Measure and improve site speed using a variety of monitoring tools.
Protect your infrastructure & guard against malicious attacks.
Keep your ecosystem live at all times with uptime monitoring.
Protect key aspects of your online world with these common-sense monitors.
Track ongoing SEO performance with a variety of useful metrics.
Effortless application monitoring with a hands-on technical account manager.
Consultant led security testing for complete peace of mind.
Ensure the security of your public facing Web Applications.
The latest info on new features, development and other insights in the world of monitoring.
Tips, advice & answers to your frequently asked questions.
Developer guide for our RESTful API.
Use the form below to raise a support ticket with our team.
We will attempt to respond as soon as possible. Working support hours are 9—5:30pm GMT, Monday to Friday, with urgent requests answered outside of these hours.
Would you like to know when you are being targeted by attackers or Botnets? Receive an early warning of an impending security issue and obtain a list of networks to block to prevent it.
The RapidSpike Malicious User Detection system utilises Real User Monitoring (RUM) technology to identify when your website or web application is being targeted by known malicious networks.
Traffic is compared and identified in real time when your website is being targeted by botnets, attack networks and rogue proxy servers amongst others allowing you to be alerted to the issue enabling you to take action.
This analysis provides an early warning mechanism so that you can prevent an attack before it escalates into a service affecting issue. The customizable alerts will notify you when the traffic from these malicious sources is increasing and the system provides you with a generated list of malicious networks that can form a shun list for you to restrict access at your perimeter device such as your router or firewall.
The tool harnesses the power of a constantly updated list of known malicious IP addresses and networks, compiled by our security researchers from multiple trusted resources to ensure the accuracy and completeness of the data.
Posted in Functionality, New Features, Security
Posted in Development, New Features, Security, Vulnerability Scanning
Posted in New Features, Security, Vulnerability Scanning