The Web Application Firewall stops you from getting hacked by identifying malicious traffic, blocking attackers before they can access your website. Powered by the Threat Defense Feed, it is automatically updated with new firewall rules that protect you from the latest threats. Even if you are running a vulnerable plugin or theme, our Web Application Firewall will protect you from being hacked by blocking attacks based on known and constantly updated attack patterns.
Brute Force Attacks
Brute Force Attacks happen when malicious software tries to guess your sites username and passwords to gain access, usually to place malware or some nature on your site. When this is detected the system will automatically lock out the username or if the forgot password form is used too many times, the system will lock the user out. This will prevent hackers gaining access to usernames that may exist on your system.
Your own virtual IT department working around the clock to ensure your website is always protected
Advanced Manual Blocking
This feature allows you to block traffic from any source that may be a threat to your site. You can block entire networks which can be done by blocking entire IP ranges. This can be very useful when blocking attacks from certain regions.
You can also block websites by entering their hostname which can include any subdomains. The system will also let you record the reason as to why you blocked a particular site, IP or IP range so that you will have a record of why you chose this action.
The same as your computer, your site can become infected with Malware, software programs that are designed to either send information to a third party, or to make your site generate spam or traffic to a third party site. Often this can take the form of “Cloaking”, where your site seems fine to you, but when searched for, it can point visitors to other locations such as porn sites.
Our advanced Malware Scanner will compare your core files, themes, and plugins and compare these to the original files. We will scan your site looking for malware, code injections, back doors, as well as checking URL, ‘s against Google’s safe browsing list.
Once you sign up to our service you will see from your regular reports, that your site was visited by unscrupulous visitors from numerous countries trying to gain access to your site. Our service will show your hack attempts and will show you where they are originating from.
You will see traffic from robots, humans, Gogole crawlers as well as security threats and exploits and where in the world they are coming from, including their IP address, the date and time and how much time they spent on your site.
View Google Crawl Activity
If you are serious about your website and SEO is important to you then knowing how and when Google crawls your site, what pages are crawled and which aren’t is relevant. Our system will also separate visits to your site by humans as well as crawlers and will immediately block fake Google or malicious or aggressive crawlers.
Enterprise-class security services that are trusted to protect over 1,000,000 websites across the globe
View Bots and Crawlers
There are many rogue crawlers on the Intenet which can consume your bandwidth and impact the performance of your website. They can generate many “page not found errors” and this can be a sign that they are up to no good. Our scanner will separate page views from humans and crawlers and will immediately block fake crawlers making room for legitimate crawlers like Google to work uninterrupted.
View Logins and Logouts
Knowing exactly who is logging in and out of your website is important, especially true if your site has been hacked. With our managed security service, you will have full visibility of which usernames hackers are logging in with and whether hackers are using software to attempt to guess passwords. You will be able to see who logged in and from where and also what they were looking at.
Our Managed Security Services will monitor visits to your site in real time which will include visitor location and IP address as well as the time of their visit.
Our Managed Security Service uses source code verification to tell you if files have been hacked or changed and will allow you to repair these files. Our system checks core file, theme files and plugin files against a repository of the original files.
Hackers have software that crawls the Internet looking for sites that aren’t protected, make sure your site is secure
Monitor Disk Space
Running out of disk space can severely impact the performance of your website and may make your ser4ver unavailable. This can happen with some Denial of Service attacks as they can consume a lot of space. Our Manages Security Service monitors your disk space usage and alerts us in advance of any down time.
Get Detailed IP Info
Each visitors IP address is logged by our system. Should you have your concerns about a particular visitor you can use our system to block them from your site.
The technology we use protects over 1,000,000 websites around the world and this means that we have access to information about how hackers compromise vulnerable sites, we know where the attacks originate and what type of code they deploy. As such the algorithms behind our Managed Security Services are constantly being updated to protect against new and emerging threats.
With our premium version, your website is updated in real time, meaning you have the best protection available 24/7. All the latest malware signatures and firewall rules are updated automatically giving you peace of mind that your website is protected.
Spamvertising & Spam Generation Checks
When your site has been comprimised it can be used for spamvertising purposes. This means that your site could be sending thousands of SPAM emails, unbeknown to you. When this happens, your site can be blacklisted which could severely impact your ability to send business emails. As well as being blacklisted your SEO may be damaged and you may lose ranking on Google or other search engines.
Our service protects your website from being hacked and can prevent spammers from using your website to send SPAM emails.
There are certain countries where a lot of malicious traffic originates, with our service it is possible to block these countries from accessing your site. Our software will detect which countries are making failed login attempts and we can detect the IP addresses of each potential attack. We can specify from which countries login privileges are granted or denied meaning we can stop an attack before it happens.
Cell Phone Sign In
By using “Two Factor Authentication” it is possible to further strengthen your security policies. This is the same form of authentication used by governments, military and banks across the world. Two factor authentication allows you to authenticate logins via your cell phone and should a hacker manage to guess your password, the attack will not be successful without the second phase of authentication which requires your cell phone.
You would be surprised at how many admins use easy to hack passwords for their corporate websites. These passwords are easily detected using various types of hacking software. So having strong passwords is essential to maintain the security of your site. This premium service will audit all passwords stored on your site and will identify which accounts are leaving you vulnerable to attack.
Comment Spam Filter
If you want your visitors to leave comments on your posts or articles then you will be susceptible to comment SPAM. Our SPAM filter will automatically detect comment SPAM providing an additional layer of protection to your site.