• question_answerHow secure is the backup?
    BountySite stores all data on industry standard AES 256 bit encryption. The backup FTP credentials are stored on backup nodes which can be communicated only over SSL REST API. Credentials are encrypted using AES 256 in database, and database is stored over encrypted storage, using AES 256 bit encryption. Redundant Backup (including S3) is also encrypted using AES 256, at rest, and uploaded using https(encryption at transit). We recommend using FTPS(default mode) instead of FTP for encryption on control and data channel, for backup. We also can encrypt Mysql database, with the help of a tiny SSL Proxy application to send data to Mysql server.
  • question_answerHow fast is the backup?
    BountySite was designed to backup all sites on a hosting sever. It is very light weight and fast. So, speed is only a matter of latency between the storage node and hosting server. To get best results choose Enterprise plan in nearest location, to your hosting server. 1Gb full site backup can be done within 5min, and incremental backups within a minute. For best results, we recommend Hosting providers to build their own storage, with BountySite storage, within their hosting network. For data reliability/disaster recovery, a copy of data(Redundant Backup) can be kept in AWS S3 or on remote storage.
  • question_answerHow much backup quantity should I buy?
    In most cases, one quantity implies 1GB, unless mentioned explicitly. We do compress backup, but compression ratio is low for images, which mostly constitute site data. We also maintain unlimited restore points of website. So, it is a good idea to start with same size as your website. Quantity can be upgraded when your limit increases, as and when needed.
  • question_answerDo I need to be a techie to be able to configure backups?
    Configuring backup does not need any technical expertise. Just provide with FTP password and database password, and schedule your first site backup. It is also very easy to restore. BountySite also provides with concierge service for Hosting Providers/Resellers for any assistance, with user's approval.
  • question_answerWhat Remote Host(s) should I add to allow Mysql backup?
    We are distributed globally and our IP address vary to the server your account is provisioned on. We have come up with a solution to backup/restore Mysql over HTTPS, using PHP script. BountySite sends db credentials over HTTPS to the php script(not generic) and downloads database. This is more secure than doing a mysqldump. The php script is specific for individual site, and can be downloaded from the control panel, under corresponding site. If your site is working on HTTP, this will not work. Please move to HTTPS.
  • question_answerWhy do I care about backup speed?
    Sure, backup runs in the background and speed is hardly noticed. But faster backups is essential to release any hosting server resources. Also, BountySite backups your website with latest contents, before doing a restore, as anyone would or should. If your backup takes more than 30min, your restores will take longer time. BountySite restores are faster, because backups are faster. Restore is the most essential part of backup, which is commonly overlooked. Backup speed does matter!
  • question_answerHow does BountySite's file change notification help?
    BountySite notifies site owner on site file changes. Site owner can decide whether it was an unauthorized change. If unauthorized, site owner can take action to rectify it by restoring back that particular file and finding the root cause of the change. Site owner can easily investigate when the file change took place and what the file changes are. If you don't want to investigate yourself you can reach out BountySite Support to take care of it. Apart from this, BountySite does intensive scans on files to detect malicious files. Bountysite also detects threats before being exploited, which prevents malware.
  • question_answerHow does BountySite's malware scan work?
    Yes, BountySite does intensive malware scans and antivirus scans on all your files to check for malware. Malwares keep evolving and we constantly update our scans to catch these evolving malwares. The malware scans are specifically designed to intelligently catch the latest malwares spreading in the hosting environment. When BountySite catches a malware in a website it intelligently runs an intensive scan all other similar websites for the same vulnerability to quickly curb the malware spread.
  • question_answerDoes BountySite detect vulnerabilities on my website?
    Yes, BountySite runs scans to check for vulnerabilities on your website. The vulnerabilities are reported to you based on standard CVSS score. This tells you how critical the vulnerability is and you can decide to take action accordingly. We give out security patches to fix these vulnerabilities.We also give you instructions on how to fix it yourself. Alternatively, you can contact BountySite's Support team to fix it for you.
  • question_answerHow does BountySite's Security Patches work?
    BountySite releases Security Patches to fix known vulnerabilities on websites. If BountySite detects a vulnerability on your website it means that your website is at risk of getting infected. The Security patches fixes the vulnerability to prevent infection.
  • question_answerWhat is Dormant Site Protection? How does it help?
    Dormant Site Protection was designed for idle sites, which are not changed/modified for long time. These sites are commonly targetted by attackers. Dormant Site Protection allows sites to auto restore file changes to a predefined pristine version. When you know that your site files are not going to be modified, you can set this version (stable version) for Dormant Site Protection. When Bountysite detects changes, it automatically reverts back the contents to the stable version of the site.
  • question_answerHow does BountySite assure me Ransomeware Immunity?
    If you are infected by any Ransomware you can simply restore to the latest clean version before the infection. Our Backups are stored at a different location from the live environment where the infection would have taken place. Further you can contact BountySite Support for a root cause analysis of how the infection took place in the first place and fix the vulnerability that led to the infection.
  • question_answerHow does BountySite help me if I get blacklisted?
    Security is an ever evolving field, things can go wrong despite all security measures. In the even of a blacklist we immediately notify you to make sure immediate steps can be taken to un-blacklist. The main problem in trying to fix the blacklist issue is trying to find when and which files got infected. With BountySite's file change monitoring you can easily identify exactly which files changed without authorisataion and when it changed. These malicious files or the entire website can be easily restored back to the latest clean versions in a click.
Disaster Recovery
  • question_answerDo you support windows hosting?
    Currently, we only support Linux hosting for Disaster Recovery. While buying Disaster Recovery service, choose Trial plan to test. The Disaster recovery has been configured with common php modules, which should work in most cases. You can also switch your backup to run from Disaster Recovery node. Do note that we do not provide ftp or control panel access.
  • question_answerWhy do I need Disaster Recovery Hosting?
    During hosting server downtime or to put your site behind DDoS mitigation, during a DDoS of server/neighbor site.
  • question_answerHow do I switch my site to Disaster Recovery service?
    First and foremost make sure that TTL for domain(including www.domain.com) is set to 300seconds for faster transition between live hosting and disaster recovery. Simply changing DNS to Disaster Recovery node, should get your site online.
Backup Sync
  • question_answerWhy do I need Backup Sync service?
    Backup Sync keeps a replica of backup data, on a storage node of your choice. You can download a copy of data whenver needed. It provides better data reliability. Full control of site data. It is upto you to ensure security of your storage service.
  • question_answerHow often do you upload backup data?
    A copy of data is uploaded, whenever the site has undergone a file change or change in database content. If upload fails for various reasons, the job is retried. Every failure is notified via mail/notification.
  • question_answerWhat Bucket policy to set for my S3 account, for adding security?
    It is recommended to lock down your upstream storage service. In case of AWS Standard S3, the minimum permissions needed is List Bucket, Head Bucket and Put Object for respective bucket. If you want to add IP level restrictions, you can get IP from Add Database page, mentioned for Remote Mysql Host.
Contact Us