Strategies

Let's talk

Contact us icon

    We know your time is precious, so let us get you to the right place as fast as we can.

    What can we do for you?

    Tell us about your project and we'll get back to you shortly.

    We can't wait to hear more

    Contact us icon

    Lets talk

    Strategies

    Network Security

    Our approach to your website security

    Let's talk

    Strategies takes the security of its network, applications and the storage of your data extremely seriously. Our operations team and developers work closely together to create robust, secure products and applications that adhere to best industry practices when dealing with network security.

    You have the added assurance that our data centre, infrastructure and working processes are fully compliant and accredited with all the relevant industry certifications

    In addition, our physical location has 24/7 manned security, CCTV, intruder detection, and 3 factor access control.

    Access to Servers

    Physical access to servers is tightly guarded and only designated to key network and infrastructure employees. Internal network access is conditional with team members only provisioned details for servers they require access to. External access is secured to the individual ports required for HTTP and HTTPS access, with anything additional being subject to our IT manager’s approval.

    Intrusion Detection & Firewalls

    Strategies’ core network is protected by up to date UNIX based packetfiltering firewalls. An intrusion detection and prevention system is in place to help protect against a variety of web application attack vectors and also detects and mitigates DDoS attacks. All public facing HTTP and HTTPS traffic passes through this resilient and redundant platform before entering a secure DMZ. We make use of advanced caching and reverse proxy methods to help reduce load on backend servers and add an extra layer of security.

    Monitoring

    A monitoring system is deployed to alert the networking team 24/7 to any issue on any system in the datacentre. From CPU usage to network outages we immediately know if there is an issue as quickly as possible so we can resolve it in a timely fashion to keep downtime to a minimum.

    We continuously monitor official sources, technical blogs and security mailing lists for vulnerabilities in the software and operating systems that we utilise. In the event of a reported software exploit the team rapidly assesses the situation and potential effect it may have on clients and the network as a whole. Once this assessment is complete the team mitigate in the form of patches, upgrades, segregation or even deploying alternative solutions.

    Communicating Change with You

    We will immediately communicate with a designated client point of contact if any changes that we make to our network may affect how you use your applications. We ensure that all planned maintenance happens outside of offices hours and can work closely to determine any particular time slot which best suits you.

    We provide completely bespoke solutions from a single virtual server, to dedicated servers, to a robust, highly available virtualised private cloud with dedicated hardware and dedicated networks.

    Please contact us if you have any questions or would like more information regarding our network security or hosting centre.

    Let's talk