How It Works

1. Identify Security Issues

When your site is compromised, our team immediately assesses the damage. Our automated scripts and professional security analysts work quickly to understand your environment and locate infections and their impacts. Our research-driven tools keep us on top of emerging threats and security issues so we can clean them faster than the competition.

 

  • CMS & extensions used on your site
  • Known issues and anomalies in source code
  • Current versions of your website software
  • Integrity issues against a known good baseline
  • Malware infections and indicators of compromise

2. Remediate Security Issues

Our Security Analysts are available 24/7/365 to clean your website when it’s hacked. We offer plans based on guaranteed response time, though our team typically responds much faster than advertised. This allows you to get back to the things you most care about. All plans offer unlimited malware removal requests during the lifetime of your subscription.

 

  • Remove & repair malware infections
  • Check the integrity of your website
  • Remove blacklist warnings from your website
  • Repair brand reputation issues in search engine results
  • Advise you on available updates and post-hack steps

3. Configure for Continuous Monitoring

Website security is a constantly changing landscape. New methods of attack are always emerging. Our first step is to establish a known good baseline of your website so that we can create a security plan to clean and protect your unique sites. We generate audit reports in your dashboard and alerts so you can stay informed about the health of your site.

 

  • Server-side scanner PHP file on your server
  • Monitoring for changes to DNS records
  • Monitoring for changes to WHOIS records
  • Uptime alerts
  • Monitoring for SSL certificate changes

4. Deploy Protection Platform

New malware infections, bots, and scanners are emerging every day. You can combat these by using our protection platform to surround your website using military-grade defensive technology. Never fear a hack again when you have our robust firewall safeguarding your traffic, visitors, and reputation from the constantly evolving world of cyber threats.

 

  • Blocks DDoS attacks (Including Layer 7 HTTP-Flood attacks)
  • Protects against brute force attacks
  • Stops website attacks & hacks
  • Prevents malware infections
  • Zero Day immediate response patching

5. Configure Performance Optimization (CDN)

A big concern with any website security implementation is the impact on website performance. Rest assured that the changes and monitoring services will dramatically improve page speed and performance. This not only includes optimizing how your website loads for visitors, it also significantly decreases the load placed on your web server and its available resources.

 

  • Set content delivery network for optimal site performance
  • Preferred compression settings to enhance site speed
  • Globally-distributed Anycast network (GDAN)
  • 6 global points of presence (PoP)
  • URL query string and caching location rules