WordPress Hosting
Fast, reliable and secure WordPress hosting, including maintenance and management services. Your WordPress solution is only ever hosted in ISO-certified, ultra-secure data centres managed by security cleared personnel. And as an exclusively UK-based company, WordPress hosting through 2able offers guaranteed data sovereignty.
Features
- Direct contact with our UK Directors, WordPress specialists
- 100% Network Uptime for your WordPress hosting environment
- 24/7/365 UK WordPress Support available
- Customised WordPress Backups
- Customised Hardware and Software Firewalls
- Always on WordPress monitoring
- Plugin and Security updates of your WordPress site
- SSL Certificates
- Climate Positive WordPress hosting
- 10+ years WordPress experience
Benefits
- Ensures your WordPress website can be available 24/7/365
- Helps prevent hackers bringing down your WordPress website
- Socially responsbile WordPress hosting
- GDPR Compliant
Pricing
£75 a unit a month
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
8 0 6 1 8 6 7 0 9 8 3 0 8 3 0
Contact
2ABLE LTD
Ben Crowley
Telephone: 01202 237 891
Email: ben.c@2able.co.uk
Service scope
- Service constraints
- No
- System requirements
- WordPress
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
-
Emergency issues within 1 hour.
Standard response within 8 hours.
SLAs can be tailored to meet the needs of the client. - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 A
- Web chat accessibility testing
- This has been extensively tested by the developers.
- Onsite support
- Yes, at extra cost
- Support levels
- Support levels are customised to the clients needs.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We initially assess the requirements of the client through questions around their website. We then recommend a solution accordingly, which can include training and documentation if required.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- We supply WordPress website files and databases at the end of the contract.
- End-of-contract process
- Providing WordPress site files and databases is included in the price.
Using the service
- Web browser interface
- No
- API
- No
- Command line interface
- No
Scaling
- Scaling available
- No
- Independence of resources
- We have monitoring in place and have low thresholds. Should these thresholds be breached, we respond accordingly.
- Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- Memory
- Network
- Reporting types
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Catalyst2, UK Fast, Clook, AWS
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- WordPress Website files
- WordPress Media
- WordPress Database
- Backup controls
- All data is backed up daily. Retention periods can be customised.
- Datacentre setup
- Single datacentre with multiple copies
- Scheduling backups
- Supplier controls the whole backup schedule
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- 100% network uptime. If this is not achieved, a refund is given for the length of time the outage occurs.
- Approach to resilience
- Catalyst2 10G network is designed to be completely redundant from the ground up, every element of their core network is duplicated. They don’t just deploy one switch/router/firewall, they deploy two. catalyst2 ensure that even if the hardware fails, they have a spare ready to automatically take over, or right beside it to be plugged in, with the result being minimal or no impact on your service.
- Outage reporting
- This can be customised to the clients needs, such as emails and SMS alerts.
Identity and authentication
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Username or password
- Access restrictions in management interfaces and support channels
- We provide user levels based on requirements. WordPress admin access is restricted to 2able only.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Username or password
- Devices users manage the service through
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
-
We only host websites that we or trusted 3rd parties have developed or vetted so that the server and your website perform effectively.
Various methods to ensure WordPress security are adhered to. - Information security policies and processes
- 2able follow GDPR requirements for all areas of our business.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Configuration management is managed by third parties.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- We provide these services through an approved supplier.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- This is managed by our supplier.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Our supplier has operational ISO27001-complaint processes and systems for incident response.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- No
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
-
Catalyst2 offsets more carbon than it emits based on the analysis of data centre usage, offices and associated transportation of goods.
catalyst2 has invested in systems and processes to achieve this and to proudly add ‘carbon positive’ to their sustainability credentials.
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
2able are carbon neutral through Carbon Neutral Britain and are working towards becoming B Corp certified
Pricing
- Price
- £75 a unit a month
- Discount for educational organisations
- No
- Free trial available
- No