Secure Web Hosting

What makes our secure hosting special?

PCI DSS ComplianceNIST ComplianceHIPAA ComplianceThird Party Content AnalysisCMS Security AnalysisCSP Security AnalysisHTTP Headers AnalysisIndustry Best PracticesGDPR

Domain Management for a Secure Hosting

secure web hostingAll domains are registered by us with Key-Systems GmbH to provide a secure hosting. The headquarter is located in Europe, Germany.

Key-Systems GmbH received its accreditation as a registrar at the Internet Corporation for Assigned Names and Numbers (ICANN). Since then they were able to expand their customer base to more than 100,000 retail/corporate customers. And with over 2,300 resellers thanks to their diversified offerings, trusted technique and experienced team. For more information about Key-Systems click here.

  • Reg-C (Registrant Contact)
    The organization or person that has the rights to use (or “ownership” of) the domain.
  • Admin-C (Administrative Contact)
    Contact person for the domain for administrative, non-technical matters.
    Example, for legal matters, change of ownership, etc.
  • Tech-C (Technical Contact)
    Contact person for domain’s technical matters.

Registrant (Reg-C) and Administrative (Admin-C) contacts are the most important. The Registrant contact will be used primarily to determine who currently has rights over the domain for matters such as domain transfers. If the Registrant cannot be contacted, the Administrative contact will then be contacted.

Domain contact details can only be updated at the domain’s Registrar. If your domain has not been registered with Jaispirit (such as an external domain), you will need to Update Your Domain’s Contact Details with the domain’s current registrar. No contact details are used for subdomains since subdomains will use the “parent” domain’s contact information.

Contact details are not publicly available anymore. They were redacted for privacy since the switch to GDPR / IT Security.

secure hosting What does ICANN do?

Emails with DMARC, DKIM and SPF

The three main email security protocols DMARC, DKIM and SPF, which complement one another, are implemented by us for a secure hosting. All three together provide the best protection.

DMARC (Domain-based Message Authentication, Reporting and Conformance) is a technology to extend the capabilities of the SPF and DKIM sender policies. The DMARC policy defines how the receiver should treat email messages depending on the results of DKIM and SPF checking. This technology is based on the rules specified in the sender’s DNS zone.

DKIM (DomainKeys Identified Mail) provides a method used to validate a domain name identity that is associated with a message. It lets an organization to take responsibility for a sent message by attaching an automatically generated digital signature to it and uses cryptographic techniques to validate authorization for the signature presence.

SPF (Sender Policy Framework) is a method used to prevent sender address forgery, i.e. using fake sender addresses. SPF allows a domain’s administrator to set a policy that authorizes particular hosts to send mail from the domain. A receiving mail server checks that the incoming mail from a domain comes from a host authorized by that domain’s administrator. SPF is based on the rules specified by the administrator in the sender’s DNS zone.

secure web hostingTo check your current web space use following link:

A new tab appears. Enter your domain name and the site provides you with all information if DMARC, DKIM and SPF are implemented in your current hosting.

IPv4 or IPv6
There is no serious advantage in using IPv6. Except more IP numbers are available. On the contrary, with IPv6 more information’s are provided about the users (device number, etc.).  We want to protect our users and release as little information as possible. Therefore, we largely renounce the use of IPv6. We prefer to use 6to4 which is an Internet transition mechanism for migrating from Internet Protocol version 4 (IPv4) to version 6 (IPv6).

Secure Web Hosting Site: OVH EU OVH Green IT

All data that you send and receive while using our secure hosting services are stored fully encrypted on our dedicated server. Our dedicated server is located in a high secured data center (OVH) in Europe, Strasbourg, France and meets today’s standards. Please read our blog entry: GDPR Compliance for websites – How to test in three steps.


Payment Card Industry Data Security Standard (PCI DSS) is an information security standard for organizations that handle branded credit cards from the major card schemes.


(Health Insurance Portability and Accountability Act of 1996) is United States legislation that provides data privacy and security provisions for safeguarding medical information.


National Institute of Standards and Technology (NIST) is a metrology laboratory, and a non-regulatory agency of the United States Department of Commerce. Its mission is to promote innovation and industrial competitiveness.

secure hostingTest your current web space if it uses encryption. Click on the following link: A new tab appears and enter your domain name. It takes a little bit time. Your current server undergoes a scan. As a result you will see a note from A to F. Where F means worst.

Secure Hosting with DNSSEC & DANE

DNSSEC was designed to protect applications (and caching resolvers serving those applications) from using forged or manipulated DNS data.

DANE enables an incremental transition to verified, encrypted SMTP without any other external mechanisms. A DANE record indicates that the sender must use Transport Layer Security (TLS).

Use following link: to check your current web space for DNSSEC & DANE.


We have enabled all necessary NGINX server amenities for a proper website optimization. There is no need to give out the control of DNS to a Content Delivery Network (CDN) for example, even for any additional speed- or caching plugins in WordPress for a fast and proper configured GDPR compliant website.

Website optimization

No Automation

Safeguarding against hackers is an art, not an automation. With automation, things or processes are linked. A chain is as strong as its weakest link. Therefore, we largely do without automation to ensure a secure web hosting.

No evaluation of your data and no Artificial Intelligence (AI)

Confidentiality, Integrity and especially Privacy have our top priority among others! Opposed to the majority of most hosting providers your data are not evaluated for commercial purposes by us.

“It is a disease of the people that they neglect their own field to look for weeds in the fields of other people.” Victor-Marie Hugo, French, 1802-1885

We reject the use of Artificial Intelligence for data evaluation without consent.


Contacting Us Is Easy

Feel free to contact us regarding your next project, questions about the company, or anything else that is on your mind.

Send us a mail

2 + 2 = ?

Jaispirit MSP



Member of GTCC