Go to Top

Website Maintenance Plans

Services Offered Basic Basic + Pro
Automatic Malware Scan YES YES YES
The word Malware stands for Malicious Software. It can consist of things like Trojan horses, adware, worms, spyware and any other undesirable code which a hacker will try to inject into your website. If any malware code is inserted into the site you will normally not notice anything out of the ordinary based on appearances, but it can have a dramatic effect on your site’s search ranking. This is because the bots and Spyders from search engines such as Google have the capability to detect malware when they are indexing the pages on your site, and consequently they can blacklist your website which will in turn affect your search rankings.
Malware Removal YES YES YES
Malware works to remain unnoticed, either by actively hiding or by simply not making its presence on a system known to the user. The goal of using Malware removal technique is to stop any operations the malware may attempt on the system before they occur, including activities which might exploit bugs or trigger unexpected system behaviour. Usage of security monitoring script to remove backdoors, Rootkits, Trojan horses, worms, Fraudtools, adware, spyware and other malware.

We connect via FTP or SSH and use the latest research to perform a deep analysis of the application server, database, and software environment. We constantly evaluate the techniques used by hackers, allowing us to develop new tools to combat them. We use advanced heuristic analysis to flag new and emerging threats for immediate investigation.

Blacklisting Monitoring YES YES YES
Email is the lifeline of any business and customers, and being improperly blacklisted not only tarnishes credibility but it directly impacts the business in a negative way. Blacklisting Monitoring helps to eliminates concerns over unanticipated IP blacklisting, downtime and chances of financial harm due to email disruption.
Blacklist Removal YES YES YES
Breaklist Removal process provides a protective layer around the website that diverts site traffic through proxy servers. This means that when people try to put malicious code on your site at the server level they do not have access to your IP. Our Firewall technology also patches website vulnerabilities remotely via the virtual hardening and patching technology to help your website load faster.
Scan & Block Hacking attempts YES YES YES
1) Limiting the access to FTP:- Most FTP hacking attempts are automated so rely on guessing both the username and the password. We ensure the FTP usernames are not predictable in any way from the domain name – by appending some random letters or digits.

2) Dynamically blocking Login attempts: Program created that will detect failed login attempts and automatically block the source IP address for a period of time.

3) Identifying entry points. Installing proper scanning software programs to identify all entry points from the internet into the internal network of the company. Any attack to the network needs to start from these points.

4) Removing default, test and example pages and applications that usually come with web server software.

5) Configuring firewalls. A firewall will have its own configurations depending upon the security aspect of organization. From time to time proper analysis of the composition and nature of the traffic itself is done to maintain security.

Denial of Service (DDoS) Protection YES YES YES
A distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. There are two types of DDoS attacks: a network-centric attack which overloads a service by using up bandwidth and an application-layer attack which overloads a service or database with application calls. The inundation of packets to the target causes a denial of service.

Defensive responses to denial-of-service attacks typically involve the use of a combination of attack detection, traffic classification and response tools, aiming to block traffic that they identify as illegitimate and allow traffic that they identify as legitimate. The Defensive techniques involves usage of: Firewall, Switches, Routers and IPS based applications.

Automated Website Backups with Database YES YES YES
Automated Website Backup is a process to undergo backup service that protects WebPages, databases, files, and emails. Backups are done incrementally to ensure efficient, accurate data storage. It will allow protection from threats by hackers and other cyber criminals and easy recovery and restoration of your data from previous versions

Automated Website Backup offers a reliable backup solution for all data, including:

1) All of website files

2) MySQL database files

3) Images and additional website information

4) Scripts and applications used for your website

5) cPanel email forwarding structure and stored emails.

Manual Website Backups with Database NO YES YES
Backup is the activity of copying files or databases so that they will be preserved in case of equipment failure or other catastrophe. Backup is usually a routine part of the operation.

It provides insurance against all types of setbacks, such as security compromises and inadvertently deleting your entire site.

Website/Application Firewall Integration YES YES YES
Web Application Firewall protects against the most critical web application security risks, such as SQL injection, cross-site scripting, illegal resource access and remote file inclusion.

1) Total website security – protection from application layer attacks

2) Highly targeted vulnerability remediation (known as virtual patching)

3) Automated remediation that reduces the time, complexity and cost of

4) Protecting your Web applications without the need for manual intervention.

CMS version monitor & update NO YES YES
The main reasons for keeping every aspect of your CMS up to date are:



Bug fixes



Third –Party Plug-in version monitor & update NO YES YES
Plugins need to be updated as soon as updates are available, particularly patches to plugins which are bug and security fixes. Sometimes plugin upgrades are so big that we need to recreate any customized template files or stylesheets or re-enter data.
Third –Party Plug-in version monitor & update NO YES YES
Plugins need to be updated as soon as updates are available, particularly patches to plugins which are bug and security fixes. Sometimes plugin upgrades are so big that we need to recreate any customized template files or stylesheets or re-enter data.
Cross-Browser & Device Compatibility Check NO YES YES+ Detailed Function checks
Live testing environment with access to various browsers across different operating systems in order to enhance efficiency and user experience and thereby, business.
Mobile Responsive Check (Simulated Environment) NO YES YES+ Detailed Function checks
Responsive design refers to a technique that enables websites to change their layout and content based on the device being used to view them. We intended to show, how visual elements of the site respond to different screen sizes.
Functionality Checks & Fixing-All pages YES YES YES
Functionality Checks & Fixing-All Links YES YES YES
Functionality Checks & Fixing-All Forms YES YES YES
Functionality Checks & Fixing-Other functional elements of the site NO YES YES+ Detailed Function checks
Usability Testing – User scenario creation & checks NO YES YES+ Detailed Function checks
Requirement wise Modification on Website/Performance Enhancement NO YES YES
AMOUNT (Monthly) $179 $299 $419
AMOUNT (Yearly Discounted) $1979 $3299 $4539

Terms of maintenance:

  • If a monthly plan is chosen – service will be charged in advance which is non-refundable on a pro rata basis.
  • Yearly Plan will be charged on pro rata basis as per the discounted amount. A charge of 2 initial months is non-refundable.
  • For Monitoring & fixing multiple elements of the website on a regular basis, many internal & external resources/services will be used.
  • All the service hours are subject to man hours spent (details below per month). Any additional charges per hour spent will be based upon technology of the website.
Basic Plan Basic + Pro
10 Hours 17 Hours 23 Hours
  • The three plans defined are designed on a general study of the size and security requirements of websites and web applications owners. A custom plan can be created : “PRO Advanced” for websites having a larger database.