Home » Technology » Security Transformation » Top four features needed for optimum hosting security

Top four features needed for optimum hosting security

Tech Page One

optimum hosting 1

Billions of dollars are transferred across the internet on a regular basis, and information is stored on the internet that is worth billions of dollars.  You could say that how to ensure hosting security is the multi-billion-dollar question.

Hosting security is in part a partnership – a partnership between the hosting company and their customers.  When you do appoint a hosting company, make sure you carry out your due diligence, and ensure that the company maintains servers. You should also see if it has published a security protocol that you can review.

Bear in mind that there are multiple motivations for attacks on your system, however, you can broadly divide them into two categories:  attacks for which the motive is to gain or steal information – or indeed money – and attacks designed to cause inconvenience or financial harm.

Back-up data on a regular basis

Carry out regular back-ups.  In this way, if security is compromised, data is lost or in some way manipulated, there is the recourse to upload data that was created beforehand.  Do not rely on your host for data back-up, but equally, there is no harm in choosing a host which automatically backs-up clients’ data.

But what features are required for optimum hosting security?

Secure File Transfer Protocol (SFTP)

First of all, ensure Secure File Transfer Protocol or SFTP.  This is a method for transferring files between two machines, with security measures that are generally considered superior to security measures in FTP – file transfer protocol.   SFTP transfers files using private and safe data streams.  One way in which SFTP scores over FTP is that it encrypts passwords.

Secure Sockets Layer (SSL)

Secondly, ensure Secure Sockets Layer – SSL. This is a security technology for guaranteeing that the link between a web browser and a website is encrypted, and ensuring all data that is transferred remains private. To create an SSL connection a web server requires a SSL certificate. You can ascertain if an SSL certificate is in place by looking for a padlock image on the URL address, as well as an https:// address instead of http://.

Use of adequate firewalls

Thirdly, establish if your hosting company has adequate firewalls. You would expect your hosting company to have firewalls, but make sure that firewalls specific to different clients are independent. Linked with this, ensure your hosting company has IDS – Intrusion Detection System.


Finally, create anti-DDOS (distributed denial of service attack) features.  A DDOS attack can occur when a third party bombards your host with information requests that cannot be handled.  Features reducing the damage from a DDOS attack can involve single network management protocol – SNMP – in which unusual activity is identified and can divert traffic to a cloud scrubbing service.




Dell empowers countries, communities, customers and people everywhere to use technology to realize their dreams. Customers trust us to deliver technology solutions that help them do and achieve more, whether they’re at home, work, school or anywhere in their world. Learn more about our story, purpose and people behind our customer-centric approach.

Latest Posts:


Tags: Security Transformation, Technology