perche scegliere Kinsta hosting

Our affiliate hosting: why to choose Kinsta

Questo contenuto è disponibile in Italiano

As a company F.technology, always attentive to the growth in toto of its knowledge and instrumentation used, we can boast, in the vast world of Hosting, that we “have tried a little bit of all of them” over the years, looking for that service that fully satisfied our and our clients’ needs: SiteGround, Flywheel, WP Engine, Cloudways… until we discovered Kinsta.

Kinsta dashboard

Love at first sight?

We have put Kinsta through its paces by attempting migrations of all kinds, stressed as much as we need their support service, asked why each feature was needed, and enhanced our clients’ websites far beyond expectations.

In the end, yes, we fell in love with it! So much so that Kinsta chose us as case studies.

Point by point: what makes Kinsta special?

wp kinsta infrastrucure google cloudflare

It is powered by Google Cloud Platform and Cloudflare

Kinsta is powered by the VMs of Google Cloud Platform and the Premium Tier network high-performance network.
All sites on Kinsta are protected by Cloudflare‘s free integration.

  • Compute-optimized C2 VMs to deliver 200% higher performance than standard VMs.
  • Cloudflare’s secure firewall with free DDoS protection.
  • Possibility to choose from 36 data centers for your site.
  • HTTP/3 support for incredibly fast page loads.
  • Qualified technical assistance 24 hours a day, 7 days a week.

Security Monitoring and Performance Optimization

Constant monitoring of the Kinsta infrastructure to provide high performance and security is ensured by the provision of unparalleled services:

wp performance security
kinsta compatibility

Works with all kinds of technology and frameworks

  • 19 programming languages and 4 types of databases with fully automatic configuration.
  • Compatible with any stack with custom Dockerfiles.
  • Supports all modern frameworks.
  • Creation of ultrafast static sites.

Would you like to try the benefits
of Kinsta hosting?

Want to know if your hosting
is better than Kinsta?

Some more technical information...

SOC2 type II ratio

https://kinsta.com/it/docs/soc-2/
The compliance report provides independent evidence of proper safety management.
It demonstrates that procedures are established and adhered to over time.

Kinsta infrastructure security

https://trust.kinsta.com/monitoring#INFRASTRUCTURE_SECURITY

  • Constant maintenance of service by applying security patches.
  • Periodic backups of production data.
  • Intrusion detection system.
  • Real-time replication of data to a second data center.
    Kinsta is automatically notified in case of failure.
  • Production systems can only be accessed by Kinsta employees authenticated by multiple factors.
  • Establishment of revocation of access for former Kinsta employees.
  • Authentication to production data centers for using secure authentication mechanisms (such as SSH, which are precisely customized).
  • Production systems can be accessed remotely only by authorized employees via encrypted connection.
  • Restricted access to encryption keys for authorized users with business-related needs.
  • Monitoring of systems, infrastructure and performance, with notifications when thresholds are reached.
  • Application access restricted to authenticated users with business-related needs.
  • Access control procedures: requirements for adding, changing and removing users are documented.
  • Administration tool to identify winds that may impact the achievement of security goals.
  • Network segmentation to prevent authorized access to user data.
  • Authentication to the “production network” is required to use unique identifiers, passwords and keys.
  • Firewall access restricted to authorized users with business-related needs.

Kinsta organizational security

https://trust.kinsta.com/monitoring#ORGANIZATIONAL_SECURITY

  • Encrypted devices.
  • Use of constantly updated and logged anti-malware technologies.
  • Background checks of new employees.
  • “Mobile Data Management” (MDM) system to centrally manage mobile devices that support the service.
  • Passwords of system components are configured according to predetermined policies.
  • Employees complete safety courses within 30 days of employment and at least annually.
  • Confidentiality agreement required of contractors at time of assignment.
  • Formal inventory of production system resources.

Kinsta’s product safety

https://trust.kinsta.com/monitoring#PRODUCT_SECURITY

  • Penetration testing at least annually.
    Remedial plan updated accordingly.
  • Data encryption.
  • Encryption in data transmission.
  • System Activity Log.
  • Established monitoring procedures for IT/engineering aspects, regarding vulnerability management and systems monitoring.

Kinsta’s internal security procedures

https://trust.kinsta.com/monitoring#INTERNAL_SECURITY_PROCEDURES

  • Quarterly scans on hosts of systems that face outside.
    Tracking high vulnerabilities for remediation purposes.
  • Quarterly access reviews.
  • Continuity/disaster hospitalization plans tested annually.
  • Indicator response plan tested annually.
  • Controlled management of user access to system components.
  • Established backup processes.
  • Restricted access to production releases.
  • Vendor management program updated annually.
  • Default procedures for infrastructure changes.
  • Default procedures for system configuration management.
  • Definition and management of roles and responsibilities.
  • Description of services to internal and external users.
  • Safety policies documented and reviewed annually.
  • Outwardly available support for any reports.
  • Contracts to all third parties.
  • Incidents related to the company’s security and privacy are recorded, monitored, resolved, and communicated to relevant parties according to agreements.
  • Predetermined software development cycle (SDLC).
  • Cybersecurity policy to mitigate the possible financial impact of business interruptions.
  • Ongoing evaluation of system capacity.

Kinsta data protection

https://trust.kinsta.com/monitoring#DATA_AND_PRIVACY

  • Pre-established, available, constantly updated and maintained privacy policy(privacy policy).
  • User data deleted upon abandonment.
  • Established procedures for compliance with protection.

Structure

kinsta architecture july 2021
Each platform site runs in an isolated software container with all the software resources needed to run the site (Linux, Nginx, PHP, MySQL).
The software that runs each site is completely isolated via Linux containters.
Each container is located in a Google data center and is protected by Cloudflare and Google Cloud.

Cloudflare

https://kinsta.com/it/knowledgebase/integrazione-cloudflare/
Cloudflare acts as a proxy between the server and visitors.

  • The firewall allows malicious traffic to be blocked by specific rules.
  • Distributed Denial of Service ( DDoS ) protection is in place.

Google Cloud

  • Includes a firewall with IP-based protection.

Questo contenuto è disponibile in Italiano

Related articles

SSL certificate renewal on Kinsta, how to do it?

Questo contenuto è disponibile in ItalianoIf your website is being hosted on Kinsta you will certainly have received, over time, several email communications from the hosting provider: incoming news and...

Mandatory upgrade to PHP 8.1 on Kinsta

Questo contenuto è disponibile in ItalianoIf you are one of our customers or manage a hosting space Kinsta you’ve undoubtedly received an important communication this week: it’s time to upgrade...

F.technology as case studies of Kinsta

Questo contenuto è disponibile in ItalianoDid you know? F.technology Made Easy was chosen as a case study by the staff of Kinsta! Read the full article here In the company,...