 2 Type II compliant
  • GDPR compliant
Network Security:
  • WAF protection
  • DDoS mitigation
  • Rate limiting
  • IP whitelisting (Enterprise)

Setup

1

Sign Up

Create account at app.vulnzap.com/signup
2

Verify Email

Confirm email address
3

Select Region (Optional)

Choose data residency region
4

Install CLI

npm install -g vulnzap
vulnzap auth
5

Start Scanning

vulnzap scan
Setup Time: < 5 minutes

VPC Deployment

Overview

VulnZap deployed in your AWS, GCP, or Azure environment with your own infrastructure. Ideal for:
  • Medium to large enterprises
  • Strict data residency requirements
  • Existing cloud infrastructure
  • Compliance requirements (HIPAA, PCI-DSS, etc.)

Architecture

┌─────────────────────────────────────────────────────────┐
│              Your AWS/GCP/Azure VPC                      │
│                                                          │
│  ┌───────────────────────────────────────────────────┐  │
│  │  Public Subnet                                    │  │
│  │  ┌──────────────────────────────────────────┐    │  │
│  │  │  Application Load Balancer               │    │  │
│  │  │  - SSL/TLS termination                   │    │  │
│  │  └────────────────┬─────────────────────────┘    │  │
│  └─────────────────────┼────────────────────────────┘  │
│                       │                                │
│  ┌────────────────────▼──────────────────────────────┐  │
│  │  Private Subnet                                   │  │
│  │  ┌──────────────────────────────────────────┐    │  │
│  │  │  VulnZap Services (ECS/Kubernetes)       │    │  │
│  │  │  - API Server                            │    │  │
│  │  │  - Scanning Workers                      │    │  │
│  │  │  - MCP Server                            │    │  │
│  │  └────────────────┬─────────────────────────┘    │  │
│  │  ┌────────────────▼─────────────────────────┐    │  │
│  │  │  Database (RDS/Cloud SQL)                │    │  │
│  │  │  - Encrypted storage                     │    │  │
│  │  │  - Automated backups                     │    │  │
│  │  └──────────────────────────────────────────┘    │  │
│  └───────────────────────────────────────────────────┘  │
│                                                          │
│  Optional: VPN/Private Link to VulnZap for updates     │
└─────────────────────────────────────────────────────────┘

Supported Cloud Providers

  • AWS
  • Google Cloud
  • Azure
Requirements:
  • AWS account with admin access
  • VPC with public and private subnets
  • ECS or EKS cluster
  • RDS PostgreSQL instance
  • S3 bucket (for reports)
Deployment Method:
  • Terraform module
  • CloudFormation template
  • Manual setup guide
Estimated Cost: $200-500/month

Setup Process

1

Contact Sales

Email enterprise@vulnzap.com for VPC deployment
2

Infrastructure Review

VulnZap team reviews your infrastructure requirements
3

Receive Deployment Package

Get Terraform modules, Docker images, and deployment guide
4

Deploy Infrastructure

terraform init
terraform plan
terraform apply
5

Configure

Set environment variables and secrets
6

Verify Deployment

Run health checks and test scans
7

Go Live

Update CLI configuration to use VPC endpoint
Setup Time: 1-2 days

Configuration

AWS Example (Terraform)

module "vulnzap" {
  source = "vulnzap/vulnzap-vpc/aws"
  version = "1.2.0"
  
  vpc_id = "vpc-abc123"
  private_subnet_ids = ["subnet-111", "subnet-222"]
  public_subnet_ids = ["subnet-333", "subnet-444"]
  
  database_instance_class = "db.t3.medium"
  database_storage_gb = 100
  
  ecs_cluster_name = "vulnzap-production"
  ecs_desired_count = 2
  ecs_cpu = 1024
  ecs_memory = 2048
  
  domain_name = "vulnzap.example.com"
  ssl_certificate_arn = "arn:aws:acm:..."
  
  enable_auto_scaling = true
  min_capacity = 2
  max_capacity = 10
  
  backup_retention_days = 30
  
  tags = {
    Environment = "production"
    ManagedBy = "terraform"
  }
}

Client Configuration

Point CLI to your VPC deployment:
vulnzap config set api_endpoint https://vulnzap.example.com
vulnzap auth --key vzap_your_api_key

Management

Updates:
  • Automatic (via VulnZap managed updates)
  • Manual (you control update schedule)
  • Air-gapped (manual image deployment)
Monitoring:
  • CloudWatch/Stackdriver/Azure Monitor
  • VulnZap health dashboard
  • Prometheus/Grafana integration
Backups:
  • Automated database backups
  • Point-in-time recovery
  • Cross-region replication (optional)

On-Premises Deployment

Overview

Fully air-gapped VulnZap deployment in your data center. Ideal for:
  • Government and defense sectors
  • Highly regulated industries (finance, healthcare)
  • Air-gapped environments
  • Complete data sovereignty requirements
On-premises deployment requires Enterprise plan.

Architecture

┌─────────────────────────────────────────────────────────┐
│              Your Data Center (Air-Gapped)               │
│                                                          │
│  ┌───────────────────────────────────────────────────┐  │
│  │  DMZ                                              │  │
│  │  ┌──────────────────────────────────────────┐    │  │
│  │  │  Load Balancer (HAProxy/NGINX)           │    │  │
│  │  └────────────────┬─────────────────────────┘    │  │
│  └─────────────────────┼────────────────────────────┘  │
│                       │                                │
│  ┌────────────────────▼──────────────────────────────┐  │
│  │  Internal Network                                 │  │
│  │  ┌──────────────────────────────────────────┐    │  │
│  │  │  VulnZap Application Servers             │    │  │
│  │  │  - API (3 nodes, HA)                     │    │  │
│  │  │  - Scanning Workers (5+ nodes)           │    │  │
│  │  │  - MCP Server (2 nodes, HA)              │    │  │
│  │  └────────────────┬─────────────────────────┘    │  │
│  │  ┌────────────────▼─────────────────────────┐    │  │
│  │  │  PostgreSQL Cluster (Primary + Standby)  │    │  │
│  │  └──────────────────────────────────────────┘    │  │
│  │  ┌──────────────────────────────────────────┐    │  │
│  │  │  Redis Cluster (Caching)                 │    │  │
│  │  └──────────────────────────────────────────┘    │  │
│  │  ┌──────────────────────────────────────────┐    │  │
│  │  │  Object Storage (MinIO)                  │    │  │
│  │  └──────────────────────────────────────────┘    │  │
│  └───────────────────────────────────────────────────┘  │
│                                                          │
│  Optional: Isolated update server for security patches │
└─────────────────────────────────────────────────────────┘

Hardware Requirements

Minimum (Testing/Small Teams)

Application Servers: 2 nodes
  - 8 CPU cores
  - 16 GB RAM
  - 100 GB SSD

Database Server: 1 node
  - 4 CPU cores
  - 8 GB RAM
  - 500 GB SSD

Load Balancer: 1 node
  - 2 CPU cores
  - 4 GB RAM
  - 50 GB SSD

Production (Medium Teams)

Application Servers: 3 nodes
  - 16 CPU cores
  - 32 GB RAM
  - 200 GB SSD

Scanning Workers: 5 nodes
  - 8 CPU cores
  - 16 GB RAM
  - 100 GB SSD

Database Cluster: 2 nodes (Primary + Standby)
  - 8 CPU cores
  - 32 GB RAM
  - 1 TB SSD

Cache Layer: 2 nodes
  - 4 CPU cores
  - 16 GB RAM
  - 100 GB SSD

Load Balancer: 2 nodes (HA)
  - 4 CPU cores
  - 8 GB RAM
  - 50 GB SSD

Enterprise (Large Organizations)

Custom sizing based on:
  - Number of repositories
  - Scan frequency
  - Team size
  - Retention requirements

Contact enterprise@vulnzap.com for sizing

Setup Process

1

Contact Enterprise Sales

Email enterprise@vulnzap.com Provide infrastructure details and requirements
2

Architecture Review

30-60 minute call with VulnZap architects Review network topology, security requirements
3

Receive Installation Package

  • Docker images (air-gap compatible)
  • Kubernetes manifests or VM images
  • Installation scripts
  • Documentation
  • License key
4

Prepare Infrastructure

Set up servers, networking, storage
5

Installation

Deploy using Kubernetes, Docker Compose, or VMs Configure databases, load balancers
6

Configuration

SSL certificates, network settings, backups
7

Testing

Health checks, test scans, load testing
8

Training

On-site or remote training for your team
9

Go Live

Production cutover with VulnZap support
Setup Time: 1-2 weeks

Deployment Methods

  • Kubernetes
  • Docker Compose
  • Virtual Machines
# Load Docker images
docker load < vulnzap-api.tar
docker load < vulnzap-scanner.tar
docker load < vulnzap-mcp.tar

# Apply Kubernetes manifests
kubectl create namespace vulnzap
kubectl apply -f secrets.yml
kubectl apply -f configmap.yml
kubectl apply -f database.yml
kubectl apply -f api.yml
kubectl apply -f scanner.yml
kubectl apply -f mcp.yml
kubectl apply -f ingress.yml

# Verify deployment
kubectl get pods -n vulnzap

Offline Updates

For air-gapped environments:
1

Request Update Package

Contact VulnZap support with current version
2

Receive Offline Package

USB drive or secure file transfer with:
  • New Docker images
  • Database migration scripts
  • Release notes
  • Rollback instructions
3

Transfer to Environment

Physically transfer or one-way file transfer
4

Test in Staging

Apply update to staging environment first
5

Apply to Production

./update-vulnzap.sh --version 2.2.0
6

Verify

Run health checks and test scans

Monitoring and Maintenance

Health Checks:
# API health
curl https://vulnzap.internal/health

# Database
pg_isready -h localhost -p 5432

# Scanning capacity
vulnzap admin capacity
Logs:
# Application logs
journalctl -u vulnzap-api -f

# Kubernetes logs
kubectl logs -f deployment/vulnzap-api -n vulnzap
Metrics:
# Prometheus endpoints
/metrics (API, Scanner, MCP)

# Example metrics:
vulnzap_scans_total
vulnzap_findings_by_severity
vulnzap_api_request_duration_seconds
vulnzap_scanner_queue_depth

Hybrid Deployment

Combine deployment options for maximum flexibility: Example: Critical Data On-Prem, Analytics in Cloud
┌──────────────────────────────────┐
│  Your Data Center (On-Premises)  │
│  - Scan execution                │
│  - Source code analysis          │
│  - Vulnerability detection       │
│  └───────────┬──────────────────┘
│              │ (Metadata only)
│              ▼
│  ┌───────────────────────────────┐
│  │  VulnZap Cloud                │
│  │  - Dashboard and reporting    │
│  │  - Trend analysis             │
│  │  - Team collaboration         │
│  └───────────────────────────────┘
Benefits:
  • Source code never leaves your infrastructure
  • Cloud dashboard for team collaboration
  • Best of both worlds

Migration

Cloud to VPC

1

Deploy VPC Infrastructure

Set up VPC deployment (see above)
2

Export Data

vulnzap export --all --format json > data.json
3

Import to VPC

vulnzap import --file data.json --target vpc
4

Update CLI Configuration

Point CLI to VPC endpoint
5

Verify

Run test scans, verify data integrity

VPC to On-Premises

Similar process with additional hardware setup.

Support

Cloud

Email support Community forums Knowledge base

VPC

Priority email Slack channel Quarterly reviews

On-Premises

Dedicated support 24/7 phone support On-site assistance SLA guarantees

Next Steps