Pay for what you use

There is no need to buy the entire capacity upfront. Pay for what you use and scale usage on-demand to meet changing requirements.

Data Protection

An immutable backup option ensuring data is protected against overwrite, corruption, malware, and malicious or accidental data deletion limiting the impact of ransomware attacks.

Real-time data analytics

Access analytics and large data datasets in seconds via a dedicated point-to-point connection or over the Internet.
Image of a cloud surrounded by icons such as wifi, graphs, files, security, people, passwords and an atom

DataHub vs Hyper scale cloud providers

  • No additional data extraction charges if you are on-net to 2degrees.
  • You always have access to your critical data with an SLA of 99.9% availability.
  • No Trans-Tasman transfer fees since your data is located completely within New Zealand.
  • 2degrees DataHub support is free of charge for faults and basic moves, adds or changes.

DataHub features


  • Multiple connection options — data accessible via either a dedicated point-to-point connection with a customer’s DC/WAN or over the Internet using SSL or IPsec VPNs.
  • A unified, open source, software-defined storage platform that supports block, file and object storage.
  • Compatibility with both S3 and other leading backup and replication platforms; with cloud tier and object storage capabilities.
  • A high degree of data security; to protect from both accidental or malicious data manipulation or loss.
  • Optional immutable backup which means that your data is fixed and unchangeable for a specified period of time.
  • Layered security — defence in depth against malicious actors, including HTTPS encryption, DDoS protection, next generation firewall, resilient multi-site hosting, and erasure coding.

Photo of a lady working on a laptop in a server room

Data Hub infrastructure

2degrees Logo
DDoS Protection

DDoS Protection safeguards against distributed denial-of-service attacks by identifying, filtering, and mitigating malicious traffic to ensure website availability.

Fortinet Logo
Enterprise Firewall

This Gartner Quadrant leading firewall monitors and controls incoming and outgoing network traffic based on security rules.

Ceph Logo
Security and access keys

Digital access keys are electronic credentials used to securely authenticate and authorise access to systems, applications, or data.

Ceph Logo
Ceph Cluster

Ceph clusters provide interfaces for multiple storage types within a single cluster, eliminating the need for multiple storage solutions or any specialised hardware, thus reducing management overheads.

Soft Iron Logo
Softiron

Auditable secure provenance ensures data authenticity and integrity by tracking and verifying its origin, modifications, and history.

2degrees Logo
DC Backhaul

Layer 2 Private VLAN (PVLAN) provides network isolation within the same VLAN, enhancing security by segmenting traffic at the switch level while maintaining connectivity to shared resources.

Why 2degrees

End-to-end solutions

We offer comprehensive mobile solutions customised to your needs, covering device management, security, and compliance.

Expert team

Our mobile experts stay up-to-date with the latest trends and technologies to help you make the best choices for your business.

Flexible options

Choose between our fully managed and self-managed Mobile as a Service (MaaS) solutions, both of which are customisable to your unique requirements.

Exceptional support

Our 24/7 customer service team is dedicated to ensuring your mobile operations run smoothly and efficiently.
Request more information about 2degrees Data Solutions. 0800 022 002
Please enter your details below and one of our product experts will be in touch with you shortly.