This is where our Professional Services team manage all your engagement with the Internet
We will ensure that specific services are running on your server before it engages with the internet. We will also discuss with you all the services you want to run on your servers
and enage in providing adequate protection within your servers. This involves the full engagement of our Professional Services team.
We can provide additional security for your services and in addition provide monitored penetration tests to provide peace of mind for your server.
Determine what services you wish to provide
You must ensure that your server has a firewall running which provides only access to the services you are providing. Your firewall should also restrict the IP addresses that can connect to your server. If you do not want to run a firewall on your server then you could opt for a hardware firewall, if your running Linux then you have a number of capable industrial firewall that will provide adequate protection for you server. Do not connect to the public internet with out an active firewall. Threat actors run automated scripts that will routinely scan networks for servers that are running open services.
Intrusion Detection System will provide a second layer of protection for your system. There are a number of such system
available that will allow you to detect threat actors before they can create any harm to your systems. You will be able to
enable triggers that will alert you to specific actions that are been taken against your server or services you are running on said servers.
An intrusion dtection system is a security system that monitors network traffic and system activities for malicious activity or policy violations
IDSs are typically passive, meaning they dtect intrusions and alert administrators rather than actively blocking them.
Our Load Balancers can quickly and easily enable SSL/TLS encryption for your applications by using
SSL termination. Our Load Balancers are compiled with OpenSSL, which allows it to encrypt and
decrypt traffic as it passes.
Your logs are crucial to reporting all events that occur on your servers.
On a professional level you should engage in remote logging so that your logs are automatically logged on remote servers
to provide you additional reporting of events.
If you require assistance to this we would be happy to enagge our professional services unit to set this up for you and also provide
some of our remote servers for your logs.
If you have the knowledge to setup we can provide remote logging servers for you.
The service is free for the first 400GB after a small charge of 10 USD will be incurred on a monthly basis
All our servers are now provided with dual 10Gbe cards. If you can aggregate or bond your network cards
to enjoy greater throughput from your connection to the switch ports and if you are operating multiple servers
you can then maximise your server connectivity.
There are multiple options to activate when using link aggregation of your network cards, nic teaming or link bonding combines multiple network cards into a single
logical connection . This improves network performance by increasing bandwidth and providing redundancy ensuring network availability eben when some links fail.
a re-reading of any previously read memory area.
We will provide unlimited bandwidth for your Load Balancing traffic.
We will not throttle
the traffic that connects to your backend servers.
If the traffic demands are great we can adjust by increasing traffic to our 20 GBps ports
When running a bare bones server it is your responsibility to monitor the health of your disk drives. You will be advised
to run smart disk utilities that will monitor the health of your disk drives. It is our resonsibility to provide you with
replacement drives in the event of disk failure. Your smart disk utilities will provide warning signs of impemding or
probable disk failure. You should take note and advise us accordingly.
Your bares nobes server will offer the options of running your controller in either HBA mode or RAID mode.
RAID mode ensures that you create virtual disk for RAID options whilst HBA mode will allow control of your disks through your Operating System
We can provide DDos protection . This involves using various techniques and tools to mitigate the impact of a DDoS attacks.
Your first line of defence must always be the firewall on your servers. Keys aspects of our service winclude dtection and also mitigation.
Detection involves identifying suspicious traffic patterns that indicate a DDoS attack is underway. This often involves monitoring network traffic for anomalies and
dviation fron normal behavious.
Mitigation involves using various techniques to lock or filter malicious traffic while allowing legitimate traffic to pass through.
Mitigation involves employing various techniques to block or filter malicious traffic whiel allowing legitimate traffic to pass through.
Mitigation techniques include tarffic filtering, Load balancing and web application firewalls......
Architecture planning for your Cluster Solution should be consider many factors,
the ability to scale and obviously security are important and cross network connectivity
must be considered.
Consider the ability to run multiple Clusters, the increased High Availability that
can be achived so that Cluster nodes and applications can survive failure at both the
application and server level.
There are several ways we safeguard our Load Balancers