With NAT Security Web Hosting you will have dedicated high performance and latest generation components such as Intel® Xeon® Gold processors, NVMe solid state drives, ddr4 version 4 RAM, among others, which you can implement according to the scalability you need to obtain increased performance and responsiveness to workloads.
NAT Security Web Hosting gives you access to cPanel, the most used control panel in the world as it is easy to use and very intuitive, so you can administer, configure and manage your files, sites, domains, databases and much more in a safe way.
With NAT Security Web Hosting you will be able to access more than 100 free applications with a very simple installation, which will facilitate the administration of your website such as WordPress, Moodle, Magento, Drupal, Joomla, PrestaShop, LimeSurvey, among others.
NAT Security Web Hosting grants 5 exclusive domains and unlimited subdomains. Likewise, we provide an unlimited and free SSL certificate, which allows your site to be encrypted under the HTTPS protocol and generate greater trust among your visitors.
NAT Security Web Hosting provides unlimited, unmetered bandwidth and symmetrical 400 Mbps of dedicated outgoing bandwidth, so you won’t have to worry about load times.
NAT Security Web Hosting scans, filters and blocks all malicious HTTP/HTTPS traffic going to your web applications and prevents unauthorized data disclosure. For this, we execute a set of policies that distinguish between malicious and safe traffic, through a Web Application Firewall – WAF.
NAT Security Web Hosting makes backup copies every 30 minutes with a retention of 24 Hours; Likewise, these backup copies are strategically geo-replicated on our different servers distributed in the US, Canada, England, Germany, France and Brazil. This, in order to guarantee the immediate recovery of your information in the event of any fortuitous event that may arise.
NAT Security Web Hosting uses advanced protection policies to identify, stop, block and eliminate any known virus infection, such as Malware, Worms, Trojans, Adware, Spyware, Ransomware, Cryptomining viruses, among others. Ensuring the protection of your servers with total reliability.
NAT Security Web Hosting establishes protection measures to prevent external attacks such as Doxing, Distributed Denial of Service (DDoS), Phishing, SQL Injection, Whaling, Cross-site scripting, drive by download, among others. To do this, we apply different protection elements such as Firewall, IPS, IDS, ATP, VPN, Anti-DDos Systems, Sandbox, Double analysis engine executed by Kapersy and Avira, among others. In this way, we maintain high security standards for your company.
Access to personalize your page
Predesigned and customizable templates.
Supports unlimited simultaneous queries
No congestion, no saturation
Edit your template in real time
Unlimited bandwidth egress
Attention through digital channels (Chat and Calls with a maximum wait of 1 minute)
30 minute SLA under contract
24 x 7 support, 365 days a year
New-Age Technology data centers are equipped with uninterruptible power supplies (UPS) and backup diesel generators, and are designed to ensure constant power availability for up to 48 hours during an indefinite power outage. In addition, there are redundant heating, ventilation, and air conditioning (HVAC) systems, networks, and UPSs. Physical security is ensured through the use of high fences, 24/7 security personnel, and video surveillance with 90-day archiving. To access it is necessary to pass a biometric scan of the geometry of the hand and present a proximity card.
We have never really had problems with service outages, however, to ensure Business Continuity for our clients, all our nodes are connected in an optical ring. The information is replicated to the next fastest responding DC in less than 15 minutes and everything continues as normal. We have our own nodes:AMÉRICAS: Washington (USA), New York (USA), Chicago (USA), Metro Kanzas (USA).
EUROPA: París (France).
PAISES BAJOS: Amsterdam.
ALEMANIA: Frankfurt am Main, Metro Karlsruhe , Munich.
To get to this answer, we must first mention that Backup tasks can be performed hot (business hours) or cold (non-business hours). Obviously it is more advisable to do it outside of working hours so that it does not consume the bandwidth that users are surely using. Anyway, if it is required to run the hot Backup, for example, because the Manager only works until noon and I need to backup his laptop before he leaves; In this case, we can assign a specific bandwidth to the task, thereby preventing upload consumption from being saturated (Email, Drive, online collaboration tools, etc.)
The data is stored encrypted in AES-256bits, which means that only the client with a username and password can access the information stored in our Cloud. You do not need to be physically on your LAN to manage your backups: the console is 100% Cloud. We have privacy and confidentiality clauses with their respective penalties in accordance with the data protection law (DLP).
© 2022, New-Age Technology Inc. All rights reserved
UN ASESOR COMERCIAL SE COMUNICARÁ A LA BREVEDAD CON USTED