20-22 Wenlock Road
London, UK N7 NG1
+44 203519 2171
[email protected]
[email protected]



ONEHOST CLOUD DATACENTERS


European Datacenter

Located in France, this is our main datacenter where the majority of our infrastructure resides. Global 11 Tbps internet links ensure high bandwidth & performance. Other datacenters located around the world include Australia and Singapore


Overview

OneHost Cloud has strict adherence to selecting a datacenter for our cloud hosting services. The criteria must be met in order for our management team to consider such locations. All datanceters must have power redundancy with multi-level redundant backups for all production services, security standards in accordance with ISO 27001:2005 and minimum 250kVA UPS devices


Datacenters

Physical Security

  • Our Datacenters are under strict controls – servers can only be physically accessed by authorized employees
  • Access restricted by security badge control system, video surveillance and security personnel 24/7 on-site
  • Rooms fitted with smoke detection systems
  • Technicians on site 24/7
  • Multiple authentication protocols
  • Background checking on all staff

Network Security

The OneHost Cloud network enables the delivery of impeccable quality of service to all customers, regardless of their location.

OneHost Cloud builds its network in a redundant manner, allowing multiple security measures to be put in place to minimize any risk of failure. The redundancy of links also enables your data to take the shortest path and benefit from minimum latency.

Datacenters


High Availability Infrastructure

  • Systematic double power supply
  • 250 kVA per UPS device
  • Generators with an initial autonomy of 48 hrs
  • Minimum of 2 network connections to and within the datacenter, 2 network rooms capable of taking over from one another
  • Advanced network capacities: 10Gb+ and 40Gb+ connectivity on main network

Compliance with international standards

Datacenters must meet the minimum standards are set by the following :-

  • Is certified ISO 27001:2005 for providing and operating dedicated cloud computing infrastructures
  • Is based on the ISO 27002 and ISO 27005 security management and risk assessment norms and associated processes
  • Has obtained SOC 1 and 2 type II certifications for all datacenters and completed detailed network assessments on the security and capacity requirements as set by OneHost Cloud




Analyze the Environment

You typically need to look at several categories of information to adequately assess your control environment. Ultimately, you want to identify threat prevention, mitigation, detection, or compensating controls and their relationship to identified threats.



Determine Rating

Now, you need to determine the likelihood of the given exploit taking into account the control environment that your organization has in place.



Our Business Partners

We only work with and select the best in technology partners and are proud to work with some of the best technology partners to help maintain our business to provide exceptional solutions to our clients.


cloudflare logo
openstack logo
vmware partner LOGO
logo-rh
Veeam
cpanel-logo
cloudlinux logo
ovh logo
vmware nsx

What is Risk ?


Understanding what is risk when used in hosting and Cyber Security is important to adequately ascertain the processes and guidelines in the form of risk assessments. We have compiled a quick overview on what is risk below.

Risk is the potential of an undesirable or unfavorable outcome resulting from a given action, activity, and / or inaction. The motivation for “taking a risk” is a favorable outcome. “Managing risk” implies that other actions are being taken to either mitigate the impact of the undesirable or unfavorable outcome and / or enhance the likelihood of a positive outcome.

For example, a venture capitalist (VC) decides to invest a million dollars in a startup company. The risk (undesirable outcome) in this case is that the company will fail and the VC will lose part or all of her investment. The motivation for taking this risk is that the company becomes wildly successful and the initial backers make a great deal of money. To influence the outcome, the VC may require a seat on the Board of Directors, demand frequent financial reports, and mentor the leadership team. Doing these things, however, does not guarantee success. Risk tolerance is how much of the undesirable outcome the risk taker is willing to accept in exchange for the potential benefit, in this case, how much money the VC is willing to lose. Certainly, if the VC believes that the company was destined for failure, the investment would not be made.

Conversely, if the is VC determined that the likelihood of a three-million-dollar return on investment was high, she may be willing to accept the tradeoff of a potential $200,000 loss. This combined with Cyber Intelligence from OneHost Cloud will allow businesses to feel safe from threats and malicious actors.