top of page
Our Hosting Security Approach

Security threats should be minimised as much as possible by taking a comprehensive strategy. Our security procedures started with an in-depth analysis of potential vulnerabilities.

Security Goal

Privacy - Only authorised individuals will be able to access data stored inside our infrastructure and systems.

Integrity - No outsider can compromise the integrity of our system's data or information.

Data Protection - It is impossible to damage, remove, or destroy data stored inside the systems.

Identification and Authentication - Verifies the identity of each user and prevents any kind of impersonation.

Network Service Protection - Protects networking gear against assaults that might disrupt service or compromise security.

Our Holistic Security Model

By combining Security Systems and Equipment1 with Security Procedures and Practices2 and Auditing Processes3, our Security platform and process offer unrivalled security for all of our services. Seven distinct layers of protection are implemented on the platform.

Level-1 Datacenter Security

After doing extensive Due diligence, we were able to form relationships with data centres throughout the world. We provide special attention to issues of safety and reliability throughout our investigation. All data centres include security cameras, biometric locks, authorization-based access restrictions, restricted physical access to the data centre, security guards, and other common security features.

 

What sets us apart is that in addition to traditional checks, our due diligence procedure additionally considers the datacenter's proactivity with regards to security. The amount of time the datacenter spends on security research and study, as well as an analysis of client case studies, are used as indicators.

Level-2 Network Security

 

At the edge and the Rack level, we have deployed Intrusion Detection Systems and Firewalls to protect our worldwide infrastructure against DDoS attacks. Our installations have been subjected to many DDoS and hacking attempts every day, and they have held up well.

Firewall Protection - Our firewall technology provides the greatest possible first defence and is active 24/7/365. Your data, website, email, and online apps will be protected from hackers because to the sophisticated inspection technology it employs. It enforces security standards developed by subject matter experts to guarantee that your data servers may connect to the Internet safely.

Network Intrusion Detection system - Targeted assaults, traffic abnormalities, "unknown" worms, spyware/adware, network viruses, rogue apps, and other zero-day vulnerabilities may all be quickly and effectively thwarted by our network intrusion detection, prevention, and vulnerability management solution. There is no noticeable increase in latency despite the use of cutting-edge high-performance network processors that run thousands of checks on each packet flow concurrently. All packets are thoroughly inspected as they go through our networks to see whether they are safe to process or not. This immediate defence mechanism is the most reliable means of stopping strikes before they inflict damage.

 

Protection against Distributed Denial-of-Service (DDoS) Attacks - At the moment, DoS attacks are the leading cause of cybercrime financial losses. A Denial-of-Service attack is an attempt to crash your website, email, or online apps in order to cause you financial and operational difficulties. This is accomplished by overwhelming the servers or network that host these services with traffic in order to bring them down. Extortion, bragging rights, political remarks, harming competitors, etc. are common motivations for such assaults. These assaults may affect any company with an Internet connection. Loss of earnings, customer discontent, productivity loss, etc. due to inaccessibility or degradation of service caused by a big, continuous DoS assault would have a devastating effect on any firm. In most circumstances, a DoS assault will also result in the highest bandwidth overage bill you've ever seen.

 

Our Distributed Denial-of-Service protection system employs cutting-edge, self-activating technology to offer unrivalled defence against DoS and DDoS attacks on your internet-facing infrastructures, such as your websites, email, and mission-critical web applications. The DDoS protector's filtering technology stops almost all malicious traffic while allowing the maximum amount of lawful traffic. These technologies have allowed businesses to continue operating normally despite several websites being under assault from multiple sources at once, with some attacks reaching 300+ Mbps.

Level-3 Host Security

 

Host Based Intrusion Detection System -The emergence of tools that can circumvent port-blocking perimeter defence systems like firewalls has made it crucial for businesses to implement Host-based Intrusion Detection Systems (HIDS), which are primarily concerned with monitoring and analysing the inner workings of a computer system. Using heuristic scanners, host log information, and monitoring system activity, our Host-based Intrusion Detection System aids in identifying and localising changes to the system and configuration files, whether by mistake, intentional manipulation, or foreign intrusion. If modifications are quickly uncovered, less harm may be done, and less time can be spent troubleshooting and recovering, which improves security and system availability.

 

Hardware Standardization- We have standardised on hardware suppliers with a history of excellent security and customer service. Cisco, Juniper, HP, Dell, etc. are widely used by our infrastructure and data center partners.

Level-4 Software Security

 

Our programmes support a wide variety of server configurations. Various distributions of Linux, BSD, and Windows are all viable options for an OS. Apache, Internet Information Services, Resin, Tomcat, PostgreSQL, MySQL, Microsoft SQL Server, Qmail, Sendmail, Proftpd, et cetera are all examples of server software. Although we use a wide variety of software solutions, our process-oriented approach guarantees their safety.

 

Timely Application of Updates, Bug Fixes and Security Patches - To guarantee that all servers have the most recent security patch installed and that any new vulnerabilities are patched as soon as possible, we have registered all of our servers for automatic updates. The majority of intrusions occur due to the exploitation of known vulnerabilities, configuration flaws, or virus assaults for which protections DO exist. CERT claims that these incidents affect systems and networks because operators have "not consistently" applied published updates.

 

Periodic Security Scans - Enterprise-grade security software is often used to scan for known server vulnerabilities. The servers are checked against the latest and greatest vulnerability databases. By spotting any security flaws ahead of time, we can keep our servers safe from assaults and keep operations running smoothly.

 

Pre-Upgrade testing processes - Many different software companies often release new versions of their products. Although each provider does its own set of tests before releasing an update, compatibility problems across different programmes are impossible to simulate. For instance, the Database provider may do testing on the latest version of the database. It is not possible to predict with certainty how this version will interact with other FTP, Mail, and Web Server software on a live production server. Software updates that are deemed to pose a high risk are beta tested in our laboratories before being deployed to production, and our system administration team meticulously records the results of these analyses.

 

We recognise the need of rigorous procedures for managing patches and updates. There are more and more vulnerabilities in modern operating systems and server software because of their increasing complexity. New security threat data and updates are published on an almost regular basis. We have established dependable auditing and reporting procedures and standardised, repeatable processes to guarantee that all of our infrastructure is current at all times.

Level-5 Application Security

 

We developed all of the platform's application software ourselves. In-house development is never outsourced. To ensure that our staff is well versed in the architecture and execution of any third-party Products or Components, we put them through rigorous training and testing processes. This ensures that we have full command of every aspect of the final Product. Our unique Product Engineering Process is used to design all of our apps; it takes a preventative approach to security.

 

The interface, the core API, the backend database, etc. are only a few of the many parts that make up a programme. Despite the security checks done at a higher abstraction level, each layer of abstraction performs its own security checks. All private information is encrypted before being saved. All of our application software is developed using engineering and development methods that are considered to be among the safest in the world.

Level-6 Personnel Security

 

Trusted individuals are always the weakest link in any security system. Employees, Developers, Vendors, and Anyone Else With Special Access to Your Network. The "Human Factor" in security is something we try to keep to a minimum with our holistic approach. On a "need-to-know" basis, only relevant individuals are informed. When the necessary time period has passed, so has the authorization. Employees get specialised training on security procedures and the importance of adhering to them.

Our company conducts thorough background checks on any employees who are granted administrative access to any of our systems. Companies who don't do this are gambling with their customers' personal information since even the most expensive security systems are useless against the harm that can be done by a single bad hire with administrative privileges.

Level-7 Security Audit Processes

 

Audit methods are necessary to assure process replication and discipline in a massive deployment of globally dispersed servers. Are all servers receiving frequent updates? Do you have continuous backup scripts? Is there a rotation schedule in place for offshore backups? Do all employees undergo thorough reference checks? Is the security system providing timely warnings?

 

The investigation, surveys, efforts at ethical hacking, interviews, etc. are used as part of a continuous out-of-band procedure to confirm this and similar queries. Before any external users notice a security flaw, our audit tools will notify us of it.

bottom of page