Secure Software Hosting

JONAS HOSTING SOLUTIONS

We will take care of hosting your club management system so you can focus on your business. Jonas Hosting Solutions enables your club to securely access your club management system through a hosted service from anywhere with an Internet connection.

Jonas Hosting Solutions enables clubs to securely operate their club management system through a service from anywhere with an internet connection. The hosting solution comes with a fully managed service that includes product updates, data backup and recovery, network monitoring, and security. To maintain the highest security standards, Jonas Hosting Solutions uses Iron Mountain, a SOC2 Certified provider, and conducts yearly third-party security penetration testing.

Optimized Hosting of Jonas Club Software

Jonas Hosting Solutions is powered by Iron Mountain. Users simply access Jonas Club Software using a desktop application through a device that is connected to the internet. Users are provided with their own access credentials, which means Jonas Club Software is secured from unwanted access.

When clients use Jonas Hosting Solutions, they can be confident that the software is hosted on servers that are powerful enough to support your users and data. Jonas Club Software considers the number of end-users and the growth of the club’s data over time to ensure you’re hosted on appropriate servers. As your business grows, so does the power of the servers hosting the software.

Managing Jonas Club Software

Jonas Hosting Solutions also comes with a “managed service”, which is a standard term that describes the IT management of software. Leave the responsibility to us so that your team can focus solely on using the software to achieve your business goals. The following are brief descriptions of the managed services that are included with Jonas Hosting Solutions, which all provide you with the time to focus on your business:

SOFTWARE SUPPORT AND MAINTENANCE

The Jonas Hosting Solutions Team monitors the uptime of the software and performs product updates when new versions are available.

AUTHENTICATION

Jonas Hosting Solutions provides IT-standardized authentication to end users.

SYSTEMS MANAGEMENT

The Jonas Hosting Solutions Team uses tools to manage the system for clients, i.e., they provision and “expand” the proper resources (memory, CPUs, user accounts, etc.) when required, so that the client can effectively use Jonas Club Software. The team regularly applies patches to the system. Patching is a critical security measure to protect the system from vulnerabilities. By staying up-to-date with patches, the hosting team helps ensure the security and stability of the system.

DATA BACKUP AND RECOVERY

The Jonas Hosting Solutions Team uses tools to perform data backups, which are governed by backup policies. Should the need to recover a client’s instance of Jonas Club Software, the Jonas Hosting Solutions Team will perform the recovery process. The Jonas Hosting Solutions and Jonas Professional Services Teams will migrate on-premise instances of the Jonas Club Software into Jonas Hosting Solutions, and ensure that all Jonas ERP business processes function properly in the new environment. 

HOSTING TRANSFORMATION

The Jonas Hosting Solutions and Jonas Professional Services Teams will migrate on-premise instances of the Jonas Club Software into Jonas Hosting Solutions, and ensure that all Jonas ERP business processes function properly in the new environment. Each club is logically separated and hosted in its own virtual infrastructure.

NETWORK MONITORING, MANAGEMENT AND SECURITY

The Jonas Hosting Solutions Team uses tools to monitor, manage and ensure the security of the Jonas Hosting Solutions network. Note, any network outside of Jonas Hosting Solutions or the Jonas Portal will not be monitored or managed.

IT RESOURCES

The Jonas Hosting Solutions and Jonas Client Support Teams function as an “extension” of your IT team. So, while your IT team is still responsible for the workstations, devices and networks that connect to Jonas Hosting Solutions, The Jonas Teams will ensure that all servers, software, and networks inside Jonas Hosting Solutions are functioning effectively.

Security is a Priority

Security is an ongoing process, and staying vigilant against emerging threats is crucial. Regularly updating and testing security measures is essential to maintaining a robust and effective security posture. The combination of SOC2 certification, regular penetration testing, antivirus protection, SIEM solutions, and data encryption demonstrates a comprehensive approach to security for the Jonas Hosting solution.

Hosting at Iron Mountain (SOC2 Certified)

Iron Mountain is a well-known data center and records management company. SOC2 (Service Organization Control 2) certification indicates that the service provider has implemented strong security controls related to data privacy, confidentiality, and availability.

Yearly Network Penetration Testing by Third-Party

Regular penetration testing helps identify and address potential vulnerabilities in the network. Using a third-party vendor adds an independent perspective to the security assessments.

Protection for Jonas Assets

All Jonas assets are protected by antivirus (AV) solution, which helps defend against malware and other malicious software. This adds an additional layer of protection to prevent, detect, and respond to potential threats.

Client Jonas Environments Protected by SIEM Solutions

Employing Security Information and Event Management (SIEM) solutions is pivotal in real-time monitoring and analysis of security events. Jonas collaborates with a third-party SOC team, ensuring continuous 24×7 surveillance over the infrastructure. This proactive approach enables swift detection and response to security incidents. Additionally, routine vulnerability assessments are conducted, pinpointing potential weaknesses and implementing proactive measures to mitigate risks.

Data Encryption in Motion

Implementing robust encryption measures is essential for safeguarding data, bolstering its security against unauthorized access and potential threats.