Guides and tutorials

Hundreds of tutorials and step by step guides carefully written by our support team.

Security

What is Information Security ?

Computer security or cybersecurity according to ISACA (Information Systems Audit and Control Association) is the protection of information assets, through the treatment of threats that put at risk the information that is processed, stored and transported by the information systems that are interconnected.

How do I go to the Security menu ?

The Security Dashboard allows you to quickly view all the options related to the security of your services.

To go to this section, click on the "Security" option, located in the side menu of your SW Panel.

enter image description here

Security Dashboard

From the following Dashboard you will be able to see some data about the security of your services and the different graphs about the detected threats.

enter image description here

You can obtain a report by clicking on "Request a report now", then choosing the type of report you want and the email address where it will be sent. There is a small charge for the report.

enter image description here

enter image description here enter image description here

enter image description here

Security Dashboard: Threats addressed by Next-Generation Security

This option is only visible for customers with active Next Generation Security. It shows a top 10 of threats received or originated by type, country of origin, severity and total.

To activate Next Generation Security, you must follow the steps below:

  1. Inside your SW Panel use the search engine to find your Cloud, in our case it is called manuals-server, yours will have a different name. Once you find it, select it.

    enter image description here

  2. Next, go to the "Available Upgrades" section and select "Next Generation Security":

    enter image description here

    From here you will see that there are three different types of security:

  • Micro, Basic and Standard. The difference between them are:

    Basic Standard Advanced Managed
    Real time analysis
    Attack notifications instantly in SW Panel
    Sending automatic reports - Monthly
    Sending automatic reports - Weekly
    Free additional reports - 2 8 10
    Real time threat blocking management
    Real time blocking
    Low severity threat blocking
    Medium severity threat blocking
    High severity threat blocking
    Configurable lock level
    Analysis data
    Security dashboard
    Threat map
    List of threats
    Comprehensive detail of threats
    Service traffic
    Files
    Logs analyzed in the report
    Traffic (summary)
    Threats
    Authentication
    Active locking modules
    Threats
    Authentication
    Files
    Additional services included
    Free vulnerability scan - 1 2 4
    On demand, paid vulnerability scanning Ilimitados Ilimitados Ilimitados Ilimitados
    PCAP (Packet Capture) Download
    Periodic security audit
    Quarterly meeting
  1. To continue, select the type of security you want:

    enter image description here

  2. Once selected, you must formalize the payment:

    enter image description here

When your Next Generation Security is activated, you will see in your service tree, your Cloud server with a shield on the right and the description "This service has a subscription to a Next Generation Security Level". If you click on the shield, you will access the Next Generation Security menu for Name of your Cloud Server, which we will explain below.

Next Generation Security menu

In this menu you will be able to see graphs about the types of threats received and protocol used. In addition you can also see if any threat is generated from your server.

enter image description here

enter image description here

In the Threats tab, you will be able to see the threats in general, both those received and those generated by your own server.

enter image description here

In Security Reports, you will be able to request a Network or Perimeter Security and Vulnerabilities report of your Cloud server system in a short period of time, maximum 6 hours.

enter image description here

enter image description here

You will be able to indicate the type of report and the start and end date of the report. The maximum number of days that the report can include is 31. Then, indicate where the mail will be sent and finally proceed to the formalization.

enter image description here

enter image description here

A sample report is attached below.

More than 2000 m² of own facilities and Data Centers in Spain
Your privacy is important for us
We use our own cookies for the proper functioning of the site. In addition, third-party cookies are used for analytical purposes only. This information is not associated with any person so that personal identifying data is not stored, but is only information that is collected to identify the session, with the aim of facilitating the analysis of the website. You can change your preferences at any time by entering this website again. For more information about our cookie policy you can visit our Cookies. You can press the "Accept and close" button to give us your consent or you can access more detailed information and manage cookies.
More than 2000 m² of own facilities and Data Centers in Spain
Your privacy is important for us
We use our own cookies for the proper functioning of the site. In addition, third-party cookies are used for analytical purposes only. This information is not associated with any person so that personal identifying data is not stored, but is only information that is collected to identify the session, with the aim of facilitating the analysis of the website. You can change your preferences at any time by entering this website again. For more information about our cookie policy you can visit our Cookies. You can press the "Accept and close" button to give us your consent or you can access more detailed information and manage cookies.