Technical Details/ Hosting Specifications

Technical Details
EastonOnline enjoys the use of a network infrastructure that is unprecedented in the hosting sector. We are situated on diverse OC192 backbones of Tier 1 carriers. Our vast array of private and public, high capacity peering arrangements provides the redundancy, survivability and resiliency to serve mission-critical hosting and email applications of enterprises worldwide.

Peering strategies, including those to Tier 1 backbone providers, allow us to share the digital distribution architectures of our peers, which include private relationships with AT&T, Sprint, AOL, C&W, IBM, UUNET, Telus, Level 3, and many more. These peering relationships also interconnect at all major public exchanges, including Mae East, Mae West, PAIX, and other popular NAP’s (Network Access Points).

Redundancy provided by Clustered Server Environment
EastonOnline's web server clusters are bundles of hardware, operating systems, and applications integrated to host and serve business-critical web applications to users worldwide. EastonOnline ensures that the hardware, software and network infrastructure to support websites are optimized for speed and efficiency and robust enough to handle the peaks and valleys of customer demand.

Unique Windows Hybrid Platform
EastonOnline has developed a one-of-a-kind technology that combines the functionality of 'Windows® hosting' and 'UNIX hosting' onto one platform. Your customers do not choose one or the other hosting platform; instead they run their ASP/MS Access and PHP/MySQL based sites from the same server farm. With our seamless blending of UNIX and Microsoft® technologies, EastonOnline's hosting system is truly a 'cross-platform.'

Industry leading SLAs guaranteeing 99.9% up time
EastonOnline guarantees that our network will be accessible for at least 99.9% of the time in every calendar month. EastonOnline also guarantees that every major network service (i.e. HTTP, SMTP, SSL, POP, IMAP) will function for at least 99% of the time in every calendar month.* If a network outage affects our customers' sites, EastonOnline will notify our customer via email within 90 minutes of the outage. If the customer is not notified within the specified time, they may apply for a free day of hosting for the affected sites. Email notification will be sent to their primary contact email address.

* This does not include scheduled maintenance windows where it may be necessary for equipment to be cycled. These maintenance windows are scheduled at times which least impact customers, based on minimal overall activity on our systems. Customers will be notified at least 72 hours prior to these events. Our architecture is designed to minimize events which require downtime. It is anticipated that maintenance windows requiring complete downtime will be limited to a maximum of two per year.

Multi-homed network utilizing latest BGP technology
Our implementation of intelligent routing, coupled with the industry standard BGP (Border Gateway Protocol) peering, removes commonplace 'hot potato' routing where packets can sometimes move further away from its destination. Our network technology robustly transmits data with the least possible latency.

RAID Storage provided by Network Appliance
Data integrity and speed are assured by multiple Network Appliance Filers using RAID technology. This assures reliability where the RAID (Redundant Array of Independent Disks) allows an increase in the mean time between failures but also increases fault tolerance through a large data capacity and by placing data on multiple disks. This configuration allows I/O (input/output) operations to overlap in a balanced way, improving performance. Three back up systems are in place, one being on-site and two off-site at geographically separate data centers. All systems are monitored 24/7 by experienced NOC staff.

Perimeter security via multi-tiered firewalling
Servers are protected with software-based firewalling. These look at source and destination addresses, and source and destination ports. Our systems are secured using the latest security methods including router access list filtering on inbound carrier feeds and firewalling at the SYN level on internal devices. Security systems, including firewalls, are tested on a monthly basis. We use security scanners that are automatically updated instantly with the latest exploit/DOS check codes. This provides us with an accurate and detailed report on our systems. Our security team is also subscribed to all the major security mailing lists, including BUGTRAQ from These lists provide access to the latest security information, which enables us to patch newly found exploits within hours of their discovery.