Professional Redmine Hosting
Improved Easy Redmine included
Top speed & connectivity guaranteed
Ready in a few seconds in your geolocation
The best security with SSL & daily backups
Why move your Redmine to the global cloud
99.9% long-term availability
Encrypted access, data, and backups
Daily backups on multiple geographical locations
Redundant hardware with RAID 1 mirror & backup machines
Guaranteed data reach at all times
Comparison of Redmine hostings
|SSL protection + backups|
|Improved Easy Redmine included|
|Redmine updates included|
|1 hour recovery quarantee|
|Hosted in your geolocation (maximal speed & connectivity)|
|Ready to use in a few seconds|
What do users say about Redmine hosting by Easy?
"Easy Redmine helps us a lot. We can utilize our employees with Resource Management plugin very well and we have also bought other plugins which we use for tracking of project costs and incomes."
Features of Redmine Global Cloud by Easy
The matter of security starts with users themselves. We are more than happy and capable of protecting your data, but we sure need you to cooperate on that. Knowledge and awareness together are the key.
We would like to suggest taking the following actions, even though most of the clients are well aware of them.
- Set up individual login credentials for each user,
- Do not share passwords with anyone – especially not online,
- Follow a set of rules when setting up (or changing) your passwords:
- 11+ characters,
- change them (at least) once a year,
- do not „recycle“ old passwords,
- avoid using the same text as both username & password,
- make sure the user’s account is deactivated after the person is suspended,
- generate a new password and an API key when you think the old one might be compromised,
- make sure users change their credentials themselves and do not use emails or chats for that.
Easy Software products come with the option of a mandatory change of users‘ passwords on a regular basis (one of the seven-time periods to choose from). That obviously does not end there, though. We included the option to set the required length of users‘ passwords to accommodate our clients‘ needs.
It is not the only request we took into consideration. A 2-factor authentication system is soon to be supported as well, in order to achieve an even higher level of security. LDAP & OpenID can be integrated for smoother access without any problems.
Having thousands of clients allowed us to monitor the overall usage of their storage space to make sure all clients will not suffer from the lack of megabytes. Clients are provided with 50GB of storage space for every application.
However, we want to make sure all clients are taken care of. If you need to keep safe files of larger sizes, do not hesitate to contact your Account Manager or send an email to email@example.com. Our team will always be happy to assist you and make that happen.
Nobody can predict the unpredictable. We are no different from other companies in this, as we too have to accept the fact that problems can occur – no matter how low such a risk is. Data reach will be mentioned below but first, there needs to be a process put in place that guarantees clients‘ data will never be deleted.
Working with data centers that are geographically distant from each other also allows us to make sure all backups are always stored in multiple locations. This works as a great precaution from natural disasters and represents yet another step towards making sure our hosting will never fail.
Backups are created every 2 hours for the first two days and once a day after. It is important to us to provide our clients the option to perform a rollback if requested, so those backups are saved for at least 2 months after being created.
Backups are encrypted both during the transfer and while stored on physical discs.
Everything is connected. The overall system is only as strong as its weakest link and we are well aware of it. All our backups and promises would not mean anything if we were not able to get our clients up and running in a short amount of time. Should any major problem occur, the database itself can be uploaded back within 15 minutes from the moment our server admins start the process. A separate upload of files is happening simultaneously as it is crucial to us to provide a working application as soon as possible. The time it takes to migrate all clients‘ files can take a few minutes longer as it largely depends on the total size. The migration of 10GB of files takes about 15 minutes.
99.9% long-term uptime has been achieved on regular basis.
Being able to replace a piece of hardware that malfunctioned in a quick manner is just as important as the rest when making sure clients‘ continuity is taken care of. Data is stored on a RAID 1 storage node mirroring on two discs. The application keeps running as long as there is at least one disc working.
We have taken an extra step, though, as we feel like there is never too many preventive measures. For every machine we have, there is another one to serve as a backup. Should any malfunction occur, the server is immediately backed-up by another one, while the former is being replaced promptly.
Users‘ access to the application is limited by the permissions set within the system. This part of our products is very complex, as it is a necessary part of a proper project management. Cross-site scripting (XSS) is prevented where required, the rest is handled by mentioned permissions.
Any access to the application goes through a tunneling protocol (SSL) while the database is stored on an encrypted disc. SSH-2 encryption is used for the backup transfer.
Only HTTP and HTTPS accesses are allowed through our firewall system. Every HTTP request is immediately redirected to HTTPS.
Permanent support & maintenance
Clients hosted on our cloud can use our 24/7 Easy Cloud hotline at +420 312 313 671. This hotline is intended only for emergency situations when your application is down and not available. You will not receive any user support or consultations on this number.
It goes without saying that all applications are constantly monitored and immediate reports are generated in case of any issues. This allows us to resolve the majority of problems without even affecting the end user.
Such monitoring does not concern applications only. All hardware is also under control at all times. This is essential for larger clients as we are able to suggest performance upgrades before users start experiencing higher response times of the application – making for an optimized configuration for every client.
These services, together with the initial setup and continuous administration, are included in the standard price for private clouds. You can find that on our pricing pages or reach out to your Account Manager and request further information.
We have always been fans of flexibility, both in products and services. Explore how can the hosting be modified, if you choose to be hosted on our Redmine Private Cloud.
We have been approached with requests of VPN a few times in the past. However, after several consultations with such clients, we have always agreed that it would not bring any extra usage, as HTTPS already serves the same purpose more effectively. We still understand that it might represent a strict requirement in some cases, so this service can be provided on our Redmine Private Cloud. Reach out for more information!
- Data security, as described above, is sufficient according to GDPR requirements and recommendations
- Please note that Easy Software does not control data of Easy Software‘s clients. Hence, according to our Terms & Conditions, our clients may comply with GDPR on the level of data collected in Easy Software products. Breach of this may result in immediate discontinuity of service.
- Easy Software products provide users with all tools to limit, erase or delete data upon request, as required by GDPR.
- Please note that upon official request Easy Software may become obliged to limit, erase or delete data. Easy Software policy is to provide enough time to clients to perform necessary actions before Easy Software has to perform obligatory data changes directly.
- Multiple high-end data centers, all fulfilling parameters in the following description
- Every data center holds appropriate certifications
- Geographically distant data centers to prevent permanent damage from natural disasters
- Barbed wires, surveillance & security systems in place
- Restricted access, thorough verification system & 24/7 human presence on site
- Two separate electrical power supplies, two network connections & network rooms
Security of facilities
Even though it is highly unexpected there would be any attempt to breach these facilities, we see it as our duty to make sure clients‘ data are always secure. All access points to data centers are strictly monitored and every boundary of the property is secured using barbed-wire fencing. This, together with a video surveillance and movement detection systems, are designed to prevent any intrusions. The security team is on site 24/7 to support the technology set up to guarantee proper safety.
Staff members have to follow strict security procedures. Every employee receives a RFID name badge that restricts their access and permissions and is required before passing through security doors. Access rights are reassessed on regular basis.
Electrical supply and network
Two separate electrical power supplies power data centers, equipped with UPS devices (250 kVA per device) and backed-up by generators with an initial autonomy of 48 hours to make sure servers are always accessible. Some of the server ranges are also equipped with double power supplies and double network cards, making sure the infrastructure is redundant from end to end.
Fibre optic network is deployed across the globe with cutting-edge technology that is installed and maintained by in-house teams of engineers. It was also chosen to build the network in a totally redundant manner where multiple security measures have been put in place, in order to eliminate any risk of failure or serious issues. Such redundancy allows clients‘ data to take the shortest path and noticeably lower the overall response time.
At least 2 separate network connections are maintained within each data center to prevent any issues resulting from the providers‘ outage. There are also 2 network rooms capable of taking over one another to serve the same purpose.
It is understandable that clients require multiple certifications as a proof of the data center’s capability of keeping their data safe. Here is a list of certifications that our data centers hold:
- PCI DSS Level 1
- ISO/IEC 27001:2013
- SOC 1 Type II and SOC 2 Type II
- Cloud Security Alliance (CSA) STAR self-assessment
Heat and fire have always been an enemy of high-performing technologies. It is very important to stay out of trouble by having every room fitted with a system that detects and extinguishes fire immediately. All data centers comply with APSAD R4 rule and N4 conformity certification.
Majority of hosting rooms are also free from air conditioning and have water cooling installed instead. This system disperses 70% of the emitted heat, while the air cooling takes care of the rest. This led to energy costs being halved, making for a more ecological way of work.