ChilledWeb believe in building long-term client relationships. Our approach is always open and honest. Our pricing is transparent and easy to understand.
We are happy to offer advice and guidance so please contact us to arrange for a free, no obligation consultation to discuss your requirements.
You can find us working in our home offices, at a workshop, coffee shop or an event.
We are a modern distributed company and as such we don't work from a central HQ, we use leading collaboration tools to ensure a culture of inclusion and success.
As a customer you won't be dragged into meetings for 'meetings sake' or conferenced in to an 'echoing' speakerphone meeting; you'll be kept up to date regularly and consistently.
We pride ourselves on our communication and excellent client relationships.
ChilledWeb partner with Amazon Web Services to provide our customers with highly secure UK data centers that utilize state-of-the art electronic surveillance and multi-factor access control systems. The data centres are staffed 24x7 by trained security guards; and access is authorized strictly on a least privileged basis.
Not only are ChilledWeb applications and data protected by highly secure facilities and infrastructure, but they’re also protected by extensive network and security monitoring systems. These systems provide important security measures such as distributed denial of service (DDoS) protection and password brute-force detection.
Additional security measures include:
All our staff access both ChilledWeb and client servers using secure SSL connections.
Allow us to restrict access to a limited range of IP addresses that users outside the ChilledWeb network do not have access to. Therefore only authorised ChilledWeb employees based on a ChilledWeb network have access to ChilledWeb servers.
We keep logs of all user activity. We’re able to see what actions were performed on each of our resources and by whom.
Encrypted data storage
All our databases (with the exception of those on customer managed servers) are encrypted automatically using Advanced Encryption Standard (AES) 256, a secure symmetric-key encryption standard using 256-bit encryption keys.
All databases are backed up automatically on a nightly basis and held for seven days. Snapshot images are taken of each web/application server monthly and stored on an encrypted disk.
We employ Identity and Access Management tools that allow us to control the level of access our users have to our infrastructure services. Each user has unique security credentials, eliminating the need for shared passwords or keys and allowing the security best practices of role separation and least privilege.