Manashosting
Security Package

 

Packages A - (1 lakh)
Server - (Free) ** Virtual Private Server
Operating System - windows 2008 web edition/Red - Hat
Support - Dedicated Account Manager - 8 x 5

Dedicated IP ** For 1 domain
Dedicated Secure Sockets Layer (SSL) Certification
Automated SSL Certificate Verification Service
Verifying domain name ownership
UDP Flood Attack 24 x 7 monitor
Secure Access

Monitoring of Data Center Infrastructure

Proactive monitoring
• Provides real-time network health summary with detailed view of individual network components, enabling operations staff to respond quickly to events based on their severity.
• Facilitates early detection and prevention of outages, increasing network availability.
• No rules to write; works immediately with prebuilt rules and thresholds.
Performance and capacity
• Provides detailed visibility into real-time and historical performance statistics in the data center.
• Provides insight into port and bandwidth utilization, error count, traffic statistics, etc.
• Includes scheduled custom reports that can be offloaded for post-processing.
VMpath Analysis
• Provides view of VMpath through physical fabric to storage array and to the data store.
• Provides capability to view performance for every switch hop all the way to the individual VMware ESX server and virtual machine.
Topology views
• Displays real-time operationally focused topology of the data center infrastructure.
• Offers Layer 2 topology maps to streamline the troubleshooting process and reduce the mean time to repair; mouse over topology to view detailed information about paths and switch attributes.
• Technology-specific overlays for vPC,  FabricPath, VDC, and VLAN enable provisioning and efficient management of these features.
Reports
• Lets you build custom reports from predefined templates across all fabrics, individual fabric, or VSANs.
• Provides easy-to-schedule reports that can be exported for post-processing or sent by email.

 

Configuration and change management

• Provides pre-deployment validation of configuration changes, reducing opportunities for human error.
• Out-of-the-box configuration wizards are provided for critical OS Software features
• Using historical configuration archive coupled with config-compare, enables you to identify the last-known good state if configuration problems occur.
• Provides capability to back up configuration files from all switches.

Includes checks for Exchange 2000/2003, ISA server, IIS and Others

Via the Quickstart wizard, you can create a series of checks which monitor all the important services on your network, including Exchange Server, IIS and others.
 
Critical Exchange services and performance counters (Information Store, mailboxes, SMTP service, etc.) are all monitored.

 

Performs administrative steps to ensure that a service is running

GFI has developed specialized checks which mimic administrator operations to verify that the services offered by various applications are running.
 
For example, we will log on to a service, perform a task and log off the service, without need for any administrative intervention. The monitoring functions that make use of such methodologies include: IMAP, POP3, SMTP Server and the email route check.

 

Alert notification via email, pager or SMS

When we detect a failure, GFI Network Server Monitor will send alerts via SMS, pager, email or a network message.
 
SMS (text) messages are sent either through an SMS service provider (SMSC) or directly through a connected GSM phone/modem. It is also possible to use the GFI FAX maker email-to-SMS gateway service, Clickatell’s web email-to-SMS online gateway service or a

 

Monitor processes, service performance and CPU usage

GFI Network Server Monitor enables you to check critical processes and services on local and remote computers.
 
You can also monitor the CPU usage of a machine and any performance counter accessible through perfmon.msc. This way you can ensure that virtually any application is running properly.

 

E-Mail Protection

• AntiVirus Protection - 100% protection against known and unknown viruses
• Virus False Positives - 0.0001% false positive capture rate
• Spam Capture Rate - 99% capture rate (95% for emails containing Asian characters)
• Spam False Positives - 0.0003% false positive capture rate
• Latency - Average round-trip time of email delivery occurs in less than 60 seconds
• Service Availability - 100% uptime
Total multi-layered protection from spam, with threats managed away from your network
Proprietary Skeptic™ heuristics technologies
Multiple best-of-breed third party commercial scanning engines
Provides additional layers of automatically updated security
‘Link following’ technology checks every URL within emails for threats
Fully configurable, with a range of actions for both administrators and end-users
Exceptional Service Level Agreement package
Gives you reassurance and allows you to focus on business growth
Dashboard, summary, detailed and scheduled reporting
Optimized for Exchange
Flexible real-time, scheduled, and manual scanning provides efficient protection.
In-memory scanning and effective multi-threading provides superior performance.
Edge and Hub focused scanning leverages AV Stamping to eliminate redundant scanning and minimize impact to Mail Store.
Supports 64 bit Windows, VMware and Hyper-V Virtualized environments.
Manual Support *
   
Packages B - (2.5 lakhs) - (includes Package A)
Server - (Free) ** Virtual Private Server
Dedicated IP ** For 1 domain

Anti - DoS Attacks

Jamming Networks
Flooding Service Ports
Misconfiguring Routers
Flooding Mail Servers

Anti DDoS Attacks

FTP Bounce Attacks
Port Scanning Attack
Ping Flooding Attack
Smurf Attack
SYN Flooding Attack
IP Fragmentation/Overlapping Fragment Attack
IP Sequence Prediction Attack
DNS Cache Poisoning
SNMP Attack
Send Mail Attack
anti ddos tech support man power cost

 

VPN Security Router Bundles

Virtual Network Management Center (VNMC)

Multiple-device management
Security profiles
Stateless device provisioning
Security policy management
Context-aware security policies
Dynamic security policy and zone provisioning
Multi-tenant (scale-out) management
Role-based access control (RBAC)
XML-based API

 

VeriSign Identity Protection Authentication Service

Cloud-based authentication service deploys without requiring hardware or software installation
Wide choice of hardware and software one-time password (OTP) credentials, including free mobile phone credentials
Integrates with enterprise infrastructure via plug-ins into popular enterprise applications
Out-of-box self-service application–including token activation, token synchronization

 

 

Image management

• Enables easy to use, nondisruptive (In-Service Software Upgrade [ISSU]) mass deployment of  NX-OS Software images that can be scheduled or run on demand.
• Image upgrades are pre-validated, helping ensure compatibility with the running configuration, and in the event of a failure, rollback is initiated automatically.

 

Takes corrective action automatically

After an unexpected condition has occurred, GFI Network Server Monitor can automatically move to correct the problem by restarting a service (or multiple services) upon failure; rebooting a server upon failure; or launching an executable, batch job or VBS

 

 

Built-in computer monitor functions

GFI Network Server Monitor includes a number of functions to make it easier and faster for you to check various aspects of your system, including:
 
CPU usage function - ensure that a processor's usage does not go beyond a certain level
Performance counter - monitor any internal operating system counter, including counters used by SQL Server and MSMQ
Directory size function - ensure that a particular directory (for example, a user's home directory) does not take up more than 'x' amount of drive space
Disk drive function - monitor the physical status of the disk
Disk space function - check if sufficient disk space is available
File existence function - monitor the existence of a particular file, for example, results of scheduled batch jobs
File size function - monitor the size of particular files, for example, critical log files

 

Monitor users, groups and other active directory information

Use GFI Network Server Monitor to monitor directory information.
 
For example, monitor group membership of the domain admins group. You can also check user accounts, for example ones that are locked out or disabled, and more; computer accounts, groups, group membership, organizational units, and so on.

 

Manual Support *
   
Packages C - (5 lakhs) - (includes Package A and B)
Server - (Free) ** Virtual Dedicate Server
Dedicated IP ** For 2 domain

Performance and capacity

• Provides detailed visibility into real-time and historical performance statistics in the data center.
• Provides insight into port and bandwidth utilization, error count, traffic statistics, etc.
• Includes scheduled custom reports that can be offloaded for post-processing.
VMpath Analysis
• Provides view of VMpath through physical fabric to storage array and to the data store.
• Provides capability to view performance for every switch hop all the way to the individual VMware ESX server and virtual machine.

 

Topology views

• Displays real-time operationally focused topology of the data center infrastructure.
• Offers Layer 2 topology maps to streamline the troubleshooting process and reduce the mean time to repair; mouse over topology to view detailed information about paths and switch attributes.
• Technology-specific overlays for vPC,  FabricPath, VDC, and VLAN enable provisioning and efficient management of these features.

 

Data Center Resource Management

Automated discovery
• Using automated network discovery, provides up-to-date physical and logical inventory information.
• Tracks inventory and performance information in real time; information can be used as a source of truth for asset tracking or as a data source for a configuration management database (CMDB).

 

Web services APIs

• Abstracts the network to implement an IT service management framework (Information Technology Infrastructure Library [ITIL]) with a CMDB at its center as well as to integrate with business intelligence reporting solutions.
• Enables easy integration with third-party applications, allowing accurate flow-through provisioning and data mining.
• Enables integration into enterprise storage management systems through Storage Management Initiative Specification (SMI-S)-based APIs.
Event forwarding
• Enables integration with enterprise operations console (NOC) for alerts and events.
• Uses email and traps to notify operations staff of service disruptions.

 

Built-in Internet service functions

GFI Network Server Monitor includes a number of functions to make it faster and easier for you to check various aspects of your Internet systems, including:
 
HTTP function, checks availability of HTTP and HTTPS sites; passes credentials if required
Website content checking, checks website content by specifying a text pattern
FTP function, checks availability of an FTP server/site
ICMP ping function, checks a remote host for availability
IMAP server function, checks that the IMAP service is functioning by logging into the service and checking the count of the emails contained in a specific folder on the IMAP server
DNS server function, checks DNS server by reading an 'A' record and verifying the result
SMTP server function, checks mail server by establishing a connection and handshaking to verify SMTP protocol is working correctly
POP3 server function, checks POP3 servers by establishing a connection and handshaking
NNTP news server function, checks connection and does a handshake
SNMP function, monitors specific variables on remote machines or devices via the SNMP GET message
TCP port function, checks if a port is responding and checks its response
NTP timeserver function, monitors status of timeservers
Email route function, checks the health of email services by actually sending test emails and verifying their delivery at destination. This check is also useful for verifying performance of your mailing systems
Daemon function, SSH-based check that verifies if particular daemons are running on target Linux/Unix computer/s.

 

View network status from anywhere in the world

You can check rule status from any location using GFI Network Server Monitor's remote web monitor.
 
The remote web monitor includes two types of web page views: One for a normal web browser and one optimized for viewing from a mobile phone or handheld device such as a Blackberry or a Palm. A small footprint web server is included, although the feature c

 

Custom network monitoring using VBScript and SSH

Although GFI Network Server Monitor includes an extensive set of default monitoring functions, you can build your own custom checks by writing a VBScript (Windows) or an SSH shell script (Linux). From VBScript, you can use both WMI and ADSI. WMI is an int
 
Although GFI Network Server Monitor includes an extensive set of default monitoring functions, you can build your own custom checks by writing a VBScript (Windows) or an SSH shell script (Linux). From VBScript, you can use both WMI and ADSI. WMI is an int

 

Manual Support *
   
Packages D - (10 lakh) - (includes Package A,B and C)
Server - (Free) ** Virtual Dedicate Server
Dedicated IP ** For 2 domain

Virtual Network Management Center (VNMC)

Multiple-device management
Security profiles
Stateless device provisioning
Security policy management
Context-aware security policies
Dynamic security policy and zone provisioning
Multi-tenant (scale-out) management
Role-based access control (RBAC)
XML-based API

 

Enterprise class architecture

GFI Network Server Monitor™ consists of a network monitoring service and a separate management interface.
No agent software needs to be installed on machines you wish to monitor. The Network Monitor Engine is multi-threaded and can run up to 40 checks at a time. Our software architecture allows for high reliability and scalability to monitor both large and sm

 

Monitors terminal servers by actually logging In

GFI Network Server Monitor will check the status of a terminal server by actually performing a complete login and checking to see that the session is established correctly. This monitoring method is superior to relying on the events that the terminal serv

 

Monitor your database servers (SQL/ODBC)

GFI Network Server Monitor can check the availability of all leading database applications. Out of the box, it will monitor Microsoft SQL Server via ADO. It supports other databases such as Access, FoxPro, Paradox, SyBase, Informix, IBM DB2 and many more 

 

Monitor Linux servers

GFI Network Server Monitor includes extensive checks for monitoring Linux servers.
 
You can monitor CPU usage, printer availability, file existence, process running, folder size, file size, users and groups membership, disk partition check and disk space. Administrators can create any other check by creating an SSH script.

 

Network Threat Response

Give security analysts a powerful forensic tool
 
Get deep visibility into the threat context inside your network.  Network Threat Response can examine a series of packets to characterize an attack, discover malware payloads embedded inside PDF files, analyze payloads, and even recreate the series 
 
Characterize unknown threats
 
Find new network activity and new behaviors unique to your network, accelerating malware analysis and threat response.  Network Threat Response focuses on identifying, collecting, reverse engineering, and labeling malware and bots. It provides real-
 
Automate the response process
 
Reduce time spent sifting through thousands of threat alerts by viewing confirmed attacks. Using a unique embedded data-coupling process,  Network Threat Response confirms the appearance of vulnerabilities and attempts to exploit. Only  Networ
 
Reduce the sensor-to-analyst ratio
 
Automate tedious manual examinations, enabling experienced security analysts to focus on new, abnormal, and unique network activity. By providing metadata signatures with built-in correlation elements, such as data coupling,  Network Threat Response
 
Get instant threat response
 
Identify malware using network exploits to move on your internal network.  Network Threat Response captures malware for analysis and response. This stream-based solution rapidly decodes payloads, intercepts and downloads malware, and provides detail
 
Block attacks with unique signature database
 
Trust a large signature database, as well as templates, to stop attacks. The SNORT-compatible malware signature database contains more than 18,800 signatures, and 200 new signatures are added each month.  Network Threat Response helps create new sig
 
Integrate easily with  network security solutions
 
Get complete protection against malware.  Network Threat Response typically works in conjunction with an enforcement appliance like  Network Security Platform or  Firewall Enterprise. New malware is captured and sent to  Artemis Te
 
Streamline web-based management
 
Reduce overhead and save time with simple, centralized management. The  Network Threat Response Control Center is a web-based management console that manages multiple Network Threat Response sensor appliances. Control Center is also installed on eac

 

Endpoint Encryption

Data Protection Suite for Rights Management

Protect sensitive data automatically
 
Discover sensitive data without any user interaction and eliminate inefficiencies inherent with manual process-based data protection solutions. Instantly scan local user drives to find sensitive data that needs to be protected and immediately assign a rights management (RM) rule based on your information security policies. User access rights are defined by individual, job title, job function, and other parameters.
 
Share information with confidence
 
Collaborate with third parties without worrying about data breaches. Dynamic and effective policy management ensures that company information sent to stakeholders, customers, vendors, suppliers, partners, and potential new business associates remains secure and doesn’t end up in the wrong hands.  Data Protection Suite for Rights Management helps avoid costly and damaging data loss, and supports regulatory compliance.
 
Safeguard data sent to third parties
 
Protect data sent via email, the web, and removable hard drives. Encrypted files can only be accessed by authorized users and the RM protection travels with the document, regardless of the device used to access the file.
 
Secure data throughout the entire lifecycle
 
Audit, revoke, change, or update user privileges to maintain control over data even after it leaves the organization. You can restrict access to data for a specific period of time, rescind a document, and alter authorized users or groups. Protection remains in place regardless of where users are located or the length of time they have the data.
 
Get instant support for hundreds of millions of users
 
Support a broad user base. Data Protection Suite for Rights Management works with Adobe Reader and Microsoft Office.
 
Seamless file integration
 
Protect commonly used file types, including PDF and Microsoft Office documents. Adobe Reader includes native support for rights management, giving you instant coverage for hundreds of millions of users. Microsoft Office documents are supported via a simple plug-in.
 
Get comprehensive and cost-effective data protection
 
Find sensitive data on your local drives in real time and automatically apply RM usage policies from the Adobe Live Cycle server. Digital rights management protects files against unauthorized access, regardless of where the file resides or how it is distributed. Automated processes eliminate error-prone manual data discovery, lowering administrative overhead.
 
Ensure protection for unsecured data
 
Stop data that does not have a RM applied from leaving your organization via email, web, or removable media device.
 
Simplify centralized data security management and deployment
 
Ease data security management with the  ePolicy Orchestrator ( ePO) platform. Deploy, monitor, and generate actionable reports to boost security and support compliance. The  ePO platform pushes data policies out to every corporate endpoint to ensure that all sensitive data is discovered. From a single console, easily manage security deployment and track, audit, and report on sensitive data access to meet compliance requirements.

 

Complete data security
Data protection outside the network
Easy deployment and management
Manual Support *
   
Packages E - (25 lakhs) - (includes Package A,B, C and D)
Server - (Free) ** Dedicate Server
Dedicated IP ** For 5 domain

Server Monitoring

Deeply and Easily Monitor Your Entire IT Environment:  Virtual Server Monitoring, Physical Server Monitoring, Cloud Monitoring and more. One server monitoring tool across platforms (Windows, Solaris, AIX, HP-UX, Linux, Novell,VMware) applications, and mul
Simple Per-Physical-Server Licensing: Complete application and server monitoring software with no tiers or management packs. Just count your physical servers (even in virtual environments!). Installs in minutes, deploys in as little as 1-day. >> More on l
The 'uptime' Dashboard: A true single pane of glass view for virtual, physical, and cloud servers and applications that scales from 50 - 5,000+ servers and can monitor multiple datacenters. Intelligent alerting eliminates the 'sea of red.' >> Screenshots
Very Deep Metrics: Monitor services, monitor applications, and monitor system resource levels without the complexity of 'Enterprise' tools. >> See all metrics.
Deploy In Days: Deploys in as little as 1-day, very low maintenance. See the video here.
North-American Based Support: Award winning support makes sure you get top tier support every time.

 

Data Base Protection

Comprehensive threat protection — Protect even your unpatched databases against zero-day attacks by blocking attacks that exploit known vulnerabilities and terminating sessions that violate your security policies.
 
Detailed audit trail reports — Audit trail reports are available to meet SOX, PCI, and other compliance audit requirements. During post-incident forensic analysis, this audit trail can help you understand the amount of lost data and gain greater insight i
 
Streamlined patching with no required downtime — Applying missing patches and fixing misconfigurations found by the Database Activity Monitoring vulnerability scan will improve the security posture of your databases immediately — without requiring any dow
 
Dependable end-to-end user tracking — Database User Identifier is installed on JavaEE and .NET application servers as a separate container, where it injects the end-user information into the pooled database connection and associates every database session
 
Software-only solution, non-intrusive, and easy to deploy and maintain — As a software component, Database User Identifier is installed on the application servers and does not require any change to the underlying applications or database management system
 
Actionable alerting on specific end-user activity — Information from Database User Identifier can be used by  Database Activity Monitoring to create granular rules to specifically alert or block users based on application activity.
 
Save time and money with faster deployment and more efficient architecture
 
Start testing and monitoring database servers immediately. You can install  Integrity Monitoring for Databases without requiring any changes to your database systems.
 
Increase your flexibility by deploying on the IT infrastructure of your choice
 
Install Integrity Monitoring for Databases on physical servers, along with the database on virtual machines, and deploy remotely on cloud servers.
 
Get real-time notification of changes to settings that may impact database security
 
Monitor and log high-risk transactions, including DDL, drop/alter table, privilege grants, and changes to audit settings and relevant configuration parameters. Generate a trusted audit log for configuration changes that could impact security.
 
Receive out-of-the-box regulatory compliance reports
 
Generate preconfigured reports for compliance regulations and create custom reports identifying administrative users, expired users, database properties, and more.
 
Support virtualization and cloud computing environments
 
Provision sensors along with the database on each virtual machine, and deploy on cloud servers to enable remote testing and monitoring.
 
Get unparalleled visibility into database security posture
 
Know exactly where risks are and how to minimize the likelihood of a breach by automatically discovering databases on the network, and conducting more than 3,000 checks for vulnerabilities.
 
Save time and money by reducing the need for external database security consultants
 
Get recommendations for remediation for the most high-priority vulnerabilities, in many cases augmented with fix scripts you can run to address any issues.
 
Gain access to more than 3,000 security verifications
 
Get comprehensive and up-to-date checks of the most popular database platforms reporting on meaningful criteria such as version/patch level, changed objects, modified privileges, and forensic traces from common hacker tools.
 
Discover databases and sensitive tables automatically
 
Find databases by scanning the network or by importing from existing tools, and identify tables containing restricted information based on preset patterns.
 
Check passwords quickly and efficiently
 
Use a variety of techniques to detect weak passwords and shared passwords, including hashed passwords (SHA-1, MD5, and DES), by downloading data for local analysis to avoid affecting database performance.
 
Get out-of-the-box regulatory compliance reports and custom reporting
 
View reports for PCI DSS and other regulations, as well as specific reports for various stakeholders such as database administrators (DBAs), developers, and InfoSec users.
 
Get recommendations and fix scripts for high-priority items
 
Organize items by priority and provide actionable recommendations for remediation based on input from leading security researchers.
 
Integrate directly with  ePolicy Orchestrator (ePO)
 
Plug  Vulnerability Manager for Databases directly into the ePO platform to get centralized reporting and summary information for thousands of databases from one consistent dashboard.
 
Prepare for and perform well during a security audit
 
Detect altered data, including modifications of privileges and user tables, while spotting security issues such as SQL injection vulnerabilities.
 
Accelerate time to compliance and minimize audit cycles
 
Use out-of-the-box compliance reports to uncover potential issues before an audit, minimizing the time and cost involved in confirming remediation post-audit.
 
Deliver speedy fixes to help address vulnerabilities while prioritizing issues
 
Organize items by priority and review actionable recommendations for remediation. The database browser interface allows for quick application of fixes across multiple databases.
 
Check password strength in the fastest and most efficient manner possible
 
Detect weak passwords, shared passwords, and hashes passwords while downloading data for local analysis to avoid affecting database performance.

 

Data Center Security

Be proactive in securing the move to hybrid next-generation data centers (NGDCs)
Say “yes” to data center upgrades and consolidation projects requiring security measures for physical/virtual/cloud computing (PVC) infrastructures. Build security directly into the design architecture; apply security controls optimized for hybrid, decent
Safely roll out a virtual data center infrastructure
Get protection against fast-changing threats while safely unlocking the power of virtualized applications and servers through improved performance and resource utilization. Holistically monitor and enforce agile intrusion prevention and access control pol
Assure data center integrity through threat protection assessment
Get real-time predictive protection with  Global Threat Intelligence. It guards your data center across all key threat vectors — file, web, message and network — through ’s product portfolio to pinpoint critical, at-risk assets.
Align security measures to meet the modular, hybrid, and ubiquitous protection needs of NGDCs
Provide security controls optimized for the modular components of NGDCs: servers, storage, data, and networks. These comprehensive security measures work within a unified management environment spanning physical, virtual, and cloud computing infrastructure
Implement comprehensive security strategies
From risk assessment to the creation of trust zones extending to the public cloud,  helps secure your data, database workloads, virtual desktop infrastructure, and networks through comprehensive security controls.

 

Network Threat Response

Give security analysts a powerful forensic tool
 
Get deep visibility into the threat context inside your network.  Network Threat Response can examine a series of packets to characterize an attack, discover malware payloads embedded inside PDF files, analyze payloads, and even recreate the series 
 
Characterize unknown threats
 
Find new network activity and new behaviors unique to your network, accelerating malware analysis and threat response. Network Threat Response focuses on identifying, collecting, reverse engineering, and labeling malware and bots. It provides real-
 
Automate the response process
 
Reduce time spent sifting through thousands of threat alerts by viewing confirmed attacks. Using a unique embedded data-coupling process, Network Threat Response confirms the appearance of vulnerabilities and attempts to exploit. Only  Network
 
Reduce the sensor-to-analyst ratio
 
Automate tedious manual examinations, enabling experienced security analysts to focus on new, abnormal, and unique network activity. By providing metadata signatures with built-in correlation elements, such as data coupling,  Network Threat Response
 
Get instant threat response
 
Identify malware using network exploits to move on your internal network.  Network Threat Response captures malware for analysis and response. This stream-based solution rapidly decodes payloads, intercepts and downloads malware, and provides detail
 
Block attacks with unique signature database
 
Trust a large signature database, as well as templates, to stop attacks. The SNORT-compatible malware signature database contains more than 18,800 signatures, and 200 new signatures are added each month.  Network Threat Response helps create new sig
 
Integrate easily with  network security solutions
 
Get complete protection against malware.  Network Threat Response typically works in conjunction with an enforcement appliance like  Network Security Platform or  Firewall Enterprise. New malware is captured and sent to  Artemis Te
 
Streamline web-based management
 
Reduce overhead and save time with simple, centralized management. The  Network Threat Response Control Center is a web-based management console that manages multiple Network Threat Response sensor appliances. Control Center is also installed on eac

 

Endpoint Encryption

Data Protection Suite for Rights Management

Protect sensitive data automatically
 
Discover sensitive data without any user interaction and eliminate inefficiencies inherent with manual process-based data protection solutions. Instantly scan local user drives to find sensitive data that needs to be protected and immediately assign a rights management (RM) rule based on your information security policies. User access rights are defined by individual, job title, job function, and other parameters.
 
Share information with confidence
 
Collaborate with third parties without worrying about data breaches. Dynamic and effective policy management ensures that company information sent to stakeholders, customers, vendors, suppliers, partners, and potential new business associates remains secure and doesn’t end up in the wrong hands.  Data Protection Suite for Rights Management helps avoid costly and damaging data loss, and supports regulatory compliance.
 
Safeguard data sent to third parties
 
Protect data sent via email, the web, and removable hard drives. Encrypted files can only be accessed by authorized users and the RM protection travels with the document, regardless of the device used to access the file.
 
Secure data throughout the entire lifecycle
 
Audit, revoke, change, or update user privileges to maintain control over data even after it leaves the organization. You can restrict access to data for a specific period of time, rescind a document, and alter authorized users or groups. Protection remains in place regardless of where users are located or the length of time they have the data.
 
Get instant support for hundreds of millions of users
 
Support a broad user base. Data Protection Suite for Rights Management works with Adobe Reader and Microsoft Office.
 
Seamless file integration
 
Protect commonly used file types, including PDF and Microsoft Office documents. Adobe Reader includes native support for rights management, giving you instant coverage for hundreds of millions of users. Microsoft Office documents are supported via a simple plug-in.
 
Get comprehensive and cost-effective data protection
 
Find sensitive data on your local drives in real time and automatically apply RM usage policies from the Adobe Live Cycle server. Digital rights management protects files against unauthorized access, regardless of where the file resides or how it is distributed. Automated processes eliminate error-prone manual data discovery, lowering administrative overhead.
 
Ensure protection for unsecured data
 
Stop data that does not have a RM applied from leaving your organization via email, web, or removable media device.
 
Simplify centralized data security management and deployment
 
Ease data security management with the  ePolicy Orchestrator ( ePO) platform. Deploy, monitor, and generate actionable reports to boost security and support compliance. The  ePO platform pushes data policies out to every corporate endpoint to ensure that all sensitive data is discovered. From a single console, easily manage security deployment and track, audit, and report on sensitive data access to meet compliance requirements.

 

Manual Support *
   
Packages F - (50 lakhs) - (includes Package A, B, C, D and E)
Server - (Free) ** Dedicate Server
Dedicated IP ** For 5 domain

System Recovery Server Edition

Restore physical and virtual servers from local or off-site destinations in minutes, even to bare metal, dissimilar hardware, remote locations, or virtual environments
Offsite Backup Copy to FTP location or secondary disk drive for enhanced disaster recovery capabilities
Perform seamless, automated physical to virtual (P2V) and virtual to physical (V2P) conversions
Capture and protect the entire system, including the OS, applications, all files, device drivers, etc. in one easy-to-manage recovery point with image-based technology
Schedule server backups to run automatically, including event triggered backups, without disrupting user productivity
Built-in AES software encryption of server backups ensures the security of critical business data

 

Data Loss Prevention Standard

Coverage of endpoint incidents, including e-mail, Web, IM, USB, print/fax, copy/paste
Automatic remediation capabilities for data loss incidents
Editable policy templates for quick configuration
Pop-up screens educate employees and allow for action cancel
Identify data loss at the endpoint
Monitor how employees use confidential data
Block confidential data loss activities
Demonstrate endpoint risk reduction to management

 

Data Center Security

Be proactive in securing the move to hybrid next-generation data centers (NGDCs)
Say “yes” to data center upgrades and consolidation projects requiring security measures for physical/virtual/cloud computing (PVC) infrastructures. Build security directly into the design architecture; apply security controls optimized for hybrid, decent
Safely roll out a virtual data center infrastructure
Get protection against fast-changing threats while safely unlocking the power of virtualized applications and servers through improved performance and resource utilization. Holistically monitor and enforce agile intrusion prevention and access control pol
Assure data center integrity through threat protection assessment
Get real-time predictive protection with  Global Threat Intelligence. It guards your data center across all key threat vectors — file, web, message and network — through ’s product portfolio to pinpoint critical, at-risk assets.
Align security measures to meet the modular, hybrid, and ubiquitous protection needs of NGDCs
Provide security controls optimized for the modular components of NGDCs: servers, storage, data, and networks. These comprehensive security measures work within a unified management environment spanning physical, virtual, and cloud computing infrastructure
Implement comprehensive security strategies
From risk assessment to the creation of trust zones extending to the public cloud,  helps secure your data, database workloads, virtual desktop infrastructure, and networks through comprehensive security controls.

 

Manual Support *
   
Packages G - (1 crore ) - (includes Package A, B, C, D, E and F)
Server - (Free) ** Dedicate Server
Dedicated IP ** For 5 domain
Support - Dedicated Account Manager - 24 x 7 x 365

Protection Suite Enterprise Edition License

Fastest, most-effective protection, powered by Symantec Insight, for laptops, desktops, servers, messaging and web gateways--protection beyond antivirus.
Catch more than 99% of spam and prevent data loss with advanced content filtering to identify and control the flow of sensitive data in email and IM.
Web gateway security that protects against web threats, including malicious software, spyware, botnets, viruses, and malware.
Rapid data and system recovery recovers individual files and folders in seconds or complete Windows systems in minutes to dissimilar hardware or virtual environments.
Integrated protection technologies such as network access control, antivirus, antispyware, desktop firewall, intrusion prevention, and application and device control technologies.

Be proactive in securing the move to hybrid next-generation data centers (NGDCs)

Say “yes” to data center upgrades and consolidation projects requiring security measures for physical/virtual/cloud computing (PVC) infrastructures. Build security directly into the design architecture; apply security controls optimized for hybrid, decent

 

Safely roll out a virtual data center infrastructure

Get protection against fast-changing threats while safely unlocking the power of virtualized applications and servers through improved performance and resource utilization. Holistically monitor and enforce agile intrusion prevention and access control pol

 

Assure data center integrity through threat protection assessment

Get real-time predictive protection with  Global Threat Intelligence. It guards your data center across all key threat vectors — file, web, message and network — through ’s product portfolio to pinpoint critical, at-risk assets.

 

Align security measures to meet the modular, hybrid, and ubiquitous protection needs of NGDCs

Provide security controls optimized for the modular components of NGDCs: servers,storage, data, and networks. These comprehensive security measures work within a unified management environment spanning physical, virtual, and cloud computing infrastructure

 

Implement comprehensive security strategies

From risk assessment to the creation of trust zones extending to the public cloud,  helps secure your data, database workloads, virtual desktop infrastructure, and networks through comprehensive security controls.

 

Dedicated Manual Support 24 / 7 / 356
Domain Search
Search Your Domain

Register Your Domain at Low Cost
with our new Low Price
Domain Registration
 
Virtual Product Advisor
lappy
Live Demo
arrow_sky  View our demo site,
    try out some of our
    tools.
lappy
  +read more
Are you looking for more email ids?
LiveChat

Manashosting helps you to create large
websites without worrying about 'ceiling'.

chat now
What is Domain?
arrow_sky  A domain name is an online    identification label that an individual    or an organization.

                                                +read more
What is Web Hosting?
arrow_sky  A web hosting service is a type of    Internet hosting service that allows    individuals

                                                +read more
What is Web Space?
arrow_sky  Web space is the space provided on     the web server to host websites. In     other words

                                                +read more
What is Web Server?
arrow_sky  Manashosting has dell server    incorporated with the latest    technology.

                                                +read more
What is Webmail?
arrow_sky  Web mail is one of the most useful     web applications on the Internet,
    it allows

                                                +read more
What is Control Panel?
arrow_sky  A control panel, in web hosting, is a    web-based interface provided by the    hosting company.

                                                +read more
What is FTP?
arrow_sky  FTP stands for File Transfer     Protocol. FTP is used to connect two     computers

                                                +read more
What is a File Manager?
arrow_sky  A file manager or file browser is a    computer program that provides a    user interface

                                                +read more
What is Sub-domain?
arrow_sky  Sub domains are part of the main    domain name they don't need to be    registered

                                                +read more
What is Bandwidth?
arrow_sky  Bandwidth is a measure of the     amount of data that people     download

                                                +read more
Click We Will Call You
arrow_sky  Is to facilitate our customers to gain    access when they need a call back    from our sales

                                                +read more
7 Days Free Trial
arrow_sky  we provide you the opportunity to     determine the utility and applicability     of the services.

                                                +read more
Why to Choose Us?
arrow_sky  Superior uptime and performance |     Unlimited space at lower costs |         Latest Anti Spam.

                                                +read more
Customer Satisfaction
Spam Protection
arrow_sky  Inbuilt spam protection surge on our    servers helps us to fight malicious    spam.

                                                +read more
Web space Transfer
arrow_sky  When you are moving the hosting     package to Manashosting, and if     your site is active with another     hosting provider,

                                                +read more
Website Builder
arrow_sky  An easy tool though which any     person who do not have designing     knowledge can create their own     website with just few clicks.

                                                +read more
Ownership Certificate
arrow_sky  A Web Ownership Certificate is a     legal document that we provide to     our customers who purchase Web     space and Domain from us.

                                                +read more
Corporate Windows
arrow_sky  Looking for unlimited database
    MySql 2005, host your website on
    corporate Windows package.

                                                +read more
Corporate Linux
arrow_sky  Looking for MySql unlimited
   database with Cpanel control panel,
   a package that you can rely upon.

                                                +read more
Java Package
arrow_sky  Fulfill your Java requirement by     hosting your website on our Java     platform. Amazing features that is
     just right for your requirement.

                                                +read more
Renew Hosting
arrow_sky  Renewing you hosting account is as      important as renewing your
     passport or license if your website      generates revenue.

                                                +read more
Load Balancing
arrow_sky  The Server Architecture is so     designed that at no given point of     time

                                                +read more
Template
arrow_sky  We provide more than 5000 unique    templates that would best match your    needs.

                                                +read more
Award
arrow_sky Manashosting is proud to receive 12    international awards. After doing hard    labor, innovative

                                                +read more
World’s Lowest Price hosting
arrow_sky  The packages are such designed to     provide world’s lowest price without     compromising

                                                +read more
Quality
arrow_sky  World class datacenter,    Superior control panel, high    configuration

                                                +read more
What is Unlimited?
arrow_sky  Manashosting helps you to create    large websites without worrying    about ‘ceiling’.

                                                +read more
What is PHP?
arrow_sky  PHP is a general-purpose scripting     language originally designed for     web development.

                                                +read more
What is ODBC?
arrow_sky  ODBC is an Open Database     Connectivity, and is an interface to     access databases.

                                                +read more
What is TOMCAT?
arrow_sky  A popular Java servlet container from     the Apache Jakarta project. Tomcat     uses the Jasper

                                                +read more
What is ASP.NET?
arrow_sky  It is a server-side scripting     technology that can be used to     create dynamic

                                                +read more
What is JAVA?
arrow_sky  Java supports programming for the     Internet in the form of platform-     independent

                                                +read more
What is MySql?
arrow_sky  It is used to store information.     MySQL can store many types of data     from something.

                                                +read more
What is Mambo?
arrow_sky  Mambo is one of the most powerful Open Source Content Management Systems on the planet. It is used all over the world for everything

                                                +read more
ecommerce hosting?
arrow_sky  When setting up your eCommerce business, it is crucial to choose the right web hosting provider. You want your online store

                                                +read more
What is Domain Reseller?
arrow_sky  It is very possible for you to make money when you enroll in domain reseller programs. Registering for a domain reselling program

                                                +read more
What is Website?
arrow_sky  A website, is a collection of webpages, that is, HTML/ XHTML documents accessible via HTTP on the Internet, all publicly accessible.

                                                +read more
What is Windows server?
arrow_sky  A network server that uses the    Windows operating system, also    called “Win2K"

                                                +read more
What is a Linux Server?
arrow_sky  A network server that uses the    Windows operating system.
   A very popular

                                                +read more
What is Database?
arrow_sky  Collection of data or information     organized for rapid search and     retrieval.

                                                +read more
What is Joomla?
arrow_sky  Joomla is a free content management system used to create websites. Joomla allows web designers to construct sites by combining modules.
                                                +read more
Audio & Video Presentation
arrow_sky  To help our new clients and     customers to familiarize with control     panel, placing

                                                +read more
Antivirus
arrow_sky  Our servers are installed and     regularly updated by the latest     antivirus

                                                +read more
SSL
arrow_sky  Manashosting provides the most     widely-used security protocol on the     Internet, used

                                                +read more
VPS
arrow_sky  Amazing features, new hardware,    high quality configuration, choice of    managed

                                                +read more
V-Dedicated Servers
arrow_sky  A technology that gives the feel of    using a Dedicated Server but at the    cost of a VPS

                                                +read more
Dedicated Servers
arrow_sky  A complete independent single use    machine with scalable configuration    and easy

                                                +read more
Cloud:
arrow_sky  Cloud hosting is also known as enterprise or cluster hosting. It is a web hosting service which is offered from a network of servers.

                                                +read more
SaaS:
arrow_sky  SaaS is a software delivery method that provides access to software and its functions remotely as a Web-based service.

                                                +read more
Dedicated IP
arrow_sky  Dedicated IP refers to web hosting that provides the user with an IP address which is used solely by their website's server space and domain.

                                               +read more
Account manager:
arrow_sky  You can use our Account Manager option who will take care of your hosting account and do all the necessary steps and procedures to keep your account up and running.
                                                +read more
What’s New?
arrow_sky  All the latest updates of technology,    changes and much more happening    at Manashosting

                                                +read more
How to Renew?
arrow_sky  Renewal is as important as    purchasing of a new account.
   Most of the

                                                +read more
Free Products
arrow_sky  Various free products that would     help Manashosting’s customers not     just online

                                                +read more
Network
arrow_sky  Network plays a vital role when     providing hosting to our clients
    and hence

                                                +read more
A Domain Characters
arrow_sky  The valid characters for a domain name.


                                                +read more
Meaning of TLDs
arrow_sky  Meaning of .COm .Net .Org and other tlds.


                                                +read more
Testimonial & Portfolio
arrow_sky  Hundreds and thousands of happy     customers have said what they have     truly experienced

                                                +read more
Security
arrow_sky  In today’s internet world
   security is of primal importance
   and Manashosting

                                                +read more
Domain Transfer
arrow_sky  Manashosting’s technology helps a     customer to transfer their domain     from another

                                                +read more
Discounts
arrow_sky  Discounts are provided only to our     esteemed clients and specially     those chosen

                                                +read more
Speed
arrow_sky  With different top brass ISP     providers, powerful Dell servers and     with auto

                                                +read more
Uptime
arrow_sky  Manashosting’s unique server    architecture and the latest cloud    technology deliver

                                                +read more
How to Raise a Ticket?
arrow_sky  Customers can enter into our archive     of support and help through raising     a ticket

                                                +read more
How to Place an Order?
arrow_sky  The help file to guide a customer     without any human assistance and
    a step by

                                                +read more
Safe emails
arrow_sky  Mail exchange service would be the right option for you, don’t worry it does not cost you in lakhs but just in few thousands.

                                                +read more
Technical challenge
arrow_sky  "Technical Challenge 2011" in which technical manager challenged the customers to fix their issues

                                                +read more
Dynamic team work
arrow_sky  Our team members are very dynamic.

                                                +read more
Your vote counts
arrow_sky  As a company we approach our customers we believe in socialism.

                                                +read more
Expertise in?
arrow_sky  Our main expertise is in hosting as it says in the name.

                                                +read more
Our mission
arrow_sky  As a hosting company we wanted to provide hosting for all.

                                                +read more
How to Raise a Ticket?
arrow_sky  Customers can enter into our archive     of support and help through raising     a ticket

                                                +read more
How to Place an Order?
arrow_sky  The help file to guide a customer     without any human assistance and
    a step by

                                                +read more
More Databases
arrow_sky  With 10MB database one can store huge information. More space per database will reduce the quality and connectivity of your site.

                                                +read more
More email space
arrow_sky  We can also provide unlimited email id space and unlimited database space. But our main motto is to provide high uptime, speed and quality to our customers

                                                +read more
121 facts to know
arrow_sky  Get to know the most important 121 facts about the company before your purchase the package

                                                +read more
Frequently Asked Questions
arrow_sky  Are you still depending on human assistance? Get to know more answers for those questions that you had.

                                                +read more
Indian and foreign hosting
arrow_sky  Currently it looks like we are still under bondage and slavery by using or purchasing foreign goods, services and commodities.

                                                +read more
What is Cheap Web Hosting?
arrow_sky  Cheap web hosting is the right solution for anyone who is looking to set up a personal or a small business website. Cheap web hosting starts.

                                                +read more
Recover data
arrow_sky  There are several ways to start a restore operation. Using the Windows Control Panel, look for System and Security, then back up your computer.

                                                +read more
Collocation hosting
arrow_sky   Collocating the server gives you the greatest flexibility. You get to choose the hardware configuration of the server and the software

                                                +read more
Business Hosting
arrow_sky  Business Class Features Our business web hosting environment (corporate hosting) is perfect for all business class sites.

                                                +read more
Indian server
arrow_sky  A program which provides some service to other (client) programs. The connection between client and Indian server is normally by means of message passing

                                                +read more
Reliable hosting
arrow_sky  In today's highly competitive market, having reliable web hosting is very critical for the success of your online business.

                                                +read more
Web hosting company
arrow_sky  Website hosting basically means storing the digital field of your website, design and information on a computer that facilitates the Internet

                                                +read more
Why choose Linux server
arrow_sky  If you are planning to run your business online, and are looking for a server to host your e-commerce website, it is advisable to choose

                                                +read more
What is CSS?
arrow_sky  CSS stands for Cascading Style Sheets.

                                                +read more
Front page Extension?
arrow_sky  Front Page extensions are a type of language used involved in building the website.

                                                +read more
Domain Aliases?
arrow_sky  A domain alias is an alternate name for an Internet domain.

                                                +read more
Testimonial & Portfolio
arrow_sky  Hundreds and thousands of happy     customers have said what they have     truly experienced

                                                +read more
Security
arrow_sky  In today’s internet world
   security is of primal importance
   and Manashosting

                                                +read more
Domain Transfer
arrow_sky  Manashosting’s technology helps a     customer to transfer their domain     from another

                                                +read more
Discounts
arrow_sky  Discounts are provided only to our     esteemed clients and specially     those chosen

                                                +read more
Speed
arrow_sky  With different top brass ISP     providers, powerful Dell servers and     with auto

                                                +read more
Security of Domain
arrow_sky  Domain security is very important

                                                +read more
What is Domain?
arrow_sky  A domain name is an online    identification label that an individual    or an organization.

                                                +read more
risk factor
arrow_sky  When you are hosting your service with us you can move anytime you would like as we do not have any lock on your account.

                                                +read more
What is Web Hosting?
arrow_sky  A web hosting service is a type of    Internet hosting service that allows    individuals

                                                +read more
Flexible Approach:
arrow_sky  As and when there is a change in the market we upgrade and migrate and introduce new technology to the hosting packages.

                                                +read more
How to Pay?
arrow_sky  Manashosting has provided various    payment options for our customers
   to choose

                                                +read more

Datacenter

Data center is considered a top tier facility in terms of network connectivity and infrastructure design.

Online website Builder

You can design your own website with our free website builder in just few clicks. Design your own page

Free Products

Free source codes 5000 plus templates with free SEO tools to increase your page ranking.

Award winning Technical team

Our friendly technical support team is access able by chat, phone, ticket system, email and by SMS too.

Dell server

Servers are powered by Dell. These servers are high-end servers with high configuration

24x7 Customer support

Our technical team works round the clock to fix your issues in a speedy and effective manner

Super Fast Servers

We provide our customers with the best servers with high configuration super fast servers.

Secure Environment

Our servers are installed with the latest anti spam & antivirus software, with power backups

7 days free trial

Free trial is provided for customers to try our service and choose the best package for their business

Control Panel

Using Plesk(PEM) technology customer will get reliable, secure and flexible shared hosting account.

Superior Uptime

We provide 99.99% uptime. Our server structure is designed to provide the best uptime

How to Pay?

You can pay by Cash Deposit, Net Banking, Credit card, Debit card, Cheque/DD

 

image