Protect your online services
Our Protection solution allows you to monitor, protect and react quickly in the event of an incident.
Our support team is made up of security and technology specialists ready to respond. This rapid action will ensure that you have a respond to an incident or disaster on your information technology as soon as possible. Our team accompanies you in the resolution of technical incidents. Our protection solution allows you to:
- Supervise your online infrastructure and services
- Respond automatically to attacks;
- Enjoy privileged access to our support;
- Receive a monthly report on the safety of your services.
From only $99/month
Our Protection solution provides supervision of your online services:
- The state of physical resources;
- The state of services;
- The application activity.
The Mean Time To Recovery (MTTR) is the time it takes to return to a normal situation after an incident and takes into account the detection and repair time. The Protection service significantly reduces your MTTR by detecting any malfunction in your infrastructure before a disaster occurs.
Our Protection solution uses SIEM (Security Information and Event Management) and IDS (Intrusion Detection System) technologies to correlate and detect events threatening your online services. A SIEM has the distinction of understanding security issues as a whole and not in isolation.
If the Protection SIEM detects an attack in the form of attempted intrusions on your messaging (IMAP) and Remote Connection (SSH) services, then the correlation engine will calculate a counter-measure to block any access to the attacker.
Notre équipe de support est constituée de spécialistes en sécurité et en technologies prêts à réagir. Cette force d’action rapide vous garantira une intervention en cas d’incident ou de désastre sur votre infrastructure dans les meilleurs délais.
Le support Gold inclus avec notre solution de Protection vous permet de communiquer facilement avec notre équipe de support :
- Every day of the week as needed;
- Depending on a response capability within an hour of the incident;
- By phone and email.
Each month, a report shows you the evolution of threats to your online services. This report can also be used as a tool to measure solicitation and thus predict the need to evolve it.
Analyze and correlate traffic peaks in your ecommerce with the security report. Anticipate any limitations to prevent future technical incidents.