Dome9 Launches Cloud Server Firewall Management

May 26, 2011 by · Comments Off on Dome9 Launches Cloud Server Firewall Management 

Webmaster ToolboxTel Aviv, Israel – Dome9 Security announces the public availability of their new cloud server security service, the only secure firewall management platform available for Cloud, Virtual Private Servers (VPS), Dedicated servers and Amazon’s EC2 Security Groups. This unique security-management-as-a-service platform is now available for beta, allowing easy deployment, configuration, and management of security policies using standard operating system security elements.

“Cloud technology has seen extraordinary growth within the hosting industry. With the Dome9 platform, cloud hosting providers can finally offer a scalable service that enables top of the line security for their customers” said Dome9 co-founder and CEO Zohar Alon. “The fact that most hosted cloud servers are protected by just a username and password is alarming. Cloud providers simply can’t scale yesterday’s hardware-based firewalls to meet cloud demand and pricing trends.   Our software-based solution brings a new dimension to server security and allows cloud administrators, providers, and users to take charge of their security, anytime, anywhere.” Read more

Interoute London Hosting Center Attains PCI DSS Accreditation

May 10, 2011 by · Comments Off on Interoute London Hosting Center Attains PCI DSS Accreditation 

Webmaster ToolboxLondon, UK – Interoute, owner operator of Europe’s largest advanced next-generation network, today announced that it has achieved Payment Card Industry Data Security Standard (PCI DSS) certification for its London data center. PCI DSS is a security standard for online credit card transactions set out by the PCI Security Standard Council, founded by leading credit card organisations including American Express, MasterCard Worldwide, and Visa.

Interoute attained compliance through an independent Qualified Security Assessor (QSA) for its managed hosting solution.   Read more

Six tips for protecting critical data against Advanced Evasion Techniques

March 30, 2011 by · Comments Off on Six tips for protecting critical data against Advanced Evasion Techniques 

Web Hosting BlogLONDON, UK – Stonesoft, an innovative provider of integrated network security and business continuity solutions, discovered Advanced Evasion Techniques (AETs) last year. Since then, it has been verified that the threat posed by AETs to organisation’s critical data capital and systems is constantly evolving and dynamic. Here Stonesoft shares six tips for organisations to protect their critical data assets and systems against Advanced Evasion Techniques.

Evasions are a way to bypass network intrusion prevention systems (IPS) or any security device that is supposed to do network traffic inspection. As such, evasion techniques have been known for a long time. However, when Stonesoft discovered the AETs – a new threat category that existing network security systems are not able to detect – the information and the first 23 samples were quickly delivered to the Computer Emergency Response Team CERT-FI and later announced to the public. Stonesoft has recently shared 124 newly discovered samples with CERT-FI. However, this was just the tip of the iceberg. Read more

Data Center Security is Still Flawed Says Sentry42

March 28, 2011 by · Comments Off on Data Center Security is Still Flawed Says Sentry42 

Web Hosting BlogUNITED KINGDOM – Sophisticated cyber-attacks like last year’s stuxnet worm grab the headlines and trigger massive investment in anti-virus software but the chief threat to data center security today remains ‘physical’ according to Alex Rabbetts of Norwich-based colocation specialists, Sentry42.

“Over half of the data security breaches in the UK this year will be the result of direct physical attack or theft from the data center. The reality of our day-to-day enemy is not the international cyber terrorist gangs – it is more likely to be a disgruntled employee or petty criminal breaking in and stealing to order.” Read more

Beefing Up Security With Web Application Firewalls

November 2, 2010 by · Comments Off on Beefing Up Security With Web Application Firewalls 

If you’re fortunate enough to have a growing online business, you will find your hosting needs growing along with it.  What may have started as a single server may now begin to resemble a burgeoning IT shop, with multiple web servers, database servers, mail servers, and file servers.   All businesses reach a threshold where security and reliability of the environment becomes paramount – to the point where it becomes a higher priority to protect the assets and infrastructure before investing any further in functionality and business growth.  One of the first appliances deployed to protect that infrastructure is a firewall, which can be defined as a hardware and/or software appliance whose primary purpose is to protect network resources by limiting or eliminating unauthorized access to those resources.  While larger businesses often opt to invest in hardware firewalls capable of on-the-fly packet filtering, encryption of all incoming and outgoing requests, and processing of extremely large numbers of concurrent connections, small-to-mid-sized businesses are often best served by software firewalls and specifically Web Application Firewalls, or WAFs. Read more

New Online Marketing Platform – Declares Independence for Businesses

June 18, 2009 by · Comments Off on New Online Marketing Platform – Declares Independence for Businesses 

AITWebsite ToolsFayetteville NC – In the current economy, many businesses are bringing their marketing and PR efforts in-house and targeting their consumers directly in an effort to cut costs and improve ROI. According to the Center for Media Research this move to be independent is being shaped by “four trends impacting consumer-centric marketing: consumer adoption of new, low cost distribution formats such as social networks and opt-in email, a shift in advertiser spending to highly targeted online venues, the migration to cost-cutting virtualized platforms and the emergence of new capabilities due to game-changing moves by both new entrants and existing players”.

What does that mean for businesses that rely heavily on interactive media to “get the word out” including small businesses, publishers such as newspapers, e-magazines and domain monetization entrepreneurs? According to, a 14 year old web host and domain registrar, migrating traditional media services online is simple using the company’s cloud computing technology that is both robust, and affordable. “We provide multiple domain name registration, dedicated and virtual servers, search engine placement, email marketing, security with a customized firewall and actual sales leads in a one-stop-shop,” said Sean McCoy, VP of Sales and Marketing.

AIT’s Enterprise Class hosting plans boast over 2gbs of RAM, 250gbs of disk space, unlimited data transfer, Ready4Design2007 web design software, MCART e-commerce platform, and guaranteed web traffic that is relevant to any business. These features and many others are supported by dedicated resources using IBM hardware and VMware starting for less than $50 a month during the months of June and July of 2009, visit for more information about this alternative to the Enterprise Hosting Plan.

Read more

The Planet Adds New High-Performance Firewalls to Portfolio

March 16, 2009 by · Comments Off on The Planet Adds New High-Performance Firewalls to Portfolio 

The Planet 190x60 LogoWebmaster News – HOUSTON – The Planet, the global leader in IT hosting, today announced the addition of two new Cisco firewalls to its product catalog. The new firewalls enhance server performance and security for the company’s dedicated server hosting and virtual and private rack customers.

The high-performance Cisco ASA 5505 Security Plus firewall vastly improves performance for the company’s dedicated server hosting customers compared with the CheckPoint XU firewall. The product features 100 Mbps of firewall and VPN throughput and allows for 25,000 concurrent sessions, which is up to 50 percent more robust than the CheckPoint solution. Read more