10-01-12 | Blog Post

Announcing: Your Complete Technical Security Toolkit

Blog Posts

What’s in your technical security toolkit? Each tool covers different aspects of your hosting environment and ensures server and database protection. By taking a layered approach to security, you can cover all of your bases and prevent a data breach.

At Online Tech, we’ve unveiled our IT security toolkit we recommend to any industry concerned with data confidentiality, privacy and integrity. All of the managed services are required by PCI DSS (Payment Card Industry Data Security Standard) for organizations that accept, transmit or process credit cardholder data, and they are highly recommended for HIPAA (Health Insurance Portability and Accountability Act)/HITECH (Health Information Technology for Economic and Clinical Health); organizations that deal with protected/patient health information.

Click on each to learn more:

Technical Security Services

daily-log-review Daily Log Review
While some PCI hosting providers may offer logging (tracking user activity, transporting and storing log events), Online Tech provides the complete logging experience with daily log review, analysis, and monthly reporting.
file-integrity-monitoring File Integrity Monitoring (FIM)
Monitoring your files and systems provides valuable insight into your technical environment and provides an additional layer of data security. File integrity monitoring (FIM) is a service that can monitor any changes made to your files.
web-application-firewall Web Application Firewall (WAF)
Protect your web servers and databases from malicious online attacks by investing in a web application firewall (WAF). A network firewall’s open port allows Internet traffic to access your websites, but it can also open up servers to potential application attacks (database commands to delete or extract data are sent through a web application to the backend database) and other malicious attacks.
two-factor-authentication Two-Factor Authentication
Online Tech offers two-factor authentication for VPN (Virtual Private Network) access as an optimal security measure to protect against online fraud and unauthorized access for clients that connect to their networks from a remote location.
vulnerability-scanning Vulnerability Scanning
Vulnerability scanning checks your firewalls, networks and open ports. It is a web application that can detect outdated versions of software, web applications that aren’t securely coded, or misconfigured networks. If you need to meet PCI compliance, you need to run vulnerability scans and produce a report quarterly.
patch-management Patch Management
Why is patch management so important? If your servers aren’t updated and managed properly, your data and applications are left vulnerable to hackers, identity thieves and other malicious attacks against your systems.
anti-virus Antivirus
Antivirus software can detect and remove malware in order to protect your data from malicious attacks. Significantly reduce your risks of data theft or unauthorized access by investing in a simple and effective solution for optimal server protection.
ssl-certificate SSL Certificate
In order to safely transmit information online, a SSL (Secure Sockets Layer) certificate provides the encryption of sensitive data, including financial and healthcare. A SSL certificate verifies the identity of a website, allowing web browsers to display a secure website.

Technical security is just one aspect of a complete security solution – the physical security of your hosting environment and administrative security (policies, contracts, and staff training) allow for ultimate security. Read more about our Physical Security and Administrative Security.

Not sure what the PCI requirements, or HIPAA hosting requirements are? Download and read our PCI Compliant Hosting white paper, or our HIPAA Compliant Hosting white paper.

Overwhelmed by cloud chaos?
We’re cloud experts, so you don’t have to be.

© 2024 OTAVA® All Rights Reserved