What makes us different?

When most people think about hosting, server hosting, website hosting or VPS, they think about the big cloud providers, which can provide you with that service for a few quid a month, cheap as chips. Right? But not a lot of people think about what that gets you, and whether or not that meets your business requirements.

You may say you don't think about it at all, because your website designer also provides the hosting. Ever spend a moment thinking about exactly WHAT they provide? And HOW they do that?

Like with everything else in life, you get what you pay for. From a business point of view, who provides the infastructure, and what it is comprises of, is not that relevant. Like it doesn't matter who bakes your bread and what oven they used, what matters is the quality of the bread, and the taste.

Solutions, not boxes

We are not a VPS or server provider. We recognize that for you and your business, top of the requirements list is service availability, closely followed by data security, and the need for a rapid response to get things fixed if that availability is under threat. We provide you with a complete hosting solution, and providing secure and securely managed servers is just a part of that.

Security is part of our fabric. It is front and centre of everything we do.

This already starts at our initial meeting, when we discuss your applications and your requirements. We will be honest and open about any security issues we won't be able to mitigate, and if we can not come to an agreement to address these issues, we will not accept you as a client. If you don't need a secure hosting environment, we are not the partner for you.

Nothing of our hosting infrastructure is directly connected to the internet. Everything is behind firewalls and intrusion detection systems, and we operate a default deny-all policy for every service. On top of that, we use additional mitigation per type of service, from reverse proxies and SSL offloaders for HTTP traffic to anti-virus, anti-spam and DNS blacklisting for incoming email.

Every client is seperated from other clients at the network level. Every server is isolated from every other server, even those from the same client, using a host-based firewall.

The entire infrastructure is managed from a completely seperate out-of-band network. There is no direct connection between the out-of-band network and either client networks or the internet. We use secure bastion hosts to access the servers for server and application management. Remote access by system administrators is through a secure VPN to a separate firewall, encrypted with certificates, and protected by both password and a hardware 2FA token.

Every part of the server hardware, the operating system, and the technology stack used to run your applications is monitored around the clock, with any issues or detected anomalies reported directly to the administrators on duty via SMS, 24/7.

We work with a renowned european cyper security firm which audits our infrastructure on a yearly basis. If your business application contains highly sensitive data, for example personal, medical or financial information, we highly recommend them to execute a security PEN test on your application, to verify the security at the application level.

company logo