C3 Cloud Minimum Requirements


  • Microsoft® Windows® 7, Windows 8, Windows 10
  • Pentium III 600Mhz or higher
  • 128MB of RAM
  • 40MB of hard drive space
  • Speakers Recommended
  • Suggested Resolution: 1024 x 768


* MAC OS (ONLY available via C3 Cloud)



C3 Cloud Security

Maintaining a secure environment for your data is important to us, so that's why we have taken steps to to ensure that your data is safe and secure. We have provided a list of common questions you may have regarding C3 Cloud and the variety of services selected to help ensure that your information is in a secure cloud environment.


Where is C3 Cloud hosted?
C3 Cloud is hosted on Rackspace™ which is headquartered in San Antonio, TX. They operate data centers on four continents and is the global leader in hybrid cloud. They offer reliable platforms for software services used by thousands of businesses worldwide. Rackspace security management's model consists of four main stages: Plan, Do, Check, Act, as recommended by the ISO 27001 standard. This standard is recognized globally as the most comprehensive framework for establishing and maintaining information security best practices within an organization.

For more information, visit Rackspace Security
For more information on ISO 27001, visit ISO.org

How secure is the storage space on C3 Cloud?
Rackspace has compliance and validation phases that help assure their implemented controls are operating effectively and are in sync with the policies set by the security organization. Rackspace adheres to the following information security and related certifications and standards.

  • ISO 27002
  • ISO 27001
  • PCI-DSS (PAYMENT CARD INDUSTRY DATA SECURITY)
  • SSAE16
  • SOC 1

  • SOC 2
  • SOC 3
  • SAFE HARBOR
  • CONTENT PROTECTION AND SECURITY STANDARD (CPS)

What network-level security is used?
C3 Cloud leverages Rackspace's database access monitoring, SSL encryption and key managment solutions to protect your important information. The services are hosted in a protected server environment that uses a firewall and other advanced technology to help prevent interference or access from outside intruders and attacks.