Welcome to OVHcloud.
Log in to order, manage your products and services, and track your orders.
Products
Solutions
Partners
Documentation
Articles
Intrusion Prevention Systems (IPS) proactively block cyber threats by analysing network traffic and taking immediate action against malicious activities. Unlike IDS, IPS solutions actively prevent intrusions. They are crucial for modern network security, offering real-time protection and integrating with other security tools for comprehensive defense.
Application security protects software from cyber threats through secure coding, testing, and monitoring. Modern development must prevent data breaches, financial loss, and reputational damage.
Sovereign cloud is a cloud computing model that ensures complete control over data, technology vendors in use, and operational flexibility. It protects digital assets from external influence and ensuring freedom in choosing technology solutions in the future.
A Secure Sockets Layer (SSL) creates an encrypted link between a browser and a web server so any data moving between the two is kept private. The SSL protocol is actually the predecessor to the current protocol, TLS (Transport Layer Security), but SSL remains better known and its name remains in use today.
A private network is secured and isolated from the public internet, allowing only authorised devices and apps to connect and exchange data with one another. Private networks are often used by business to create local area networks, which offer secure access to network resources within a defined geographic location.
Network security protects digital assets using firewalls, encryption, intrusion detection, and prevention systems. Network security is crucial for data protection, business continuity, and regulatory compliance.
Reliable network connectivity is crucial for businesses in the digital age. It streamlines operations, enhances communication, and improves customer experience. Wired and wireless connections, VPNs, and cloud infrastructure ensure secure and efficient data transfer for businesses of all sizes.
IT incident management is how IT teams handle disruptions to IT services. It minimizes downtime and restores normal service operation as quickly as possible. A robust process ensures business continuity, enhances security, and meets compliance requirements.
Identity Access Management offers a framework of technologies and processes that only allow users with official authorisation to access enterprise data, resources, assets, and more. This helps protect business from malicious actions and ensures best IT practices are maintained, all while enabling regulatory compliancy targets to be met.
GRC stands for Governance, Risk, and Compliance, acting as a framework within IT services and security. It aligns IT efforts with organisational goals, ensuring security and compliance with industry standards while managing IT risks like cyber threats and data breaches.
Data encryption encompasses all methods of encrypting sensitive or personal information in order to ensure its confidentiality. The data can only be read with an encryption key.
Find out what a DNS server is, its vital role in web browsing, and how it translates domain names into IP addresses.
DNS security is the protection the Domain Name System (DNS) from attacks using specific techniques and protocols. Website security, reliable online communication, and data integrity can be guaranteed by encryption and real-time monitoring.
DNS root servers are the backbone of the internet, acting as a master directory for all websites. They ensure that when you type a website name, your computer finds the correct IP address. This article explores how these servers work, who manages them, and why they're vital for a stable and secure internet experience.
DNS poisoning, also known as DNS cache poisoning, compromises the Domain Name System's (DNS) integrity to redirect users to malicious websites. This can lead to the theft of sensitive information or the installation of malware on unsuspecting victims' devices.
DNS attacks exploit the Domain Name System, crucial for internet functionality. Attackers manipulate DNS for unauthorised access, causing network disruptions, financial loss, and reputational damage. In cloud hosting, DNS security is a shared responsibility, crucial for protecting against data theft and malware
With more and more websites coming online every year, cybersquatting has become a growing problem on the internet. This involves using or registering a domain name similar or identical to that of a well-known company.
Cybersecurity is the application of processes and technologies to protect computer systems, networks and data from cyberattacks, unauthorised access and leaks. It helps maintain data availability, integrity and confidentiality.
Cloud security is a group of measures and technologies that protect data, applications and infrastructure in IaaS, PaaS and SaaS services. It prevents unauthorized access, manages incidents, and ensures compliance.
Cloud network security safeguards cloud-based data, apps, and infrastructure. It employs firewalls, encryption, and access controls to protect against threats like data breaches and cyberattacks. Regular audits and multi-factor authentication enhance security.
Customer Identity and Access Management (CIAM) solutions secure and enhance customer experiences. They streamline registration, protect data, offer personalisation, and drive engagement. Businesses can build loyalty and gain a competitive edge by understanding preferences and behaviours.
Border Gateway Protocol (BGP) is the routing protocol that enables the internet to function as a unified network. It's the 'postal service' of the internet, finding the most efficient paths for data packets to traverse the many different networks that make up the internet.