Fast, Global And Scalable

Our AWS cloud-based hosting options feature 99.99% uptime, enterprise security, optimal space, CDN, fast performance, painless resource scaling, and multi-region redundancy.


99.99% Uptime

Reliability plays a key part in web hosting. Our servers stay up and running and so do your digital assets. It's our Rhyno Guaranty!

Scalability & Redundancy

All of our configurations automatically add bandwidth and duplicate resources in the case of falure or to immediately increase needs.

High Speed Hosting

Ultra-fast and secure hosting environments via AWS with your choice of ready-to-run hardware and software configurations.

Disaster Recovery

Our backup and one-click restore system ensures you are covered in the event of a critical functionality failure.

Load Balancing

Our system optimizes the use of resources available, maximize throughput, minimize response time, and avoid overload of resources.

Global CDN

Our geographically-distributed Content Delivery Network provides high availability and high performance across the world.

Website Speed Optimization

We improve website speed by 70% on average with our caching options and global content delivery network (CDN).

Built on AWS

Our stack is built on Amazon Web Services, allowing us to leverage advanced resources and tools to scale and support your applications.

SSL Acceleration

Built on HTTP/2, we offload processor-intensive SSL encryption to hardware accelerators so you get faster load time over https://.

Malware & Hack Protection

Our Web Application Firewall (WAF) covers common server attacks such as cross-site scripting (XSS), and SQL injection.

DDoS Attack Mitigation

Distributed Denial of Service (DDoS) attacks can cause downtime and major problems. We block layer 3, 4, and 7 DDoS attacks.

Zero-Day Exploit Prevention

Hackers discover new vulnerabilities every day. We protect sites and stop suspicious behavior. Mitigating new threats rarely requires a patch.

Website Malware Scanning

Our scanner monitors for signs of website malware and indicators of compromise (IOC) with our website scanning tools.

Server-Side Scanning

We check all files on the server for signs of malware to find backdoors, phishing pages, spam, DDoS scripts, and more.

SSL Certificate Monitoring

If any changes are made to your website’s SSL certificate (HTTPS), we receive immediate alerts so we can take action.

SEO Spam Scanner

Spam keywords and link injections harm your brand. We discover SEO spam before Google and other search engines do.

Blacklist Status

A blacklisted site loses at least 95% of its traffic. Our scanner monitors for security warnings from blacklist authorities.

DNS Monitoring

Our scanners detect changes to your website’s domain name system (DNS) settings. We alert you if any changes are made.

Brute Force Attacks Protection

Automated hacker tools target all sites. We stop brute force attacks and password cracking to prevent site abuse.

24/7 Technical Support

Your success drives everything we do. That’s why we offer the industry’s best customer support via phone, chat, email and ticketing system.

Security Updates

Security is arguably the most important reason we keep your website up to date. We perform security updates as soon as they come out.

Maintenance Updates

We perform maintenance updates that are non-critical but solve bugs, introduce features and provide better website performance.

Fast Incidence Response

With a 5-hour average resolution time, we have a security team you can depend on. Rest assured, your website will be in good hands.

Sandbox Site

A sandbox is a testing website that isolates untested code changes and content experimentation from your production website.

Manual Checkups

Everyday our specialists manually check key server and website enpoints to make sure your system and website are fully operational.

Website Restoring

We conduct unlimited website restores with minimal downtime as part of our backup and disaster recovery plans.

Website Speed Optimization

We help you analyze and optimize your website's speed and performance by using proven tools for both server and website tools.

Further Development

We are always there to help if you need a hand on web, e-commerce, mobile and software design and development. We are just one click away. :)

Website Malware Removal

We safely remove any malicious code in your website file system and database. We restore your site completely.

Blacklist Status Removal

Websites with security warnings lose 95% of their traffic. We submit blacklist removal requests on your behalf.

SEO Spam Repair

SEO spam keywords and link injections harm your brand. Make sure your website looks right in search engines.

Future Attack Prevention

Our website firewall (WAF) blocks attacks by filtering malicious traffic. We stop hacks and speed up your site.

Quarantine Reports

We automatically log every file we touch and keep secure backups before making changes. We keep in touch with you during the cleanup and provide a complete report of everything we find.

Security Best Practices

We don’t just clean your website. We follow the industry's best security practices to keep your site clean after our team has removed all malware and backdoors.

Our Platform

RhynoCLOUDTM equips you with the scalability, performance, security, and support you need, so you can build and deploy a range of online experiences from websites to e-commerce to mobile apps. Our platform is unified by powerful technology, strong cybersecurity standards, award-winning support, and an ecosystem of developers and security experts that expand the value you gain from all solutions.

Service Definition

  • High-Speed Hosting: Our AWS cloud-based hosting options feature 99.99% uptime, optimal space, CDN, fast performance, painless resource scaling, and multi-region redundancy.
  • Disaster Recovery: Our enterprise-grade redundant backup and one-click restore system ensures you are always covered in the event of a critical functionality failure.
  • Total Web Security: Our web cybersecurity system monitors your site and servers 24/7 for thousands of vulnerabilities and threats. If your site ever gets infected, we bring it back to life with minimal downtime.
  • Maintenance & Support: We perform security and non-security updates on your CMS as soon as they are available including core, extensions, plugins, and components.

Regular Rhyno’s standard support hours are from 9am to 5:30pm, Eastern Standard Time excluding public holidays. Extended support hours which include weekdays and weekends (24/7) are covered under levels 3, and level 4.

  • Support Portal. You can log in to our online service portal at to raise a support request ticket at any time
  • Chat. You can chat with a Rhyno representative anytime via
  • Email. All emailed support enquiries must be sent to which will create a work task in our system to track your request
  • Phone. If you contact us by telephone, we will create a service ticket in our online service portal to track your request.


Any support, maintenance and custom work performed by Rhyno in response to a request made by the client. This covers activities such as answering questions, giving advice, resolving issues, training, new development and providing help and technical assistance. Support requests are charged using the available monthly hours allotted in your Managed Service Plan. Extra work will be charged at Rhyno’s standard rate for Level 1 plans and at the corresponding discounted rates for the Level 2-4 plans. All extra work beyond the time allotted in your plan will be subject to estimation and client approval prior to commencement of work.

Ticket Priority Description Expected Response
Medium Non-security related updates, general support requests Within 1 working day
Urgent Security-related updates, partial problems with the Website 4 hours
Critical Security breach, website not available (down) Immediate (1 hour)

Rhyno’s Fully-Managed Service Plans apply to WordPress, Drupal and Joomla Content Management Systems. We also have an online service portal to manage support contracts, communication, work planning and task status. We offer four levels of support, tailored to suit your business size and requirements.

Amazon Web Services (AWS)

Amazon Web Services is the leading cloud platform that provides over 70 services across compute, storage, databases, analytics, networking, mobile and IoT. AWS is widely used by enterprises and startups alike for web and mobile applications, game development, data processing and warehousing, storage etc.

Our AWS managed services provide full lifecycle provisioning, monitoring and management for:

  • Elastic Compute Cloud (EC2)
  • Amazon Elastic Beanstalk
  • Amazon Simple Storage (S3)
  • EC2 Container Service
  • Amazon Glacier
  • Amazon Relational Database Service (RDS)
  • Amazon Redshift
  • AWS Identity and Access Management
  • Amazon WorkSpaces
  • AWS Directory Service
  • AWS Mobile Hub
  • Amazon API Gateway
  • Amazon Elastic Cache
  • Amazon Route 53
  • Amazon VPC
  • Elastic Load Balancing

The demands of Enterprise are not those served by typical hosting platforms. You need flexibility, reliability, security, audits, developer tools, fail over and automated backups. More than that, your biggest need is to not worry. We got your back. Our hosting platform is a scalable web hosting solution designed for your needs. With high performance, continuous integration, deployment services, and monitoring options baked in.

Our unique managed service offers painless configuration of AWS instances and clusters, resource scaling, multi-region redundancy, and enterprise-grade security.

When updates are required for your CMS, Rhyno will promptly perform these updates using the available hours of your managed service plan. Updates include core CMS, plugins, components, and modules. Rhyno will evaluate all security releases based on their requirements. Any issues or extra work arising as the result of an update, such as backward incompatible or core resources or extensions, will be performed using the available hours of your managed service plan and at the standard/discounted rate if the hours in your plan have been exhausted. If you have exceeded the available hours in your plan, Rhyno will advise you of the costs involved before undertaking any extra work on your Website.

If an urgent security update becomes available, we will contact you immediately to perform the update and protect your data and infrastructure.

Updates usually take on average between 3 – 8 hours and are required every few months based on WordPress, Drupal and Joomla release trends.

When an update is applied, any linked staging site will be deleted and re-cloned from the updated production web site to reflect the current production version.

Updates are provided by the CMS foundation and third-party vendors. They involve making changes to the code and database in such a way that it doesn’t affect its core structure, functionality or design of your CMS. Updates include bug fixes, security patches or added support for core and functionality.

Upgrades on the other hand are a set of changes made to the CMS that are significant and substantial such as important changes to the GUI, adopting new technology for the CMS, or new features and options which are not present in the existing version of the CMS. Upgrades are provided by the CMS foundation and are not security-related.

Performing an upgrade to your CMS is more complicated and requires a development plan. CMS upgrades are not covered in this Service Level Agreement and are subject to estimation and client approval.

Any Website hosted on the Internet is vulnerable to cyber attacks. Rhyno treats all security breaches as Critical Incidents and will create a support request in our online service portal to track the remediation of your web site immediately.

A CMS that is not continually updated is substantially susceptible to attack. Security releases for your CMS are frequent and keeping your Website up to date is extremely important. Although Rhyno can not guarantee that your Website will be free of attacks, we have put forward this Managed Service Plan as a preventative measure that will dramatically reduce vulnerability issues and help mitigate the impact of attacks if they were to occur. In the event of a security breach, our process under this Service Level Agreement is as follows:


Step Description Level
1 Our monitoring service will report a security breach immediately. An alert will be sent to the client. (for Level 1, clients are required to report security breaches to Rhyno) Level 2-4
2 Scan the site code and database for possible entry points. Level 2-4
3 Clean the security breach immediately either by removing infected/added files, database dumps or by restoring the site from a previous backup if your hosting service provides backups. (included in levels 3 and 4) Level 3-4
4 Quarantine the Website for 30 days. During our clean up, a ‘quarantine’ folder is created and that is where all infected files are kept. They are encrypted and will not harm your site in any way. We keep the infected backup for comparing. Level 3-4
5 Produce forensic report Level 4


Any work undertaken by Rhyno to remedy your Website including forensic analysis is either included in your monthly support plan, as per the above table, or will be charged at our standard/discounted hourly rate. We will endeavor to seek approval for remediation if the hours in your plan are exhausted.

Rhyno may be required to restore your Website from a backed up image of your website in order to revert the security breach immediately. Please make sure you have a backup plan in place. Rhyno offers Backup and Disaster Recovery plans. Please note backup and disaster recovery is not part of this Service Level Agreement.

In certain cases, your Website maybe be temporarily offline while the breach is remedied.

A staging site is an environment setup for our clients (Level 2 and up) for testing and approving the performed work. This environment exactly resembles the production environment. In other words, it’s a complete but independent copy of the production environment of your CMS, including the database. Once the client is satisfied with the changes and the work is approved, Rhyno will promote the updates to the production Website. Our development/update process is as follows:

  • Our main branch of the central code repository holds the code for the live server
  • A secondary branch holds the staging server code
  • Development/updates are done and tested on our internal development environment
  • When a feature/update is completed and fully tested in the development environment, the branch is pushed to the repository and merged with the staging server code, which is then checked out to the staging server.
  • When the code has been tested and approved by the client on the staging server, it’s merged with the main branch (the live server code) and checked out to the live server. As the branch has now been merged with the live code, the staging sever will be deleted.

Rhyno monitors for signs of website hacks and warnings from blacklist authorities so we can react quickly. We detect downtime and changes to your DNS settings, core file integrity, and SSL certificates. Our scanning engine is fast and lightweight. It captures blacklist warnings and malware visible in the source code, including conditional malware that only presents itself to certain kinds of visitors. Malware and security issues we detect include:

  • Dirty Search Engine Results
  • Hidden & Malicious iFrames
  • Mobile Malware Infections
  • Phishing Lures
  • Hijacking
  • Obfuscated JavaScript Injections
  • Redirects Targeting Mobile Devices
  • Drive-by-Download Injections
  • Email Spam Abuse
  • Pharma Hacks
  • Desktop AntiVirus Blacklisting (i.e., AVG, Norton, McAfee)
  • Infected Database / SQL Injections
  • Website Defacements
  • Embedded Trojans
  • Cross-Site Scripting (XSS) Infections
  • Search Engine Blacklisting (Google, Bing, Yahoo, etc)

Our deep scanning engine has full access to your server. Some malware hides itself from visitors, but it can’t hide from our server-side scanner. We scan for things like backdoors, phishing pages, email and DDoS scripts.

Our blacklisting monitoring and Warning removal service works for major authorities including:

  • Google Safe Browsing
  • Norton Safe Web
  • PhishTank
  • Opera browser
  • SiteAdvisor
  • Sucuri Malware Labs blacklist
  • SpamHaus DBL
  • Yandex (via Sophos)
  • ESET

When your site is compromised, our team immediately assesses the damage. Our automated scripts and professional security analysts work quickly to understand your environment and locate infections and their impacts.

We identify:

  • CMS & extensions used on your site
  • Known issues and anomalies in source code
  • Current versions of your website software
  • Integrity issues against a known good baseline
  • Malware infections and indicators of compromise

 We remedy:

  • Remove & repair malware infections
  • Check the integrity of your website
  • Remove blacklist warnings from your website
  • Repair brand reputation issues in search engine results
  • Advise you on available updates and post-hack steps

Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the security attacks targeting a web application every day, and hence improve its security. The report states the type of attack, the originator, why it happened and how it happened.

Rhyno makes it easy for you to keep your site backed up. We connect your website and database to our secure external backup/restore service and generate 2 parallel and incremental backups daily. We keep all backups of your site for 90 days with a premium option to keep your entire backup history.

We automatically get notified if there are any additions, modifications or deletions between each version of your website.

Intelligent Restore

In our backup repository, we have access to every backup complete with a datestamp and detailed information on each change. With one click, we can easily restore your website by replacing all of your current content with content from a backup automatically. We can also select specific files and folders to restore, and manually restore by downloading a zip file of an entire backup or selectively download specific files.

Website Migration Services are one of the most requested services within our company. Whether you have Wordpress, Drupal or Joomla CMS, we will work with you every step of the way to make sure the migration is seamless. Website migration will be performed using the available hours of your managed service plan and at the standard/discounted rate if the hours in your plan have been exhausted. If you have exceeded the available hours in your plan, Rhyno will advise you of the costs involved before undertaking any extra work on the migration.

  • Maintenance: Any changes, reconfiguration, features and/or the addition of modules to a client web site after initial implementation.
  • Support: Any activity performed by Rhyno in response to a request made by the client. This covers activities such as answering questions, advice, resolving issues and providing help and assistance.
  • Response Time: The time taken for Rhyno to begin work on an issue once a Service Ticket has been created. Response times are calculated within standard support hours only.
  • Service Portal: Rhyno’s online work tracking and support management system (, similar to an online help desk with project management capabilities. This allows customers to create and update support requests, upload files and attach screen shots and view status of projects or tasks.
  • Update: A minor release of a version of the CMS or an extension.
  • Upgrade: A major release of a version of a CMS or an extension. Generally, upgrades take longer to perform than updates, as significant changes to the code base and database structures may have occurred. Supporting extensions may need to be updated to reflect these changes.
  • Service Ticket: The action of the client or Rhyno staff creating and managing a support and/or maintenance request via our online service portal. Any works undertaken by Rhyno will always be tracked using a Service Ticket.
  • Cyber Attack: an attempt by hackers to damage or destroy a computer network or system.
  • Security Breach: An incident that results in unauthorized access of data, applications, services, networks and/or devices by bypassing their underlying security mechanisms. A security breach occurs when an individual or an application illegitimately enters a private, confidential or unauthorized logical IT perimeter.
  • Website Blacklist: A list of websites that are considered off limits or dangerous. A website can be placed on a blacklist because it is a fraudulent operation or because it exploits browser vulnerabilities to send spyware and other unwanted software to the user.
  • Dirty Search Engine Results: the intentional manipulation of a search engine to return a specific result
  • iFrame: an HTML element that allows an external webpage to be embedded in an HTML document
  • Malware: software that is intended to damage or disable computers and computer systems.
  • Phishing Lures: the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication
  • Hijacking: a form of unwanted software that modifies a web browser’s settings without a user’s permission, to inject unwanted advertising into the user’s browser.
  • Obfuscated JavaScript Injections: a process by which we can insert and use our own JavaScript code in a page, either by entering the code into the address bar, or by finding an XSS vulnerability in a website.
  • Redirects: A URL redirect is a webserver function that sends a user from one URL to another
  • Drive-by-Download Injections: the unintentional download of a virus or malicious software (malware) onto your computer or mobile device
  • Spam: irrelevant or inappropriate messages sent on the Internet to a large number of recipients.
  • Pharma Hacks: an exploit that takes advantage of vulnerabilities in a Website, causing search engines, notably the one hosted by Google, to return ads for pharmaceutical products along with legitimate listings
  • Desktop Antivirus: software utility used for scanning and removing viruses from your computer
  • Website Defacement: attack on a website that changes the visual appearance of the site or a webpage
  • Embedded Trojans: a non-replicating malicious program
  • Cross-Site Scripting (XSS): a type of computer security vulnerability typically found in web applications. XSS enables attackers to inject client-side scripts into web pages viewed by other users.
  • Server Backdoor: a means to access a computer system or encrypted data that bypasses the system’s customary security mechanisms.
  • DDoS: A Distributed Denial-of-Service (DDoS) attack is an attack in which multiple compromised computer systems attack a target, such as a server, website or other network resource, and cause a denial of service for users of the targeted resource
  • Custom Development: Work conducted on the Website which includes design and programming.
  • Internet: a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
  • Website: a location connected to the Internet that maintains one or more pages on the World Wide Web.
  • Web Page: A document which can be displayed in a web browser such as Firefox, Google Chrome, Opera, Microsoft Internet Explorer or Edge, or Apple’s Safari. These are also often called just “pages.”
  • Website: A collection of web pages which are grouped together and usually connected together in various ways. Often called a “web site” or simply a “site.”
  • Web Server: A computer that hosts a website on the Internet.
  • Code Repository: a file archive and web hosting facility where a large amount of source code, for software or for web pages, is kept privately.
  • Database: a structured set of data held in a computer, especially one that is accessible in various ways
  • SQL: Structured Query Language (SQL) is a standard computer language for relational database management and data manipulation.
  • Development Environment: set of processes and programming tools used to create or modify the program or software product.
  • Website Migration: The transfer of a website from one web host to another. The move requires the migration of all integral website files and database to the new hosting environment.
  • Cloud Web Hosting: Hosting that uses the resources of several clustered servers. These are virtual resources of several servers to accommodate all the aspects of hosting your site.
  • Search Engine: A website that helps you find other web pages, such as Google, Bing, or Yahoo.
  • Offline: Not connected to a computer, server, external network or the Internet.
  • Backup: the procedure for making extra copies of data in case the original is lost or damaged.
  • Restore: Data restore is the process of copying backup data from secondary storage and restoring it to its original location or a new location. A restore is performed to return data that has been lost, stolen or damaged to its original condition or to move data to a new location.
  • Website Clone: A duplicate of a website identical to another website.