Home > Storage > ObjectScale and ECS > Product Documentation > ECS Cyber Protection Suite Reference Architecture > Deployment and configuration considerations
The modules in the ECS Cyber Protection Suite have unique deployment and configuration considerations. This section describes module dependencies, interactions, considerations, and hardware requirements.