ULTI-LAYERED SECURITY FOR YOUR LINUX WEB SERVER
At ReadySpace, we use Imunify360 for your security, a comprehensive security platform for web-hosting servers. It utilizes highly tailored and integrated components for proactive real-time website protection and web server security. It’s not just antivirus or WAF. Imunify360 combines an Intrusion Prevention and Detection system, a Web Application Firewall, Real-time Antivirus protection, a Network Firewall, and Patch Management components. These elements are seamlessly integrated for flawless interoperability that instantly detects, fixes, and protects from any threats that a web-hosting service may encounter.
ROBUST PROTECTION AGAINST CYBER ATTACKS
Imunify360 is a completely automated security solution. It includes a distributed Threat Intelligence approach, which processes data reported by all running Imunify360 instances. Upon first cyber-attack or threat detection, Imunify360 provides instant protection. Moreover, we empowered it with heuristics running in the Cloud to make it even stronger. Servers under Imunify360 protection gain collective herd immunity because they share threat information in real-time. Our sophisticated detection of known and unknown security threats, including the infamous zero-day and distributed brute-force attacks, delivers robust and comprehensive protection for your server.
NEXT-LEVEL PROPRIETARY TECHNOLOGY PROTECTS YOUR SYSTEM FROM KNOWN AND UNKNOWN MALWARE
Imunify360 analyses scripts in real-time and recognizes dangerous execution flows. This means you no longer need to watch CVE lists to identify current exploits. Imunify360 stops malicious PHP scripts, both new and old, preventing them from running on your servers. Innovative PHP Immunity technology makes any web application invulnerable. Additionally, Imunify360 shares data with WAF and antivirus, giving your servers an added layer of protection.
A SIGNIFICANTLY LOWER FALSE POSITIVE RATE IS A TOP PRIORITY
With Imunify360 protection, you can forget about false alarms and keep your business & website protected when it matters most. Our protection makes Imunify360 a must-have for any business.
OUT OF THE BOX LAYERED PROTECTION AT THE NETWORK LEVEL
The Network layer consists of a Web-Application Firewall together with WebShield and a Network Firewall. This layer protects against different web attacks sent via HTTP/HTTPS as regular traffic and from a CDN or Proxy. Each component uses cloud-based information, and many attacks are blocked in real-time. Attackers cannot bypass the protection while collecting information. Additionally, the network layer does not wait for attackers to reach a threshold. Imunify360 offers 360 degrees protection leaving no possibility for the malware to go through to the clients’ servers.
ADVANCED WEB-APPLICATION FIREWALL KEEPS YOUR SERVERS UP & RUNNING
The firewall tightly integrates with ModSecurity web application firewalls supplied by low false positives rules to enhance its usefulness. In combination with WAF, Imunify360 stops the majority of web application attacks even before they start. An advanced Captcha system and Splash Screen are employed to halt malicious activity and ensure valid customers can reach your website.
The WebShield component takes care of CDN and Proxy Traffic by determining the attackers’ real IP-addresses, then differentiates those IP addresses from those of legitimate users. Webshield grey-lists suspicious IPs then provides splash screens and CAPTCHA challenges that prevent malicious requests from harming or even slowing your system.
INTRUSION DETECTION AND PREVENTION SYSTEMS
Lastly, our Network Firewall and Intrusion Detection and Prevention Systems include IP management. This is an Imunify Pluggable Authentication Modules extension, Open Source HIDS Security, and Port Firewall that prevents all system services attacks against FTP, SSH, IMAP/SMTP, etc.
The majority of hosting providers say that remote exploit is a top issue for their customers’ web servers. With IDS and IPS in Imunify360, you will be protected from inside out and outside in.
Imunify360 features an excellent Intrusion Prevention System (IPS) that includes a comprehensive collection of “deny” policy rules that block all attacks. And are effective against those who use custom or well-known exploit tools.
By monitoring server logs, the Intrusion Detection System (IDS) provides excellent visibility of server security. It scans log files from several different angles and bans IPs that show signs of malicious activity. This activity includes password failures, potential exploits, etc., and reports the data Imunify360’s Dashboard.
A real-time file scanner. When a file is loaded into the system, it is scanned. If it is malicious, it is cleaned. This mitigates the destructive effects on an unprotected system and is most helpful for an already infected system.
A background (regular) Antivirus program that performs regular file checks in the background to keep your server clean.
On-Demand Antivirus that can be run at any time by administrators or end-users to check any arbitrary folder against malware.
FILE-SYSTEM LEVEL PROTECTION DURING FILE INPUT/OUTPUT OPERATIONS
The final layer of defense occurs at the File-System level during file input/output operations. The file system is where Imunify Antivirus comes into play.
CLOUD & HERD ANTIVIRUS TO ENSURE YOUR SECURITY
A term we use is “herd immunity” – a collective immunity for our customers based on data related to incidents and attacks accumulated from all Imunify360 instances. We analyze incidents in real-time and produce protection rules we then distribute to all Imunify installations. Once an attacker is identified, we proactively block malicious activity on all servers.
The cloud-based component has a Real-time blacklist server containing blacklisted IP subnets and IPs for specific URL zones used in the WAF RBL module working server-side.
CENTRALIZED THREAT MONITORING MADE EASY
Imunify360 combines WAF, IDS, IPS, Network Firewall, Proactive Defense, and File Antivirus as a single working engine. It shares data amongst all system components and provides a much higher level of protection. United under a centralized incident management system, this is “synergy” not found with separate standard security components installed on the system.
A central dashboard is available directly in your control panel. This lets you check the overall state of your server and manage all aspects of its security. The central dashboard displays all security events, with the latest incidents updated in real-time. The central dashboard is customizable and allows filtering and event selection based on various parameters, review the details of incidents, access white list and blacklist management features, view settings, reports, and much more.