wordpress

Enterprise WordPress Hosting

Made-to-measure hosting infrastructure for the most complex WordPress setups.

bulb

WordPress Intelligence

  • take advantage of our newest feature: WordPress Intelligence integrated on our dashboard that includes performance measurements to help you make the best decision concerning your website
  • benefit from actionable technical insight data to recognize what works and what doesn’t
cicle

Continuous monitoring

  • Manage access rights with the help of our organization-based structure in order to administrate your team, from developers to editors
  • Oversee Quality of Service, including third-party monitoring and alerting for errors
  • Continuous R&D work with high developers ratio in team
cicle

Geographical distribution

  • enjoy our infrastructure that is built for global audiences
  • experience ultra-fast response times and high availability
traffic

Failover policies
systems

  • hybrid architecture - best of both worlds
  • DNS based failover and automatic system healing
headset

Support and recommendations

  • Take advantage of phone and email support in priority mode
  • Benefit from the help of a dedicated Account Manager
  • Receive development recommendations
lock

WordPress Security Policy

Security is a shared responsibility between Presslabs and customers, with clearly identifiable attributions.

Our responsibility

validate

Https wp-admin always on encryption

We’re securing at all times the data that you’re exchanging between your device and WP-admin. Your passwords and editorial contents are always safe.

validate

Denial of service attacks

In case of denial of service attack attempts, we are taking actions to mitigate and identify the source, keeping your site in proper working condition.

validate

Incident handling

In case of suspicious security incidents, we are investigating responses and we recommend the appropriate actions.

validate

Firewall

We are managing firewall rules to limit access only to publicly intended resources, in legitimate usage patterns.

validate

OS maintenance for underlying machines and code patching

We permanently keep machines, virtual and physical, up-to-date with the latest LTS operating system versions.
In case of major security vulnerabilities at the operating system level, we handle them with urgency and transparency.

validate

WP-core upgrades policy

We are performing test-backed upgrades of the WordPress core and take full responsibility for the process.

validate

Scraping control

We’re filtering scraping activity that affects performance and service integrity.

validate

Throttling of resource user-usage for illicit purpose

We’re automatically monitoring traffic and usage patterns that pass over established thresholds and throttle them.

validate

Inter and intra data center security

Our equipment is located in standardized data center facilities with clear contracts concerning data access and security. Physical access is audited as well.

validate

WordPress filtering

We’re implementing strict checks for php execution and limit allowed pass-through parameters based on the WordPress Codex.

validate

Staff access guaranteed

We assume full responsibility for data access, as our staff is formed by support and infrastructure engineers alike.

validate

Trails auditing

All dashboard actions performed by your team, as well as our support, are tracked and auditable.

validate

User’s responsibility

validate

Maintaining non-open source code

Using purchased plugins or themes rises the risk of vulnerabilities.
Renew subscriptions to be able to always keep the commercial code up-to-date.

validate

All third-party code inserted, other than ads

Code snippets inserted in your site’s source code expose your visitors, in case of intrusion.
Reduce to a minimum the amount of external calls and review periodically your site code for outdated references.

validate

Open source plugins update

The more code you have, the more potential security risks may arise.
Keep open source plugins, by all means, up-to-date.

validate

Ad code

Advertisements used on your site are most likely hosted by third-parties and in case of intrusion on their systems, your site and your visitors are at risk.
Always work with highly trusted ad networks.

validate

Physical access to personal computer and devices

Don’t authorize access to open sessions in browsers while logged in on dashboards.
Consider encrypting your storage and use reasonably strong device access passwords. Avoid using sensitive passwords on foreign computers.

validate

Collaborators' access management

Control the access to your site. If given to the disloyal people, your site may get harmed.
Carefully select and instruct people you work with and trust.

validate

Password management

Weak passwords can become the gateway to undesired activities on your accounts.
Use strong passwords, change them often and keep them only in trusted password management services.

comment

What our clients say

We pride ourselves on providing smart WordPress hosting but you don't just have to take our word for it. Read what our customers have to say about us.

spike

What's next?

An affordable plan that grows with your business.

Presslabs Whitepaper

Presslabs white paper for enterprises

Read all the technical specifications of our product, in one page

Download PDF

Request a quote

We’ll also give you a private tour of our WordPress infrastructure and intelligence