From managed firewall and host intrusion detection through to SSL certificates, domain names and DNS — Cloud365 provides and manages all the security layers your Australian business application needs. Firewall, SSL and intrusion detection are included in every managed service at no extra charge, and administered by our police-cleared Australian team.
Your domain name and DNS configuration underpin every other system your business uses — email, your website, application access, and authentication services all depend on correct DNS. Cloud365 manages domain names and DNS records as part of every service, ensuring changes are made correctly, propagation is monitored, and renewals happen automatically.
Unlike providers who hand you a control panel and wish you luck, we manage DNS on your behalf. When your application needs a configuration change, your developer requests a new record, or a domain requires renewal — we handle it, correctly and promptly.
SSL certificates are the foundation of secure communication between your users and your application. Expired certificates cause browser warnings that destroy user trust and can block access entirely. Certificate management — procurement, installation, renewal and monitoring — is something we handle for every customer.
We manage certificates across all your domains and subdomains, monitor expiry dates proactively, and handle renewals before they become an issue. For businesses with compliance requirements, we also manage extended validation and organisation validation certificates where required.
A firewall is only as good as the person managing it. Most hosted environments include a firewall by default — but default firewall rules are generic, and generic rules leave gaps. Cloud365 configures and actively manages firewall rules for each customer's environment, ensuring only the right traffic reaches your application.
We design firewall rules based on your application's actual requirements — what ports it uses, who needs access, what third-party services it communicates with — and update rules when your application or requirements change. When new vulnerabilities emerge, we assess and update rules without waiting for you to ask.
A firewall controls what traffic can reach your system. Intrusion detection monitors what's happening inside it. Our host-based intrusion detection system (HIDS) runs on every managed environment, continuously monitoring for signs of compromise — unusual processes, unexpected file changes, suspicious authentication attempts, and behaviour that deviates from established baselines.
When the intrusion detection system identifies a potential threat, it alerts our security monitoring team, who investigate and respond. Most security events are resolved before they affect your application or data.
Every Cloud365 managed service includes firewall, intrusion detection, SSL and domain management as standard. Get a quote and we'll show you exactly what's included for your application.
These services are commonly combined with security services for a complete managed solution.