Company Support Client Login Contact
Website Packages Web Hosting Website Improvements
Get a Website with everything your business needs.
Accept credit cards and run your ecommerce business.
Sell 24/7 from your online Store

Order Now
Webhoster Building Confidence and Trust
We understand the trust you place with with your web hosting provider - It's your business.

We ensure quality and reliability beyond what other hosting companys are offering. Network Infrastructure is housed in carrier class network operation centres, meeting NEBS compliance standards. Redundant, high speed multi-gigabit connections, over diverse fibre feeds, provides fault tolerance and ensures robust data transfers.
  1. First tier, network hybrid firewall with multilayer intrusion detection, ensures optimal security
  2. Network framework is based on high powered routers and multilayer gigabit switching technology
  3. Redundant content distribution devices, coupled with proprietary integration technology, collectively forms the solution
  4.’s proprietary innovation maintains a redundant hybrid UNIX and Windows web hosting clustered server platform
  5. A redundant mail architecture, includes the segmentation, and isolation of MTA, MDA and MUA offerings
  6. Redundant database clusters support all major database flavours which transparently integrates into the total solution
  7. Redundant e-commerce clusters ensure all online store fronts are selling merchandise
  8. Backup solutions incorporate both conventional tape archives as well as secure offsite storage
  9. Clustered NAS (Network Attached Storage) arrays ensure reliability and 100% data integrity
Webhoster Perimeter security via multi-tiered firewalling's servers are protected with software-based firewalling. These look at source and destination addresses, and source and destination ports. Security administrators handle all aspects of firewall management.

Our engineers are familiar with many types of firewall applications, including CheckPoint, ipchains, ipfw, ipfwadm, etc. We are able to modify response packets with masquerade responses to the remote initiator. Our systems are secured using the latest security methods including router access list filtering on inbound carrier feeds and firewalling at the SYN level on internal devices.

Webhoster Monitoring security systems and processes
All security systems are tested on a monthly basis. We use security scanners such as Nessus, (, and SAINT, ( Automatic updates are instantly made with the latest exploit/DOS, (Denial of Service), check codes. This provides us with an accurate and detailed report on our systems. Our security team is also subscribed to all the major security mailing lists, including BUGTRAQ from These lists provide access to the latest security information, which enables us to patch newly found exploits within hours of their discovery.

Webhoster Intrusion Detection
We currently use a number of intrusion detection applications such as SHADOW and TRIPWIRE, along with our own proprietary monitoring and logging systems. These systems notify our security response team during scans and potential DOS attacks. We react to these situations immediately, modifying ACLs as needed. In certain cases rules are implemented automatically during detection.

All suspicious activity is logged hardcopy directly to a printing station which is monitored closely. This ensures there is no tampering with conventional softcopy logs.

Webhoster Anti Virus Measures
Our systems are protected against viruses by extensive built-in access controls. Regular users are unable to access or damage system files.

Webhoster Offsite Backups
Automated offsite secure storage backups to our mirrored storage arrays in the southern US are conducted through secure encrypted tunnels using SSH with confidential data encryption prior to transit.

Webhoster Disaster Recovery Procedure
Our disaster and recovery site is currently located in the South Eastern United States. This site is for the sole purpose of emergency fail over. This NOC is capable of handling all traffic in case our eastern operations is interrupted, however we have taken every precaution necessary to ensure our services will be available under all circumstances. This site is also set up in a redundant, robust, high availability clustered environment. This allows multiple equipment failures with zero degradation in service. All sites are designed and implemented as exact duplicates to ensure the operating environment remains the same. users are unable to access or damage system files.

Webhoster Recording and determining access to data
Every employee with access to internal computer interfaces that includes customer data is assigned a unique username, ID number and password. Access to customer data is restricted based on the responsibilities of each employee. Each user is assigned an appropriate access level. Employees are only granted access to information that is essential for them to efficiently perform their job requirements. The actions of each individual on the computer system are recorded and logged by employee ID number.

Printed documents that include sensitive customer information are protected in locked file cabinets. An access control system that uses key fobs restricts access to server rooms and programming areas. Individuals are granted access to these areas only if it is essential for them to effectively perform their responsibilities.

Our practices regarding the protection of customer information are captured in our Privacy Policy. The Privacy Officer is responsible for ensuring the responsible management of all customer information.

Webhoster Passwords
All passwords must be changed from vendor-supplied defaults upon initial use. To ensure the effectiveness of security parameters, we recommend a combination of uppercase letters, lowercase letters, numbers and symbols for each password. Employee passwords are regularly tested to ensure that they are not easily compromised.

Webhoster Blackout 2003 - Zero Hosting Downtime

On August 14, 2003 approximately 4:14 EST a blackout occured on Eastern portion of the North American continent. All electrical service ceased to function. As a result our Emergency Plan was put into action. As part of our plan to ensure continuity for all critical aspects of our service we have achieved the following:

  • All traffic was instantaneously rerouted. As a result we have experienced no downtime in any of the hosting services.
  • All of our systems were being powered by our two redundant diesel generators to ensure 100% uptime of the servers and the network; There were gas trucks on order to replentish fuel if needed
  • Our Florida network facility is completely functional due to our geographic dispersion strategy.
  • While our Head Office and Technical Support Office in Toronto functioned in degraded mode and was operating under our backup power generation system.

In summary, all of your customers experienced continuous service for their hosting and email during this time of crisis. We are serious about our hosting.

Webhoster Tour the Internet Data Centre
Home | Legal | Client Login | Getting Started | Transfer to Us | Sitemap | Contact Us
Copyright © 2007 All Rights Reserved. is registered under JGM Enterprises, used with permission.
Other marks referenced herein are the property of their respective owners.