Domain Name / Customer ID:


Forgot Password

All material © 1996 - 2015 Superb Internet Corp. // version-1.50.33

Hosting Services Certified and Compliant-ready Managed by Experts

Our hosting infrastructure along with all our data centers, IP backbone and all operations – are continuously audited under SSAE-16 SOC-1 Type II, ISO 9001:2008 and ISO 27001:2013 standards, and we are Certified & Registered within the rigorous standards of the International Standards Organization by an ANAB and UKAS accredited Registrar. In addition, key technical staff and managers are ITIL certified. Our certified and customer compliance-ready technologies and operations provide a comprehensive, highly compliant full service array, from secure, certified and compliant colocation, IP transit, cloud computing, through to fully managed services that can help customer entities be FISMA, HIPAA, PCI-DSS and other customer-organization-level standard compliant. Let our dedicated IT security & compliance experts develop a world’s toughest standards certified and customer-organizational-level compliance-ready solution to secure your network, protect your data, and help you meet all your regulatory compliance & security requirements. We offer a wide array of compliance-ready, secure services which include, but are not limited to, the following:

  • Redundant perimeter firewalls
  • Intrusion detection systems (IDS)
  • Intrusion prevention systems (IPS)
  • Dedicated or network-wide firewalls
  • Redundant Load Balancers that act as a reverse proxy filter for malicious traffic
  • SSL offloading with IDS/IPS behind SSL traffic
  • Host-based intrusion prevention
  • Segregation of Web and database servers
  • Web application firewalls on all public-facing Web services
  • Enterprise antivirus protection
  • Two-factor authentication
  • Restrictions on physical access to data center
  • File integrity monitoring
  • Data classification policy
  • Encrypted data transfers
  • Monthly third-party vulnerability scans
  • Log management

SSAE-16 Soc-1 Type II Audited Facilities, Network & Operations

Our data centers and coast-to-coast IP backbone are continuously independently audited under SSAE-16 SOC-1 Type II (former SAS-70). By achieving complete SSAE-16 compliance (audit reports with zero exceptions are available upon customer request), we have demonstrated that effective control objectives, and control activities are in place throughout the organization. Our SSAE-16 compliant operations allow enterprise organizations to achieve compliance and to incorporate our SSAE-16 audit report in their audited financial statements, if so required by their auditors. Here are some examples of SSAE 16 compliance controls our secure hosting environment supplements:

  • Facilities and asset management
  • Logical access and access control
  • Network and information security
  • Computer operations
  • Backup and recovery
  • Change and incident management
  • Organizational and administrative controls
  • Security policies, reporting, and monitoring
  • Physical and logical security
SSAE 16 Compliant Cloud/Hosting Features:
  • SSL offload capability
  • Enterprise-level, application level protection
  • Hardware firewalls
  • IP and port restricted access
  • Multiple levels of segregated access
  • Managed backups and retention
  • Advanced monitoring
  • Multi-level intrusion detection & prevention (IDS/IPS)

ISO 27001:2013 &ISO 9001:2008 Certified & Registered Facilities, Network & Operations

Our data centers, coast-to-coast IP backbone and operations are ISO 9001:2008 and ISO 27001:2013 Certified & Registered by ANAB and UKAS accredited Registrar, NQA, under the stringent standards and supervision of the International Standards Organization, thus demonstrating our complete and unwavering adherence to these strict global standards for our quality & information security management systems. These international world-standard certifications ensure all our solutions and operations have Quality Management System (QMS) processes and controls in place, and that everything is covered by a thorough Information Security Management System (ISMS).

  • ISO 27001:2013 is an information security standard published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) under the joint ISO and IEC subcommittee, ISO/IEC JTC 1/SC 27. It is a specification for an Information Security Management System (ISMS). An ISMS is a systematic approach to managing sensitive systems and information so that they remain secure. It includes people, processes, networks and IT systems by applying a comprehensive, detailed security and risk management process throughout. It helps us keep our and customer systems and information assets, such as financial information, intellectual property, and other data, secure, through a rigorous, company and all locations and disciplines wide security program, which undergoes ongoing internal and external detailed audits. Organizations that meet the standard have been thoroughly (on-site and at all locations) audited by the Registrar’s auditors and certification committee, whose audit, in turn, is audited by the UKAS, who ultimately make the decision whether to certify the said organization. The accreditation provides our customers with verifiable, independent third-party, multi-step audited assurance of thorough ISMS applied to all of our operations.
  • ISO 9001:2008 specifies requirements for a Quality Management System (QMS) where an organization needs to demonstrate its ability to consistently provide product and service that meets customer and applicable statutory and regulatory requirements. We aim to enhance our customer satisfaction through effective and thorough application of the system, including processes for continual improvement of the system and the assurance of conformity to customer and applicable statutory and regulatory requirements. Being ISO 9001:2008 Certified and Registered means that the Registrar’s auditors and certification committee have performed thorough on-site audits, reviewed our records and interviewed our staff, to ensure that the processes influencing quality within our organization conform to the relevant standard’s requirements and are consistently and thoroughly applied at all locations, in all instances, and by all staff. The Registrar’s audit, in turn, is audited by ANAB, who makes the final decision whether to award Certification & Registration. The primary objectives of ISO 9001:2008 are to give our management and our customers’ confidence that we are always in control of the way we do things, that thorough change control processes are in place, that all steps of service delivery are thoroughly documented, that any issues are immediately escalated and resolved, and that continual improvement is always in place.

All of our operations (headquarters and all three data centers, and our coast-to-coast IP backbone) and services are ISO 9001:2008 and ISO 27001:2013 Certified & Registered. You are invited to review our ISO 27001:2013 and ISO 9001:2008 Certificates of Registration:

For more information on the ISO 27001:2013 standard, please visit For more information on the ISO 9001:2008 standard, please visit

PCI-DSS Compliance-Ready Services

When companies collect customers’ payment card information, PCI-DSS compliance and certification is required by all merchant card processors, in order to ensure the security and integrity of customers’ credit card data. All of our facilities, services and processes are PCI-DSS compliant, developed specifically not just to keep your customers’ payment card data, but the entire hosting environment, facilities and network, secure. By handling sensitive personal data in a responsible way, we help enterprises that accept, store, and/or process credit cards to achieve and maintain 100% compliance with PCI-DSS 2.0 standards. Our secure cloud platform and hybrid cloud capability (i.e., to use a public cloud in conjunction with a private cloud or isolated dedicated highly secure servers) gives e-Commerce retailers an affordable, compliant way to segment public website files from confidential database files and restrict access from the Internet and unauthorized personnel. In addition, we are there every time your hosting environment needs a “checkup” by assisting with network scans as prescribed per your QSA. If you subscribe to our fully managed service, we will also provide log data and audit trails on your behalf when your need to respond to any forensic inquiry. Our PCI 2.0 compliance-ready hosting services provide a protective, scheduled hosting environment for each secure cloud or server. The intrinsic qualities of our secure cloud hosting environment fulfill the PCI DSS requirements. Partnering with us to achieve PCI compliance can significantly reduce the costs and time it takes to obtain a Report on Compliance. Some of our security features and services available that help to ensure PCI 2.0 compliance:

  • Thorough Access Control and Physical Security
  • 24x7x365 Data Center on-site Staffing & Monitoring
  • Physical environment has restricted access and man traps
  • Surveillance monitoring with video retention
  • Log Maintenance and Process Management
  • Log storage and customizable retention
  • Systems Monitoring and Testing
  • IDS (Intrusion Detection Systems)
  • Real-time security event notifications
  • Network security scans
  • IP logging
  • Two-factor authentication
  • SSL certificates with extended ID validation
  • Hardened Solutions
  • Antivirus protection
  • Network-Wide Firewalls
  • Web application firewalls
  • Continuous patching and maintenance
  • Web servers separated (logically and physically) from database servers
  • Port control – unnecessary ports are closed
  • Strong encryption during data transfer and transmission
  • Redundant power and cooling
  • 100% Uptime Network & Facilities

Hipaa Compliance-Ready Services

Our HIPAA compliance-ready solutions provide secure cloud and data center hosting practices to help healthcare providers achieve HIPAA compliance. One of our specialties is helping healthcare enterprises achieve and maintain HIPAA (Health Insurance Portability and Accountability Act) security requirements. Our secure hosting practices provide a safe, compliant hosting environment for critical web applications within healthcare providers’ networks. We handle the data center facility and network aspects of compliance requirements and let medical practitioners focus on what they do best, providing excellent patient care. Enterprise-grade private cloud provides the best of both worlds: a highly cost efficient virtualized environment, coupled with full physical isolation. Added features such as application level firewall protection help doctors, service providers, and private healthcare businesses adhere to HIPAA regulations. Our multi-layered security platform, combined with an enterprise-grade hosting environment, helps protect your PHI data and allows your hardware, software, databases, and security, working to ensure that you have HIPAA compliant hosting. We work with billing companies and insurance providers, as well as medical, vision, and dental care providers every day to achieve compliance. Professional services organizations, such as law offices and accounting firms working with healthcare providers, benefit from our HIPAA compliant hosting practices as well. All of our clients in the healthcare industry have found that outsourcing electronic aspects of HIPAA compliance to a secure hosting company allows them to focus their time and fiscal resources on other aspects of HIPAA requirements, such as patient document and record handling. Some of our HIPPA compliant services:

  • Commercial, business web application hosting for healthcare professionals
  • Internet/Hosting infrastructure for medical SaaS (software-as-a-service) providers
  • HIPAA-compliant colocation, dedicated and private cloud hosting environments
  • Intranet and extranet hosting in virtual private environments
  • Hosting for medical billing systems and web-based patient management systems
Our HIPPA focused security solutions:
  • Web Application Level Protection
    • Helps detect and contain undesirable traffic on public networks
    • Helps prevent malware invasions like viruses, worms and trojans
    • Helps stop hacker attempts like SQL injections and XSS (Cross-site scripting) attacks
    • Customizable security rules ensure WAF is calibrated to protect your unique vulnerabilities
  • Application Level Monitoring and Intrusion Detection
    • Alerts administrators and manager every time files, directories, or hardware are accessed and by whom
    • Detects active hosts, bad logon attempts, and inappropriate content
  • Disaster Recovery with HIPPA Compliant Encryption
    • Managed backup snapshots with retention
    • Provides data encryption at rest in storage
    • Requires a “key” to securely decrypt the data from backup
  • Virtualized HIPAA Compliance Architecture
    • Provides separate and privatized web application and databased hosting environments
    • Makes creating a development /beta testing environment affordable
    • Runs on enterprise level hardware
    • Forces password expiration & enforces password strength
    • Automates SSH & RTD timeouts
  • HIPAA Compliant System Architecture
    • Separate web and database environments
    • Exclusive environment for development, separate from production environment
    • Password expiration & ensured password strength
    • Automatic SSH & RTD timeouts
    • Log retention
    • Provides a valuable, detailed audit trail during a forensic investigation
  • Managed Patching, Version Control, and Security Updates
    • Upgrades operating system automatically, and applications on request
    • Provides support for Linux and Windows OSes
    • Alerts administrators when security vulnerabilities are detected
  • Physical and Logical Security
    • Includes stringent data destruction policies
    • Controls data movement inside and outside of our facilities
    • Records any changes to the hosting environment
    • Secures the data center environment with man-traps, surveillance, and controlled access
  • Vulnerability Scanning
    • Tests all services, virtual domains, ports, and IP addresses for 10,000-plus known vulnerabilities every day delivers a detailed notification every time a vulnerability is found

Fisma Compliance-Ready Services

FISMA is the Federal Information Security Management Act. It consists of security guidelines to protect the information and information systems of all federal agencies. With us, government agencies can rest easy knowing their sensitive information will be protected and that any risk will be effectively managed or prevented. With FISMA compliant hosting, you’ll get an even greater level of service and support as with our other managed hosting solutions. Our team of engineers and security technicians are available every day, all day for consultations and assistance, and work with you to configure and secure your environment and to define and apply appropriate FISMA security controls. We monitor your hardware, software, databases and security, and you’ll get additional protection from our security platform, which provides intrusion detection systems and Web application firewalls. We deploy a defensive in-depth approach from the physical to the network and system layers utilizing best of breed security tools, technologies, and security best practices that meet or exceed NIST (National Institute of Standards and Technology) 800.53 rev3 requirements.

  • Physical Layer: At the physical layer, our customers’ systems are hosted in our SSAE-16 Audited and ISO 9001:2008 & ISO 27001:2013 Certified & Registered data centers that are N+1 redundant for all critical infrastructure (electrical and HVAC) with strict temperature and humidity controls. The data centers are staffed 24x7x365 by systems and network administrators & engineers. Only authorized personnel are granted access into the facilities; visitors to the facilities must be escorted at all times by authorized personnel. All secure access points require card key or biometric access, and thorough surveillance is in place throughout the facilities and around the external perimeter.
  • Network Layer: At the network layer we focus on protecting customer systems from malicious and known attacks, such as XSS, SQL injections, and DDoS attacks by deploying the following network security tools:
    • Redundant stateful inspection firewalls
    • Multiple DDoS mitigation devices
    • Multiple WAFs (Web Application Firewalls) to prevent XSS, CQL injections, and thousands of malicious requests and attacks
    • Network IDS
    • Complete customer-to-customer isolation
    • Managed system-level backups as an additional service
    • Customer compliance scanning as an additional service
    • Web application scanning as an additional service
    • SSL-encrypted VPN
  • System Layer: We deploy the following security products and methodologies to harden customer systems and protect against unauthorized, malicious and known attacks such as unauthorized access, Trojans viruses, and malware infections:
    • Antivirus protection
    • MS SQL encryption (if required)
    • Fully hardened server images customized per server role
    • Managed operation system security updates
    • Host-based IDS as an additional service
    • Two-factor Authentication for remote access
    • All systems are monitored 24x7x365 by our professional on-site data center systems administrators & engineers
  • Operational and Management Layer: We have strict documented policy and procedures and customer portal to support customers’ ongoing FISMA compliance audit requirements as follows:
    • Documented policy and procedures
    • Separation of duties enforced
    • Least privileges enforced
    • Change Management procedures
    • Patch management policy
    • Incident response policy
    • Sensitive media handling policy
    • Our secure customer portal
    • Customer ticketing system

ITIL Compliance-Ready Services

ITIL service management is the de-facto global standard in the area of IT service management. ITIL is a comprehensive, non-proprietary, and publicly available set of guidelines for best practices in information technology service management. Our ITIL management processes and professionally trained staff ensure that we manage business risks and minimize service disruptions, as well as help your enterprise with the following:

  • Maximize your return on IT & infrastructure investment
  • Build and maintain positive business relationships with customers and improve customer satisfaction
  • Ensure your customers can access services on-demand, when and where needed
  • Support business change at the speed your business needs while ensuring a stable and low-risk environment
  • Help you to quantify and clearly demonstrate the true value of the services you provide
  • Ensure the business and your customers are not affected by unexpected service failures
Thank you. Superb has the quickest and most reliable ticket system that I know of.
- John Krische
Great service! After about 7 years here, I'm still happy.
- Ole Jul
As always, team jumps right in there and gets it done! Always such a pleasure working with Superb support.
- Michael Henry
Absolutely amazing. These guys know their stuff! As always superb!
- Louis Gualtieri, Jr.
Thank you for so patiently handling my fairly complicated request. You guys rock! Still ahead of the rest!!!
- Innocent Gathungu
honesty and quickness to respond, is the key to good support.
- Ravi Raheja
As usual a highly qualified and competent team.
- Crocefisso D'ospina
The service your team provided was superlative in all respects. I was amazed! Thank you so much.
- Ned Orrett
Your Response Time to the Support Request is your Strength, I wan to thank you for that.
- Benigno Guerrero
Fantastic support as always
- Ian Hamilton
Superb team did a Terrific job... misconfigurations happen in life and the way the teamed responded was wonderful. I did a lot of research on providers before decide to go with Superb and I look forward to building out our server needs with your company in future. Thanks again, have a Great weekend! Cheers!
- Jarvis Joyce
Thank you all! You guys ROCK!
- Jaysen Moore
You all are the best of the best! Thank you!
- Anthony Griffin
Very prompt and helpful service. Much appreciated.
- Paul Westley
Fast and accurate help. Thank you!
- Alex George
She was superb! Attentive and quick. She solved my problem! Thank you Sheena!
- Allen Reep
Precise technical instructions on how to resolve my issue. Great support as always
- Chris Harrington
Really fast response; excellent solution.
- Alexander Trevor
Immediate response that put my mind at ease. Thank you.
- Helena Looby
Very Professional, communicated the issue clearly so that I could verify the issue and resolve it.
- Chris Harrington
I've been with Superb for a long time and I have never been disappointed by the technical services staff. Keep up the excellent work!
- Mike Belton
Another excellent turnaround!
- Mike Belton
The response was much faster than I had anticipated.
- Karen Umstattd
I am excited to get such a quick response to my inquiry, especially so early on a Sunday morning (EST)
- Karen Umstattd
Again I am amazed at the speed of the reply... well done.
- Richard Martin
Thanks for resolving this issue expeditiously! Still ahead of the rest!
- Innocent Gathungu
You guys have hands down the fastest response and resolution time of any customer service team I know.
- Nancy Helms Weeks
The proactive support and good communication make superb top notch. Thanks guys.
- Andrew Walmsley
Great job!!! Everything taken care of within one hour! Love it!
- Lynn Modranski
Thank you very much for your help. It has always been a good experience to ask you for help. Keep on with the good work!
- Anouk Hoedeman
Thanks to all of you and for all the help that you have given me.
- Charles Upton
Fast response and fast fix. Pleasant and polite as usual.
- Ole Jul
Couldn't ask for any better service than this!!
- Doug Hannah
Thanks, team! Always happy with your service.
- Alan Gustin
It is comforting to know competent people are available when needed. Good to have you as part of the team.
- Gary Millar
Always good results from Superb Support. Thanks!
- Bernard Molek
Your customer service is amazing, and easily accessible.This was reason enough for me to leave my former registrar and switch to Superb!
- Douglas Grant
Everyone handling this ticket has been great -- Transitioning between hosting plans is usually a pain, but the support engineers I've been working with have been awesome.
- Charles Medley
As usual... congratulations for your excellent support!
- Samuel Sosa
Great Job! Ticket completed within six minutes! I appreciate the quick response, it's all taken care of!
- Lynn Modranski
Excellent handling. Wish all help teams worked as well as yours.
- Rick Scorupski
Thanks. Prompt results are the norm with you guys.
- Richard Berger
Greg has been extermely quick to respond, and he's knocking out all of my requests in near real-time... Kudos to him and the rest of the team at Superb support. Thank you.
- Charles Medley
Awsome support, nothing can be better than this. Thanks a lot.
- Shankar Nath
I am a newbie....I am driving your tech staff nuts. They are handling me perfectly, kindly and in a very timely fashion. I could not be happier that I chose superb.
- Melanie Cannon
Superb assistance (pun intended). Knowledgeable and eager to help in short time.
- Jacques Island
You guys are always great at troubleshooting. Thanks so much for your help!
- Robert Cooney
Always excellent support and guidance. Thank you.
- Chris Harrington
I am really happy working with the staff and all what they do to help and make things easy.
- Graciela Ortiz
Super fast response and fixed problem within minutes. Thanks Travis and team.
- Omer Ashraf
Great service. I've come to expect it, but it's still nice to see.
- Jonathan Rosenberg
Lightning FAST. Keep up the good work.
- Wayne Eckert
Thanks a bunch for your prompt help by fixing a security issue. You rock!
- Z. Destree
I have never seen a business with such consistently good customer service over the years... and I'm 55 and counting! ;-) Keep up the good work!
- James Wells
As usual everything went soft and easy with your help!! So glad we work with you!!
- Graciela Ortiz
Your customer service is much better than our former host. I would like to thank you for that.
- Patrick Keeley
Excellent customer service. Thanks and team.
- Omer Ashraf
As always - fast and friendly!!! THANKS!
- Lynn Modranski
Excellent, top of the class.
- Sameer Abdul Rahiman
The entire staff has been very friendly (and flexible) as we got this project off the ground. Thanks!
- Benjamin Hendricks
Absolutely great - quick response - identified issue was not on Superb's end, provided me with testing guidance and reference material website.
- Chris Harrington
I have been delighted by responsiveness of your technical team! Bravo!
- Larry Eisenberg
I've said it before and I'll say it again. You've got the best support staff I've ever experienced. Thanks again!
- Rich Scorupski
Excellent! Love the quick response!!
- Victor Sandoval
Quick replies with clear instructions. It doesn't get any better than that. Thanks to all.
- Phil Bondi
Great support and within minutes of asking for help.
- Carlos Villareal Kwasek
You guys are always super-responsive. We appreciate that.
- Jeffrey Childress
Thanks for all your expert and quick help!
- Marsha Thompson
Fast response - as usual!
- Ole Jul
I always receive the very best from each and everyone of you. THANK YOU
- Graciela Ortiz
Great job! Your tech team always responds fast. I appreciate that.
- Alan Gustin
I love you guys!
- Anthony Peiris
Over the last few years, the response time has improved alot. It was not 'bad' before, but it's 'superb' now.
- Phil Bondi
Resolved! Love the quick support and detailed explanation! Thank you!
- Eta Thia
Your support team is always helpful and fast to respond. Thanks for putting good people on the project.
- Todd Martin
Are you guys using roller blades in the datacenter now? You move quickly!
- Joel Gathercole
You guys are great! This is why I keep my business with your company!
- Chris Hatchie
I could not suggest any improvement. Fast and friendly, and exactly what I needed. Kudos to the team in general and Brian specifically.
- Richard Martin
I can never believe the fast and accurate service you folks give. You are the service providers that all other sites should aspire to emulate.
- Richard Martin
Always satisfied with support provided by your technical support resources.
- Chris Harrington
Superb has a really superb team. Great customer service, dedication and expertise. Thank you for the great support!!
- Stephan Mitchev
You guys were on top of things. Quick replies and easy solutions.
- Jacob Pozderac
I would not even consider another web hosting company as my experiences with you are always so positive. Thank you!!!
- Diane Secor
Quick and effective. Thank you!
- Marlyne Israelian
Thanks for the fast and quality support!
- Shawn Rhoads
As always you folks are the best!!!
- Ken Webster
I use 3 other hosting companies and none of the are as efficient as Speed is of the essence as they say and that is what Superb does. Great service.
- Howard Barr
Your staff was very patient and knowledgeable. They helped us learn how to fish instead of just giving us fish.
- Russel Piper
I love the support! Very responsive and the action taken to prevent any damage to the server and/or network under a DDos attack are superb! Keep up the great work guys!
- Louis Gualtieri, Jr.
You cannot improve perfection, you can only pay her far more than she gets now and hope it is enough to prevent her being stolen away by evil corporate competitors.
- John Zortman