Threat Stack Oversight Intrusion Detection System

Fully Managed Intrusion Detection System.

Threat Stack Oversight

Antivirus and anti-malware technologies provide an important foundation layer of security, but provide limited protection against dangers that have not yet been recognised or, even worse, are actively modifying your system. Consider adding the enhanced capabilities of an Intrusion Detection System for the highest level of security and peace of mind.

Threat Stack gathers, monitors, and analyses server-wide security data in order to find abnormalities, evaluate and prioritise risks, and report breaches.

Advanced protection from Threat Stack may also assist your firm in meeting stringent security requirements, such as PCI DSS, SOC 2, and HIPAA/HITECH compliance rules.

Protection Plus Peace of Mind

Get your information away from spammers and identity thieves now!

Threat Monitoring

The agent-based solution of Threat Stack continuously analyses your server’s security telemetry, alerting possible attacks or abnormalities.

Intrusion Detection

Threat Stack identifies intrusion indicators rapidly by monitoring logins, user and file access, and privilege changes.

24/7/365 Rapid Response

When a threat is found, you will be notified promptly and kept informed as our investigation and remediation progresses.

Compliance Best Practices

Threat Stack’s superior protection can help you achieve and maintain compliance across a number of security requirements.

Protecting Your Server 24/7/365

Hostingli is aware that our clients take web hosting seriously and want prompt, competent assistance from a team member who is conversant with their hosting requirements.
With Hostingli, you’ll have piece of mind knowing that we’re continually monitoring your server 24/7/365 at our data centres. We are accessible whenever you need us.


Got questions? Well, we’ve got answers.

Can I add Threat Stack to my server?

Threat Stack is compatible with all VPS, Dedicated, Private VPS Parent, and HIPAA-compliant servers, as well as Cloud Servers, VMware Private Cloud (only on Dedicated Infrastructure), High Availability, and High Performance solutions running a supported operating system.

What Operating Systems are supported?

CentOS 7 and 8; Ubuntu 16.04, 18.04, and 20.04; Debian 10; Cloud Linux (all Cloud LInux versions currently supported by Liquid Web); and Windows Server 2012, 2012 R2, 2016, and 2019. Windows servers require Sysmon to be installed and configured. 

Does Threat Stack include on-demand vulnerability scanning?

Threat Stack functions in real time, continuously monitoring your server and detecting any unusual behaviour instantly. When a threat is found, a manual investigation and the relevant remediation measures are initiated immediately, and you are kept informed throughout. Optionally, you may buy vulnerability and malware scans on-demand individually.

How will I be notified if there's a threat detected?

Threat Stack’s Security Operations Center will notify Hostingli of any possible threats or identified abnormalities, and we will immediately initiate an investigation. If a threat is verified or if your assistance is required during the investigation, we will provide you with a summary of the problem and the remediation efforts through a support ticket.