Data Protection & Disaster Recovery Plans

 

Advanced Data Protection and Disaster recovery services with Website Hosting Services

We understand that data is the lifeblood of most companies today and organizations increasingly require 100% uptime, where data is constantly online and accessible. We have therefore implemented solid solutions that allows you to protect your data in the unfortunate event of software malfunction, system failure, events of loss of data due to hacking or viruses etc.

  • Daily & Weekly Server Backups

    Important data exists across various locations on a server. Our subject-matter experts have conducted comprehensive research and have prepared complex backup scripts that automatically maintain copies of all important files and folders, in a secure manner, on a regular pre-defined interval, such that we can restore a server in the shortest possible time, in the event of a total failure.

  • Live Backup (RAID Technology)

    We use cutting-edge RAID Hardware to protect all data on the server against harddisk failures. This technology works by creating a mirror of all data on more than one harddisk automatically, without any delay i.e. all data is written to multiple harddisks simultanously so that if any harddisk fails, that harddisk will be marked as deactivated and the system will still continue to function as though nothing has happened by using the copy of the data on the other harddisk(s). The best part is that you do not require to make any changes or special code modifications in your website/web application for this technolgy to function.

     

    RAID systems offer a significant advantage over non-RAID systems, both in terms of data protection and ability to maintain 100% uptime, as the system continues to function perfectly in case of disk failures. RAID technology also marginally improves the performance of the various services on the server.

     

    As soon as a harddisk fails, notification alerts are sent out, so that the failed harddisk can be replaced by the system administrators. As such, the system continues to perform normally despite disk failures, using the mirror of the data on the additional hard disk(s).

  • Your Own Backup Policy Manager (Only Applicable for Web Hosting Packages)

    All our services involve your crtitical data. Most of our Products have a built-in Backup Manager that provides comprehensive and cost effective protection by allowing you to define highly flexible backup policies that will protect your critical data. A web-based backup policy manager provides an easy-to-use one-step wizard to define the backup scope, backup frequency and backlogs.

 

Level-3: Host Security

  • Host Based Intrusion Detection System

    With the advent of tools that are able to bypass port blocking perimeter defense systems such as firewalls, it is now essential for enterprises to deploy Host-based Intrusion Detection System (HIDS) which focuses on monitoring and analyising the internals of a computing system. Our Host-based Intrusion Detection System assists in detecting and pinpointing changes to the system and configuration files - whether by accident, from malicious tampering, or external intrusion - using heuristic scanners, host log information, and by monitoring system activity. Rapid discovery of changes decreases risk of potential damage, and also reduces troubleshooting and recovery times, thus decreasing overall impact and improving security and system availability.

  • Hardware Standardization

    We have standardized on hardware vendors that have a track record of high security standards and quality support. Most of our infrastructure and datacenter partners use equipment from Cisco, Juniper, HP, Dell etc.

 

Level-4: Software Security

Our applications run on myriad systems with myriad server software. Operating Systems include various flavors of Linux, BSD, Windows. Server Software includes versions and flavors of Apache, IIS, Resin, Tomcat, Postgres, MySQL, MSSQL, Qmail, Sendmail, Proftpd etc etc. We ensure security despite the diverse portfolio of software products we utilize by following a process-oriented approach.

  • Periodic Security Scans

    Frequent checks are run using enterprise grade security software to determine if any servers have any known vulnerabilities. The servers are scanned against the most comprehensive and up-to-date databases of known vulnerabilities. This enables us to proactively protect our servers from attacks and ensure business continuity by identifying security holes or vulnerabilities before an attack occurs.

  • Timely Application of Updates, Bug Fixes and Security Patches

    All servers are registered for automatic updates to ensure that they always have the latest security patch installed and that any new vulnerabilities are rectified as soon as possible. The largest number of intrusions result from exploitation of known vulnerabilities, configuration errors, or virus attacks where countermeasures ARE already available. According to CERT, systems and networks are impacted by these events as they have "not consistently" deployed the patches that were released.

     

    We fully understand the requirement for strong patch and update management processes. As operating systems and server software get more complex, each newer release is littered with security holes. Information and updates for new security threats are released on an almost daily basis. We have built consistent, repeatable processes and a reliable auditing and reporting framework which ensures that all our systems are always up-to-date.

  • Pre-Upgrade testing processes

    Software upgrades are released frequently by various software vendors. while each vendor follows their own testing procedures prior to release of any upgrade, they cannot test inter-operability issues between various software. For instance a new release of a database may be tested by the Database vendor. However the impact of deploying this release on a production system running various other FTP, Mail, Web Server software cannot be directly determined. Our system administration team documents the impact analysis of various software upgrades and if any of them are perceived to have a high-risk, they are first beta-tested in our labs before live deployment.

 

Level-5: Application Security

All of the application software that is used in the platform is built by us. We do not outsource development. Any 3rd party Products or Components go through comprehensive training and testing procedures where all elements of such products are broken down and knowledge about their architecture and implementation is transferred to our team. This allows us to completely control all variables involved in any particular Product. All applications are engineered using our proprietary Product Engineering Process which follows a proactive approach towards security.

Each application is broken down into various components such as User Interface, Core API, Backend Database etc. Each layer of abstraction has its own security checks, despite the security checks performed by a higher abstraction layer. All sensitive data is stored in an encrypted format. Our engineering and development practices ensure the highest level of security with regards to all application software.

 

Level-6: Personnel Security

The weakest link in the security chain is always the people you trust. Personnel, Development staff, Vendors, essentially anyone that has privileged access to your system. Our Holistic Security Approach attempts to minimize security risk brought on by the "Human Factor". Information is divulged only on a "need-to-know" basis. Authorization expires upon the expiry of the requirement. Personnel are coached specifically in security measures and the criticality of observing them.

Every employee that has administrator privileges to any of our servers goes through a comprehensive background check. Companies that skip out on this are putting to risk all sensitive and important data belonging to their customers, as no matter how much money is invested into high-end security solutions, one wrong hire - having the right amount of access - can cause greater damage than any external attack.

 

Level-7: Security Audit Processes

In a vast deployment of globally distributed servers, audit processes are required to ensure process replication and discipline. Are all servers being patched regularly? Are the backup scripts running all the time? Are offsite backups being rotated as desired? Are appropriate reference checks being performed on all personnel? Is the security equipment sending out timely alerts?

These and many such questions are regularly verified in an out-of-band process that involves investigation, surveys, ethical hacking attempts, interviews etc. Our audit mechanisms alert us to a kink in our security processes before it is discovered by external users.

Reasons why one should choose our hosting company

It has always been difficult to select a suitable, efficient, and yet, affordable web hosting service provider. Explore the reasons why hostelevator.net is the right choice for your web hosting requirements:

  • Best value for money

    You get what you expect, and then some

  • Unquestionable 30 Day Money Back Guarantee

    Our 30 day money back guarantee enables our clients to test our quality services, stability of our servers, and experience the sharpness and expertise our technical team. For VPS AND Dedicated Server 7 day MBG.

  • Stability

    There are two reasons why our servers are stable: (1) We never oversell and (2) we upgrade our hardware on a regular interval. These two core practices ensure reliability, agility and speed.

  • Free of cost and hassle free transfer from other service provider

    If you are planning to change your hosting service provider, all you need to do is to let our support team know about your decision and they will take care of the rest.

  • Special hosting services suitable for WordPress, Joomla, Drupal etc.

    Our servers are equipped to host any of the above mentioned requirements. If there are additional requirements that are not listed, please advise our tech team and most of the time we will be able to accommodate.

  • Genuine Technical Support on 24 x 7

    Claiming and truly providing round the clock technical support are two different things. Anyone can test our round the clock presence on our live chat support. Additionally, we offer 24 x 7 support via our ticket system.

  • Reliability Redundant Fast Low latency

  • Affiliate Program

    Our affiliate program offers you an opportunity to earn up to Rs.5000.00 by referring any client. You can recommend our services to your friends, family, and other contacts via our referral link and let our affiliate system handle the rest. For more details please click on the Affiliate button on our home page.

  • Choice Of Our Data Center (INDIA, USA AND UK)

    We have pioneered the concept of a Globally distributed Datacenter. Our Data center is a globally distributed collection of redundant server infrastructure which hosts all our Products and Services. We have above 4 data centre located in INDIA, USA AND UK.

  • 99.9% Up-time Guarantee

    Based on the quality of our servers and our management team, we can confidently guarantee a 99.9% up time of your website. The up time is measured by our round the clock monitoring system.

  • Free Add-ons with every Domain Name

    We provide free Email Account, Free DNS Management, Free Mail Forwards, Domain Forwarding, Domain Theft Protection, Easy to use Control Panel ETC

  • High End Multi core/ Multi Processor Servers

    All Administration, Security, Backups and Upgrades managed by Host Elevator