Technology
Fast, Global And Scalable Secure Hosting
Our AWS cloud-based hosting options feature 99.99% uptime, enterprise security, optimal space, CDN, fast performance, painless resource scaling, and multi-region redundancy.
Experience unparalleled reliability and performance with our AWS cloud-based hosting solutions. Boasting an impressive 99.99% uptime, our services ensure your digital presence is always available. We prioritize enterprise-level security, ensuring your data is protected with the most stringent measures. With optimal storage space and a fast Content Delivery Network (CDN), your website’s performance is accelerated, offering users a seamless experience.
Our hosting solutions are designed for painless resource scaling, allowing you to effortlessly adjust to your growing needs. Additionally, multi-region redundancy guarantees robustness and resilience, keeping your operations smooth and uninterrupted. Choose our AWS hosting for a secure, fast, and reliable digital foundation.
99.99% Uptime
Reliability plays a key part in web hosting. Our servers stay up and running and so do your digital assets. It's our Rhyno Guaranty!
Scalability & Redundancy
All of our configurations automatically add bandwidth and duplicate resources in the case of falure or to immediately increase needs.
High Speed Hosting
Ultra-fast and secure hosting environments via AWS with your choice of ready-to-run hardware and software configurations.
Disaster Recovery
Our backup and one-click restore system ensures you are covered in the event of a critical functionality failure.
Load Balancing
Our system optimizes the use of resources available, maximize throughput, minimize response time, and avoid overload of resources.
Global CDN
Our geographically-distributed Content Delivery Network provides high availability and high performance across the world.
Website Speed Optimization
Reliability plays a key part in web hosting. Our servers stay up and running and so do your digital assets. It's our Rhyno Guaranty!
Built on AWS
Our stack is built on Amazon Web Services, allowing us to leverage advanced resources and tools to scale and support your applications.
SSL Acceleration
Built on HTTP/2, we offload processor-intensive SSL encryption to hardware accelerators so you get faster load time over https://.
Malware & Hack Protection
Our Web Application Firewall (WAF) covers common server attacks such as cross-site scripting (XSS), and SQL injection
DDoS Attack Mitigation
Distributed Denial of Service (DDoS) attacks can cause downtime and major problems. We block layer 3, 4, and 7 DDoS attacks.
Zero-Day Exploit Prevention
Hackers discover new vulnerabilities every day. We protect sites and stop suspicious behavior. Mitigating new threats rarely requires a patch.
Website Malware Scanning
Our scanner monitors for signs of website malware and indicators of compromise (IOC) with our website scanning tools.
Server-Side Scanning
We check all files on the server for signs of malware to find backdoors, phishing pages, spam, DDoS scripts, and more
SSL Certificate Monitoring
If any changes are made to your website’s SSL certificate (HTTPS), we receive immediate alerts so we can take action.
SEO Spam Scanner
Spam keywords and link injections harm your brand. We discover SEO spam before Google and other search engines do.
Blacklist Status
A blacklisted site loses at least 95% of its traffic. Our scanner monitors for security warnings from blacklist authorities.
DNS Monitoring
Our scanners detect changes to your website’s domain name system (DNS) settings. We alert you if any changes are made.
Brute Force Attacks Protection
Automated hacker tools target all sites. We stop brute force attacks and password cracking to prevent site abuse.
24/7 Technical Support
Your success drives everything we do. That’s why we offer the industry’s best customer support via phone, chat, email and ticketing system.
Security Updates
Security is arguably the most important reason we keep your website up to date. We perform security updates as soon as they come out.
Maintenance Updates
We perform maintenance updates that are non-critical but solve bugs, introduce features and provide better website performance.
Fast Incidence Response
With a 5-hour average resolution time, we have a security team you can depend on. Rest assured, your website will be in good hands.
Sandbox Site
A sandbox is a testing website that isolates untested code changes and content experimentation from your production website.
Manual Checkups
Everyday our specialists manually check key server and website enpoints to make sure your system and website are fully operational.
Website Restoring
We conduct unlimited website restores with minimal downtime as part of our backup and disaster recovery plans.
Website Speed Optimization
We help you analyze and optimize your website's speed and performance by using proven tools for both server and website tools.
Further Development
We are always there to help if you need a hand on web, e-commerce, mobile and software design and development. We are just one click away. :)
Website Malware Removal
We safely remove any malicious code in your website file system and database. We restore your site completely.
Blacklist Status Removal
Websites with security warnings lose 95% of their traffic. We submit blacklist removal requests on your behalf.
SEO Spam Repair
SEO spam keywords and link injections harm your brand. Make sure your website looks right in search engines.
Future Attack Prevention
Our website firewall (WAF) blocks attacks by filtering malicious traffic. We stop hacks and speed up your site.
Quarantine Reports
We automatically log every file we touch and keep secure backups before making changes. We keep in touch with you during the cleanup and provide a complete report of everything we find.
Security Best Practices
We don’t just clean your website. We follow the industry's best security practices to keep your site clean after our team has removed all malware and backdoors.
High-Speed Hosting:Our AWS cloud-based hosting options feature 99.99% uptime, optimal space, CDN, fast performance, painless resource scaling, and multi-region redundancy.
Disaster Recovery:Our enterprise-grade redundant backup and one-click restore system ensures you are always covered in the event of a critical functionality failure.
Total Web Security:Our web cybersecurity system monitors your site and servers 24/7 for thousands of vulnerabilities and threats. If your site ever gets infected, we bring it back to life with minimal downtime.
Maintenance & Support:We perform security and non-security updates on your CMS as soon as they are available including core, extensions, plugins, and components.
Regular Rhyno’s standard support hours are from 9am to 5:30pm, Eastern Standard Time excluding public holidays. Extended support hours which include weekdays and weekends (24/7) are covered under levels 3, and level 4.
Support Portal.You can log in to our online service portal at my.rhyno.ca to raise a support request ticket at any time
Chat.You can chat with a Rhyno representative anytime via Rhyno.ca.
Email.All emailed support enquiries must be sent to [email protected] which will create a work task in our system to track your request
Phone.If you contact us by telephone, we will create a service ticket in our online service portal to track your request.
Definition:
Any support, maintenance and custom work performed by Rhyno in response to a request made by the client. This covers activities such as answering questions, giving advice, resolving issues, training, new development and providing help and technical assistance. Support requests are charged using the available monthly hours allotted in your Managed Service Plan. Extra work will be charged at Rhyno’s standard rate for Level 1 plans and at the corresponding discounted rates for the Level 2-4 plans. All extra work beyond the time allotted in your plan will be subject to estimation and client approval prior to commencement of work.
Ticket Priority | Description | Expected Response |
---|---|---|
Medium | Non-security related updates, general support requests | Within 1 working day |
Urgent | Security-related updates, partial problems with the Website | 4 hours |
Critical | Security breach, website not available (down) | Immediate (1 hour) |
Rhyno’s Fully-Managed Service Plans apply to WordPress, Drupal and Joomla Content Management Systems. We also have an online service portal to manage support contracts, communication, work planning and task status. We offer four levels of support, tailored to suit your business size and requirements.
Amazon Web Services (AWS)
Amazon Web Services is the leading cloud platform that provides over 70 services across compute, storage, databases, analytics, networking, mobile and IoT. AWS is widely used by enterprises and startups alike for web and mobile applications, game development, data processing and warehousing, storage etc.
Our AWS managed services provide full lifecycle provisioning, monitoring and management for:
Elastic Compute Cloud (EC2)
Amazon Elastic Beanstalk
Amazon Simple Storage (S3)
EC2 Container Service
Amazon Glacier
Amazon Relational Database Service (RDS)
Amazon Redshift
AWS Identity and Access Management
Amazon WorkSpaces
AWS Directory Service
AWS Mobile Hub
Amazon API Gateway
Amazon Elastic Cache
Amazon Route 53
Amazon VPC
Elastic Load Balancing
The demands of Enterprise are not those served by typical hosting platforms. You need flexibility, reliability, security, audits, developer tools, fail over and automated backups. More than that, your biggest need is to not worry. We got your back. Our hosting platform is a scalable web hosting solution designed for your needs. With high performance, continuous integration, deployment services, and monitoring options baked in.
Our unique managed service offers painless configuration of AWS instances and clusters, resource scaling, multi-region redundancy, and enterprise-grade security.
When updates are required for your CMS, Rhyno will promptly perform these updates using the available hours of your managed service plan. Updates include core CMS, plugins, components, and modules. Rhyno will evaluate all security releases based on their requirements. Any issues or extra work arising as the result of an update, such as backward incompatible or core resources or extensions, will be performed using the available hours of your managed service plan and at the standard/discounted rate if the hours in your plan have been exhausted. If you have exceeded the available hours in your plan, Rhyno will advise you of the costs involved before undertaking any extra work on your Website.
If an urgent security update becomes available, we will contact you immediately to perform the update and protect your data and infrastructure.
Updates usually take on average between 3 – 8 hours and are required every few months based on WordPress, Drupal and Joomla release trends.
When an update is applied, any linked staging site will be deleted and re-cloned from the updated production web site to reflect the current production version.
Updates are provided by the CMS foundation and third-party vendors. They involve making changes to the code and database in such a way that it doesn’t affect its core structure, functionality or design of your CMS. Updates include bug fixes, security patches or added support for core and functionality.
Upgrades on the other hand are a set of changes made to the CMS that are significant and substantial such as important changes to the GUI, adopting new technology for the CMS, or new features and options which are not present in the existing version of the CMS. Upgrades are provided by the CMS foundation and are not security-related.
Performing an upgrade to your CMS is more complicated and requires a development plan. CMS upgrades are not covered in this Service Level Agreement and are subject to estimation and client approval.
Any Website hosted on the Internet is vulnerable to cyber attacks. Rhyno treats all security breaches as Critical Incidents and will create a support request in our online service portal to track the remediation of your web site immediately.
A CMS that is not continually updated is substantially susceptible to attack. Security releases for your CMS are frequent and keeping your Website up to date is extremely important. Although Rhyno can not guarantee that your Website will be free of attacks, we have put forward this Managed Service Plan as a preventative measure that will dramatically reduce vulnerability issues and help mitigate the impact of attacks if they were to occur. In the event of a security breach, our process under this Service Level Agreement is as follows:
Step | Description | Level |
---|---|---|
1 | Our monitoring service will report a security breach immediately. An alert will be sent to the client. (for Level 1, clients are required to report security breaches to Rhyno) | Level 2-4 |
2 | Scan the site code and database for possible entry points. | Level 2-4 |
3 | Clean the security breach immediately either by removing infected/added files, database dumps or by restoring the site from a previous backup if your hosting service provides backups. (included in levels 3 and 4) | Level 3-4 |
4 | Quarantine the Website for 30 days. During our clean up, a ‘quarantine’ folder is created and that is where all infected files are kept. They are encrypted and will not harm your site in any way. We keep the infected backup for comparing. | Level 3-4 |
5 | Produce forensic report | Level 4 |
Any work undertaken by Rhyno to remedy your Website including forensic analysis is either included in your monthly support plan, as per the above table, or will be charged at our standard/discounted hourly rate. We will endeavor to seek approval for remediation if the hours in your plan are exhausted.
Rhyno may be required to restore your Website from a backed up image of your website in order to revert the security breach immediately. Please make sure you have a backup plan in place. Rhyno offers Backup and Disaster Recovery plans. Please note backup and disaster recovery is not part of this Service Level Agreement.
In certain cases, your Website maybe be temporarily offline while the breach is remedied.
A staging site is an environment setup for our clients (Level 2 and up) for testing and approving the performed work. This environment exactly resembles the production environment. In other words, it’s a complete but independent copy of the production environment of your CMS, including the database. Once the client is satisfied with the changes and the work is approved, Rhyno will promote the updates to the production Website. Our development/update process is as follows:
Our main branch of the central code repository holds the code for the live server
A secondary branch holds the staging server code
Development/updates are done and tested on our internal development environment
When a feature/update is completed and fully tested in the development environment, the branch is pushed to the repository and merged with the staging server code, which is then checked out to the staging server.
When the code has been tested and approved by the client on the staging server, it’s merged with the main branch (the live server code) and checked out to the live server. As the branch has now been merged with the live code, the staging sever will be deleted.
MDR solutions are significantly more affordable than the equivalent costs of setting up an in-house SOC. Because it removes the requirement to recruit a team of security specialists, deploy and manage a wide range of technologies and run a 24/7 monitoring operation, MDR offers organisations significant financial savings. The cost of an annual MDR solution subscription will be defined by aspects such as the type and number of technologies being deployed and the number of network assets and endpoints being monitored.
Rhyno monitors for signs of website hacks and warnings from blacklist authorities so we can react quickly. We detect downtime and changes to your DNS settings, core file integrity, and SSL certificates. Our scanning engine is fast and lightweight. It captures blacklist warnings and malware visible in the source code, including conditional malware that only presents itself to certain kinds of visitors. Malware and security issues we detect include:
Dirty Search Engine Results
Hidden & Malicious iFrames
Mobile Malware Infections
Phishing Lures
Hijacking
Obfuscated JavaScript Injections
Redirects Targeting Mobile Devices
Drive-by-Download Injections
Email Spam Abuse
Pharma Hacks
Desktop AntiVirus Blacklisting (i.e., AVG, Norton, McAfee)
Infected Database / SQL Injections
Website Defacements
Embedded Trojans
Cross-Site Scripting (XSS) Infections
Search Engine Blacklisting (Google, Bing, Yahoo, etc)
Our deep scanning engine has full access to your server. Some malware hides itself from visitors, but it can’t hide from our server-side scanner. We scan for things like backdoors, phishing pages, email and DDoS scripts.
Our blacklisting monitoring and Warning removal service works for major authorities including:
Google Safe Browsing
Norton Safe Web
PhishTank
Opera browser
SiteAdvisor
Sucuri Malware Labs blacklist
SpamHaus DBL
Yandex (via Sophos)
ESET
When your site is compromised, our team immediately assesses the damage. Our automated scripts and professional security analysts work quickly to understand your environment and locate infections and their impacts.
We identify:
CMS & extensions used on your site
Known issues and anomalies in source code
Current versions of your website software
Integrity issues against a known good baseline
Malware infections and indicators of compromise
We remedy:
Remove & repair malware infections
Check the integrity of your website
Remove blacklist warnings from your website
Repair brand reputation issues in search engine results
Advise you on available updates and post-hack step
Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the security attacks targeting a web application every day, and hence improve its security. The report states the type of attack, the originator, why it happened and how it happened.
Rhyno makes it easy for you to keep your site backed up. We connect your website and database to our secure external backup/restore service and generate 2 parallel and incremental backups daily. We keep all backups of your site for 90 days with a premium option to keep your entire backup history.
We automatically get notified if there are any additions, modifications or deletions between each version of your website.
Intelligent Restore
In our backup repository, we have access to every backup complete with a datestamp and detailed information on each change. With one click, we can easily restore your website by replacing all of your current content with content from a backup automatically. We can also select specific files and folders to restore, and manually restore by downloading a zip file of an entire backup or selectively download specific files.
Website Migration Services are one of the most requested services within our company. Whether you have Wordpress, Drupal or Joomla CMS, we will work with you every step of the way to make sure the migration is seamless. Website migration will be performed using the available hours of your managed service plan and at the standard/discounted rate if the hours in your plan have been exhausted. If you have exceeded the available hours in your plan, Rhyno will advise you of the costs involved before undertaking any extra work on the migration.
Maintenance:Any changes, reconfiguration, features and/or the addition of modules to a client web site after initial implementation.
Support:Any activity performed by Rhyno in response to a request made by the client. This covers activities such as answering questions, advice, resolving issues and providing help and assistance.
Response Time:The time taken for Rhyno to begin work on an issue once a Service Ticket has been created. Response times are calculated within standard support hours only.
Service Portal:Rhyno’s online work tracking and support management system (my.rhyno.ca), similar to an online help desk with project management capabilities. This allows customers to create and update support requests, upload files and attach screen shots and view status of projects or tasks.
Update:A minor release of a version of the CMS or an extension.
Upgrade:A major release of a version of a CMS or an extension. Generally, upgrades take longer to perform than updates, as significant changes to the code base and database structures may have occurred. Supporting extensions may need to be updated to reflect these changes.
Service Ticket:The action of the client or Rhyno staff creating and managing a support and/or maintenance request via our online service portal. Any works undertaken by Rhyno will always be tracked using a Service Ticket.
Cyber Attack:an attempt by hackers to damage or destroy a computer network or system.
Security Breach:An incident that results in unauthorized access of data, applications, services, networks and/or devices by bypassing their underlying security mechanisms. A security breach occurs when an individual or an application illegitimately enters a private, confidential or unauthorized logical IT perimeter.
Website Blacklist:A list of websites that are considered off limits or dangerous. A website can be placed on a blacklist because it is a fraudulent operation or because it exploits browser vulnerabilities to send spyware and other unwanted software to the user.
Dirty Search Engine Results:the intentional manipulation of a search engine to return a specific result
iFrame:an HTML element that allows an external webpage to be embedded in an HTML document
Malware:software that is intended to damage or disable computers and computer systems.
Phishing Lures:the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication
Hijacking:a form of unwanted software that modifies a web browser’s settings without a user’s permission, to inject unwanted advertising into the user’s browser.
Obfuscated JavaScript Injections:a process by which we can insert and use our own JavaScript code in a page, either by entering the code into the address bar, or by finding an XSS vulnerability in a website.
Redirects:A URL redirect is a webserver function that sends a user from one URL to another
Drive-by-Download Injections:the unintentional download of a virus or malicious software (malware) onto your computer or mobile device
Spam:irrelevant or inappropriate messages sent on the Internet to a large number of recipients.
Pharma Hacks:an exploit that takes advantage of vulnerabilities in a Website, causing search engines, notably the one hosted by Google, to return ads for pharmaceutical products along with legitimate listings
Desktop Antivirus:software utility used for scanning and removing viruses from your computer
Website Defacement:attack on a website that changes the visual appearance of the site or a webpage
Embedded Trojans:a non-replicating malicious program
Cross-Site Scripting (XSS):a type of computer security vulnerability typically found in web applications. XSS enables attackers to inject client-side scripts into web pages viewed by other users.
Server Backdoor:a means to access a computer system or encrypted data that bypasses the system’s customary security mechanisms.
DDoS:A Distributed Denial-of-Service (DDoS) attack is an attack in which multiple compromised computer systems attack a target, such as a server, website or other network resource, and cause a denial of service for users of the targeted resource
Custom Development:Work conducted on the Website which includes design and programming.
Internet:a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
Website:a location connected to the Internet that maintains one or more pages on the World Wide Web.
Web Page:A document which can be displayed in a web browser such as Firefox, Google Chrome, Opera, Microsoft Internet Explorer or Edge, or Apple’s Safari. These are also often called just “pages.”
Website:A collection of web pages which are grouped together and usually connected together in various ways. Often called a “web site” or simply a “site.”
Web Server:A computer that hosts a website on the Internet.
Code Repository:a file archive and web hosting facility where a large amount of source code, for software or for web pages, is kept privately.
Database:a structured set of data held in a computer, especially one that is accessible in various ways
SQL:Structured Query Language (SQL) is a standard computer language for relational database management and data manipulation.
Development Environment:set of processes and programming tools used to create or modify the program or software product.
Website Migration:The transfer of a website from one web host to another. The move requires the migration of all integral website files and database to the new hosting environment.
Cloud Web Hosting:Hosting that uses the resources of several clustered servers. These are virtual resources of several servers to accommodate all the aspects of hosting your site.
Search Engine:A website that helps you find other web pages, such as Google, Bing, or Yahoo.
Offline:Not connected to a computer, server, external network or the Internet.
Backup:the procedure for making extra copies of data in case the original is lost or damaged.
Restore:Data restore is the process of copying backup data from secondary storage and restoring it to its original location or a new location. A restore is performed to return data that has been lost, stolen or damaged to its original condition or to move data to a new location.
Website Clone:A duplicate of a website identical to another website.
What Our Customers Say
5/5 - BASED ON 40 REVIEWS