In this section you will be able to view, download, and request both the Certificates of Services, as well as the security reports that you have previously requested from your Advanced Security New Generation section.
To access the menu click on "Reports and Services Certificates" in the drop-down that will open when you place the pointer over your name or the name of your company and that you will find in the upper right corner of the SW Panel.
They are documents of an administrative nature used to verify a specific event and establish that the document has been complied with.
Certificate of Elimination of Services: In compliance with current legislation on data protection, and national laws (_ LOPDGDD _) and European (_ RGPD _) in the treatment of the data of our clients, SW Hosting is committed to eliminate completely and permanently all the data hosted in the services at the moment they are deleted by the client.
The data elimination certificates are an express and written certification of said commitment, both with current laws and with the client.
Data Location Certificate: Certifies the physical location of the customer's service, detailing the name of the service in particular, its IP, the date of creation of the service, the Data Center where it is located and the population/country where this Data Center is located
Data Protection Certificate - ISO27001: Expressly and in writing certifies SW Hosting's compliance with the current laws in force regarding European data protection (RGPD), as well as certification ISO27001 of Information Security Management Systems that SW Hosting owns. You can, if you wish, download the certificate, issued by the company BSI (British Standards Institution)
Regarding the certificates of data location and data protection, the way to request them is as follows:
Within your SW Panel, you must access the services tree, from the left side menu in blue, and click on the service you want request the certificate
Once inside the service, you must select the "certificate" icon that is at the top, inside the section "Reports"
Select the type of certificate you want from the drop-down menu, enter the required information (name and NIF) and click the green button "Apply now"
These certificates are generated immediately, so once requested you will be able to view and/or download from your SW Panel.
Regarding the certificate of data deletion, only the option will appear when you make the [cancellation of a service] https://www.swhosting.com/es/comunidad/manual/solicitar-baja-de-un-servicio)
At the moment of requesting it, you must accept the checkbox that will appear at the end of everything, inside a blue box, and end the request to cancel the service:
Once the service has been completely eliminated, you will have your certificate available in the SW Panel.
In order to download your certificates you should only go to the Manage option, located to the right of the corresponding certificate, and click on the option you want.
Security reports are documents that detail the vulnerabilities of the analyzed server, as well as the malicious network traffic received or sent from the services hosted on your server.
In this section you can check the security reports that you previously requested through the security section of your SW Panel, or even request a new one from here if you wish. You will be able to request a report of Network or Perimeter Security and Vulnerabilities of your Cloud server system in a short period of time, maximum 6 hours.
In this section, we can find different types of security reports:
These types of reports are created automatically if you have contracted with us our high level advanced security. In these reports, therefore, a summary and a list of the threats detected by our security service are presented. In the first place, the threats that have been blocked correspond to the chosen sensitivity. Subsequently, the threats that have been registered but on which our automatic system has not taken any additional measures are presented.
Reports of Vulnerabilities
The third part of this report presents the results of an exhaustive vulnerability scan performed on each of the hosts included in this report. The results of this scan discover security gaps that currently exist and offer necessary information for their prompt solution.
Network Analysis Reports
Our Next Generation Firewall allows you to discriminate traffic according to the application that originated it. This exclusive feature of a layer 7 firewall allows you to prevent threats, apply specific solutions and detect risk points with much more efficiency.
For more information you can consult the manual "Security" where we analyze in more detail all the options available to you this sense