|
Warum
L3server?
Wir
sind auf Sicherheit spezialisiert. Wir
bieten Ihnen vollständig konfigurierte
Server mit vorinstallierter Hosting Administrations-Software
und besonderen Sicherheitsvorkehrungen.
L3server wird Ihren Server nach Ihren
Bedürfnissen und Wünschen konfigurieren
und verwalten. Unsere regulären Angebote
sind daher auf Firmen und Institutionen
zugeschnitten, die besonders auf die Sicherheit
Ihrer Daten bedacht sind.
Auf
die Verwendung des Servers zugeschnitten
installieren und konfigurieren wir auf
Ihrem Server einen ganzen Katalog von
Sicherheitsprogrammen. L3server verwendet
ausschließlich hochwertige Hardware
(Dell Server Hardware, HP Switch, usw.).
Unsere deutschen Racks befinden sich im
Hamburger Level(3) Rechenzentrum (10 Minuten
vom L3 Büro) mit der neuesten Technologie
und dem zuverlässigsten und schnellsten
Netzwerk Europas und Nordamerikas. Netzwerk
Uptime ist sehr nahe an 100%. Unser schneller
und freundlicher Kundendienst wird Sie überzeugen.
Ping Test:
Klicken Sie hier für einen Ping Test. |
|
|
|
Professionelle, gesicherte Business Server
Server
Sicherheit:
Hier
einige der Punkte aus unseren beiden Sicherheits-Paketen (die Einzelheiten passen wir
fortlaufend den jeweiligen Notwendigkeiten und Bedürfnissen an):
|
Sicherheits
Patching #1 |
|
Sicherheits
Patching #2 |
|
Iptables
firewall (CSF oder APF)
Brute force detection (BFD)
Process Resource Monitor (PRM)
Stop unnecessary processes
Logcheck
Logwatch
Tripwire
Server Configuration check
openSSH configuration check
Rootkit Hunter
Chkrootkit
mod_security
mod_evasive
Host spoof protection
Operating system update configuration check
Name server configuration check if required
Disk check
Kernel check
Apache check
Enhanced log rotation
Additional backup rotation for local backups
Additional backups
Securing tmp directories
Exploit check
Upgrade vulnerable apps
MRTG graphs |
|
Iptables
firewall (CSF oder APF)
Brute force detection (BFD)
Process Resource Monitor (PRM)
Stop unnecessary processes
Logcheck
Logwatch
Tripwire
Server Configuration check
openSSH configuration check
Rootkit Hunter
Chkrootkit
mod_security
mod_evasive
Host spoof protection
Operating system update configuration check
Name server configuration check if required
Disk check
Kernel check
Apache check
Enhanced log rotation
Additional backup rotation for local backups
Additional backups
Securing tmp directories
Exploit check
Upgrade vulnerable apps
MRTG graphs |
|
Erklärung
der Begriffe:
|
|
File
Manager/Console script
Operating system updates if required
Perl installation check and repair if required
Enhanced path protection
Remove SUID/GUID from binaries if not required
PHP hardening
Exploit cleanup if required
Kernel upgrade if required
Apache upgrade if required
Mailman performance if required
MySQL query cache |
CSF or APF - installation and configuration - the most effective Firewall software
BFD - installation and configuration - Brute Force Detection
PRM - installation and configuration - Process
Resource Monitor
Stop unnecessary server services - reduces security risks and frees server
resources
Logcheck - installation,
configuration, tuning, hourly email updates
- The logcheck tool allows summaries of
log file entries to be mailed to a system
administrator via a cron job. These summaries
can alert the administrator(s) to any
anomalous events upon the system, from
errors with daemons to intrusion attempts.
Tripwire - installation, configuration, tuning,
daily email updates - Intrusion Detection
System
Configuration check in control panel to make sure you have
sensible and secure options chosen
OpenSSH modification - allow
only SSH2 connections
Rootkit
Hunter - 2 * daily email
updates - rootkit (i.e. hacking) detection
tool
Chkrootkit - 2 * daily email updates - rootkit (i.e.
hacking) detection tool
mod_security - installation, configuration with initial
directives - intrusion detection and prevention
engine for web applications
MRTG - provides server-wide performance graphs
Additional Backup rotation - for local backups (to backup disk),
modification to keep 7 days of daily backups
in addition to the standard single Daily,
Weekly, Monthly
Additional Backup -
secures /etc, /root and MailScanner files
/usr/mailscanner to local backup disk
Enhanced Log Rotation - to do the logs cPanel forgot about
Libsafe - helps protect against buffer overflow,
stack smashing and format string vulnerabilities
Kernel upgrade if necessary
to the latest OS vendor release
Secure /tmp /var/tmp /dev/shm partition or create if required
to help prevent exploitation of the server
through cPanel provided apps
Mailman tuning for
mailing lists to even out load on the
mail server
Hard Disk check to
ensure they're running optimally
Upgrade Vulnerable apps available in the Addon Script Manager
to protect against exploitation of the
server through vulnerable cPanel user
application installations
Update Operating System to latest vendor releases if necessary
Delete unnecessary OS users to reduce security risks
Enhanced path protection to prevent
users from easily browsing system directories
PHP Hardening disables the ability
to load Dynamic Libraries which can be
used to exploit PHP and disables MySQL
persistent links to protect against MySQL
DOS attacks and lessen MySQL load
Exploit check to make sure you
haven't already suffered a server compromise
Exploit cleanup if you've been
infected with a PHP/CGI worm
Initial cPanel configuration if required
MySQL query cache enhances performance
for MySQL driven applications (esp. forums)
|
Add-On
Preise
Unique
IP Addresses, Block of 8 IPs |
8 €/Monat |
Bandwidth
Overcharges |
22 €/Monat
per 50 GB Block |
Softaculous Script Installer (add-on) |
1,80 €/Monat |
RapidSSL and GeoTrust
SSL Certificates |
13,90 €/Jahr,
79 €/Jahr, or 99 €/Jahr |
Work
Order |
64 €/Stunde
(Minimum: 30 Minuten) |
|
|
|