WellCycle Cloud - Break Down the Barriers

Highly Secure

Highly Secure

WellCycle employs a powerful security model addressing physical, network, system, and application level concerns offering maximum protection of your confidential data.

Immediate Availability

Immediate Availability

WellCycle solutions can be accessed immediately in the cloud in our world-class, SSAE 16 certified data center, or installed in your internal data center.

Maximum Scalability

Maximum Scalability

A state-of-the-art infrastructure assures that our solutions can scale to manage the growing requirements of your well portfolio.

Break Down the Barriers with WellCycle Cloud

We are committed to making our solutions as accessible and easy to deploy as possible. Our WellCycle Cloud breaks down the traditional barriers to software deployment with a fully hosted offering that is affordable, easy-to-learn, and quick to deploy. Your company can realize the benefits of our Well Planning and AFE Management solutions while minimizing IT resource requirements.

  • Fully Hosted – No hardware or software to purchase or maintain
  • Immediate Access – System can be up and running immediately
  • Quick ROI – Realize immediate return on your investment


The WellCycle Cloud minimizes the risks involved in implementing enterprise software by eliminating the need for up-front capital investment. Your team can access the system immediately, compared to the months or longer with other enterprise offerings. As a result, you will begin to experience ROI almost immediately, rather than waiting two years or longer for software to deliver any kind of ROI.


The WellCycle Cloud is not a scaled-down version of our enterprise offering. With WellCycle Cloud you get all the power and adaptability of our comprehensive WellCycle Well Planning and AFE management solutions. Easy configuration lets you adapt the system to support your processes, or phase your deployment, rolling out features only as fast as your culture can absorb them. The solution can then be integrated with your other systems and extended without limits, growing with you as your team and processes advance.


As a fully hosted system there is no software to install, maintain, or upgrade with WellCycle Cloud. Our hosting service includes everything you need, so you will not be surprised later by hidden resource and technology costs that can quickly add up to as much as ten times the original licensing fees. Our hosted offering provides organizations with an alternative to implementing, administering, and maintaining an installation at their own site. In the end, this equates to savings when you eliminate hardware costs and reduce costs associated with implementation, IT support, maintenance and training.


With the WellCycle Cloud, your Users and Administrators will never know they are accessing the cloud and not working directly within your network. Internal network login authentication can be securely passed to WellCycle Cloud so that users will not have to login separately. You will be provided with full secure access to your database so WellCycle data can be seamlessly integrated with other internal systems.

Cloud Computing


The WellCycle Cloud is hosted in a highly secure, world-class, SSAE 16 certified data center located in California.

  • Physical Security – Our data center provides 24-hour physical security designed to deny unauthorized access to facilities, equipment and resources. Our physical security makes use of multiple layers of interdependent systems including surveillance, security guards, protective barriers, and access control protocols.
  • Perimeter Defense – The network perimeter is protected by multiple firewalls and monitored by intrusion detection systems – all sourced from industry-leading security vendors.
  • Data Encryption – WellCycle leverages the strongest encryption products, including 128-bit Thawte SSL Certification and 1024-bit RSA public keys.
  • User Authentication – Users access WellCycle only with a valid username and password combination, which is encrypted via SSL. Using secure federated services, users can be authenticated against your internal network
  • Application Security – Our robust application security model prevents one WellCycle customer from accessing another’s data.
  • Internal Systems Security – Inside of the perimeter firewalls, the systems are safeguarded by network address translation, port redirection, IP masquerading, non-routable IP addressing schemes, and more.
  • Database Security – Database access is controlled at the operating system and database connection level for additional security.
  • Operating System Security – WellCycle enforces tight operating system-level security by using a minimal number of access points to all production servers.
  • Server Management Security – All data entered into the WellCycle application by a customer is owned by that customer.
  • Reliability and Backup – All networking components, load balancers, Web servers, and application servers are configured with a backup redundant configuration on alternate servers.
  • Disaster Recovery – WellCycle has a detailed disaster recovery plan in place along with backup hardware at an alternate location from our primary data center.

Contact WellCycle for more information about WellCycle Cloud