Get Peace of Mind

Rhyno CLoud is an enterprise, fully-managed service plan that allows your organization to receive hosting, support, updates, cyber-attack monitoring and cleanup, custom development, and reporting for your system for a fixed monthly cost.

Our hosting architecture is built for performance, durability, and security. We maintain that infrastructure with server support, Core updates, backups, and regular security audits so you can get back to what matters.

Request Information

Trusted by leaders

Good-bye maintenance

Rhyno Cloud is built and maintained by a team of experts. We combine our development, IT and cybersecurity expertize with world-leading technology, so you don’t have to worry.

Optimized for WordPress, Drupal, Joomla & Other Popular CMS

Reliable Linux and Windows web hosting environments via AWS, MS Azure or OVH, with your choice of ready-to-run  hardware and software configurations. Take full control and enjoy developer-friendly features like the BWIRED-CLI, WP-CLI, and Git.

Powerful Malware and Cybersecurity Breach Platform

Our all-in-one firewall and cyber-security solutions cover your websites with backup/disaster recovery, protection, monitoring, whitelisting, and hack cleanup for thousands of both server-side and website malware.

Periodic Backups, Web Updating and Dedicated Staff

Great customer service is an essential part of what we do. We perform web maintenance, regular security and non-security updates on your CMS, and provide you with a dedicated account specialist to answer all your questions.

  • Managed Cloud Hosting via AWS or MS Azure
  • Moderate and high network performance
  • Auto-scaling and CDN included
  • Backup and Disaster Recovery
  • Web Maintenance and Support
  • Security and non-security updates
  • 24/7 website security monitoring
  • Staging environment for testing
  • Periodic website and Server Security scans
  • Blacklisting check and warning Removal
  • Full malware detection and protection
  • Website hacking clean-ups
  • Forensic reporting for security breaches
  • Unlimited page-views
  • Private/elastic IP and SSL
  • Website and server migration included
  • Discount on extra design and development
  • "Build-your -own" server specifications options
  • Managed Cloud Hosting via AWS or MS Azure
  • Moderate and high network performance
  • Auto-scaling and CDN included
  • Backup and Disaster Recovery
  • Web Maintenance and Support
  • Security and non-security updates
  • 24/7 website security monitoring
  • Staging environment for testing
  • Periodic website and Server Security scans
  • Blacklisting check and warning Removal
  • Full malware detection and protection
  • Website hacking clean-ups
  • Forensic reporting for security breaches
  • Unlimited page-views
  • Private/elastic IP and SSL
  • Website and server migration included
  • Discount on extra design and development
  • "Build-your -own" server specifications options

Rhyno Cloud at a glance

Bwired delivers an enterprise-level solution that is fully-managed and includes Hosting, Website Security, Maintenance and Support.

Hosting: Our hosting options feature optimal space, fast performance, painless resource scaling, multi-region redundancy, and enterprise-grade backup and disaster recovery.

Security: Our system monitors your site and servers 24/7 for thousands of vulnerabilities and threats. If your site ever gets infected, we bring it back to life quickly.

Maintenance: We perform security and non-security updates on your CMS as soon as they are available including core, extensions, plugins, and components.

Support: Our security support time expands to other activities such as fixes and general maintenance of your Web application.

Regular Bwired’s standard support hours are from 9am to 5:30pm, Eastern Standard Time excluding public holidays. Extended support hours which include weekdays and weekends (24/7) are covered under levels 3, and level 4.

  • Support Portal. You can log in to our online service portal at to raise a support request ticket at any time
  • Chat. You can chat with a Bwired representative anytime via
  • Email. All emailed support enquiries must be sent to [email protected] which will create a work task in our system to track your request
  • Phone. If you contact us by telephone, we will create a service ticket in our online service portal to track your request.


Any support, maintenance and custom work performed by Bwired in response to a request made by the client. This covers activities such as answering questions, giving advice, resolving issues, training, new development and providing help and technical assistance. Support requests are charged using the available monthly hours allotted in your Managed Service Plan. Extra work will be charged at Bwired’s standard rate for Level 1 plans and at the corresponding discounted rates for the Level 2-4 plans. All extra work beyond the time allotted in your plan will be subject to estimation and client approval prior to commencement of work.

Ticket Priority Description Expected Response
Medium Non-security related updates, general support requests Within 1 working day
Urgent Security-related updates, partial problems with the Website 4 hours
Critical Security breach, website not available (down) Immediate (1 hour)

Bwired’s Fully-Managed Service Plans apply to WordPress, Drupal and Joomla Content Management Systems. We also have an online service portal to manage support contracts, communication, work planning and task status. We offer four levels of support, tailored to suit your business size and requirements.

Microsoft Azure

Microsoft Azure is one of the leading cloud platforms that provides basic IaaS capabilities to deploy your workloads on comprehensive preconfigured VMs across Windows, Linux of different compute, storage and network characteristics. Azure provides native support for containers like Docker and Mesos and orchestrations with Kubernetes. But the power of Azure really comes from 50+ cloud services that allow you to build native Azure applications, reducing cost, providing true elastic scale and a platform for modern applications. We provide full lifecycle provisioning, monitoring and management for:

  • Azure Cloud Services
  • Azure Web App
  • Azure VM (compute)
  • Azure Storage
  • Azure Network
  • Azure SQL PaaS
  • Azure Site Recovery
  • Azure Backup
  • Azure Security
  • Microsoft In-tune
  • Azure Active directory
  • Subscription Management
  • Containers service
  • VM Scale Set
  • Service fabric


Amazon Web Services (AWS)

Amazon Web Services is the leading cloud platform that provides over 70 services across compute, storage, databases, analytics, networking, mobile and IoT. AWS is widely used by enterprises and startups alike for web and mobile applications, game development, data processing and warehousing, storage etc.

Our AWS managed services provide full lifecycle provisioning, monitoring and management for:

  • Elastic Compute Cloud (EC2)
  • Amazon Elastic Beanstalk
  • Amazon Simple Storage (S3)
  • EC2 Container Service
  • Amazon Glacier
  • Amazon Relational Database Service (RDS)
  • Amazon Redshift
  • AWS Identity and Access Management
  • Amazon WorkSpaces
  • AWS Directory Service
  • AWS Mobile Hub
  • Amazon API Gateway
  • Amazon Elastic Cache
  • Amazon Route 53
  • Amazon VPC
  • Elastic Load Balancing

The demands of Enterprise are not those served by typical hosting platforms. You need flexibility, reliability, security, audits, developer tools, fail over and automated backups. More than that, your biggest need is to not worry. We got your back. Our hosting platform is a scalable web hosting solution designed for your needs. With high performance, continuous integration, deployment services, and monitoring options baked in.

Our unique managed service offers painless configuration of AWS instances and clusters, resource scaling, multi-region redundancy, and enterprise-grade security.

When updates are required for your CMS, Bwired will promptly perform these updates using the available hours of your managed service plan. Updates include core CMS, plugins, components, and modules. Bwired will evaluate all security releases based on their requirements. Any issues or extra work arising as the result of an update, such as backward incompatible or core resources or extensions, will be performed using the available hours of your managed service plan and at the standard/discounted rate if the hours in your plan have been exhausted. If you have exceeded the available hours in your plan, Bwired will advise you of the costs involved before undertaking any extra work on your Website.

If an urgent security update becomes available, we will contact you immediately to perform the update and protect your data and infrastructure.

Updates usually take on average between 3 – 8 hours and are required every few months based on WordPress, Drupal and Joomla release trends.

When an update is applied, any linked staging site will be deleted and re-cloned from the updated production web site to reflect the current production version.

Updates are provided by the CMS foundation and third-party vendors. They involve making changes to the code and database in such a way that it doesn’t affect its core structure, functionality or design of your CMS. Updates include bug fixes, security patches or added support for core and functionality.

Upgrades on the other hand are a set of changes made to the CMS that are significant and substantial such as important changes to the GUI, adopting new technology for the CMS, or new features and options which are not present in the existing version of the CMS. Upgrades are provided by the CMS foundation and are not security-related.

Performing an upgrade to your CMS is more complicated and requires a development plan. CMS upgrades are not covered in this Service Level Agreement and are subject to estimation and client approval.

Any Website hosted on the Internet is vulnerable to cyber attacks. Bwired treats all security breaches as Critical Incidents and will create a support request in our online service portal to track the remediation of your web site immediately.

A CMS that is not continually updated is substantially susceptible to attack. Security releases for your CMS are frequent and keeping your Website up to date is extremely important. Although Bwired can not guarantee that your Website will be free of attacks, we have put forward this Managed Service Plan as a preventative measure that will dramatically reduce vulnerability issues and help mitigate the impact of attacks if they were to occur. In the event of a security breach, our process under this Service Level Agreement is as follows:


Step Description Level
1 Our monitoring service will report a security breach immediately. An alert will be sent to the client. (for Level 1, clients are required to report security breaches to Bwired) Level 2-4
2 Scan the site code and database for possible entry points. Level 2-4
3 Clean the security breach immediately either by removing infected/added files, database dumps or by restoring the site from a previous backup if your hosting service provides backups. (included in levels 3 and 4) Level 3-4
4 Quarantine the Website for 30 days. During our clean up, a ‘quarantine’ folder is created and that is where all infected files are kept. They are encrypted and will not harm your site in any way. We keep the infected backup for comparing. Level 3-4
5 Produce forensic report Level 4


Any work undertaken by Bwired to remedy your Website including forensic analysis is either included in your monthly support plan, as per the above table, or will be charged at our standard/discounted hourly rate. We will endeavor to seek approval for remediation if the hours in your plan are exhausted.

Bwired may be required to restore your Website from a backed up image of your website in order to revert the security breach immediately. Please make sure you have a backup plan in place. Bwired offers Backup and Disaster Recovery plans. Please note backup and disaster recovery is not part of this Service Level Agreement.

In certain cases, your Website maybe be temporarily offline while the breach is remedied.

A staging site is an environment setup for our clients (Level 2 and up) for testing and approving the performed work. This environment exactly resembles the production environment. In other words, it’s a complete but independent copy of the production environment of your CMS, including the database. Once the client is satisfied with the changes and the work is approved, Bwired will promote the updates to the production Website. Our development/update process is as follows:


  • Our main branch of the central code repository holds the code for the live server
  • A secondary branch holds the staging server code
  • Development/updates are done and tested on our internal development environment
  • When a feature/update is completed and fully tested in the development environment, the branch is pushed to the repository and merged with the staging server code, which is then checked out to the staging server.
  • When the code has been tested and approved by the client on the staging server, it’s merged with the main branch (the live server code) and checked out to the live server. As the branch has now been merged with the live code, the staging sever will be deleted.

Bwired monitors for signs of website hacks and warnings from blacklist authorities so we can react quickly. We detect downtime and changes to your DNS settings, core file integrity, and SSL certificates. Our scanning engine is fast and lightweight. It captures blacklist warnings and malware visible in the source code, including conditional malware that only presents itself to certain kinds of visitors. Malware and security issues we detect include:


  • Dirty Search Engine Results
  • Hidden & Malicious iFrames
  • Mobile Malware Infections
  • Phishing Lures
  • Hijacking
  • Obfuscated JavaScript Injections
  • Redirects Targeting Mobile Devices
  • Drive-by-Download Injections
  • Email Spam Abuse
  • Pharma Hacks
  • Desktop AntiVirus Blacklisting (i.e., AVG, Norton, McAfee)
  • Infected Database / SQL Injections
  • Website Defacements
  • Embedded Trojans
  • Cross-Site Scripting (XSS) Infections
  • Search Engine Blacklisting (Google, Bing, Yahoo, etc)

Our deep scanning engine has full access to your server. Some malware hides itself from visitors, but it can’t hide from our server-side scanner. We scan for things like backdoors, phishing pages, email and DDoS scripts.

Our blacklisting monitoring and Warning removal service works for major authorities including:

  • Google Safe Browsing
  • Norton Safe Web
  • PhishTank
  • Opera browser
  • SiteAdvisor
  • Sucuri Malware Labs blacklist
  • SpamHaus DBL
  • Yandex (via Sophos)
  • ESET

When your site is compromised, our team immediately assesses the damage. Our automated scripts and professional security analysts work quickly to understand your environment and locate infections and their impacts.

We identify:

  • CMS & extensions used on your site
  • Known issues and anomalies in source code
  • Current versions of your website software
  • Integrity issues against a known good baseline
  • Malware infections and indicators of compromise

 We remedy:

  • Remove & repair malware infections
  • Check the integrity of your website
  • Remove blacklist warnings from your website
  • Repair brand reputation issues in search engine results
  • Advise you on available updates and post-hack steps

Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the security attacks targeting a web application every day, and hence improve its security. The report states the type of attack, the originator, why it happened and how it happened.

Bwired makes it easy for you to keep your site backed up. We connect your website and database to our secure external backup/restore service and generate 2 parallel and incremental backups daily. We keep all backups of your site for 90 days with a premium option to keep your entire backup history.

We automatically get notified if there are any additions, modifications or deletions between each version of your website.

Intelligent Restore

In our backup repository, we have access to every backup complete with a datestamp and detailed information on each change. With one click, we can easily restore your website by replacing all of your current content with content from a backup automatically. We can also select specific files and folders to restore, and manually restore by downloading a zip file of an entire backup or selectively download specific files.

Website Migration Services are one of the most requested services within our company. Whether you have Wordpress, Drupal or Joomla CMS, we will work with you every step of the way to make sure the migration is seamless. Website migration will be performed using the available hours of your managed service plan and at the standard/discounted rate if the hours in your plan have been exhausted. If you have exceeded the available hours in your plan, Bwired will advise you of the costs involved before undertaking any extra work on the migration.

  • Maintenance: Any changes, reconfiguration, features and/or the addition of modules to a client web site after initial implementation.
  • Support: Any activity performed by Bwired in response to a request made by the client. This covers activities such as answering questions, advice, resolving issues and providing help and assistance.
  • Response Time: The time taken for Bwired to begin work on an issue once a Service Ticket has been created. Response times are calculated within standard support hours only.
  • Service Portal: Bwired’s online work tracking and support management system (, similar to an online help desk with project management capabilities. This allows customers to create and update support requests, upload files and attach screen shots and view status of projects or tasks.
  • Update: A minor release of a version of the CMS or an extension.
  • Upgrade: A major release of a version of a CMS or an extension. Generally, upgrades take longer to perform than updates, as significant changes to the code base and database structures may have occurred. Supporting extensions may need to be updated to reflect these changes.
  • Service Ticket: The action of the client or Bwired staff creating and managing a support and/or maintenance request via our online service portal. Any works undertaken by Bwired will always be tracked using a Service Ticket.
  • Cyber Attack: an attempt by hackers to damage or destroy a computer network or system.
  • Security Breach: An incident that results in unauthorized access of data, applications, services, networks and/or devices by bypassing their underlying security mechanisms. A security breach occurs when an individual or an application illegitimately enters a private, confidential or unauthorized logical IT perimeter.
  • Website Blacklist: A list of websites that are considered off limits or dangerous. A website can be placed on a blacklist because it is a fraudulent operation or because it exploits browser vulnerabilities to send spyware and other unwanted software to the user.
  • Dirty Search Engine Results: the intentional manipulation of a search engine to return a specific result
  • iFrame: an HTML element that allows an external webpage to be embedded in an HTML document
  • Malware: software that is intended to damage or disable computers and computer systems.
  • Phishing Lures: the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication
  • Hijacking: a form of unwanted software that modifies a web browser’s settings without a user’s permission, to inject unwanted advertising into the user’s browser.
  • Obfuscated JavaScript Injections: a process by which we can insert and use our own JavaScript code in a page, either by entering the code into the address bar, or by finding an XSS vulnerability in a website.
  • Redirects: A URL redirect is a webserver function that sends a user from one URL to another
  • Drive-by-Download Injections: the unintentional download of a virus or malicious software (malware) onto your computer or mobile device
  • Spam: irrelevant or inappropriate messages sent on the Internet to a large number of recipients.
  • Pharma Hacks: an exploit that takes advantage of vulnerabilities in a Website, causing search engines, notably the one hosted by Google, to return ads for pharmaceutical products along with legitimate listings
  • Desktop Antivirus: software utility used for scanning and removing viruses from your computer
  • Website Defacement: attack on a website that changes the visual appearance of the site or a webpage
  • Embedded Trojans: a non-replicating malicious program
  • Cross-Site Scripting (XSS): a type of computer security vulnerability typically found in web applications. XSS enables attackers to inject client-side scripts into web pages viewed by other users.
  • Server Backdoor: a means to access a computer system or encrypted data that bypasses the system’s customary security mechanisms.
  • DDoS: A Distributed Denial-of-Service (DDoS) attack is an attack in which multiple compromised computer systems attack a target, such as a server, website or other network resource, and cause a denial of service for users of the targeted resource
  • Custom Development: Work conducted on the Website which includes design and programming.
  • Internet: a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols.
  • Website: a location connected to the Internet that maintains one or more pages on the World Wide Web.
  • Web Page: A document which can be displayed in a web browser such as Firefox, Google Chrome, Opera, Microsoft Internet Explorer or Edge, or Apple’s Safari. These are also often called just “pages.”
  • Website: A collection of web pages which are grouped together and usually connected together in various ways. Often called a “web site” or simply a “site.”
  • Web Server: A computer that hosts a website on the Internet.
  • Code Repository: a file archive and web hosting facility where a large amount of source code, for software or for web pages, is kept privately.
  • Database: a structured set of data held in a computer, especially one that is accessible in various ways
  • SQL: Structured Query Language (SQL) is a standard computer language for relational database management and data manipulation.
  • Development Environment: set of processes and programming tools used to create or modify the program or software product.
  • Website Migration: The transfer of a website from one web host to another. The move requires the migration of all integral website files and database to the new hosting environment.
  • Cloud Web Hosting: Hosting that uses the resources of several clustered servers. These are virtual resources of several servers to accommodate all the aspects of hosting your site.
  • Search Engine: A website that helps you find other web pages, such as Google, Bing, or Yahoo.
  • Offline: Not connected to a computer, server, external network or the Internet.
  • Backup: the procedure for making extra copies of data in case the original is lost or damaged.
  • Restore: Data restore is the process of copying backup data from secondary storage and restoring it to its original location or a new location. A restore is performed to return data that has been lost, stolen or damaged to its original condition or to move data to a new location.
  • Website Clone: A duplicate of a website identical to another website.