Security Services
We understand that security is foundational to ensuring an effective, reliable solution, and therefore should play a key role in the early design of your solution. We have designed our service offerings on the belief that your solution’s security must come first. To ensure the security of your critical digital assets we utilise a methodology known as ‘Defence in Depth’.
Defense in Depth is a practical strategy for achieving the highest possible Information Assurance (IA) with the least possible sacrifice, commonly known as the balance of risk versus reward. This model follows a multi-layered approach in which each layer is mutually exclusive. Security controls are designed to progressively weaken an attack.
The security community has identified three key categories of paramount security concerns; People, Technology, and Operations.
People
Within any organisation, statistically, people are the weakest link in the security chain.
Hyve requires all staff members to undergo comprehensive background checks to ensure your confidence in our team. Using thorough security training, our staff maintains privacy and best practices from initial setup through daily operations.
Hyve’s support and security staff are certified professionals that are available to assist you 24/7/365 to ensure the security of your solution.
Technology
Even with the best business model, a security flaw can threaten your solution’s Confidentiality, Integrity and Availability (CIA). Our security services suite is designed to go beyond industry standards and maintain the CIA of your solution.
-
Perimeter Defense Layer
Firewall/VPN, Distributed Denial of Service (DDoS) protection, and 2-Factor Authentication
-
Network Integrity Layer
Monitoring, Intrusion Detection System (IDS), Multi-tier Architecture, and Event Management
-
Content Filtering Layer
AntiMalware, AntiSpam, and Web Application Firewall
-
Host Security Layer
Secure configuration assessment, Patch Management, Intrusion Prevention System (IPS), System Integrity monitoring, AntiMalware, and Vulnerability Assessment
-
Data Protection Layer
Database Encryption, File Encryption, and Backup encryption
Operations
Operational Security is best described as a culture. Hyve believes in and fosters this culture across all levels of our organisation.
Operations are the actions associated with policies and procedures. Even our minimum facility and network requirement policies go far beyond that of standard hosting providers. Our fully redundant data center and network infrastructure will give you peace of mind, even under extreme circumstances.
All of our policies are designed with security in mind. We can integrate your policies with ours, allowing for customised responses for any situation. Hyve can even provide your business with policy templates should your business require them.
Hyve employs strong access control measures across multiple aspects of our operations. Some of these include: security entry cards, biometric hand scanners, thin clients, two factor authentication, email encryption of sensitive data, and PIN number verification for account access.
Security Services
To learn about our wide range of security services, please click a heading below.
- Continuous Audit
- Data Encryption
- Event Management
- Firewall & VPN Services
- DDoS Defense System (DDS)
- Intrusion Detection System (IDS)
- Intrusion Prevention System (IPS)
- Malware Protection
- Patch Management Services
- PCI DSS Compliance Solutions
- Two Factor Authentication
- Vulnerability Assessment Services
Contact Us
If you would like more information regarding our enterprise cloud hosting solutions, please complete our contact form or call us directly on 0800 612 2524.













