Author Archives: Josh

Cloud Hosting Security


With the Cloud now being seen as the defacto standard in enterprise computing, many are beginning to question the security of the environments provided and what steps have been taken to protect now just their servers, but also the data that they are hosting. Here we will look at what are some of the perceived threats to Cloud users and how the risk of these threats can be reduced.

User access levels

It is the responsibility of Cloud vendors to make sure that staff members are only assigned the access level to the environment that is necessary for them to perform their jobs, therefore preventing them from having access to information that could be classified and isn’t necessary for them to fulfill their roles.  This would mean providing support staff with access to the hardware infrastructure only, rather than with full administrator access that could offer them a way into Cloud VMs.  On occasions there have been attempts by staff members who have been provided with a level of access that goes well beyond their authority to access and steal data for personal gain, whether this is for the purpose of whistle blowing or selling private strategic documents to rivals.  In other situations where support employees have been assigned access levels well beyond what they require, inexperienced workers have made mistakes whilst performing specific tasks that have led to huge data loss and downtime.  In short, as a Cloud hosting provider you should ensure that employees are provided with the correct access because their actions, malicious or not, could end up damaging your business and brand as well as customer confidence. read more

Zimbra or Exchange email servers – which is better?

Email servers are an important consideration for businesses regardless of size because email constitutes a form of communication that is used by employees to communicate with one another much in the same way that they will be using it communicate with customers. As email is likely to be one of the most used IT components in your business, it is important for you to invest in an infrastructure that will be able to handle every message that you receive and can offer the capacity required by your employees for the storage of their messages. In an enterprise environment there are two servers that provide a number of features based around a core email platform, these being Zimbra and Microsoft Exchange Server. Whilst Zimbra is available as an open source platform, both email servers offer commercial variants for larger organisations; here we will discuss the commercial variants and the features offered, concluding with which is the best system. read more

Why are Bodhost dedicated servers the best for resource intensive websites?

Resource intensive websites often come about as a result of high demand and popularity. A resource intensive website requires a high specification dedicated server if it is to remain available because a hosting environment capable of dealing with the loads experienced is a necessity. Bodhost offers a range of dedicated servers to cater to businesses of all sizes; with dual core dedicated servers aimed at small businesses and servers that featuring dual processors for the most resource intensive of applications. Whilst choosing a high specification dedicated server from the outset might be one way of playing it safe, you will find that you are lumped with large allocations of resources that you aren’t using and therefore you’re wasting money. Choosing Bodhost for dedicated server hosting will give you access to a sales team that will work with you to fully evaluate your requirements in order to deliver a solution that is tailored specifically to your needs. read more

Does Bodhost support CDN – Content Delivery Networks?

bodHOST CDN Servers

Content delivery networks are large networks of servers distributed around the Internet with the sole intention of serving the content of third parties to end-users. This content can take the form of website media including graphics and sounds, downloadable items such as software and documents, live streaming services and social networks. CDNs are most beneficial to organisations running websites where the average visitor is demanding large amounts of data because CDN networks are specially optimised to cope with these large data requests; furthermore, outsourcing CDN services to external suppliers gives organisations a chance to reduce their hosting bills. Rather than having the servers on which a CDN runs based in a single data centre, these servers are often distributed throughout multiple data centres for improved performance and redundancy. If there is an issue with one data centre that is impacting the CDN for example, the servers in other data centres can meet the shortfall in power until the situation is rectified. In terms of performance, distributing the CDN around the world means that users from different parts of the globe can be served content from the server that geographically closest to them so that they aren’t faced with slow access speeds. read more

How to build a data centre in the Cloud?

Using the eNlight Cloud platform, you are effectively able to develop your own data centre within the context of a Cloud hosting environment. eNlight is an Infrastructure as a Service (IaaS) solution that hosts Cloud virtual machines, but also offers a range of additional features that allows you to network your VMs together much in the same way that you would with physical dedicated servers in a data centre. Being able to connect servers together is intrinsically important if you want to achieve particular configurations, for example if you are looking to achieve a load balancing setup in the Cloud then you would need to network all of these servers together so that they can communicate with one another effectively in order for traffic to be routed to the right location. Furthermore, allowing your VMs to communicate through an internal vLAN improves the security of your data, as it will be incredibly hard for hackers to eavesdrop on these connections. read more

How does server mirroring work?

Server mirroring is a method of backup that can be used to ensure that if your primary server fails, there will be another server available to fulfill the role of the server that has crashed. Server mirroring solution works by ensuring that the two servers are in constant synchronisation so that the failover server always has a copy of all the data hosted on the primary machine; this means that in the event that the secondary server has to take up the role of the primary server, when the automatic switchover occurs you won’t notice any difference because the most recent copies of all of your data will be accessible. There are a number of different ways in which server mirroring can be implemented; for example, if you are going to be utilising two servers on the same site then technologies such as RSync that will synchronise your data across the local network will meet your requirements, whilst Cross Platform Disaster Recovery solutions will be more beneficial for scenarios where hosting the backup environment elsewhere is necessary. read more

Is Private Cloud Storage Secure?

A Private Cloud environment gives organisations their own cloud infrastructure to use as they wish. Unlike the Public Cloud with which you have to share the Cloud infrastructure with other users, the Private Cloud is completely isolated and is developed to meet the specific needs of an organisation. One of the most common reasons for customers choosing Cloud hosting is the amount of storage that the environment can achieve. One of the biggest demands of any modern business is storage capacity as crucial business information is stored electronically more often than not, and when you consider the number of documents the average business has archived, that can add up to a massive storage requirement. Whilst Cloud hardware nodes take care of the hosting of the Virtual Machines themselves, storage is handled by specific machines known as SANs (Storage Area Networks); the purpose of hosting storage separately to the main hardware nodes is that SANs can provide greater redundancy for critical business information along with greater data security. read more