Hosting Performance Security Compare Us About Sign In Register

Security

We protect your site, saving you time for things that matter

Datacenter

State-of-the Art Datacenter

Digital Reality Datacenter ORD12
9333 Grand Avenue
Franklin Park, Illinois

Physical Security

24/7 Onsite Security Personnel

Monitored CCTV Camera System

Biometric / Card Access Only

2N UPS Redundancy

N+1 Cooling Redundancy

Fully Diverse Transit Carriers

Redundant Network Switches

Dry-Pipe Fire Supression

Certifications

SOC1

SOC2

SOC3

ISO 9001

ISO 14001

ISO 27001

Hardware

Redundantly Secure

Device

Storage Cluster 1

Filesystem Version

13.2.2

Device

Storage Cluster 2

Filesystem Version

13.2.2

Storage

Drives Encrypted at Rest

Ultra-Low Latency Networked Storage

Redundant Data Replication Across Storage Nodes

Enterprise Grade Drives

Power Loss Protection

Network

Diverse Transit Carriers

Multiple Outbounds Fiber Paths

2N Switch+Router Redundancy

Fortigate IDS/IPS Hardware DDoS Mitigation

Strict Physical Access Controls

Compute

Instant Compute Node Failover

Redundant Power Supply Units

Redundant Physical NICs

24/7 Hardware Monitoring

Datacenter Class Components

Backups

Backups Replicated to Three Geographically Diverse Datacenters

OS Failure RPO < 8 minutes

99.99999999% Data Durability

Operating System

Host Security

Strict Access Control

Host access is restricted to internal networks and authorized systems only

Centralized Logging

Access and audit logs are retained and archived offsite for administrative review

Intrusion Prevention

Any client-exposed applications are rate limited and monitored for suspicious activity.

24/7 Monitoring and Response

Access and hosts are monitored by a 24/7 incident response team

Live Kernel Patching

System patches and updates are applied instantly via KernelCare, reducing TTP to 0

Automated Recovery

Host instances auto-recover from a variety of fault scenarios without any intervention

Application

The WAF

Deep Request Inspection

Detects and blocks advanced application-based attacks before they reach your site, including zero days, through in-depth request and response filtering

Payload Analysis

Inspects and validates any user payloads to ensure they are free of malware, exploits, backdoors, and other malicious attempts

Reputation Intelligence

Real-time IP reputation blacklists synchronized across tens of thousands of servers block attacks even before they strike





Network

ML Anomaly Detection

Advanced algorithms establish various traffic baselines, detect anomalies, and flag requests to be further validated, across our global cloud network with unlimited capacity.

Security

Standards that Matter

You're only as secure as your weakest link. Secure it out of the box.

Enforce SSL

Secure Database Prefixes

Secure WordPress Hashes

Disable PHP Execution

Enforce Proper File Permissions

Secure Username

Protect wp-config.php

Prevent Directory Browsing

Auto-update Plugins, Themes, and Core

Up-to-date PHP

Prevent User Enumeration

Prevent Bad Bots

Generate Strong Passwords

Enforce SSL

Secure Database Prefixes

Secure WordPress Hashes

Disable PHP Execution

Enforce Proper File Permissions

Secure Username

Protect wp-config.php

Prevent Directory Browsing

Auto-update Plugins, Themes, and Core

Up-to-date PHP

Prevent User Enumeration

Prevent Bad Bots

Generate Strong Passwords

Sleep easy.
We got your back.


We're always on your side, watching out for your websites

Join Us