Security Service
Various security measures are needed to protect Cloud Servers from ever-increasing threats, such as the most recent viruses and intrusions.
Security can mean a lot of different things, depending on who's hosting your Cloud Servers. Security could mean that the servers are just sitting in a concrete building with limited access. Or, it may mean that the servers are sitting behind a firewall that's not even configured right. You get the idea—you might not be as secure as you think you are and need to be. And the risks are huge.
For GMO Cloud, security starts with protecting the integrity of your data and guarding against service interruptions. But being truly secure means far more than safeguarding data and preventing interruptions. There are the resulting financial losses, your brand's equity and reputation, business continuity and potential litigation or fines to consider. And, when it's all said and done, paying a little more for expert security means customers will continue to have confidence in your business. That, in itself, makes it worthwhile investing in GMO Cloud's Security Services.
By outsourcing to our specialized professionals, you save time and ensure no details are missed. Services include shared firewall policy configuration, access restriction configuration (iptables/TCP Wrapper Settings), DenyHosts configuration, SSL installation, investigation of unauthorized access status, weekly reporting and security updates.
Service Scope
Shared Firewall Policy Configuration |
Configuration of troublesome firewall settings. |
---|---|
Access Restriction Configuration (iptables/TCP Wrapper Settings) | Configuration of iptables/TCP Wrapper settings to set up access restrictions for each service. |
DenyHosts Configuration | Implementation of deny hosts, which is effective in preventing attacks such as a brute force attack. |
SSL Installation | CSR generation and SSL server certificate installation. SSL transfer configuration (to transfer the SSL certificate and private key from your existing server). |
Investigation of Unauthorized Access Status and Weekly Reporting |
We investigate in depth for traces of intrusion in the server and report to you once a week by email. Also, notifications of available updates to packages are sent to you. |
Security Updates Free of Charge |
We apply security updates upon your request. * Not available for certain plans. |
Pricing
Setup | Free |
---|---|
Monthly | $100.00 per virtual machine |
(*) OS templates that may be used are limited to CentOS. (However, this excludes beta version OS templates.)
(*) It is necessary for the customer to obtain SSL certification themselves. Additionally, acquisition expenses incur separate fees.
(*) The application of security options will take about 2~3 business days.
(*) Depending on customer operating conditions there will be instances where only a part of the operations are executed.