Hosting Security
Secure your website with Xlogic Hosting
Uptime 99,9%
We use the best technologies and constantly monitor our servers to always be online, thus reducing problems.
Redundant connectivity
Redundancy guarantees our networks continuity of service and maximum reliability and stability.
Website protection
Our systems allow us to block DDos and Brutal Force attacks and detect viruses / malware within accounts.


Hosting Security
Included on all our servers
- HTTP/3
- Antivirus
- AntiSpam
- Disaster Recovery
- Certificated SSL (https://)
- Firewall / WAF / IPS
- Dedicated Environment
- Backup Tool
We keep your data safe
A free Comodo SSL certificate will be installed on all your domains and subdomains to allow your sites to travel via the HTTPS:// protocol; We also offer the possibility to use Antivirus / AntiSpam tools from cPanel
Our servers are secure
Thanks to our Firewall network, WAF (Web Application Firewall) and IPS (Intrusion Prevention System), the server analyses incoming traffic in real time and automatically blocks attacks.
We create dedicated environments
CloudLinux with CageFS provides a more secure Web Hosting environment thanks to a virtualized file system that is able to keep each user in their own zone (dedicated instance) within a shared server.
We offer you the automatic backup tool
You have the option to activate our backup tool (JetBackup) which will allow you to restore a partial or full backup of your website
Imunify 360
6 levels of integrated defense
The network firewall leverages our global threat intelligence network, which collects attack data from over 57 million domains worldwide. When an attack is detected on a server, the offending IP address is immediately blocked across the entire network, preventing the attacker from reaching any other server protected by Imunify. It blocks known malicious actors at the outer perimeter, before they can even attempt to exploit a vulnerability.
WebShield sits in front of web servers to detect and filter malicious traffic, including botnet attacks and Denial of Service (DoS) attempts. For suspicious traffic, it features our invisible JavaScript challenge, which effectively blocks automated bots while still allowing human visitors to pass through. It ensures server availability and prevents forced login attempts without frustrating legitimate users with traditional CAPTCHAs.
The Web Application Firewall (WAF) inspects incoming traffic to identify and block common web application attacks, such as SQL injection, cross-site scripting, and illegal resource access. It also provides a virtual patching system, blocking attempts to exploit known vulnerabilities in popular software (such as WordPress plugins) before an official patch is released or applied, thus protecting sites from compromise through their code.
Our comprehensive scanner performs real-time and on-demand scans of all files on your server for malware signatures, backdoors, and other threats. It also includes a database scanner, which scans the databases of popular CMS applications (WordPress, Joomla, and others) for infections, and scans malicious cron jobs, blocking a common backdoor used by attackers.
This is our unique real-time PHP script evaluation engine. It analyzes the behavior of PHP scripts as they run, identifying and blocking malicious activity before it can cause problems. It’s our answer to zero-day attacks, blocking even the latest and most unknown threats that traditional signature-based scanners would miss.
The IDS/IPS system constantly monitors server logs for suspicious activity, such as repeated failed login attempts. When it detects a pattern indicative of a brute-force attack or vulnerability exploitation, it automatically blocks the offending IP address, protecting all server services, not just websites.