Cloud Service - Secure

Other Hosting Services

Our Hosting Service

What happens when your traditional web application server is hacked? Your business starts bleeding while you attempt to find out what happened and how bad the damage is. If private customer data is involved, you need to inform them and that’s a potential PR disaster for you.


Since you have no way of knowing if the actual applications and operating system on the server have been compromised, the smart thing is to reinstall everything from scratch using sources that can be trusted. This can takes days or even weeks and could easily end up costing thousands of dollars.


When servers get hacked, people often lose their jobs.

Our Cloud service was designed with security as the number one priority. It has several layers of security compared to most hosting services that provide none.

  • Smart Firewall

    Our Cloud service starts with a smart firewall. Most hosting services provide a simple, dumb firewall that lets you open and close ports. Our Cloud has an smart, adaptive firewall that watches the traffic coming in to your Cloud server and looks for the patterns that indicate a hacker. It can then lock the hacker out before they get in.

  • Intrusion Detection

    Should the hacker get through that somehow, our Cloud service employs an Intrusion Detection System (IDS) that looks for hacking activities. When a hacker is detected, the IDS locks them out.

  • OS Protection

    We use Security-Enhanced Linux, which employs United States Department of Defense-style Mandatory Access Controls (MAC) which helps protect the OS itself from being hacked.

  • File Change Detection

    If the hacker gets past these first two layers, we can see which files were changed. This allows us to improve our firewall and intrusion detection and aids us and you in restoring from a backup.

These layers of security are too expensive for most businesses. Because all of our Cloud servers use the same configuration, we can make them ultra-secure at a reasonable price. And with our Cloud, you benefit from crowd-sourced security. If one server is hacked, we can use that information to protect the rest of the Cloud servers.


Your application itself has an additional layer of security: it’s a compiled binary. Web apps built with traditional tools are nothing more than a series of text files. Our web apps are compiled to binary code. Few hackers have the knowledge to manipulate binary code. This makes our web apps incredibly difficult and time-consuming to hack.


No security system is completely impenetrable. However, our Cloud service has some of the best security available for hosting web apps. And we are constantly monitoring and upgrading your Cloud server to keep the bad guys out.


LinkedIn Icon Twitter Icon Facebook icon
Mark Lewis & Associates


Mark Lewis & Associates


Mark Lewis & Associates