Introduction to our network security

Strategies takes the security of its network, applications and the storage of its clients’ data seriously. Our operations team and developers work closely together to create robust, secure products and applications that adhere to best industry practices when dealing with network security.

Our customers have the added assurance that our hosting partner is fully compliant and certified in the provision of data centre services under ISO 27001:2013 and ISO 9001:2008.

Access to Servers

Physical access to servers is tightly guarded and only designated to key network and infrastructure employees. Internal network access is conditional with team members only provisioned details for servers they require access to. External access is secured to the individual ports required for HTTP and HTTPS access, with anything additional being subject to our IT manager’s approval.

Intrusion Detection & Firewalls

Strategies’ core network is protected by up to date UNIX based packetfiltering firewalls. An intrusion detection and prevention system is in place to help protect against a variety of web application attack vectors and also detects and mitigates DDoS attacks. All public facing HTTP and HTTPS traffic passes through this resilient and redundant platform before entering a secure DMZ. We make use of advanced caching and reverse proxy methods to help reduce load on backend servers and add an extra layer of security.


A monitoring system is deployed to alert the networking team 24/7 to any issue on any system in the datacentre. From CPU usage to network outages we immediately know if there is an issue as quickly as possible so we can resolve it in a timely fashion to keep downtime to a minimum.

We continuously monitor official sources, technical blogs and security mailing lists for vulnerabilities in the software and operating systems that we utilise. In the event of a reported software exploit the team rapidly assesses the situation and potential effect it may have on clients and the network as a whole. Once this assessment is complete the team mitigate in the form of patches, upgrades, segregation or even deploying alternative solutions.

Communicating Change with You

We will immediately communicate with a designated client point of contact if any changes that we make to our network may affect how you use your applications. We ensure that all planned maintenance happens outside of offices hours and can work closely to determine any particular time slot which best suits you.

We provide completely bespoke solutions from a single virtual server, to dedicated servers, to a robust, highly available virtualised private cloud with dedicated hardware and dedicated networks.

Please contact us if you have any questions or would like more information regarding our network security or hosting centre.

Latest case study

“It has been a real pleasure working with Strategies throughout our website projects, they are always very helpful, quick to respond and patient when trying out lots of new ideas.”

Existing customers Electronics Datasheets approached Strategies about a new project that they were planning. The aim was to create a new parts comparison website that would provide up to date pricing and availability from over 20 leading distributors. Engineers and buyers would be able to use the websites search function to source millions of parts from thousands of manufacturers and then purchase directly from authorized suppliers.

A name was established for the project (ED Inventory, or EDI for short) and planning got underway.

As one of the fastest growing electronic datasheets websites it was crucial that the EDS brand could expand into a new global marketplace offering users the ability to search through a very large database of part and inventory data.

View case study