Web hosting administration and optimization service, xCMS hosting

xCMS Hosting

 

Managed web hosting

Table of Contents

I. What is managed hosting?
II. Managed Hosting vs. Standard Hosting
III. Do I need managed hosting?
IV. How does Hostico differ from other managed hosting providers?
V. Application transfer
VI. Integrity check
VII. Stress test
VIII. Security analysis
IX. Frontend analysis and optimization
X. Analyze active themes / extensions
XI. Database analysis and optimization
XII. Application optimization
XIII. Connecting additional services
XIV. Uptime monitoring
XV. Performance Check
XVI. Integrity / Security Analysis
XVII. Update
XVIII. Administration

I. What is managed hosting?

Purchasing a hosting package and installing an application is no longer difficult or requires a high level of knowledge.
However, the same cannot be said about the subsequent administration of the application, respectively of the website installed on the respective hosting.

In addition to the visible and tangible aspects that a site owner deals with, such as site content, marketing, graphical interface, social media, etc., the technical aspects of the application, such as security, optimization, updating, monitoring must also be taken into account.
Both the visible part to customer / owner (front end) and the back part (backend) require a direct, active and constant involvement for a good functioning. This involvement requires time, energy and resources even if you have the knowledge to perform these tasks.

Managed hosting involves taking over these responsibilities, ensuring both the proper functioning of the hosting services and the proper functioning of the client application.

II. Managed Hosting vs. Standard Hosting

On standard hosting you will benefit from the space offered by the purchased hosting package, and the resources allocated to it. The task of installing and managing the application is your responsibility.
In the case of managed hosting, the task of securing, optimizing, updating and monitoring the application / website is the responsibility of the hosting company, which assumes the complexity of managing the application, so that you have the freedom and peace of mind to focus on creating a unique digital experience.

III. Do I need managed hosting?

It would be advisable to opt for managed hosting if:

  • you do not have the necessary knowledge to manage the application / site
  • you do not have the time to administer the application / site
  • you cannot afford the site to be compromised due to its non-updating / insecurity
  • you do not want to lose visitors / customers due to slow loading speed of the site

IV. How does Hostico differ from other managed hosting providers?

Although there are companies that offer hosting packages that contain the names of some applications in their name, they do not include their administration.
The managed hosting service is a additional service to those already offered by Hostico, so the reasons displayed here also apply to this service.

Speed, reliability, performance and support are reasons to migrate your site to Hostico.

In addition to the managed hosting service, in addition to the optimizations made to the application, we also come with adjacent server-level solutions such as Memcached, Redis, ElasticSearch, Nginx.
They will take over some of the stress to which the application is subjected and will improve its performance.

The services we offer as part of the managed hosting package, in addition to the benefits provided by default by a Hostico hosting package are:

V. Application transfer

Free service for all Hostico hosting packages:

  • file and database transfer
  • reconfigure the application to run on our servers
  • transfer of mailboxes together with their contents

VI. Integrity check

Before performing any operations, we will check the integrity of the application. If this is compromised, any further testing is irrelevant and we will first focus on restoring the integrity of the application.

VII. Stress test

We will check the approximate number of concurrent connections that the application supports with the resources allocated to it before and after its optimization.

VIII. Security analysis

Attempts are being made to detect security issues and potential vulnerabilities that could compromise the site. Subsequently, security measures are implemented to strengthen the application.

IX. Frontend analysis and optimization

Checking the frontend optimization of the application / site according to the standards imposed by Google / Yslow and optimizing, respectively correlating the application with them, in order to obtain a shorter loading time.

X. Analyze active themes / extensions

Checking their operation, load level, possible incompatibilities, vulnerabilities, etc.

XI. Database analysis and optimization

It checks both the level of load for the database with non-essential information stored by each application, as well as the SQL queries run by the application, in order to optimize the related SQL tables.

XII. Application optimization

Implementation of measures meant to reduce the resource consumption of the application but without affecting its good functionality.

XIII. Connecting additional services

Depending on the application used and the measures to be taken for a better functioning, it will be connected to the services installed on the server in order to take over part of the resource consumption made by the application and reduce its response time.

After these operations are completed, for the entire period of the subscription we will provide the following services:

XIV. Uptime monitoring

We check the operation of the site at regular intervals, which means that our response time is almost instantaneous to any interruption that may occur. The Hostico team is notified immediately of the failure, and verification and elimination of the cause of the downtime is initiated as soon as possible.

XV. Performance Check

We analyze the site`s performance to identify possible unexpected situations, improve them and also implement new optimization technologies.

XVI. Integrity / Security Analysis

Scanning files / database for possible corrupt/infected files and/or unwanted records.
Security scan to identify possible vulnerabilities that might occur as a result of an upgrade or install/uninstall an extension/themes.

Check for application vulnerabilities, extensions, or installed themes.

Checking the site in external databases about its status.

XVII. Update

The foundation of a powerful and secure application is given by constantly updating it as well as the installed extensions/themes.We make sure that as soon as an update is available, we make the necessary checks to apply it.

XVIII. Administration

Install/Uninstall/Configure extensions/themes.

Currently, these services are only available for applications and / or CMSs such as WordPress, Woocommerce, Prestashop, OpenCart, Joomla, Virtuemart and Drupal
The service is not available for applications or CMS whose native functionality or extended through various extensions allows the creation of multiple sites / stores (multisite / multistore).