Dedicated Servers

For high-powered performance and room to grow, Choose Dedicated for your website and all its needs.

All dedicated servers are hosted on Microsoft Azure Cloud Services or Amazon Web Services. We can provision Windows and Linux VMs, apps, and infrastructure using Microsoft-managed datacenters in 13 regions around the world. World-class security and industry leading performance.

ENTRY DEDICATED
$249.95 Per Month
Dual Core Processor
2 GB of RAM
250 GB of Storage
/29 IP block (5)
CentOS 64-bit
cPanel or Plesk Available
ADVANCED DEDICATED
$349.95 Per Month
Quad Core Processor
6 GB of RAM
500 GB of Storage
/29 IP block (5)
CentOS 64-bit
cPanel or Plesk Available

Custom Plan

We can configure almost any system or network to meet your needs.
Our experienced team can help you migrate your servers from a local network to a highly secured cloud network.

All Dedicated plans include

All dedicated servers meet a broad set of international and industry-specific compliance standards, such as ISO 27001, HIPAA, FedRAMP, SOC 1 and SOC 2.  By using Microsoft Azure, we also utilize country-specific standards including Australia IRAP, UK G-Cloud, and Singapore MTCS.

454065 - lock network protection safe safety secure securitDESIGN AND OPERATIONAL SECURITY

Security begins with a trustworthy technology foundation. Your VMs infrastructure is based on systems designed for security from the ground up, to ensure that the core infrastructure remains resilient to attack.

453960 - network private save security vpnNETWORK SECURITY

Your VM’s networking infrastructure provides the ability to securely connect Virtual Machines (VMs) to one another, and be the bridge between your private cloud and the world. Your network services maximize flexibility, availability, resiliency, security, and integrity by design.

security_partnerSECURITY PARTNERS

The wisdom of the crowd.  We seek the collective opinions and products of the best and brightest individuals and companies, rather than that of any single expert.  The best network services, the best data storage solutions, and the best monitoring tools.

Custom-SSHROOT ACCESS

Users receive full SSH access to securely log onto your system and manage your server like never before, provided on all Linux servers, Windows servers will receive a full RDC (Remote Desktop Connection) access.

454038 - creative head idea intelligent magnifying searchIDENTITY AND ACCESS MANAGEMENT

Providing a comprehensive identity and access management cloud solution that enables a robust set of capabilities to manage users and groups is only the start. It helps secure access to on-premises and cloud applications, including online services like Office 365 and many SaaS applications.

threat-managementTHREAT MANAGEMENT

An obvious temptation for hack-happy types would be to try deny or re-allocate resources from your VM, that’s just not possible. The fabric controllers make sure that all of the VMs deployed into the fabric get the resources they paid for. It’s not possible for a malicious VM to consume unlimited resources, starve its neighbors, or be the subject of resource deprivation. Those protections also reduce the risk of an internal attack.

453969 - analysis bar chart chart diagram monitoringMONITORING, LOGGING, AND REPORTING

We watch your VM from inside, but also from outside.  Dedicated remote systems are in place to monitor key services and roles your VM provides, and its ability to provide them in a timely manner.

453995 - key keyword locked safe secure targetENCRYPTION AND KEY MANAGEMENT

Your VM’s Disk and data transport Encryption Management abilities enable necessary business needs in the cloud. VM’s are secured at rest using industry standard encryption technology to address organizational security and compliance requirements.

pen-scannigPENETRATION TESTING

Removing the ability to access on-premises data from the physical location is only the start.  Access to the fabric and the ability to administer it is done from network operations centers off site.  You cannot walk up and put your finger onto a hard drive and say “that’s where my VM is”, because the geo-replication and scaling of your data and the fabric is done automatically and constantly. 

Contact support to add SSL to any hosting account.

Frequently Asked Questions

What payment terms does this product include?

All hosting packages are available in 1, 3, 12, 24 month terms.

Can my money be refunded?

Although we don’t think you’ll ever want a refund, we do offer refunds on a case-by-case basis if it’s requested within 30 days of purchase.

Do I have to renew each year?

Renewal is based on the term you select at checkout. 

What is an SSL?

What is SSL?

SSL (Secure Sockets Layer) is the cryptography standard for authentication and communications privacy over the internet. Your customers can have confidence their private information is secure when they see your store Web address starting with "https://..." This means SSL has been activated.

Do I need SSL for my Website?

Not all sites need SSL, but if you are collecting sensitive data, such as credit card numbers, many people will abandon your site if https://.. is not visible.

SSL and e-Stores

We provide shared SSL to all of our e-Store merchants for no extra charge. Your e-Store will activate SSL-mode when a customer clicks on the checkout button. Since our SSL Certificate is shared by multiple merchants and is owned by iHost Networks, you will see the name "iHost Networks" as part of the checkout Web address. The SSL Certificate works seamlessly with your Website and is activated automatically when you signup with iHost Networks.

How to Obtain Your Own SSL Certification

For enhanced branding purposes, you can purchase your own SSL Certificate. With your own SSL, your customers will be presented only with your domain name. To many merchants, the consistent branding is important. In terms of overall security, there is no difference between the Shared SSL and having your own.

What kind of add-ons are available?

We offer SSL Certs, Managed Hosting, Additional Storage, Additional RAM, Web Design. Contact us for more information and pricing.

What kind of servers do you run on?

We use Microsoft Azure virtual servers – eliminating the reliability issues with traditional hardware and utilizing Microsoft’s state-of-the art facilities and network security.

More information on plan includes:

DESIGN AND OPERATIONAL SECURITY

Security begins with a trustworthy technology foundation. Your VMs infrastructure is based on systems designed for security from the ground up, to ensure that the core infrastructure remains resilient to attack. We assume breaches of our systems as a security strategy, and our global incident response team partners work around the clock to mitigate the effects of any attacks against the security of our platform. These are backed by centers of excellence that fight digital crime, respond to security incidents and vulnerabilities in the platform’s software, and combat malware.
 

ENCRYPTION AND KEY MANAGEMENT

Your VM’s Disk and data transport Encryption Management abilities enable necessary business needs in the cloud. VM’s are secured at rest using industry standard encryption technology to address organizational security and compliance requirements. VM’s boot under customer controlled keys and policies, and their usage can audited with key vaults.
 

NETWORK SECURITY

Your VM’s networking infrastructure provides the ability to securely connect Virtual Machines (VMs) to one another, and be the bridge between your private cloud and the world. Your network services maximize flexibility, availability, resiliency, security, and integrity by design. Use your VMs native security features to help protect your information assets.
 

IDENTITY AND ACCESS MANAGEMENT

Providing a comprehensive identity and access management cloud solution that enables a robust set of capabilities to manage users and groups is only the start. It helps secure access to on-premises and cloud applications, including online services like Office 365 and many SaaS applications. Our systems provide the level of scale and reliability required by enterprises using  a high availability service hosted in globally distributed datacenters. The service handles billions of authentications each day from more than 200 million active users and provides a 99.9% SLA.
 

MONITORING, LOGGING, AND REPORTING

We watch your VM from inside, but also from outside.  Dedicated remote systems are in place to monitor key services and roles your VM provides, and its ability to provide them in a timely manner. Providing monitoring systems that are offsite, off network, that test your VMs performance using real world networks and scenarios ensures that we’re aware of not just local infrastructure issues, but issues with other providers and networks that may affect your VM.
 

SECURITY PARTNERS

The wisdom of the crowd.  We seek the collective opinions and products of the best and brightest individuals and companies, rather than that of any single expert.  The best network services, the best data storage solutions, the best monitoring tools, they are all aggregated into one solution to provide you with products that are resilient and ever evolving to meet new demands.
 

THREAT MANAGEMENT

An obvious temptation for hack-happy types would be to try deny or re-allocate resources from your VM, that’s just not possible. The fabric controllers make sure that all of the VMs deployed into the fabric get the resources they paid for. It’s not possible for a malicious VM to consume unlimited resources, starve its neighbors, or be the subject of resource deprivation. Those protections also reduce the risk of an internal attack. The packet filtering which is enforced on all traffic originating from your VM prevents spoofing attacks on the platform and prevents the VM from communicating with protected infrastructure devices. Additional layers are also in place which are designed to reduce the risk of a distributed denial of service (DDOS) attack. We use standard DDOS mitigation techniques, but we also have dedicated third-party DDOS systems in place. The platform also monitors for internally-initiated DDOS attacks and will mitigate offending VMs.
 

PENETRATION TESTING

Removing the ability to access on-premises data from the physical location is only the start.  Access to the fabric and the ability to administer it is done from network operations centers off site.  You cannot walk up and put your finger onto a hard drive and say “that’s where my VM is”, because the geo-replication and scaling of your data and the fabric is done automatically and constantly.  A sliver of your data might be on a given drive today, but not any other day, this is the key to distributed redundancy.  Security is tight: server cages are locked, you can’t enter them without completing two-factor authentication, and the entire facility is monitored 24/7 by video. Even if physical access was gained, there is simply nothing tangible to access. With customers also concerned about specific targeted attacks on their own applications, out teams perform penetration testing internally on a continuous basis, as well as hiring independent third party firms to do pen testing on our platform services.