We understand that security is foundational to ensuring an effective, reliable solution, and therefore should play a key role in the design of your solution. We have designed our service offerings on the belief that your solution’s security must come first.
We offer a multi-layered approach in which each layer is mutually exclusive. Our security suite is designed to progressively weaken an attack.
Always and easily get through to an expert by phone
We work in small teams so we always get to know you and your business
All our team are experts in their field
20 minute response times for priority 1 requests
Our team monitor and react to issues proactively
British Airways’ global audience means that traffic spikes can occur at any time of the day or night. Hyve’s cloud platfo... More
Running several sites for Tesco is a unique challenge when it comes to hosting, as with the click of a button potentially mil... More
A very friendly and highly technical team available to extend all possible help at any time. Excellent services – all issue... More
My experiences with Hyve have been very good. The response time is quick so you don't spend your time on a telephone waiting.... More
It’s reassuring to know that Hyve will take care of everything server-side so we can focus on doing what we do, building th... More
I like working with Hyve because they are honest, transparent and down to earth.They have a knack for taking even the most co... More
As a start up, we knew nothing of servers and hosts and went with the first one that was recommended. They were based in the ... More
Carluccio’s selected Hyve to host www.carluccios.com, and also manage its online ecommerce and website security. The site p... More
Hyve provides Safestore’s hosting and runs their specialist CMS to provide them with a fast and reliable solution.... More
Distributed Denial of Service (DDoS) attacks have risen dramatically over the past few years. Hyve’s DDoS Defence System delivers a complete system to protect your business against malicious attacks.
Places a layer of security between your organization and the Internet. All inbound data traffic flows to a firewall(s), which filters traffic based on your specified requirements, detecting and deflecting unwanted attempts to penetrate your server security. We provide a variety of standard security policies, and we will work with you to develop custom policies that address the specific requirements of your solution.
A secure hosting solution with an SSL (Secure Sockets Layer) Certificate ensures that your website is secured, and encrypts all sensitive information such as usernames and passwords.
The VPN encrypts all traffic between two internet points, providing secure communication channels for individual users, user groups, contractors, vendors and remote offices. Our Managed VPN also aids in providing a high level of data integrity and protects key corporate information assets.
Real-time network threat awareness and continuous vulnerability discovery must provide the critical information that allows IT staff to make better decisions about risk, faster.
Penetration testing helps to protect websites and web applications against attacks from hackers and cyber criminals.
By analyzing the website, the scan software identifies possible security holes and vulnerabilities, then creates a detailed report which developers can use to repair any problems.
Two factor authentication is an extra layer of security that all businesses should enforce to ensure online security
Passwords are under constant risk of compromise from various techniques such as brute force, spyware, viruses or through social engineering. Requiring a second factor of authentication significantly increases your system security. System access is granted only upon successful authentication of both factors.
Hyve was among the first to achieve Level 2 PCI Certified Service Provider status and is an active member of the PCI Security Standards Council. The PCI DSS standard provides a definitive set of requirements for merchants seeking to maintain PCI DSS compliance
The security community has identified three key categories of paramount security concerns; People, Technology, and Operations
Within any organisation, statistically, people are the weakest link in the security chain. Hyve requires all staff members to undergo comprehensive background checks to ensure your confidence in our team. Using thorough security training,
Even with the best business model, a security flaw can threaten your solution’s Confidentiality, Integrity and Availability (CIA). Our security services suite is designed to go beyond industry standards and maintain the CIA of your solution.
Operational Security is best described as a culture. Hyve believes in and fosters this culture across all levels of our organisation. Operations are the actions associated with policies and procedures. Even our minimum facility and network requirement policies go far beyond that of standard hosting providers.
Our fully redundant data center and network infrastructure will give you peace of mind, even under extreme circumstances. All of our policies are designed with security in mind. We can integrate your policies with ours, allowing for customised responses for any situation. Hyve can even provide your business with policy templates should your business require them.
Hyve employs strong access control measures across multiple aspects of our operations. Some of these include: security entry cards, biometric hand scanners, thin clients, two factor authentication, email encryption of sensitive data, and PIN number verification for account access.
Hyve are 100% carbon neutral. We use carbon offsetting to balance out the release of carbon dioxide from our offices and infrastructure.