SERVER SECURITY MONITORING (LINUX & WINDOWS)

Description


This is a flexible plan that gives you not just the usual Server Monitoring but allows you to choose exactly what your server needs and focus on Intrusion detection and prevention, Monitoring and immediate follow up actions at any instance. With monthly reports, this service plan assures you complete transparency as well.

  • * Please choose the services and add-ons you require for your server in the order form.

Features

  • bulletMail Server Monitoring for Inbound & outbound Spamming
  • bulletMail Server Reputation monitoring
  • bulletIntrusion detection to Server/Services
  • bulletNetwork Intrusion detection
  • bulletIntegrity Monitoring of Security Tools
  • bulletMonitoring for Rootkits
  • bulletDNS vulnerability Monitoring
  • bulletDatabase Server Health & Integrity Monitoring
  • bulletMonitoring of versions of requested web applications – WP & Joomla
  • Addons
  • bulletRealtime File Upload Scanning   

FAQ

  • bulletQ 1. What is Server Security Monitoring and why is it called so?
  • Server Security Monitoring goes beyond having to deliver real-time monitoring of its services but also involves performing analysis of security activity inside the server. Such that your server and its services are protected against internal as well as external attacks. The need to have uptime of the services is not enough, IT administrators should be able to foresee a service down. This can be done by monitoring server’s security in a much granullar level based on the different roles taken up by the server such as a Mail Server, DNS Server, Webserver , Database server etc.
  • bulletQ 2. Who should make use of this service and when?
  • If you are in a situation were there is a constant need to watch over your companies server infrastructure and critical information assets from cyber threats. Were you need to involve security professionals to perform real time monitoring of the server, its services, resources and applications. If you would like to take the burden off your IT managers to perform the mudane task of manually monitor the services and critical applications. Then you should make use of this services. Its never too soon to use the services at the very least before you become another victim of cyber attack.
  • bulletQ 3. What is the intrusion detection mentioned here? How do you prevent it? What is the scope of the follow up actions you mentioned?
  • We use combination of both network-based and host-based network intrution detection. This involves monitoring system events, logfiles, application activity, file changes and network-traffic. As we monitor your server real-time 24×7, our security admins are always closely watching and would be alerted first. Immediate steps would be taken to rectify the problem before your end-users are affected.
  • bulletQ 4. Can I choose to have only the services I want?
  • Of course, you can customize the services you would like to monitor. In case your server does not act as a DNS Server, you can omit the DNS Vulnerability monitoring.
  • bulletQ 5. How is this different from traditional monitoring services?
  • Traditional monitoring is about monitoring uptimes whereas our Security Monitoring service is fosussed on resource violations, abuse activities within the system, data integrity, detection and prevention of intrusions and attacks to network; thereby being able to maintain server performance and reputation.
    With Server Security Monitoring, in case an event occurs the attacker IP is blocked temporarily and with the information generated, we will confirm the attack. The incidents will be prioritised according to level and intensity of attacks while reactions for this is automated within the system ,thus limiting human intervention to those cases where attacks are notified as severe. False positives would not have any damaging effect as the block will be temporary and in case it was a legitimate connection, it can be resumed. It also ensures the end-user have constant availbility of the service. For example traditional monitoring notifies if you if Mail services that use SMTP, POP or IMAP is running or active. However with Security Monitoring it identifies if your server is affected by internal/external spamming such you can take immediate action to curb it before your mail server is blacklisted by a RBL and your end-users are unable to send emails.

Set up fee $20 one time

FRESH SERVER HARDENING (LINUX)

Description


Security Hardening of servers that are being prepared to be deployed to a production environment.

Features

  • Operating Systems Supported
  • bulletLinux – Cloudlinux OS, Debian 7 and 8 All versions, Ubuntu Server 14 and 15 , CentOS 7
  • bulletBSD – All Distros of OpenBSD, NetBSD, FreeBSD
  • Environment Support
  • bulletAll Shared/Dedicated Hosting Environments
  • Hosting Control Panels Supported
  • bulletcPanel , Odin Plesk, DirectAdmin, Interworx, ISPConfig, and Standalone servers.
  • Security Tasks Included
  • bulletUpdate kernel to latest stable version and patch for vulnerabilities or exploits
  • bullet Disk Partitioning and enforcing Disk Quotas
  • bullet Configuring Package Managers and Repositories
  • bulletDisabling unused Protocols
  • bullet Eliminating unused services
  • bullet Minimizing Open Network Ports
  • bulletSecuring Binaries
  • bullet Securing Key Files and Configuration Files
  • bullet Setting and Enforcing Password Policies
  • bullet Limiting Root/SuperUser privileges
  • bullet Warning Banners for enforcing security policies
  • bullet Implementing Firewall Protection
  • bullet Configuring TCPWrappers
  • bullet Enabling System Logging, Auditing and log rotation
  • bullet System Accounting using auditd
  • bullet Configuring Backups
  • bullet Implement Integrity checking Software
  • bullet Disabling X window system
  • bullet Implementing Intrusion Detection Systems
  • bullet Implementing Linux Socket Monitor
  • bullet Configuring SeLinux for enhanced Security
  • bulletImplementing AntiVirus Protection
  • bulletTCP/IP stack hardening in Linux kernel using sysctl
  • bullet Webserver Hardening – Apache 2.X, Nginx 1.X, Lighttpd 1.X & Litespeed, PHP, CGI, DDoS & Outbound SPAM protection
  • bullet Mail Server Hardening – Postfix, Exim, QMail, Courier, Dovecot, Zimbra
  • bullet Database Server Hardening – MySQL, PostGreSQL, MariaDB
  • bullet SSH Server Hardening
  • bullet FTP Server Hardening – ProFTPd, Pure-FTPd, VSFTPD
  • bullet Control Panel Hardening – Hosting Control Panel, Webmail, Statistics
  • bulletEnable Encryption for critical services
$129.00 Per Server

COMPLETE WEB-APPLICATION SECURITY

Description


The closest you can come to a 100% secure website is with COMPLETE WEB-APPLICATION SECURITY. Initiate a complete security audit and hardening of your websites running on CMS (developed in PHP, Perl, Python, .NET, Java or Ruby followed by continuous monitoring, updates and patches with the Recurring COMPLETE WEB-APPLICATION SECURITY plan.

  • bulletFor a single website
  • bulletDoes not require Root login to server
  • bulletRequire only Control Panel access

Features

  • bulletSecurity Auditing & Scanning.
  • bulletPenetration Testing .
  • bulletVulnerability Scanning.
  • bulletMalware Scanning.
  • bulletVulnerabilities removal.
  • bulletPatching for Vulnerabilities.
  • bulletUpgrading Applications.
  • bulletSecurity Hardening.
  • bulletWebapplication Firewall.
  • bulletIntrusion Detection Systems.
  • bulletReal time Monitoring.
  • Security Hardening for Layer 3, Layer 4 & Layer 7 Exploits & Attacks
  • bulletCross-site scripting.
  • bulletSQL injection.
  • bulletPath disclosure.
  • bulletDenial-of-service attack.
  • bulletArbitrary code execution.
  • bulletMemory corruption.
  • bulletCross-site request forgery.
  • bulletData breach
    (information disclosure).
  • bulletArbitrary
    file inclusion.
  • bulletLocal file inclusion.
  • bulletRemote file inclusion.
  • bulletBuffer overflow.
  • bulletOther, including
    code injection
    (PHP/JavaScript), etc.
$20 per Web Application (One Time)
$10.00 Monthly (+ $10 Set up fee first month)
FacebookTwitterGoogle+LinkedIn