Let's talk

Contact us icon

    We know your time is precious, so let us get you to the right place as fast as we can.

    What can we do for you?

    Tell us about your project and we'll get back to you shortly.

    We can't wait to hear more

    Contact us icon

    Lets talk


    Introduction to our network security

    Network Security

    Strategies takes the security of its network, applications and the storage of its clients’ data seriously. Our operations team and developers work closely together to create robust, secure products and applications that adhere to best industry practices when dealing with network security.

    Our customers have the added assurance that our hosting partner is fully compliant and certified in the provision of data centre services under ISO 27001:2013 and ISO 9001:2008.

    Access to Servers

    Physical access to servers is tightly guarded and only designated to key network and infrastructure employees. Internal network access is conditional with team members only provisioned details for servers they require access to. External access is secured to the individual ports required for HTTP and HTTPS access, with anything additional being subject to our IT manager’s approval.

    Intrusion Detection & Firewalls

    Strategies’ core network is protected by up to date UNIX based packet filtering firewalls. An intrusion detection and prevention system is in place to help protect against a variety of web application attack vectors and also detects and mitigates DDoS attacks. All public facing HTTP and HTTPS traffic passes through this resilient and redundant platform before entering a secure DMZ. We make use of advanced caching and reverse proxy methods to help reduce load on backend servers and add an extra layer of security.


    A monitoring system is deployed to alert the networking team 24/7 to any issue on any system in the datacentre. From CPU usage to network outages we immediately know if there is an issue as quickly as possible so we can resolve it in a timely fashion to keep downtime to a minimum.

    We continuously monitor official sources, technical blogs and security mailing lists for vulnerabilities in the software and operating systems that we utilise. In the event of a reported software exploit the team rapidly assesses the situation and potential effect it may have on clients and the network as a whole. Once this assessment is complete the team mitigate in the form of patches, upgrades, segregation or even deploying alternative solutions.

    Communicating Change with You

    We will immediately communicate with a designated client point of contact if any changes that we make to our network may affect how you use your applications. We ensure that all planned maintenance happens outside of offices hours and can work closely to determine any particular time slot which best suits you.

    We provide completely bespoke solutions from a single virtual server, to dedicated servers, to a robust, highly available virtualised private cloud with dedicated hardware and dedicated networks.

    Please contact us if you have any questions or would like more information regarding our network security or hosting centre.

    Contact Us

    Most recent projects

    • Job board websites

      Black Leadership Job Board

    • Branding websites | Recruitment websites


    • Branding websites | Recruitment websites | Web Development


    • Branding websites | Recruitment websites

      Alexander Lloyd