Private System Hosting on Microsoft Azure for Banks and Lenders
Tell us about the system. We host it on a dedicated Azure environment with the same security architecture we use for our named-product hosting offerings. Microsoft 4-square credentials, examiner-ready governance, and one bill for the whole platform.
Trusted by 750+ of the Nation's Leading Lenders, Banks & Credit Unions.
If your system isn't on our product list, it lands here
Private System Hosting is the front door for any application or workload an FI needs to run that does not have a dedicated ABT product page. Calyx PointCentral has its own page. AMB Accounting has its own page. CFS Servicing Director has its own page. MortgageExchange, Mortgage BI, and Application Pilot each have their own product home. Plenty of FI software does not. That is what this page is for.
The pattern is simple. You tell us the name of the system, what it does, and roughly how many users touch it. We put together a sizing and architecture proposal, quote you on a dedicated Azure deployment, and stand it up. After cutover, your system runs alongside everything else we manage for you, in your own Azure subscription, with one identity layer, one help desk, and one monthly bill. The same engineers who run your Microsoft 365 tenant own the new workload too.
The architecture is the same architecture we use for our named-product hosting offerings. A dedicated virtual machine sized to your workload. Premium SSD for the operating system disk. Locally redundant storage (LRS) for live data, which holds three synchronous copies inside one Azure datacenter for 11 nines of durability. Geo-redundant backup (GRS) for off-site copies, which Microsoft replicates into a paired Azure region for 16 nines of durability. We do not run shared instances. We do not co-locate your data with another customer. Every deployment is single-tenant.
This is not the page for off-the-shelf SaaS that already runs in someone else's cloud. If you need to provision a Salesforce org or a HubSpot account or a Microsoft 365 tenant, the licensing channel handles that. This page is for systems that need a server somewhere and need that server to be the bank's, not a vendor's. Custom-built loan apps. Legacy on-premises platforms that have to lift to the cloud. Niche vendor software that does not have a hosted edition. File servers, internal databases, document workflow tools, and the long tail of FI-specific software you cannot find on a product brochure.
The category exists for a reason. Across our 750+ FI customer base, we get inquiries every quarter for systems that do not fit on any of our named product pages. Sometimes it is a homegrown loan-application portal a credit union built in 2014 that still works fine but the SQL Server hosting it is on hardware end-of-life. Sometimes it is a niche servicing-side workflow app that has never had a hosted edition because the vendor only has eight customers. Sometimes it is a Microsoft Access database the loan ops team has used for fifteen years that needs to come off the desktop and onto a server because four people now share it. Sometimes it is a SharePoint farm running on Server 2012 that nobody upgraded because nobody had the time. The Private System Hosting bucket is where all of those land, and the architecture is consistent across every one of them.
Three things are true at the same time and they shape how we think about this category. First, most FIs run more software than they realize. A typical community bank IT inventory has 30 to 80 distinct applications, of which maybe ten are well-known enough to have product pages. The rest are niche, custom, or legacy. Second, most of the niche/custom/legacy software at FIs runs on Windows Server with SQL Server underneath. The Microsoft stack dominates the FI software market because it always has, which means the migration target is almost always Azure. Third, the systems that lack named-product hosting are almost always the systems with the worst documentation, the oldest hardware, and the most overdue compliance work. Lifting them into a managed Azure deployment is one of the highest-value upgrade projects an IT director can run. Examiners notice. Auditors notice. The team that no longer has to keep a 2014 server alive notices most of all.
Typical workload sizing by category
Rough sizing benchmarks. Your actual deployment is sized during scoping based on your specific user count, data volume, and transaction profile. These ranges give you a sense of the shape.
XS Single-Use Database
SQL Server with up to about 50 GB of data, fewer than 25 concurrent users, light reporting. Typical sizing is a 2-vCPU virtual machine, 8 GB RAM, 128 GB OS disk on Premium SSD, 256 GB data disk on Standard SSD. Suitable for departmental databases, small workflow apps, and most legacy Access-to-SQL upgrades.
S Small Application Server
Windows Server hosting a custom application plus its SQL database, 25-100 users, moderate reporting. Typical sizing is a 4-vCPU virtual machine, 16 GB RAM, 128 GB OS disk on Premium SSD, 512 GB data disk on Premium SSD if the database is transactional. Suitable for most custom-built FI applications.
M Mid-Size Workload
Application server plus a separate database server, 100-300 users, daily batch processing. Typical sizing is two virtual machines: a 4-vCPU app server and an 8-vCPU SQL Server, both with 16-32 GB RAM, OS disks on Premium SSD, and a 1 TB data disk on Premium SSD for the database. Suitable for niche servicing platforms, mid-size custom apps, and typical legacy lifts.
L Large or Multi-Server
Multi-tier application with separate web, application, and database servers; 300-1,000 users; substantial reporting workload. Typical sizing is three to five virtual machines, OS disks on Premium SSD, data disks on Premium SSD, and a paid Site Recovery layer for shorter recovery time objectives. Suitable for larger custom platforms and consolidated multi-system migrations.
FS File Server / Share
Windows Server hosting departmental shares, branch file replication, or document repositories. Typical sizing is a 2-4 vCPU virtual machine, 8-16 GB RAM, 128 GB OS disk on Premium SSD, plus data disks scaled to total share size (1 TB to 10 TB on Standard SSD or Azure Files). Suitable for replacing on-premises file servers.
DB Standalone SQL Database
SQL Server hosting one or more databases for reporting, BI extracts, or shared lookup tables. Typical sizing is a 4-8 vCPU virtual machine, 32-64 GB RAM, 128 GB OS disk on Premium SSD, 512 GB to 2 TB data disks on Premium SSD. Suitable for custom data marts, ETL targets, and shared databases that multiple systems read against.
What usually breaks during a system migration (and how we plan for it)
Migrations are not magic. The architecture is consistent, the runbook is documented, and the parallel-run period catches most issues, but real systems have history. Three categories of issues come up often enough that we plan for them in every standup.
Hardcoded paths and IP addresses. Older applications often have file paths, server names, database connection strings, or IP addresses baked into config files, registry keys, or even compiled code. The application worked fine on the original server because the original server happened to have those values. On Azure, the server name is different and the IP is different. We document every hardcoded reference during the scoping period and either parameterize them in the new environment or rebuild the configuration files from scratch. The parallel-run period catches the ones we missed.
Service accounts and Active Directory dependencies. Many older applications authenticate against an on-premises Active Directory using a domain service account. When the workload moves to Azure, the Active Directory dependency moves with it, but the way the application sees the directory may change. We design the new deployment to authenticate against Microsoft Entra ID where the application supports it, with a domain controller in Azure as a fallback for applications that absolutely require traditional Active Directory. The decision is made during scoping based on what the application supports.
Integrations with on-premises systems that did not move. The new system on Azure may need to talk to your core, your LOS, your servicing platform, or another system that is still on-premises. Network connectivity is not a problem (Azure ExpressRoute, site-to-site VPN, or Azure Virtual Network peering all work). The harder problem is that the old integration may have used hostnames or IP addresses that worked when both endpoints were on the same network and do not work when one endpoint is in Azure. We catch these during the parallel-run period and adjust the integration patterns before cutover.
Beyond those three, there are usually a half-dozen smaller issues that surface during testing. Print spoolers configured for a specific local print server. Scheduled tasks running as a user account that no longer exists. Backup scripts that wrote to a UNC path that is not reachable from Azure. Email notifications going to an SMTP relay that does not authenticate the new server's IP. None of these are migration-killers individually. Together, they are why we run a parallel period and why we document the runbook as we go. The parallel period also gives your team a chance to validate that the application behaves the way they expect before they depend on it for daily work.
The parallel period typically runs for one to two weeks for smaller workloads and three to four weeks for larger ones. During parallel-run, both environments are live and both are receiving data. Your team uses the new environment for some tasks and the old environment for others. ABT engineers monitor both for issues and adjust the new environment based on what we see. At the end of parallel-run, we have a documented cutover checklist with verified completion criteria. Cutover itself is usually scheduled for an after-hours window with a pre-agreed rollback plan in case something unexpected surfaces.
Systems we host on dedicated Azure
A short list of categories, not a complete one. If your system fits roughly in any of these buckets, send it over and we will scope it.
Custom-Built Applications
In-house developed banking, lending, or member-service applications written by your team or by a contracted developer over the years. Could be a borrower portal, an internal pricing engine, a member self-service site, or any line-of-business tool that runs on Windows Server, IIS, .NET, Java, Node, or PHP. We host the runtime, the database, and the integrations.
.NET / Java / Node / PHPLegacy On-Premises Lifts
Older banking or mortgage software that ran fine on a server in the closet for fifteen years and now needs to come out of the closet. Common causes are hardware end-of-life, an examiner finding about disaster recovery, or simply the staff member who knew the system retiring. We assess the current configuration and rebuild the deployment on Azure with proper backups, monitoring, and security baselines.
Lift and shift to AzureNiche Vendor Software
Specialty FI software where the vendor sells the binaries but does not offer a hosted edition. Compliance tools, BSA/AML scanning utilities, statement archive viewers, dealer paper tracking, accounts receivable workflow apps. The vendor expects you to find your own infrastructure. We are that infrastructure.
Vendor-binary deploymentsFile Servers and Shares
Windows file servers, departmental shares, document repositories, branch file replication, and the file-based workflows that grew up alongside the core. We rebuild them as Azure-managed Windows Server VMs or Azure Files shares with NTFS permissions intact, integrated into the same Microsoft Entra ID tenant your loan officers and tellers already log in with.
Windows / SMB / NTFS / Entra IDWorkflow and Forms Tools
The non-LOS, non-core systems that move work from one desk to another. Onboarding workflow apps, document tracking systems, internal ticketing portals, and the Access or SQL databases that keep them running. We host the application server, the database, and the file shares behind them on dedicated Azure infrastructure.
SQL Server / IIS / AccessCustom Databases and Reporting
SQL Server databases, custom data marts, ETL jobs, scheduled reports, and the SSRS or Power BI gateways that surface them. We host the database engine on dedicated Azure infrastructure with the storage tier matched to your workload, plus a pattern for reaching back into the core for nightly extracts.
SQL Server / SSRS / Power BI gatewayThe same dedicated-tenancy pattern, every time
Every Private System Hosting deployment uses the same architecture pattern as our named-product hosting offerings. Single-tenant. Predictable. Documented for examiners.
1 Dedicated Virtual Machine
Your workload runs on its own Azure virtual machine sized to your user count and transaction profile. No shared compute. No noisy neighbors. We run a sizing exercise during scoping and right-size both the VM family and the storage tier before standup.
2 Premium SSD OS Disk
The operating system disk is Azure Premium SSD with single-digit-millisecond read latency and consistent IOPS. We use a 128 GB OS disk by default, scaled up for systems that hold the application binaries on the same disk.
3 Storage Tier per Workload
Data disks are sized and tiered to match the workload. Premium SSD for transactional databases that need predictable IOPS. Standard SSD for general-purpose data and document repositories. We document the storage choice in the architecture write-up before you sign anything.
4 LRS for Live Data
All live data sits on Azure locally redundant storage (LRS). Microsoft synchronously replicates three copies of every block inside one Azure datacenter, which gives 11 nines of annual durability. A failed disk or rack does not interrupt your application.
5 GRS Backup Off-Site
Azure Backup writes nightly snapshots into geo-redundant storage (GRS), which Microsoft asynchronously replicates into a paired Azure region in a different geography. GRS gives 16 nines of durability and a different physical site, which is what an examiner expects for backup separation.
6 Microsoft Entra ID for Identity
The system authenticates against your existing Microsoft Entra ID tenant where possible. Single sign-on, Conditional Access, MFA enforcement, and audit logging come from the same identity layer that protects your Microsoft 365 mailbox and your loan officer endpoints.
7 Microsoft Defender for Cloud
The Azure subscription is enrolled in Microsoft Defender for Cloud, which gives us a continuous security posture score, vulnerability scanning on the VM, and behavioral threat detection at the host level. We review the score quarterly with your team and remediate findings against our standard baseline.
8 Azure Backup and Site Recovery
Azure Backup handles point-in-time restore for the database and OS. Azure Site Recovery is available as a layered option for workloads that need a hot secondary in another region with a tested failover plan. Most FI workloads do well with Backup alone. Some need both. We discuss the choice during scoping.
9 Microsoft Sentinel for Logging
VM and application logs forward into Microsoft Sentinel where ABT correlates them against your wider tenant telemetry. Examiner requests for sign-in records, configuration change history, or incident timelines come out of one place rather than five.
Doing this yourself on Azure
Microsoft Azure is open to anyone with a credit card. The service is fine. The hard part is the operating model wrapped around it. Here is how the day-to-day looks under each approach.
Self-Hosting on Azure
- You stand up the subscription, configure the network, attach the storage, and document the build before any application data lands. Microsoft sells you the parts. They do not assemble the bike.
- Patching, baselines, and Defender for Cloud findings are your team's responsibility. Examiners ask who reviewed the score last quarter and what you did about the findings. The answer has to be written down.
- Backups configure once and then quietly drift. Quarterly restore tests are the only way to catch a backup that has been failing for ninety days. Most teams do not run them on schedule.
- Identity, Conditional Access, and MFA on the new system are separate from your Microsoft 365 baseline unless someone deliberately wires them together. Most self-built deployments end up with two identity systems and two help desks.
- SOC 2 evidence for the new workload comes from your team's documentation. Microsoft's SOC 2 attestation only covers the platform. Your application-layer controls are your problem.
- When the engineer who built it leaves, the runbook leaves with them. Azure subscriptions accumulate undocumented bespoke configurations the way attics accumulate boxes.
Private System Hosting from ABT
- ABT scopes, sizes, builds, and documents the deployment before cutover. The Azure subscription is in your name. The build runbook is written down. You can always take it back if you ever need to.
- Patching and baselines run on a documented monthly cadence aligned with our SOC 2 Type II attestation. Defender for Cloud findings are reviewed quarterly with your team and remediated against our standard baseline.
- Backups are configured to GRS by default, monitored daily, and restore-tested on a documented schedule. Failed jobs alert our help desk before they alert your examiner.
- The new system authenticates against the same Microsoft Entra ID tenant your Microsoft 365 environment already uses. Conditional Access and MFA enforcement are inherited from your existing tenant baseline.
- SOC 2 Type II attestation covers ABT's hosting controls. We provide environment-specific documentation that maps Microsoft's SOC 2 attestation, our SOC 2 attestation, and your application-layer policies into one evidence pack for examiners.
- Engineers come and go on both sides. The runbook does not. Every deployment is documented in our internal knowledge base and reviewable on request. No undocumented bespoke configurations.
Tell us about the system
Send the name of the application, the operating system it runs on, the rough user count, and any database details you have handy. We come back with a sizing proposal, an architecture diagram, and a quote inside one business week.
Why route this through ABT
Anyone can buy Azure. Not everyone can run it the way an FFIEC-regulated institution needs Azure run. Four reasons the Private System Hosting bucket exists at ABT.
Tier 1 Microsoft CSP Relationship
ABT is a Tier 1 Microsoft Cloud Solution Provider. We have a direct contractual relationship with Microsoft, a named Microsoft Partner Development Manager, and escalation paths into Microsoft engineering when something breaks at the platform level. There is no reseller in the middle.
Examiner-Ready Governance
Every deployment ships with environment-specific documentation that maps to FFIEC IT Examination Handbook expectations, GLBA Safeguards Rule controls, NCUA Cybersecurity Risk and Safeguards expectations, and state-regulator requirements. Auditors and examiners get one evidence pack instead of a scavenger hunt.
One Vendor for the Whole Stack
The Private System Hosting bucket exists alongside our Microsoft 365 management, our Calyx PointCentral hosting, our AMB Accounting hosting, our CFS Servicing Director hosting, our MortgageExchange interfaces, and our Guardian MxDR managed security. Same identity tenant, same help desk, same monthly invoice.
SOC 2 Type II Attestation
ABT maintains an annual SOC 2 Type II attestation covering hosting and managed-service controls. Your environment inherits the attestation as a vendor control. NDA-available. Examiners get a current SOC 2 report instead of a vendor questionnaire response.
From discovery call to live in 4 to 12 weeks
The exact timeline depends on system complexity, integrations, and how much migration prep work you have already done. Most deployments land between four and twelve weeks from kickoff.
Assess
30-minute scoping call. We capture the system name, what it does, the host operating system, the database engine, the user count, and any integrations. We ask for any documentation you have, including current server specs and a list of dependencies.
Plan
One business week. We come back with a sizing proposal, an architecture diagram, a migration plan, and a quote. The architecture follows the same pattern as our named-product hosting. The quote is itemized so you can see what is Azure consumption and what is ABT.
Stand Up
Two to eight weeks depending on complexity. We provision the Azure subscription in your name, build the VM, attach storage, configure the network, install the application, migrate data, and run a parallel-run test before cutover. The runbook is documented as we go.
Operate
Ongoing. After cutover, the system runs alongside everything else we manage for you. Patching and backups follow our standard cadence. Defender for Cloud findings are reviewed quarterly. Help desk tickets route to the same team that handles your Microsoft 365 environment.
Most MSPs cannot host this. Tier 1 CSPs do not specialize in this. We do both.
Most managed service providers in the FI space run their own MSP-platform stack. ConnectWise. Kaseya. SolarWinds. Whatever the platform-of-the-month is. They sell hosting on top of someone else's cloud. Most Tier 1 Microsoft CSPs (SHI, CDW, Insight) sell licenses but do not run managed infrastructure, do not maintain a help desk for niche FI software, and do not have engineers who know what BSA/AML deduplication looks like at the database layer.
ABT sits at the intersection. We are a Tier 1 Microsoft CSP and a managed service provider built specifically for financial institutions, with a 25-year operating history and 750+ FI customers. The Private System Hosting bucket is not a side product. It is the natural extension of what we already do for Calyx, AMB, CFS, and the rest of the named product list.
Common ways the new system needs to talk to other systems
Most FI workloads are not islands. They need to send and receive data with the core, the LOS, the servicing platform, and the line-of-business tools your team already uses. ABT designs these integration patterns into the deployment instead of adding them as bolt-ons later.
A ODBC and SQL Linked Servers
The most common pattern. The new system needs to read from or write to the core or LOS database directly. We provision the ODBC driver, configure the linked server, and lock the connection down with a service account that has only the permissions the workflow needs.
B Scheduled SFTP Drops
The legacy pattern that still works. The new system writes a flat file every night, the core picks it up the next morning, and the response file comes back the same way. We host the SFTP endpoint inside the same Azure subscription and route both directions through it.
C REST and SOAP Web Services
Modern vendor APIs. The new system calls a REST endpoint at the core or LOS to look up a borrower record, post a payment, or push a document. We handle the network configuration, the certificate trust chain, and the credential rotation policy.
D File Share Replication
For workloads that share documents across systems. We connect the new system to existing SharePoint, OneDrive, or Azure Files shares using the same Microsoft Entra ID identity the rest of the tenant uses. Permissions are inherited from the directory, not from a separate access control system.
E ABT MortgageExchange
If the new system needs to integrate with a major LOS or core (Encompass, Calyx Point, Symitar, Fiserv, FIS, Jack Henry) and the standard patterns above are not enough, we route the integration through ABT MortgageExchange instead. MortgageExchange is our orchestration platform with prebuilt connectors that handle the heavy lifting.
F Microsoft Power Automate Flows
For workflows that need to trigger across Microsoft 365 plus the new system. A document arrives in SharePoint, Power Automate kicks off a flow, the flow writes a record in the new system, and the new system sends a Teams notification back. We design these flows during scoping if the use case calls for them.
Examiner expectations and how the architecture meets them
An FI examiner reviewing a hosted system asks the same questions every time. Where does the data live? Inside Microsoft Azure, in a US-region datacenter you select during scoping. Who has access to the underlying infrastructure? Microsoft for the platform layer, ABT for the operating system layer (with delegated admin rights to your subscription), and your designated administrators for the application layer. How is access logged? Microsoft platform logs are surfaced through Microsoft Defender for Cloud and Azure Activity Log; ABT operating-system access is logged through Microsoft Sentinel; your application access is logged by the application itself. All three feed back into your tenant where examiner requests can pull a unified timeline.
The next set of questions is about resilience. What happens if a datacenter fails? Azure storage is locally redundant by default, so a disk or rack failure does not interrupt the workload. For backup, geo-redundant storage replicates copies into a paired region in a different geography. What is the recovery point objective? Twenty-four hours by default through Azure Backup; we can shorten that with snapshots or Site Recovery if the workload requires it. What is the recovery time objective? Four to eight hours for restoration from Azure Backup; under one hour for workloads that have Azure Site Recovery layered in. When was the last restore test? Quarterly, documented in the backup test log. The schedule is part of our standard operating procedure.
The third set of questions is about vendor management. What controls does the vendor have over your data? ABT operates under SOC 2 Type II attestation covering hosting and managed-service controls. What is the vendor's incident response process? Documented in our incident response runbook, which we share under NDA. What happens if the vendor goes away? The Azure subscription is in your name. The application binaries and data belong to you. Migration to another Microsoft Cloud Solution Provider is a documented runbook handoff, not a rebuild from scratch.
The last question is the one that matters most. Is this a meaningful improvement over what was running before? For most FIs, the answer is yes for measurable reasons. Single identity layer instead of two or three. Documented patching cadence instead of best-effort. Backups in a paired region instead of a tape rotation that may or may not be working. SOC 2 attestation instead of a vendor questionnaire response. Sentinel logging instead of separate vendor logs in five places. Most of the wins compound over time as your environment matures.
What drives the monthly invoice
Two line items, both itemized. Here is what shapes each one.
Azure Consumption (Pass-Through)
Microsoft bills the Azure subscription. ABT does not mark up the consumption. The drivers are virtual machine family and size, OS disk size and tier, data disk size and tier, network egress, backup storage, and any optional services like Site Recovery or Azure Files. Most workloads land between a small, predictable monthly Azure bill and a low-thousands-per-month range. We forecast the consumption number in the scoping proposal so you can see what to expect.
Standard CSP ratesABT Managed-Service Fee
This covers operating-system patching on a documented monthly cadence, backup configuration and monitoring, Defender for Cloud posture review, Sentinel log forwarding, help desk for the workload, and quarterly reviews of the architecture against your changing needs. The fee depends on system complexity, integration count, and user count. We quote this number explicitly in the scoping proposal and tie it to a service description that lists what is included.
Documented scopeWhat Is Not Included
Application-layer support is not included by default. If your custom application needs developer support to fix bugs or add features, that work goes to whoever wrote the application. ABT covers the infrastructure underneath. We are happy to coordinate with your developer, the vendor's support team, or your in-house IT team. The boundary is clear in the service description so nobody is surprised.
Infrastructure onlyOne-Time Standup Cost
Migration and standup are one line item, quoted up front. The number depends on system complexity, data volume, integration count, and how much migration prep your team has already done. Most standups land in a defined range that we share during scoping. The standup quote is fixed-fee. Overruns on the standup are our problem, not yours, as long as the scope on paper matches the system you described.
Fixed-fee migrationTerm and Renewal
Standard terms are 12-month with automatic renewal at the end of each period. Term length influences the monthly fee, with longer commitments earning a small discount. Mid-term changes to user count, storage tier, or backup retention are accommodated; mid-term changes to architecture (adding a hot secondary region, for example) are scoped as small change orders. The contract is plain English and reviewable before signing.
12-month defaultAudit and Documentation Refresh
SOC 2 Type II attestation refreshes annually. Environment-specific documentation (architecture diagram, vendor management package, backup test log, access review template) refreshes when the architecture changes or annually, whichever comes first. There is no separate fee for documentation refresh; it is part of the managed-service fee. Examiner requests for documentation get a same-day response in nearly every case.
Annual refreshNamed-product hosting siblings
If your system is one of these, start on the dedicated page. If it is not, this page is the right place.
Calyx PointCentral Hosting
Multi-user Calyx Point database for mortgage lenders. ABT is Calyx Software's officially listed Tier 1 Microsoft CSP hosting partner. Two-business-day migration.
AMB Accounting Hosting
Dedicated hosting for AMB Accounting deployments at mortgage banking shops. Same single-tenant Azure architecture, same governance baseline.
CFS Servicing Director Hosting
Dedicated hosting for CFS Servicing Director. Built for credit unions and small servicers running CFS in a private Azure environment.
What ongoing management actually looks like, day to day
The standup is the visible part of the engagement. The ongoing operation is the part that matters more over a five-year horizon. Here is what your team should expect after cutover.
Monthly patching. ABT applies operating-system patches on a documented monthly cadence aligned with Microsoft's Patch Tuesday release schedule. The maintenance window is scheduled with your team during onboarding and recurs predictably. Patches install during off-hours; rollback is available for any patch that causes an issue. Patch-related issues that surface during business hours go to the same help desk that handles the rest of your environment.
Backup verification. Azure Backup writes a snapshot every 24 hours (more frequently for transactional workloads where the recovery point objective is tighter). The backup status is monitored daily. Failed jobs trigger a help desk ticket against ABT (not against you). Quarterly restore tests validate that the backup is actually restorable; the test results land in your backup test log. Examiner requests for backup evidence pull from one folder.
Defender for Cloud review. Microsoft Defender for Cloud scores your Azure subscription on a continuous basis. ABT reviews the score against our standard baseline at least quarterly with your team. Findings are remediated against the baseline, with a documented exception process for items that genuinely cannot be remediated due to application constraints. The review meeting is short and focused; a 30-minute call covers most environments.
Help desk routing. Issues with the Private System Hosting workload route to the same help desk that handles your Microsoft 365 environment. There is no separate ticketing system for the new system. Tickets are tagged in our internal system to identify which workload they relate to, but to your team it is one inbox, one phone number, one team. Most environments fold seamlessly into the existing support relationship.
Quarterly architecture review. Once a quarter, an ABT engineer schedules a 30-minute review with your team to look at the architecture, the operational metrics, and any pending changes. Are user counts growing? Do we need to upgrade the VM tier? Are integrations performing the way we expected? Is there a feature in the application that has changed since the last review and needs attention? The review surfaces small adjustments before they become large problems.
Annual SOC 2 refresh. ABT's SOC 2 Type II attestation refreshes annually. The new attestation letter is delivered to your team within 30 days of issuance, along with a refreshed vendor management package that maps Microsoft's SOC 2, our SOC 2, and your application-layer policies. There is no separate fee for this. It is part of the managed-service relationship.
Change management. Significant changes to the architecture (a new Azure region, a hot secondary, an increase in storage tier, a change to backup retention) follow a documented change management process. Change requests are documented, approved, scheduled, and tested before they go live. Examiners reviewing your change management practices will find the records they expect to find. Smaller changes (user count adjustments, application-layer permission updates) follow a lightweight version of the same process: still documented, just faster.
How the architecture maps to FI regulatory expectations
A short list of the questions examiners and auditors raise about hosted systems and how the standard architecture answers each one. This is not a substitute for your own compliance review. It is a starting point.
FFIEC IT Examination Handbook
The Operations and Outsourcing Technology booklets address third-party hosting, vendor management, business continuity, and information security. Single-tenant Azure deployment, SOC 2 Type II attestation, documented patching cadence, geo-redundant backups, and Microsoft Sentinel logging map directly to these expectations. Environment-specific documentation is organized to match the booklet structure.
FFIEC IT HandbookGLBA Safeguards Rule (16 CFR Part 314)
The Safeguards Rule requires a written information security program, designation of a qualified individual, ongoing risk assessment, access controls, encryption, monitoring, and incident response. The hosting architecture provides the technical foundation. ABT's SOC 2 Type II attestation provides the third-party assurance. Your written program incorporates both.
16 CFR §314.4NIST CSF 2.0
The NIST Cybersecurity Framework 2.0 (the canonical replacement for the retired FFIEC CAT) covers Govern, Identify, Protect, Detect, Respond, and Recover functions. Azure provides Protect controls (encryption at rest and in transit, identity-based access). Defender for Cloud and Sentinel provide Detect controls. Azure Backup and Site Recovery provide Recover controls. ABT's runbook plus your incident response plan provide Respond controls.
NIST CSF 2.0NCUA Cybersecurity Risk and Safeguards
NCUA examiner guidance overlaps significantly with FFIEC and GLBA expectations but adds emphasis on member data protection and recovery. The single-tenant architecture (no co-mingled member data with other institutions) and geo-redundant backups address both points. Environment-specific documentation includes the NCUA-specific evidence pack examiners expect.
NCUA examiner guidanceState Regulator Expectations
State banking departments and state credit union supervisors layer additional expectations on top of federal guidance. Some states (New York DFS, California DFPI) have specific cybersecurity requirements. The architecture supports the documentation each state expects, including state-specific evidence packs. We extend documentation to match state requirements as your team identifies them during scoping.
State-specific addendaInternal Audit and SOX (Where Applicable)
For institutions subject to Sarbanes-Oxley (publicly traded bank holding companies), internal audit and external audit teams need ITGC evidence. The standard documentation pack includes access review templates, change management records, backup test logs, and incident logs. Internal audit gets one folder per workload that maps to the ITGC framework directly.
SOX ITGC where applicableWhy the bucket page exists alongside the product pages
Same architecture, different scoping process. If your system is a named product, the dedicated page is the right place. If it is not, this page is.
P1 Named-product pages assume the system
The Calyx PointCentral page assumes you run Calyx Point and PointCentral. The page can be specific about the database structure, the migration process, the user-facing client install, and the integration patterns. The scoping conversation is shorter because the architecture is already a known quantity. The quote turnaround is faster because the sizing math is calibrated to the product.
B1 The bucket page assumes nothing
This page assumes only that you have a system that needs hosting. The scoping call covers what the system is, what it runs on, and how big it is. The quote turnaround is one business week instead of same-day because the sizing math has to be calibrated specifically to your workload. The architecture is the same standard pattern, just applied to a system we have not seen before.
P2 Named products have known integrations
For products with their own page, ABT has typically built or supported integrations to other major FI systems many times before. A Calyx PointCentral integration to Symitar Episys is a familiar engagement. The connector pattern is documented, tested, and quotable from a known starting point. Custom-built integration work goes on top, but the foundation is solid.
B2 Bucket-page integrations are scoped fresh
For systems on this page, the integration story is part of the scoping work. We start by asking what the system needs to talk to, what protocol it speaks, and what authentication it uses. From there we design the connector patterns. Sometimes the answer is direct ODBC or REST; sometimes it routes through MortgageExchange; sometimes it requires a small custom integration project alongside the standup. Every case is scoped fresh.
P3 Named products have product-specific FAQs
Product pages can answer product-specific questions: how does the multi-user database work, what does the client install look like, how does the integration to the core operate during nightly batch. The FAQs answer questions a buyer of that specific product would actually ask. The page is denser and more specific.
B3 Bucket-page FAQs cover the architecture
This page's FAQs cover the architecture pattern, the operating model, the pricing model, and the migration approach. Those things are consistent across every Private System Hosting deployment regardless of what application is being hosted. The application-specific questions get answered during your scoping call once we know what your system actually is.
Private System Hosting FAQ
What good inquiries look like
The fastest scoping conversations happen when the form message gives us enough to work with. You do not need a full requirements document. You do need a few sentences that capture what the system is, what it runs on, and roughly how big it is. Three example messages, drawn from typical inquiry patterns, show what gets the conversation moving:
Example 1 (custom-built application): "We have a homegrown borrower portal a contractor built for us in 2017. ASP.NET on Windows Server 2016, SQL Server 2016 backend, about 80 GB of data, used by roughly 40 internal staff plus external borrower logins (peaks around 200 concurrent during refi rushes). Currently on a server in our HQ closet that is end-of-life next quarter. Need to lift to Azure with the same security baseline as our M365 environment. We integrate to Encompass nightly via SFTP file drop." That message has everything we need to start a sizing exercise.
Example 2 (legacy on-premises lift): "We run a niche BSA/AML scanning tool from a vendor that only has eight customers nationally. Vendor sells the binaries, no hosted edition. Runs on Server 2019 plus SQL Express. About 15 GB of data, used by 4 BSA analysts. Current server is fine but we want it off-premises and behind the same MFA layer as our M365. Vendor's license terms allow third-party hosting." That message tells us this is the "niche vendor software" category, the licensing question is already answered, and the workload is small enough to fit our XS sizing tier.
Example 3 (file server consolidation): "We have three Windows file servers (Server 2012 R2, end-of-life supported through ESU until late 2026) holding departmental shares for loan ops, accounting, and compliance. Total storage about 4 TB. Roughly 60 staff access them daily. We want to consolidate into Azure Files or a single Azure-hosted Windows file server, keep the existing NTFS permissions, and integrate with our existing Microsoft Entra ID tenant." That message has the storage volume, the user count, and the identity layer specified, so the scoping conversation can focus on whether Azure Files or a Windows file server is the better fit for the access patterns.
If your message is shorter than that, it is fine. The scoping call fills in the gaps. We just ask more questions on the call and turn the proposal around in the same one-week window. Longer is also fine. If your team has already done a requirements document, send it along. We read it and the proposal is faster.
If your system fits one of these, start there instead
A short list of cases where the inquiry should go to a more specific page or product. Saves you time and gets you to the answer faster.
Calyx Point or PointCentral
If you run Calyx Point or PointCentral, the named product page is the right place. ABT is officially listed by Calyx Software as a Tier 1 Microsoft CSP hosting partner. The page covers the multi-user database, the workstation-client setup, the migration process, and the integration patterns specific to Calyx.
Use /point-centralAMB Accounting
If you run AMB Accounting at a mortgage banking shop, the named product page is the right place. The architecture is the same single-tenant Azure pattern, but the scoping is calibrated to AMB-specific workloads (general ledger volume, escrow processing, end-of-month closeout).
Use /amb-accountingCFS Servicing Director
If you run CFS Servicing Director at a credit union or smaller servicer, the named product page is the right place. The page covers CFS-specific deployment patterns, the database structure, and the typical integration touchpoints with the core.
Use /cfs-servicing-directorMortgageExchange Integrations
If your need is "connect System A to System B" across major FI platforms (Encompass, Calyx Point, Symitar, Fiserv, Jack Henry, FIS), the MortgageExchange page is the right place. MortgageExchange is the orchestration layer with prebuilt connectors. We host MortgageExchange itself; the connectors are the value.
Use /mortgage-exchangePower BI / Reporting Stack
If your need is reporting and dashboards across FI systems, the Power BI page is the right place. ABT operates Mortgage BI and the broader Power BI gateway pattern for FI customers. Hosting a custom database is fine on this page; building the reporting layer on top of it has its own home.
Use /power-biMicrosoft 365 Licensing
If your need is Microsoft 365 licensing, Copilot deployment, security configuration, or general M365 governance, the Microsoft 365 and Licensing page is the right place. Private System Hosting is for non-M365 workloads that need their own infrastructure. M365 itself is a different conversation.
Use /office-365-and-licensingTell Us About
Your System.
Send the system name, the operating system, the database engine if you know it, and roughly how many people use it. ABT comes back inside one business week with a sizing proposal, an architecture diagram, and a quote.

