Guides and tutorials

Hundreds of tutorials and step by step guides carefully written by our support team.

Security

What is computer security ?

Computer security or cybersecurity according to ISACA (Information Systems Audit and Control Association), is the protection of information assets, through the treatment of threats that put at risk the information that is processed, stored and transported by the information systems that are they are interconnected.

How do I go to the Security menu?

The Security menu (or Dashboard) allows you to see, quickly, all the options related to the security of your services.

To go to this section, you must click on the "Security" option, located in the side menu of your SW Panel.

enter image description here

Below we will explain the different sections found in this Dashboard:

Security Dashboard: Resilience

Resilience is the ability to prepare for, resist, and recover from cyber threats and attacks. Measure the protection status of your infrastructure against present and future threats, being a key piece in the continuity of your business.

enter image description here

The level of resilience is an indicative percentage that is calculated based on 7 key elements, which contribute to increasing the security of your services, your data and, ultimately, your company. Therefore, with these 7 fields you can get an idea of how you can improve the security of your infrastructure, vulnerabilities or detect what you are most exposed to.

You can have a report if you click on "Request a report now", choosing below, the type of report you want and the email where it will be sent. The report carries a small cost.

enter image description here

enter image description here enter image description here

enter image description here

Security Dashboard: Threats Managed 2020

In these various graphs, you will be able to observe multiple threats that have been generated in hours, days, months and years.

enter image description here

Security Dashboard: Threats Addressed by Next Generation Security

This option is only visible to customers with Active Next Generation Security. It shows a top 10 threats received or originated by type, country of origin, severity and the total.

To activate the New Generation security, you must follow the following steps:

  1. Within your SW Panel use the search engine to find your Cloud, in our case it is called manuals, yours will have a different name. Once you find it, select it.

    enter image description here

  2. Next, go to the "Available enhancements" section and select "Next generation security":

    enter image description here

    From here you will see that there are four different types of security:

  • Basic, Standard, Advanced, and Managed. The difference between them is:

    Basic Standard Advanced Managed
    Real time analysis
    Attack notifications instantly in SW Panel
    Sending automatic reports - Monthly
    Sending automatic reports - Weekly
    Free additional reports - 2 8 10
    Real time threat blocking management
    Real time blocking
    Low severity threat blocking
    Medium severity threat blocking
    High severity threat blocking
    Configurable lock level
    Analysis data
    Security dashboard
    Threat map
    List of threats
    Comprehensive detail of threats
    Service traffic
    Files
    Logs analyzed in the report
    Traffic (summary)
    Threats
    Authentication
    Active locking modules
    Threats
    Authentication
    Files
    Additional services included
    Free vulnerability scan - 1 2 4
    On demand, paid vulnerability scanning Ilimitados Ilimitados Ilimitados Ilimitados
    PCAP (Packet Capture) Download
    Periodic security audit
    Quarterly meeting
  1. To continue, select the type of security you want:

    enter image description here

  2. Once selected, you must formalize the payment:

    enter image description here

When your Next Generation Security is activated, you will see in your service tree, your Cloud server with a shield to its right and the description "This service has a subscription to a New Generation Security Level". If you click on the shield, you will access the New Generation Security menu for _Name of your Cloud Server _, which we will explain below.

Next Generation Security Menu

In this menu you can see all the threats received in a list where you will find the country of origin, ports, destination IP, protocol, details of the attack, etc. Located to the right of each action, there is a drop-down ("..."), where you can click See Threat Detail to expand the information.

enter image description here

enter image description here

In the Threats tab, you will be able to observe the threats in general, both those received and those generated by your own server.

enter image description here

In Security Reports, you can request a report on Network or Perimeter Security and Vulnerabilities of the system of your Cloud server in a short period of time, maximum 6 hours.

enter image description here

enter image description here

You can indicate the type of report and its start and end date. The maximum number of days that the report can include is 30. Next, indicate where the email will be sent and finally proceed to formalization.

enter image description here

enter image description here

Here is an example informe

More than 2000 m² of own facilities and Data Centers in Spain
Your privacy is important for us
We use our own cookies for the proper functioning of the site. In addition, third-party cookies are used for analytical purposes only. This information is not associated with any person so that personal identifying data is not stored, but is only information that is collected to identify the session, with the aim of facilitating the analysis of the website. You can change your preferences at any time by entering this website again. For more information about our cookie policy you can visit our Cookies. You can press the "Accept and close" button to give us your consent or you can access more detailed information and manage cookies.
More than 2000 m² of own facilities and Data Centers in Spain
Your privacy is important for us
We use our own cookies for the proper functioning of the site. In addition, third-party cookies are used for analytical purposes only. This information is not associated with any person so that personal identifying data is not stored, but is only information that is collected to identify the session, with the aim of facilitating the analysis of the website. You can change your preferences at any time by entering this website again. For more information about our cookie policy you can visit our Cookies. You can press the "Accept and close" button to give us your consent or you can access more detailed information and manage cookies.