SAP Business One Cloud Hosting Security – Physical Security
Tier 3 Data Centres
We have private suites – This means that only SMB Solutions staff has access.
All data centres are fitted with a biometric security system, an additional method to protect hardware from outside intruders.
All data centres are manned 24/7.
“WE FOUND SMB SOLUTIONS
TO BE TOTALLY COMMITTED
TO RESOLVING ISSUES WITH
URGENCY, AND SUCCESSFULLY.”
Ben Curtis | eCloud
Black Lotus DDOS Protection (included)
DDoS protection – SMB Solutions uses a range of different tools to not only protect your server against Distributed Denial of Service attacks, but also to protect our core network and infrastructure against malicious traffic. Upon detection of a DDoS attack, we will send your traffic to our scrubbing centres and bring back the clean traffic, always keeping your server online even during a large scale attack.
Dedicated Firewalls/VPN Tunnels (optional)
Adding a dedicated firewall to your service can greatly decrease the chances of unwanted attackers gaining access to your systems, these firewalls sit in front of your servers and pass clean traffic to your server and block all bad traffic or ports that you do not wish to have open.
We can offer you a private network with full support for VPN tunnels including IPSec, L2TP, OpenVPN & other legacy VPN Protocols.
Private Networks (optional)
We can do dedicated point to point links from site to data centre which runs on private IP that is not live to the public internet. We can use technology such as ADSL, fibre, ethernet services and NBN to deliver this.
Software / Application Security
Vulnerability Scans/ Penetration Testing (Optional)
Scheduled Vulnerability Scans allowing easier PCI Compliance with detailed developer reports. This trawls through your website code to identify security issues.
Cloud Linux with CageFS
If you choose to host your web site with us your site is running on CloudLinux with CageFS is a great technology to ensure that the files are kept virtualised on separate systems. This means if one customer is compromised, your accounts will be protected.
CloudLinux on it’s own, also allows us to lock an individual user’s resources to a specified limit. This is extremely good to ensure that one account doesn’t exhaust all available resources on the server.
Config Exploit Scanner
The active scanning of files can help prevent exploitation of an account by malware by deleting or moving suspicious files to quarantine before they become active. It can also prevent the uploading of PHP and perl shell scripts, commonly used to launch more malicious attacks and for sending spam.
Enterprise Level Anti-Virus
We provide enterprise level anti-virus protection for your service.