Hosting Account Isolation
Utilizing a container based approach, accounts are provisioned with their own dedicated computing resources and secured virtual file system (Secure vFS). This ensures no single user can impact another regardless of site traffic or computing resource demands.
Linux Secure vFS
Developed at the kernel level, in combination with our account isolation technology, provides users with their own Secured virtualized File System. This ensures accounts on our platform are unable to see or access other accounts, helping to protect against malware and other malicious activity.
Real-Time Security Scanning
Utilizing kernel level file tracking, our systems can identify changed files and scan them for known malware signatures in real-time. Thanks to our Secure vFS framework, these changes can be immediately isolated to protect against malware from spreading.
Advanced Clustered Threat Analysis
A combination of proprietary and third party software allows our system administrators to have the ability to identify potential harmful attacks across our network to help develop security rules before a problem occurs.
Pro-active Server Monitoring
With Real-time monitoring of all critical services, our system administrators can identify potential problems before they occur, helping us to maintain 99.9% uptime.