Web hosting administration and optimization service, xCMS hosting

xCMS Hosting

 

Managed web hosting

Table of Contents

I. What is managed hosting?
II. Managed Hosting vs. Standard Hosting
III. Do I need managed hosting?
IV. How does Hostico differ from other managed hosting providers?
V. Application transfer
VI. Integrity check
VII. Stress test
VIII. Security analysis
IX. Frontend analysis and optimization
X. Analyze active themes / extensions
XI. Database analysis and optimization
XII. Application optimization
XIII. Connecting additional services
XIV. Connecting website to CDN
XV. Uptime monitoring
XVI. Performance Check
XVII. Integrity / Security Analysis
XVIII. Administration

I. What is managed hosting?

Purchasing a hosting package and installing an application is no longer difficult or requires a high level of knowledge.
However, the same cannot be said about the subsequent administration of the application, respectively of the website installed on the respective hosting.

In addition to the visible and tangible aspects that a site owner deals with, such as site content, marketing, graphical interface, social media, etc., the technical aspects of the application, such as security, optimization, updating, monitoring must also be taken into account.
Both the visible part to customer / owner (front end) and the back part (backend) require a direct, active and constant involvement for a good functioning. This involvement requires time, energy and resources even if you have the knowledge to perform these tasks.

Managed hosting involves taking over these responsibilities, ensuring both the proper functioning of the hosting services and the proper functioning of the client application.

II. Managed Hosting vs. Standard Hosting

On standard hosting you will benefit from the space offered by the purchased hosting package, and the resources allocated to it. The task of installing and managing the application is your responsibility.
In the case of managed hosting, the task of securing, optimizing, updating and monitoring the application / website is the responsibility of the hosting company, which assumes the complexity of managing the application, so that you have the freedom and peace of mind to focus on creating a unique digital experience.

III. Do I need managed hosting?

It would be advisable to opt for managed hosting if:

  • you do not have the necessary knowledge to manage the application / site
  • you do not have the time to administer the application / site
  • you cannot afford the site to be compromised due to its non-updating / insecurity
  • you do not want to lose visitors / customers due to slow loading speed of the site

IV. How does Hostico differ from other managed hosting providers?

Although there are companies that offer hosting packages that contain the names of some applications in their name, they do not include their administration.
The managed hosting service is a additional service to those already offered by Hostico, so the reasons displayed here also apply to this service.

Speed, reliability, performance and support are reasons to migrate your site to Hostico.

In addition to the managed hosting service, in addition to the optimizations made to the application, we also come with adjacent server-level solutions such as Memcached, Redis, ElasticSearch, Nginx.
They will take over some of the stress to which the application is subjected and will improve its performance.

The services we offer as part of the managed hosting package, in addition to the benefits provided by default by a Hostico hosting package are:

V. Application transfer

Free service for all Hostico hosting packages:

  • file and database transfer
  • reconfigure the application to run on our servers
  • transfer of mailboxes together with their contents

VI. Integrity check

Before performing any operations, we will check the integrity of the application. If it is compromised, any subsequent tests are irrelevant, and we will first focus on restoring the integrity of the application. This includes scanning files/databases for possible corrupted/infected files and/or unwanted records.

VII. Stress test

We will check the approximate number of concurrent connections that the application supports with the resources allocated to it before and after its optimization.

VIII. Security analysis

We aim to identify security issues and potential vulnerabilities that could lead to the site's compromise. Subsequently, security measures are implemented to strengthen the application.

Checking for vulnerabilities in the application, extensions, and installed themes.
Verifying the site in external databases regarding its status and reputation.

IX. Frontend analysis and optimization

Checking the frontend optimization of the application / site according to the standards imposed by Google / Yslow and optimizing, respectively correlating the application with them, in order to obtain a shorter loading time.

X. Analyze active themes / extensions

Checking their operation, load level, possible incompatibilities, vulnerabilities, etc.

XI. Database analysis and optimization

It checks both the level of load for the database with non-essential information stored by each application, as well as the SQL queries run by the application, in order to optimize the related SQL tables.

XII. Application optimization

Implementation of measures meant to reduce the resource consumption of the application but without affecting its good functionality.

XIII. Connecting additional services

Depending on the application used and the measures to be taken for a better functioning, it will be connected to the services installed on the server in order to take over part of the resource consumption made by the application and reduce its response time.

After these operations are completed, for the entire period of the subscription we will provide the following services:

XIV. Connecting website to CDN

To improve the loading speed of the website from various locations around the globe, we connect the website to a global CDN network to ensure the fastest loading speed possible. A properly configured CDN can also protect websites against Distributed Denial-of-Service (DDOS) attacks, reducing their impact on project operations.

XV. Uptime monitoring

We check the operation of the site at regular intervals, which means that our response time is almost instantaneous to any interruption that may occur. The Hostico team is notified immediately of the failure, and verification and elimination of the cause of the downtime is initiated as soon as possible.

XVI. Performance Check

We analyze the site`s performance to identify possible unexpected situations, improve them and also implement new optimization technologies.

XVII. Integrity / Security Analysis

Scanning files / database for possible corrupt/infected files and/or unwanted records.
Security scan to identify possible vulnerabilities that might occur as a result of an upgrade or install/uninstall an extension/themes.

Check for application vulnerabilities, extensions, or installed themes.

Checking the site in external databases about its status.

XVIII. Administration

Install/Uninstall/Configure extensions/themes.

Currently, these services are only available for applications and / or CMSs such as WordPress, Woocommerce, Prestashop, OpenCart, Joomla, Virtuemart and Drupal
The service is not available for applications or CMS whose native functionality or extended through various extensions allows the creation of multiple sites / stores (multisite / multistore).