Skip to the main content.
ABTSolutions › Private System Hosting

Private System Hosting on Microsoft Azure for Banks and Lenders

Tell us about the system. We host it on a dedicated Azure environment with the same security architecture we use for our named-product hosting offerings. Microsoft 4-square credentials, examiner-ready governance, and one bill for the whole platform.

Trusted by 750+ of the Nation's Leading Lenders, Banks & Credit Unions.

TIER 1 MICROSOFT CSP
SOC 2 TYPE II
ZERO TRUST
NIST CSF ALIGNED
FFIEC
GLBA / FTC SAFEGUARDS
NCUA / FDIC
CFPB / GSE AUDIT READY
750+ INSTITUTIONS
SINCE 1999
750+
Financial Institutions
Banks, credit unions, mortgage lenders
11 nines
Live Data Durability
Azure Premium SSD LRS
16 nines
Backup Durability
Azure Backup GRS
Tier 1
Microsoft CSP
SOC 2 Type II attested

If your system isn't on our product list, it lands here

Private System Hosting is the front door for any application or workload an FI needs to run that does not have a dedicated ABT product page. Calyx PointCentral has its own page. AMB Accounting has its own page. CFS Servicing Director has its own page. MortgageExchange, Mortgage BI, and Application Pilot each have their own product home. Plenty of FI software does not. That is what this page is for.

The pattern is simple. You tell us the name of the system, what it does, and roughly how many users touch it. We put together a sizing and architecture proposal, quote you on a dedicated Azure deployment, and stand it up. After cutover, your system runs alongside everything else we manage for you, in your own Azure subscription, with one identity layer, one help desk, and one monthly bill. The same engineers who run your Microsoft 365 tenant own the new workload too.

The architecture is the same architecture we use for our named-product hosting offerings. A dedicated virtual machine sized to your workload. Premium SSD for the operating system disk. Locally redundant storage (LRS) for live data, which holds three synchronous copies inside one Azure datacenter for 11 nines of durability. Geo-redundant backup (GRS) for off-site copies, which Microsoft replicates into a paired Azure region for 16 nines of durability. We do not run shared instances. We do not co-locate your data with another customer. Every deployment is single-tenant.

This is not the page for off-the-shelf SaaS that already runs in someone else's cloud. If you need to provision a Salesforce org or a HubSpot account or a Microsoft 365 tenant, the licensing channel handles that. This page is for systems that need a server somewhere and need that server to be the bank's, not a vendor's. Custom-built loan apps. Legacy on-premises platforms that have to lift to the cloud. Niche vendor software that does not have a hosted edition. File servers, internal databases, document workflow tools, and the long tail of FI-specific software you cannot find on a product brochure.

The category exists for a reason. Across our 750+ FI customer base, we get inquiries every quarter for systems that do not fit on any of our named product pages. Sometimes it is a homegrown loan-application portal a credit union built in 2014 that still works fine but the SQL Server hosting it is on hardware end-of-life. Sometimes it is a niche servicing-side workflow app that has never had a hosted edition because the vendor only has eight customers. Sometimes it is a Microsoft Access database the loan ops team has used for fifteen years that needs to come off the desktop and onto a server because four people now share it. Sometimes it is a SharePoint farm running on Server 2012 that nobody upgraded because nobody had the time. The Private System Hosting bucket is where all of those land, and the architecture is consistent across every one of them.

Three things are true at the same time and they shape how we think about this category. First, most FIs run more software than they realize. A typical community bank IT inventory has 30 to 80 distinct applications, of which maybe ten are well-known enough to have product pages. The rest are niche, custom, or legacy. Second, most of the niche/custom/legacy software at FIs runs on Windows Server with SQL Server underneath. The Microsoft stack dominates the FI software market because it always has, which means the migration target is almost always Azure. Third, the systems that lack named-product hosting are almost always the systems with the worst documentation, the oldest hardware, and the most overdue compliance work. Lifting them into a managed Azure deployment is one of the highest-value upgrade projects an IT director can run. Examiners notice. Auditors notice. The team that no longer has to keep a 2014 server alive notices most of all.

Typical workload sizing by category

Rough sizing benchmarks. Your actual deployment is sized during scoping based on your specific user count, data volume, and transaction profile. These ranges give you a sense of the shape.

XS Single-Use Database

SQL Server with up to about 50 GB of data, fewer than 25 concurrent users, light reporting. Typical sizing is a 2-vCPU virtual machine, 8 GB RAM, 128 GB OS disk on Premium SSD, 256 GB data disk on Standard SSD. Suitable for departmental databases, small workflow apps, and most legacy Access-to-SQL upgrades.

S Small Application Server

Windows Server hosting a custom application plus its SQL database, 25-100 users, moderate reporting. Typical sizing is a 4-vCPU virtual machine, 16 GB RAM, 128 GB OS disk on Premium SSD, 512 GB data disk on Premium SSD if the database is transactional. Suitable for most custom-built FI applications.

M Mid-Size Workload

Application server plus a separate database server, 100-300 users, daily batch processing. Typical sizing is two virtual machines: a 4-vCPU app server and an 8-vCPU SQL Server, both with 16-32 GB RAM, OS disks on Premium SSD, and a 1 TB data disk on Premium SSD for the database. Suitable for niche servicing platforms, mid-size custom apps, and typical legacy lifts.

L Large or Multi-Server

Multi-tier application with separate web, application, and database servers; 300-1,000 users; substantial reporting workload. Typical sizing is three to five virtual machines, OS disks on Premium SSD, data disks on Premium SSD, and a paid Site Recovery layer for shorter recovery time objectives. Suitable for larger custom platforms and consolidated multi-system migrations.

FS File Server / Share

Windows Server hosting departmental shares, branch file replication, or document repositories. Typical sizing is a 2-4 vCPU virtual machine, 8-16 GB RAM, 128 GB OS disk on Premium SSD, plus data disks scaled to total share size (1 TB to 10 TB on Standard SSD or Azure Files). Suitable for replacing on-premises file servers.

DB Standalone SQL Database

SQL Server hosting one or more databases for reporting, BI extracts, or shared lookup tables. Typical sizing is a 4-8 vCPU virtual machine, 32-64 GB RAM, 128 GB OS disk on Premium SSD, 512 GB to 2 TB data disks on Premium SSD. Suitable for custom data marts, ETL targets, and shared databases that multiple systems read against.

What usually breaks during a system migration (and how we plan for it)

Migrations are not magic. The architecture is consistent, the runbook is documented, and the parallel-run period catches most issues, but real systems have history. Three categories of issues come up often enough that we plan for them in every standup.

Hardcoded paths and IP addresses. Older applications often have file paths, server names, database connection strings, or IP addresses baked into config files, registry keys, or even compiled code. The application worked fine on the original server because the original server happened to have those values. On Azure, the server name is different and the IP is different. We document every hardcoded reference during the scoping period and either parameterize them in the new environment or rebuild the configuration files from scratch. The parallel-run period catches the ones we missed.

Service accounts and Active Directory dependencies. Many older applications authenticate against an on-premises Active Directory using a domain service account. When the workload moves to Azure, the Active Directory dependency moves with it, but the way the application sees the directory may change. We design the new deployment to authenticate against Microsoft Entra ID where the application supports it, with a domain controller in Azure as a fallback for applications that absolutely require traditional Active Directory. The decision is made during scoping based on what the application supports.

Integrations with on-premises systems that did not move. The new system on Azure may need to talk to your core, your LOS, your servicing platform, or another system that is still on-premises. Network connectivity is not a problem (Azure ExpressRoute, site-to-site VPN, or Azure Virtual Network peering all work). The harder problem is that the old integration may have used hostnames or IP addresses that worked when both endpoints were on the same network and do not work when one endpoint is in Azure. We catch these during the parallel-run period and adjust the integration patterns before cutover.

Beyond those three, there are usually a half-dozen smaller issues that surface during testing. Print spoolers configured for a specific local print server. Scheduled tasks running as a user account that no longer exists. Backup scripts that wrote to a UNC path that is not reachable from Azure. Email notifications going to an SMTP relay that does not authenticate the new server's IP. None of these are migration-killers individually. Together, they are why we run a parallel period and why we document the runbook as we go. The parallel period also gives your team a chance to validate that the application behaves the way they expect before they depend on it for daily work.

The parallel period typically runs for one to two weeks for smaller workloads and three to four weeks for larger ones. During parallel-run, both environments are live and both are receiving data. Your team uses the new environment for some tasks and the old environment for others. ABT engineers monitor both for issues and adjust the new environment based on what we see. At the end of parallel-run, we have a documented cutover checklist with verified completion criteria. Cutover itself is usually scheduled for an after-hours window with a pre-agreed rollback plan in case something unexpected surfaces.

Systems we host on dedicated Azure

A short list of categories, not a complete one. If your system fits roughly in any of these buckets, send it over and we will scope it.

💾

Custom-Built Applications

In-house developed banking, lending, or member-service applications written by your team or by a contracted developer over the years. Could be a borrower portal, an internal pricing engine, a member self-service site, or any line-of-business tool that runs on Windows Server, IIS, .NET, Java, Node, or PHP. We host the runtime, the database, and the integrations.

.NET / Java / Node / PHP
📍

Legacy On-Premises Lifts

Older banking or mortgage software that ran fine on a server in the closet for fifteen years and now needs to come out of the closet. Common causes are hardware end-of-life, an examiner finding about disaster recovery, or simply the staff member who knew the system retiring. We assess the current configuration and rebuild the deployment on Azure with proper backups, monitoring, and security baselines.

Lift and shift to Azure
🔗

Niche Vendor Software

Specialty FI software where the vendor sells the binaries but does not offer a hosted edition. Compliance tools, BSA/AML scanning utilities, statement archive viewers, dealer paper tracking, accounts receivable workflow apps. The vendor expects you to find your own infrastructure. We are that infrastructure.

Vendor-binary deployments
📂

File Servers and Shares

Windows file servers, departmental shares, document repositories, branch file replication, and the file-based workflows that grew up alongside the core. We rebuild them as Azure-managed Windows Server VMs or Azure Files shares with NTFS permissions intact, integrated into the same Microsoft Entra ID tenant your loan officers and tellers already log in with.

Windows / SMB / NTFS / Entra ID
📜

Workflow and Forms Tools

The non-LOS, non-core systems that move work from one desk to another. Onboarding workflow apps, document tracking systems, internal ticketing portals, and the Access or SQL databases that keep them running. We host the application server, the database, and the file shares behind them on dedicated Azure infrastructure.

SQL Server / IIS / Access
📊

Custom Databases and Reporting

SQL Server databases, custom data marts, ETL jobs, scheduled reports, and the SSRS or Power BI gateways that surface them. We host the database engine on dedicated Azure infrastructure with the storage tier matched to your workload, plus a pattern for reaching back into the core for nightly extracts.

SQL Server / SSRS / Power BI gateway

The same dedicated-tenancy pattern, every time

Every Private System Hosting deployment uses the same architecture pattern as our named-product hosting offerings. Single-tenant. Predictable. Documented for examiners.

1 Dedicated Virtual Machine

Your workload runs on its own Azure virtual machine sized to your user count and transaction profile. No shared compute. No noisy neighbors. We run a sizing exercise during scoping and right-size both the VM family and the storage tier before standup.

2 Premium SSD OS Disk

The operating system disk is Azure Premium SSD with single-digit-millisecond read latency and consistent IOPS. We use a 128 GB OS disk by default, scaled up for systems that hold the application binaries on the same disk.

3 Storage Tier per Workload

Data disks are sized and tiered to match the workload. Premium SSD for transactional databases that need predictable IOPS. Standard SSD for general-purpose data and document repositories. We document the storage choice in the architecture write-up before you sign anything.

4 LRS for Live Data

All live data sits on Azure locally redundant storage (LRS). Microsoft synchronously replicates three copies of every block inside one Azure datacenter, which gives 11 nines of annual durability. A failed disk or rack does not interrupt your application.

5 GRS Backup Off-Site

Azure Backup writes nightly snapshots into geo-redundant storage (GRS), which Microsoft asynchronously replicates into a paired Azure region in a different geography. GRS gives 16 nines of durability and a different physical site, which is what an examiner expects for backup separation.

6 Microsoft Entra ID for Identity

The system authenticates against your existing Microsoft Entra ID tenant where possible. Single sign-on, Conditional Access, MFA enforcement, and audit logging come from the same identity layer that protects your Microsoft 365 mailbox and your loan officer endpoints.

7 Microsoft Defender for Cloud

The Azure subscription is enrolled in Microsoft Defender for Cloud, which gives us a continuous security posture score, vulnerability scanning on the VM, and behavioral threat detection at the host level. We review the score quarterly with your team and remediate findings against our standard baseline.

8 Azure Backup and Site Recovery

Azure Backup handles point-in-time restore for the database and OS. Azure Site Recovery is available as a layered option for workloads that need a hot secondary in another region with a tested failover plan. Most FI workloads do well with Backup alone. Some need both. We discuss the choice during scoping.

9 Microsoft Sentinel for Logging

VM and application logs forward into Microsoft Sentinel where ABT correlates them against your wider tenant telemetry. Examiner requests for sign-in records, configuration change history, or incident timelines come out of one place rather than five.

Doing this yourself on Azure

Microsoft Azure is open to anyone with a credit card. The service is fine. The hard part is the operating model wrapped around it. Here is how the day-to-day looks under each approach.

Self-Hosting on Azure

  • You stand up the subscription, configure the network, attach the storage, and document the build before any application data lands. Microsoft sells you the parts. They do not assemble the bike.
  • Patching, baselines, and Defender for Cloud findings are your team's responsibility. Examiners ask who reviewed the score last quarter and what you did about the findings. The answer has to be written down.
  • Backups configure once and then quietly drift. Quarterly restore tests are the only way to catch a backup that has been failing for ninety days. Most teams do not run them on schedule.
  • Identity, Conditional Access, and MFA on the new system are separate from your Microsoft 365 baseline unless someone deliberately wires them together. Most self-built deployments end up with two identity systems and two help desks.
  • SOC 2 evidence for the new workload comes from your team's documentation. Microsoft's SOC 2 attestation only covers the platform. Your application-layer controls are your problem.
  • When the engineer who built it leaves, the runbook leaves with them. Azure subscriptions accumulate undocumented bespoke configurations the way attics accumulate boxes.

Private System Hosting from ABT

  • ABT scopes, sizes, builds, and documents the deployment before cutover. The Azure subscription is in your name. The build runbook is written down. You can always take it back if you ever need to.
  • Patching and baselines run on a documented monthly cadence aligned with our SOC 2 Type II attestation. Defender for Cloud findings are reviewed quarterly with your team and remediated against our standard baseline.
  • Backups are configured to GRS by default, monitored daily, and restore-tested on a documented schedule. Failed jobs alert our help desk before they alert your examiner.
  • The new system authenticates against the same Microsoft Entra ID tenant your Microsoft 365 environment already uses. Conditional Access and MFA enforcement are inherited from your existing tenant baseline.
  • SOC 2 Type II attestation covers ABT's hosting controls. We provide environment-specific documentation that maps Microsoft's SOC 2 attestation, our SOC 2 attestation, and your application-layer policies into one evidence pack for examiners.
  • Engineers come and go on both sides. The runbook does not. Every deployment is documented in our internal knowledge base and reviewable on request. No undocumented bespoke configurations.

Tell us about the system

Send the name of the application, the operating system it runs on, the rough user count, and any database details you have handy. We come back with a sizing proposal, an architecture diagram, and a quote inside one business week.

Why route this through ABT

Anyone can buy Azure. Not everyone can run it the way an FFIEC-regulated institution needs Azure run. Four reasons the Private System Hosting bucket exists at ABT.

🎖

Tier 1 Microsoft CSP Relationship

ABT is a Tier 1 Microsoft Cloud Solution Provider. We have a direct contractual relationship with Microsoft, a named Microsoft Partner Development Manager, and escalation paths into Microsoft engineering when something breaks at the platform level. There is no reseller in the middle.

🛡

Examiner-Ready Governance

Every deployment ships with environment-specific documentation that maps to FFIEC IT Examination Handbook expectations, GLBA Safeguards Rule controls, NCUA Cybersecurity Risk and Safeguards expectations, and state-regulator requirements. Auditors and examiners get one evidence pack instead of a scavenger hunt.

🔗

One Vendor for the Whole Stack

The Private System Hosting bucket exists alongside our Microsoft 365 management, our Calyx PointCentral hosting, our AMB Accounting hosting, our CFS Servicing Director hosting, our MortgageExchange interfaces, and our Guardian MxDR managed security. Same identity tenant, same help desk, same monthly invoice.

📋

SOC 2 Type II Attestation

ABT maintains an annual SOC 2 Type II attestation covering hosting and managed-service controls. Your environment inherits the attestation as a vendor control. NDA-available. Examiners get a current SOC 2 report instead of a vendor questionnaire response.

From discovery call to live in 4 to 12 weeks

The exact timeline depends on system complexity, integrations, and how much migration prep work you have already done. Most deployments land between four and twelve weeks from kickoff.

1

Assess

30-minute scoping call. We capture the system name, what it does, the host operating system, the database engine, the user count, and any integrations. We ask for any documentation you have, including current server specs and a list of dependencies.

2

Plan

One business week. We come back with a sizing proposal, an architecture diagram, a migration plan, and a quote. The architecture follows the same pattern as our named-product hosting. The quote is itemized so you can see what is Azure consumption and what is ABT.

3

Stand Up

Two to eight weeks depending on complexity. We provision the Azure subscription in your name, build the VM, attach storage, configure the network, install the application, migrate data, and run a parallel-run test before cutover. The runbook is documented as we go.

4

Operate

Ongoing. After cutover, the system runs alongside everything else we manage for you. Patching and backups follow our standard cadence. Defender for Cloud findings are reviewed quarterly. Help desk tickets route to the same team that handles your Microsoft 365 environment.

Most MSPs cannot host this. Tier 1 CSPs do not specialize in this. We do both.

Most managed service providers in the FI space run their own MSP-platform stack. ConnectWise. Kaseya. SolarWinds. Whatever the platform-of-the-month is. They sell hosting on top of someone else's cloud. Most Tier 1 Microsoft CSPs (SHI, CDW, Insight) sell licenses but do not run managed infrastructure, do not maintain a help desk for niche FI software, and do not have engineers who know what BSA/AML deduplication looks like at the database layer.

ABT sits at the intersection. We are a Tier 1 Microsoft CSP and a managed service provider built specifically for financial institutions, with a 25-year operating history and 750+ FI customers. The Private System Hosting bucket is not a side product. It is the natural extension of what we already do for Calyx, AMB, CFS, and the rest of the named product list.

Common ways the new system needs to talk to other systems

Most FI workloads are not islands. They need to send and receive data with the core, the LOS, the servicing platform, and the line-of-business tools your team already uses. ABT designs these integration patterns into the deployment instead of adding them as bolt-ons later.

A ODBC and SQL Linked Servers

The most common pattern. The new system needs to read from or write to the core or LOS database directly. We provision the ODBC driver, configure the linked server, and lock the connection down with a service account that has only the permissions the workflow needs.

B Scheduled SFTP Drops

The legacy pattern that still works. The new system writes a flat file every night, the core picks it up the next morning, and the response file comes back the same way. We host the SFTP endpoint inside the same Azure subscription and route both directions through it.

C REST and SOAP Web Services

Modern vendor APIs. The new system calls a REST endpoint at the core or LOS to look up a borrower record, post a payment, or push a document. We handle the network configuration, the certificate trust chain, and the credential rotation policy.

D File Share Replication

For workloads that share documents across systems. We connect the new system to existing SharePoint, OneDrive, or Azure Files shares using the same Microsoft Entra ID identity the rest of the tenant uses. Permissions are inherited from the directory, not from a separate access control system.

E ABT MortgageExchange

If the new system needs to integrate with a major LOS or core (Encompass, Calyx Point, Symitar, Fiserv, FIS, Jack Henry) and the standard patterns above are not enough, we route the integration through ABT MortgageExchange instead. MortgageExchange is our orchestration platform with prebuilt connectors that handle the heavy lifting.

F Microsoft Power Automate Flows

For workflows that need to trigger across Microsoft 365 plus the new system. A document arrives in SharePoint, Power Automate kicks off a flow, the flow writes a record in the new system, and the new system sends a Teams notification back. We design these flows during scoping if the use case calls for them.

Examiner expectations and how the architecture meets them

An FI examiner reviewing a hosted system asks the same questions every time. Where does the data live? Inside Microsoft Azure, in a US-region datacenter you select during scoping. Who has access to the underlying infrastructure? Microsoft for the platform layer, ABT for the operating system layer (with delegated admin rights to your subscription), and your designated administrators for the application layer. How is access logged? Microsoft platform logs are surfaced through Microsoft Defender for Cloud and Azure Activity Log; ABT operating-system access is logged through Microsoft Sentinel; your application access is logged by the application itself. All three feed back into your tenant where examiner requests can pull a unified timeline.

The next set of questions is about resilience. What happens if a datacenter fails? Azure storage is locally redundant by default, so a disk or rack failure does not interrupt the workload. For backup, geo-redundant storage replicates copies into a paired region in a different geography. What is the recovery point objective? Twenty-four hours by default through Azure Backup; we can shorten that with snapshots or Site Recovery if the workload requires it. What is the recovery time objective? Four to eight hours for restoration from Azure Backup; under one hour for workloads that have Azure Site Recovery layered in. When was the last restore test? Quarterly, documented in the backup test log. The schedule is part of our standard operating procedure.

The third set of questions is about vendor management. What controls does the vendor have over your data? ABT operates under SOC 2 Type II attestation covering hosting and managed-service controls. What is the vendor's incident response process? Documented in our incident response runbook, which we share under NDA. What happens if the vendor goes away? The Azure subscription is in your name. The application binaries and data belong to you. Migration to another Microsoft Cloud Solution Provider is a documented runbook handoff, not a rebuild from scratch.

The last question is the one that matters most. Is this a meaningful improvement over what was running before? For most FIs, the answer is yes for measurable reasons. Single identity layer instead of two or three. Documented patching cadence instead of best-effort. Backups in a paired region instead of a tape rotation that may or may not be working. SOC 2 attestation instead of a vendor questionnaire response. Sentinel logging instead of separate vendor logs in five places. Most of the wins compound over time as your environment matures.

What drives the monthly invoice

Two line items, both itemized. Here is what shapes each one.

Azure Consumption (Pass-Through)

Microsoft bills the Azure subscription. ABT does not mark up the consumption. The drivers are virtual machine family and size, OS disk size and tier, data disk size and tier, network egress, backup storage, and any optional services like Site Recovery or Azure Files. Most workloads land between a small, predictable monthly Azure bill and a low-thousands-per-month range. We forecast the consumption number in the scoping proposal so you can see what to expect.

Standard CSP rates
🛠

ABT Managed-Service Fee

This covers operating-system patching on a documented monthly cadence, backup configuration and monitoring, Defender for Cloud posture review, Sentinel log forwarding, help desk for the workload, and quarterly reviews of the architecture against your changing needs. The fee depends on system complexity, integration count, and user count. We quote this number explicitly in the scoping proposal and tie it to a service description that lists what is included.

Documented scope
🔮

What Is Not Included

Application-layer support is not included by default. If your custom application needs developer support to fix bugs or add features, that work goes to whoever wrote the application. ABT covers the infrastructure underneath. We are happy to coordinate with your developer, the vendor's support team, or your in-house IT team. The boundary is clear in the service description so nobody is surprised.

Infrastructure only
💸

One-Time Standup Cost

Migration and standup are one line item, quoted up front. The number depends on system complexity, data volume, integration count, and how much migration prep your team has already done. Most standups land in a defined range that we share during scoping. The standup quote is fixed-fee. Overruns on the standup are our problem, not yours, as long as the scope on paper matches the system you described.

Fixed-fee migration
🕒

Term and Renewal

Standard terms are 12-month with automatic renewal at the end of each period. Term length influences the monthly fee, with longer commitments earning a small discount. Mid-term changes to user count, storage tier, or backup retention are accommodated; mid-term changes to architecture (adding a hot secondary region, for example) are scoped as small change orders. The contract is plain English and reviewable before signing.

12-month default
📚

Audit and Documentation Refresh

SOC 2 Type II attestation refreshes annually. Environment-specific documentation (architecture diagram, vendor management package, backup test log, access review template) refreshes when the architecture changes or annually, whichever comes first. There is no separate fee for documentation refresh; it is part of the managed-service fee. Examiner requests for documentation get a same-day response in nearly every case.

Annual refresh

Private System Hosting FAQ

Custom-built banking and lending applications, legacy on-premises systems being lifted to Azure, niche vendor software where the vendor sells binaries but does not offer a hosted edition, Windows file servers and SMB shares, workflow and forms tools, custom SQL Server databases, and the long tail of FI-specific software that does not have a dedicated hosted edition. If your system runs on Windows Server, IIS, .NET, Java, Node, PHP, SQL Server, or a similar mainstream stack, we can almost certainly host it. We have separate dedicated pages for Calyx PointCentral, AMB Accounting, CFS Servicing Director, and our own products like MortgageExchange. Anything outside that named list lands here.
Send us the details anyway. The category list is meant to give you a rough sense of what fits, not a complete inventory. The scoping call is short. If we cannot host the system, we will tell you on that call and explain why. The most common reasons we say no are when the system requires a specialized hardware appliance we cannot replicate in Azure, when the vendor's license terms forbid third-party hosting, or when the application is so deeply tied to a legacy operating system Azure no longer supports. Those situations are rare. Most everything else is hostable.
Azure supports a wide range of operating systems, database engines, and runtime environments, including all currently supported versions of Windows Server, several Linux distributions, SQL Server, MySQL, PostgreSQL, .NET, Java, Node, PHP, Python, and most container runtimes. If your application runs on something Microsoft has marked end-of-life, we will discuss the upgrade path during scoping. For some legacy applications, the right answer is to host the application as-is on a supported version of Windows Server in Azure. For others, the right answer is a small upgrade project alongside the migration. We do not host on operating systems Microsoft has already removed from Azure Marketplace, but the list of supported versions is long enough that this is rarely the blocker.
Yes. Migration is part of the deployment. ABT engineers handle Azure provisioning, virtual machine standup, storage configuration, network and firewall setup, application installation, database migration, integration testing, and the cutover plan. For most workloads we run a parallel period where the new Azure environment runs alongside the existing system so your team can validate before going live. The migration runbook is documented as we build, which means a different ABT engineer can pick up the workload after cutover without having to reverse-engineer what was done. Migration is included in the standup quote, not a separate professional services engagement billed by the hour.
Every Private System Hosting deployment is single-tenant. The Azure subscription is in your name. The virtual machines run your workload only. The data disks store your data only. We do not co-mingle customers on shared infrastructure. The same single-tenancy pattern applies to all of our hosting offerings, including Calyx PointCentral, AMB Accounting, and CFS Servicing Director. If you ever decide to move the subscription to a different Microsoft Cloud Solution Provider, the subscription is yours to take. There is no platform lock-in. The only things specific to ABT are the operating runbooks, which we hand off in a documented form on request.
Two line items. The first is the Azure consumption charge, billed at standard CSP rates and pass-through. We do not mark up Azure consumption. The second is the ABT managed-service fee for hosting, patching, monitoring, backup management, and help desk. The managed-service fee depends on system complexity, user count, and integration scope. Most deployments fall between a base monthly minimum and a low-thousands-per-month range. We itemize both numbers in the proposal so you can see what is going where. Pricing scales with the system, not with the number of seats. Adding users to an already-deployed system does not increase the ABT fee until the workload outgrows its current Azure sizing.
Every deployment includes Azure Backup writing nightly snapshots into geo-redundant storage (GRS), which Microsoft replicates into a paired Azure region. GRS gives 16 nines of durability and a different physical site. Retention follows our standard policy: thirty daily restore points, twelve monthly, and longer-term archive on request. Workloads that need a hot secondary in another region with a tested failover plan can layer in Azure Site Recovery during scoping. Most FI workloads do well with Backup alone. Some need both. We discuss the choice during the scoping call and document the recovery point objective and recovery time objective in the architecture write-up.
If we already manage your Microsoft 365 tenant, the new workload joins it. The Azure subscription sits in the same Microsoft Entra ID tenant your mailbox and your loan officer endpoints already authenticate against. Single sign-on, Conditional Access, MFA enforcement, and audit logging come from the same identity layer. Help desk tickets route to the same team. The monthly invoice consolidates Microsoft 365 licensing, the new Azure consumption, and the ABT managed-service fee into one bill. If we do not currently manage your Microsoft 365 tenant, we can either deploy into your existing tenant directly or stand up a fresh subscription tied to your tenant. Either path keeps the new system inside your identity and governance perimeter rather than off to the side.
Every deployment ships with environment-specific documentation that includes the architecture diagram, the SOC 2 Type II attestation letter for ABT's hosting controls, a vendor management package that maps Microsoft's SOC 2 attestation and ABT's SOC 2 attestation against the application-layer controls, an access review template, an incident response runbook, and a backup test log template. Examiner requests can pull from one folder rather than from five vendors. We refresh the SOC 2 letter annually and notify your team when the new attestation period starts. NDA-available materials are provided on request without delay.

What good inquiries look like

The fastest scoping conversations happen when the form message gives us enough to work with. You do not need a full requirements document. You do need a few sentences that capture what the system is, what it runs on, and roughly how big it is. Three example messages, drawn from typical inquiry patterns, show what gets the conversation moving:

Example 1 (custom-built application): "We have a homegrown borrower portal a contractor built for us in 2017. ASP.NET on Windows Server 2016, SQL Server 2016 backend, about 80 GB of data, used by roughly 40 internal staff plus external borrower logins (peaks around 200 concurrent during refi rushes). Currently on a server in our HQ closet that is end-of-life next quarter. Need to lift to Azure with the same security baseline as our M365 environment. We integrate to Encompass nightly via SFTP file drop." That message has everything we need to start a sizing exercise.

Example 2 (legacy on-premises lift): "We run a niche BSA/AML scanning tool from a vendor that only has eight customers nationally. Vendor sells the binaries, no hosted edition. Runs on Server 2019 plus SQL Express. About 15 GB of data, used by 4 BSA analysts. Current server is fine but we want it off-premises and behind the same MFA layer as our M365. Vendor's license terms allow third-party hosting." That message tells us this is the "niche vendor software" category, the licensing question is already answered, and the workload is small enough to fit our XS sizing tier.

Example 3 (file server consolidation): "We have three Windows file servers (Server 2012 R2, end-of-life supported through ESU until late 2026) holding departmental shares for loan ops, accounting, and compliance. Total storage about 4 TB. Roughly 60 staff access them daily. We want to consolidate into Azure Files or a single Azure-hosted Windows file server, keep the existing NTFS permissions, and integrate with our existing Microsoft Entra ID tenant." That message has the storage volume, the user count, and the identity layer specified, so the scoping conversation can focus on whether Azure Files or a Windows file server is the better fit for the access patterns.

If your message is shorter than that, it is fine. The scoping call fills in the gaps. We just ask more questions on the call and turn the proposal around in the same one-week window. Longer is also fine. If your team has already done a requirements document, send it along. We read it and the proposal is faster.

If your system fits one of these, start there instead

A short list of cases where the inquiry should go to a more specific page or product. Saves you time and gets you to the answer faster.

🏆

Calyx Point or PointCentral

If you run Calyx Point or PointCentral, the named product page is the right place. ABT is officially listed by Calyx Software as a Tier 1 Microsoft CSP hosting partner. The page covers the multi-user database, the workstation-client setup, the migration process, and the integration patterns specific to Calyx.

Use /point-central
🏢

AMB Accounting

If you run AMB Accounting at a mortgage banking shop, the named product page is the right place. The architecture is the same single-tenant Azure pattern, but the scoping is calibrated to AMB-specific workloads (general ledger volume, escrow processing, end-of-month closeout).

Use /amb-accounting
💰

CFS Servicing Director

If you run CFS Servicing Director at a credit union or smaller servicer, the named product page is the right place. The page covers CFS-specific deployment patterns, the database structure, and the typical integration touchpoints with the core.

Use /cfs-servicing-director
📥

MortgageExchange Integrations

If your need is "connect System A to System B" across major FI platforms (Encompass, Calyx Point, Symitar, Fiserv, Jack Henry, FIS), the MortgageExchange page is the right place. MortgageExchange is the orchestration layer with prebuilt connectors. We host MortgageExchange itself; the connectors are the value.

Use /mortgage-exchange
📊

Power BI / Reporting Stack

If your need is reporting and dashboards across FI systems, the Power BI page is the right place. ABT operates Mortgage BI and the broader Power BI gateway pattern for FI customers. Hosting a custom database is fine on this page; building the reporting layer on top of it has its own home.

Use /power-bi
🔐

Microsoft 365 Licensing

If your need is Microsoft 365 licensing, Copilot deployment, security configuration, or general M365 governance, the Microsoft 365 and Licensing page is the right place. Private System Hosting is for non-M365 workloads that need their own infrastructure. M365 itself is a different conversation.

Use /office-365-and-licensing
Talk to an Expert

Tell Us About
Your System.

Send the system name, the operating system, the database engine if you know it, and roughly how many people use it. ABT comes back inside one business week with a sizing proposal, an architecture diagram, and a quote.

SOC 2 Type II
Tier-1 Microsoft CSP
750+ Financial Institutions
4-12 wk
TYPICAL TIMELINE
1 wk
QUOTE TURNAROUND
25+
YEARS SINCE 1999
Get Your Hosting Quote
One business week from details to proposal
My system is roughly... (optional)
First name is required
Last name is required
Valid email is required
Response within 1 business day. No obligation.
Got it.
An ABT infrastructure specialist will review your system details and reach out within one business day.