Are you new to Imunify360? Attend our live Q&A sessions to ask us anything. Check out the dates and SAVE YOUR SPOT!

Keeping Full control of Your CPU Usage as a Hosting Provider

Web host providers understand the importance of managing CPU usage on a server, but what they might not realize is that malware and CPU usage spikes are interconnected, making cybersecurity a critical part of server administration. In a shared hosting environment, malware could infect thousands of sites. Without the right monitoring and mitigation techniques in place, the accumulation of hacked sites could cause performance degradation leaving the entire server unusable for customers and causes loss in revenue.
Imunify360-guzel
Guzel Hosting is one of the biggest web hosting companies in Turkey. They host over 100,000 websites with shared hosting services. They work hard to ensure that customer sites run efficiently and servers run at optimized performance.
After Guzel Hosting implemented Imunify360, all shared server loads went down dramatically, which means that Guzel Hosting makes a profit from CPU power. Customer websites are no longer hacked often anymore. Because of the better performance and fewer hacking incidents, customers are happier with service. Guzel Hosting believes that Imunify360 is as important as control panels when it comes to service, mitigation of attacks, and preservation of CPU resources. Because of Imunify360, Guzel Hosting can make a profit on customer work and backup restoration tasks.
After installing Imunify360, shared server loads dramatically dropped and allowed the hosting company to monetize their server resources.

Optimization and Performance with Imunify360

Malware authors continually evolve their code to overcome the latest cybersecurity defenses. In a shared hosting environment, numerous sites could be hacked without the site owner’s knowledge. By allowing sites to continue hosting malware, server CPU could spike to usage that affects all other sites on the server.
To add to the shared hosting frustrations, many site owners work with common content management systems such as WordPress. Research shows that 40,000 of the top WordPress sites are vulnerable to hacker attacks. WordPress developers consistently upgrade the software to remediate these vulnerabilities, but site owners must install the update. This requires always authenticating into the dashboard to ensure the software has the latest updates installed.

40 000

of the top WordPress sites are vulnerable to hacker attacks

Generally, the WordPress core software is secure, but plugins can be written by any third-party developer and uploaded to the marketplace or distributed on sites where developers can sell their code. Plugin creation is lucrative for many developers, but it’s not common for small developers to have their code professionally pen-tested for any vulnerabilities. This means that sites with the plugin installed would be open to attacks.

Imunify360-bar-chart
For Guzel Hosting , hacked sites were a major issue for server CPU usage. The high CPU usage affected all aspects of the server including its performance and other customer sites. After installing Imunify360, shared server loads dramatically dropped and allowed the hosting company to monetize their server resources.

Why Does Malware Drain CPU Resources and How Imunify360 Helps?

To understand why malware affects CPU usage, it’s important to know the types of attacks launched against servers and hosted websites. Several attacks will show a spike in resource usage and affect server performance
Imunify360-ddos
The first one is a denial-of-service (DoS). Most DoS attacks are distributed, meaning an attacker sends a signal to several hundreds or thousands of hacked devices to flood the targeted server with traffic. The requests are standard web traffic, but the server does not have the resources to handle the gigabytes of traffic sent its way.
Imunify360ttos
Another common attack is brute-force password guessing attempts. Brute-force attacks can be launched against any page that requires authentication. Bots will use a downloaded list of credentials to determine if a user’s password is valid. Bot traffic is also common in attack takeover (ATO) requests where credit cards must be validated before selling them on darknet markets or used in financial fraud. With any bot traffic, the attacker sends numerous requests per minute, which can overload server CPU usage.
Imunify360-ffos
In many attacks, malware authors inject malicious scripts into pages or the site structure. The code can do anything, but for CPU spikes it usually creates backend activity triggered by the attacker. For example, the attacker could use the server for its email messaging resources to send spam email to thousands of users. It could also be used to send malicious SQL (SQL injection) to identify vulnerabilities with site databases.

The aforementioned attack types must be mitigated to avoid critical resource spikes, and Imunify360 has the ability to stop each one.

Imunify360 will stop

Imunify360-vulnerability

Vulnerability exploitations

Imunify360-upload

Malware uploads

Imunify360-access

Sensitive data
access.

imunify360-symbol

Website scraping
and scanning

Imunify360-spam

Web SPAM

Imunify360-bug

Many other
web threats

Imunify360’s advanced firewall with cloud-based heuristics protects against all types of brute-force attacks targeting FTP, SSH, SMTP, hosting panel logins, and more. It reduces server load caused by DoS and brute-force attacks and malware running on infected sites. It eliminates the resources used by malware and returns it to the users that need it — your customers.

Much of the defense provided by Imunify360 is its advanced Web Application Firewall (WAF) based on ModSecurity with proprietary rules, a real-time blacklist (RBL), and cloud heuristics updated daily with the latest threats and offers a negligible false-positive rate. The WAF protects from malicious requests sent to web applications and APIs.

Conclusion

Imunify360 takes care of several sophisticated attacks that create excessive CPU usage. It will stop brute-force attacks, denial-of-service, and the botted traffic that could cause performance degradation on your server. The results will let host providers keep full control of their server’s CPU usage and reduce support ticks, increase profitability, and maintain customer satisfaction.

Try Imunify360 Security suite for free for 14-days and forget about malware on the server.

Related Articles

Imunify360-When Linux antivirus lets you down: How to remove malware from a website manually
read iconWhen Linux antivirus lets you down: How to remove malware from a website manually
Imunify360-Why Malware on Your Website Should Never Be Ignored
read iconWhy Malware on Your Website Should Never Be Ignored
Imunify360-What to do if your website is blacklisted
read iconWhat to do if your website is blacklisted

Frequently Asked Questions

What is Imunify360?

Imunify360 is a comprehensive security suite for linux web-servers. Antivirus, Firewall, WAF, PHP Security Layer, Patch Management, Domain Reputation with easy UI and advanced automation. Find out more about Imunify360 and how it works here.

What systems do you support?

We support all the popular systems CloudLinux OS 6,7,8, Ubuntu 16,18, CentOS 6,7,8, Debian 7,8,9,10, RHEL 6,7,8

What panels do you support?

We have a simple installation at any of these panels – cPanel & WHM, Direct Admin and Plesk.

What should I do if I do not have a hosting panel?

Imunify360 offers Stand-alone installation. The detailed instructions are available here.

How can I test Imunify360?

You could explore Imunify360’s all set of features free for 14 days on an unlimited number of servers. No credit card information required. After the trial period is over, you can purchase an Imunify360 license via CloudLinux Network (CLN) by logging in to cln.cloudlinux.com.

How can I get technical support for the Imunify Products?

For technical support, visit the Imunify Support Portal. Powered by a Unified Search feature that obtains results across all available resources, this is your 24/7 gateway to all the information you might need to answer your questions or troubleshoot issues.

How do I get started with Imunify360?

Our Getting Started guide will guide you through all the steps of the installation process and help you explore all features of Imunify360.

What is the price of Imunify360?

The pricing of Imunify360 starts at 6 USD /mo. You can find more information about pricing here.

How can I buy Imunify360?

You can purchase Imunify360 either via CloudLinux Network (CLN) by logging in to cln.cloudlinux.com or contact [email protected].

How to become a partner or reseller?

We have created this handy Partner Guide to help you effectively promote Imunify360 to your Shared and VPS customers and accelerate your sales. You can learn more about the Imunify360 partner program here.

Where to find Imunify360’s documentation?

You can find all technical documentation about Imunify360 here.

How can I access the Imunify Products forum?

Visit the Imunify Products forum to get help from the large customer community, as well as senior support engineers.

Documentation

Imunify360-note

Imunify360 Features

Imunify360-note

Installation Guide

Imunify360-note

Introduction to Imunify360

Imunify360-note

Support portal