Is your corporate letterhead complete? Not if you don't have a website listed. com2go offers a full range of packages to get your business on the web. From star-up hosting to e-commerce solutions, we have the right package at the right price for you.
All of our web servers are housed in climate controlled data centers with backup power supplies and multiple redundant connections to several backbone providers. Each server has access to no less than 135Mb/Sec of bandwidth at any given time.
For companies wanting to rapidly establish an effective presence on the Internet we offer a full range of options. Not only can we set up your domain and e-mail accounts, but we can also apply a number of extensions to create a professional WWW service that caters to your specific company needs. Backbone Connectivity
Our connections to multiple backbone providers, and peering with many carriers on a regional and international basis, allows us to easily reach remote networks even in the case where a NAP may be unhealthy, or when a specific backbone connection is down. It also allows us to make intelligent routing decisions; for example, if we are trying to reach a remote network which is on the Sprint network, there's no reason to send it out to UUNET first.
Com2go utilizes the industry's most-powerful commercial and open source security products and offers a multiple layer security infrastructure for our servers with redundancies throughout the website source network.
Network Assessment is scheduled and executed regularly by specialist 3rd party organisations, who focus in examining our infrastructure’s design strengths and weaknesses as well as executing specialized procedures to help identify vulnerabilities that may be present and result in prioritized recommendations for mitigation of vulnerabilities.
More specifically, specialist organizations are instructed to run Vulnerability Tests to all our servers and comprehensive examination of targeted areas of our networks infrastructure to determine their current state.
Because these are performed on a regular basis, we can notice unexpected changes to our systems that may result in decreased security.