Guides and tutorials

Hundreds of tutorials and step by step guides carefully written by our support team.

Reports and Certificates of Services

In this section you will be able to view, download, and request both the Certificates of Services, as well as the security reports that you have previously requested from your Advanced Security New Generation section.

How do I access the Service Reports and Certificates menu?

To access the menu click on "Reports and Services Certificates" in the drop-down that will open when you place the pointer over your name or the name of your company and that you will find in the upper right corner of the SW Panel.

- Captura 1 (acceso al menú)

What are the Service Certificates?

They are documents of an administrative nature used to verify a specific event and establish that the document has been complied with.

Types of Certificates:

  1. Certificate of Elimination of Services: In compliance with current legislation on data protection, and national laws (_ LOPDGDD _) and European (_ RGPD _) in the treatment of the data of our clients, SW Hosting is committed to eliminate completely and permanently all the data hosted in the services at the moment they are deleted by the client.

    enter image description here

    The data elimination certificates are an express and written certification of said commitment, both with current laws and with the client.

  2. Data Location Certificate: Certifies the physical location of the customer's service, detailing the name of the service in particular, its IP, the date of creation of the service, the Data Center where it is located and the population/country where this Data Center is located

  3. Data Protection Certificate - ISO27001: Expressly and in writing certifies SW Hosting's compliance with the current laws in force regarding European data protection (RGPD), as well as certification ISO27001 of Information Security Management Systems that SW Hosting owns. You can, if you wish, download the certificate, issued by the company BSI (British Standards Institution)

How do I generate my Service Certificates?

Regarding the certificates of data location and data protection, the way to request them is as follows:

Within your SW Panel, you must access the services tree, from the left side menu in blue, and click on the service you want request the certificate

Once inside the service, you must select the "certificate" icon that is at the top, inside the section "Reports"

Select the type of certificate you want from the drop-down menu, enter the required information (name and NIF) and click the green button "Apply now"

These certificates are generated immediately, so once requested you will be able to view and/or download from your SW Panel.

Regarding the certificate of data deletion, only the option will appear when you make the [cancellation of a service] https://www.swhosting.com/es/comunidad/manual/solicitar-baja-de-un-servicio)

At the moment of requesting it, you must accept the checkbox that will appear at the end of everything, inside a blue box, and end the request to cancel the service:

Once the service has been completely eliminated, you will have your certificate available in the SW Panel.

How do I download or visualize my Service Certificates?

In order to download your certificates you should only go to the Manage option, located to the right of the corresponding certificate, and click on the option you want.

- Captura 2 (Certificados de servicios con la pestaña señalizada y el menú gestionar abierto).

What are Security Reports?

Security reports are documents that detail the vulnerabilities of the analyzed server, as well as the malicious network traffic received or sent from the services hosted on your server.

In this section you can check the security reports that you previously requested through the security section of your SW Panel, or even request a new one from here if you wish. You will be able to request a report of Network or Perimeter Security and Vulnerabilities of your Cloud server system in a short period of time, maximum 6 hours.

- Captura 3 (Pestaña de Informes de seguridad señalizada)

In this section, we can find different types of security reports:

Automatic Reports

These types of reports are created automatically if you have contracted with us our high level advanced security. In these reports, therefore, a summary and a list of the threats detected by our security service are presented. In the first place, the threats that have been blocked correspond to the chosen sensitivity. Subsequently, the threats that have been registered but on which our automatic system has not taken any additional measures are presented.

ejemplo de una pagina del informe automático

Reports of Vulnerabilities

The third part of this report presents the results of an exhaustive vulnerability scan performed on each of the hosts included in this report. The results of this scan discover security gaps that currently exist and offer necessary information for their prompt solution.

ejemplo de una pagina del informe de vulnerabilidades

Network Analysis Reports

Our Next Generation Firewall allows you to discriminate traffic according to the application that originated it. This exclusive feature of a layer 7 firewall allows you to prevent threats, apply specific solutions and detect risk points with much more efficiency.

ejemplo de una pagina del informe de Análisis de Red

For more information you can consult the manual "Security" where we analyze in more detail all the options available to you this sense

Your privacy is important for us
We use our own cookies for the proper functioning of the site. In addition, third-party cookies are used for analytical purposes only. This information is not associated with any person so that personal identifying data is not stored, but is only information that is collected to identify the session, with the aim of facilitating the analysis of the website. You can change your preferences at any time by entering this website again. For more information about our cookie policy you can visit our Cookies. You can press the "Accept and close" button to give us your consent or you can access more detailed information and manage cookies.
Your privacy is important for us
We use our own cookies for the proper functioning of the site. In addition, third-party cookies are used for analytical purposes only. This information is not associated with any person so that personal identifying data is not stored, but is only information that is collected to identify the session, with the aim of facilitating the analysis of the website. You can change your preferences at any time by entering this website again. For more information about our cookie policy you can visit our Cookies. You can press the "Accept and close" button to give us your consent or you can access more detailed information and manage cookies.