Managed VPS
Your guide to our Managed Virtual Private Servers
UpHostt
Last Update 4 tahun yang lalu
Hardware
Our network is designed with no single point of failure. Each hypervisor is connected
at 20 Gbps and each switch has redundant 40Gbps uplinks. All VPSs are backed by
uninterruptible power supplies and a network SLA of 99.99%.
Our entire network is protected by resilient Anti-DDOS uplinks that provide protection
against volumetric or application specific DDoS attacks of up to 1 Tbps, including Layer
7 protection.
We support IPv6, which is the new standard for IP addresses. Our servers use HTTP/2
as standard.
Network
Our VPS use Dell servers with these specifications:
Processors: Dual Intel Xeon CPU E5-2640 v3 octa-core processors with hyper-threading
for 32 logical cores.
RAM: DDR4 3200 MHz ECC-registered memory.
Storage: Samsung SM 883 enterprise solid-state disks in a resilient RAID 10
configuration with a battery-backed cache.
Our powerful content delivery network uses physical, highly optimised servers around
the world to cache the content of your websites. Customers will connect directly to
multiple CDN nodes instead of directly to our local EU network, resulting in content
being served faster and your websites loading quicker.
CDN
Your server will be located at one of two EU data centres. They are PCI compliant and
ISO/IEC 27001 accredited.
Security is manned 24×7, enforcing a strict access policy, with perimeter fencing and
controlled gate access. All halls require photo ID and swipe card entry and are centrally
monitored by CCTV.
Data Centres
Our Managed VPS is based on the CentOS 7 operating system and web hosting is
managed through our free control panel.
We provide over 70 software packages that can be deployed in seconds. They include:
CMS Made Simple, Concrete 5, CraftCMS, Drupal, Elgg, Joomla!, Opencart, Magento,
Prestashop, WordPress and Zencart.
Software and OS
Malware scans take place daily, and you will be informed of any issues. Files can be
scanned on-demand at any time.
A Web Application firewall will block suspicious activity. It inspects HTTP requests -
including forms - for cross-site scripting, path traversal, SQL injection, trojans and more.
Logins are protected against brute force login attempts, and covered by two-factor
authentication.
Security