Configure. Perfect. Replicate.

Every one of our thousands of server nodes is identically configured for complete consistency, then managed and monitored centrally using modern development tools like Terraform and Ansible. As a result, we're able to run a disparate, redundant, fully-managed hosting environment with zero technical headaches or overheads.

Imitation is the sincerest form of flattery. Our servers are configured identically and managed centrally. If a setting is tweaked to improve performance or increase compatibility, it happens (after testing) universally on all of our systems.

Provider agnostic
Provider agnostic

We deploy on top of public cloud providers, so fully leverage networks like Google and Amazon. If required, we can deploy to practically any network provider with an api.

Our management tools are spread across multiple locations to ensure that we can control our systems as efficiently as possible.

Configuration automation
Configuration automation

We use Ansible to centrally control our entire server configuration state. Once a server has been created, its details will be passed onto Ansible, where a consistent configuration is applied. From security profiles to email configurations, all of our servers begin life with a carefully designed and automatically applied configuration.

Infrastructure as code
Infrastructure as code

Each server begins by being defined as a terraform configuration. This allows us to both provision a server on numerous cloud providers in seconds, but also provision the various requirements (licenses, DNS configurations, etc.) completely programatically, with no human intervention required.

Refreshed hardware
Refreshed hardware

Underlying infrastructure is updated & replaced with minimal disruption to sites and no action required on your part. You won't find yourself on end of life systems in five years' time, or being put through confusing server migrations and nameserver changes.

100% public cloud

We leverage the networks and hardware of global public cloud providers. In practice this has a number of important consequences: we use their infrastructure to deploy our own software stack, we focus on the hosting environment and setup rather than underlying hardware, it removes almost every single point of failure in our offering.

Billion dollar networks
Billion dollar networks

These providers invest billions of dollars into their networks. No website host has the ability to come close to matching it themselves. As Google or Amazon develop new features or open new locations, we can take immediate advantage.

Hardware recovery
Hardware recovery

In case of any issue, your websites will move to new systems automatically with no disruption. On a traditional web server, a failing disk may cause sluggish performance or data-loss. This is not the case with the providers we use.

Live migrations
Live migrations

Resize, reboot, change or recover with zero downtime. Depending on the underlying provider, we can even upgrade systems without disruption.

Fully managed
Fully managed

We take care of full server management, and provide you with a straightforward cPanel hosting interface. You get all the benefits of public cloud, with no headache. You do not need your own accounts with cloud providers.

Platform details

We do not compromise in engineering the best possible hosting environments. We run two distinct setups. Our cPanel hosting is focused on creating the ultimate mass-scale and dedicated website hosting environments using the popular cPanel control panel, suitable for hosting any website. Our WordPress hosting platform is built entirely in-house and provides a specific optimised environment for running WordPress with optimal features and performance.

cPanel Hosting

Our cPanel environment runs our web hosting, reseller hosting and dedicated servers. We operate thousands of cPanel servers.

Tools & Software

We provide the cPanel control panel with all our shared and reseller hosting accounts. cPanel is the world's most popular hosting control panel, and provides an easy-to-use interface to manage your hosting environment -- creating emails, uploading files, installing applications & much more.

Along with cPanel, we include Softaculous, Imunify360 and Spamxperts.

cPanel & WHM
cPanel & WHM

cPanel is the world's leading hosting control panel. WHM is a reseller panel which allows resellers and server customers to create multiple cPanel accounts.

Softaculous autoinstaller
Softaculous autoinstaller

Install over 300 software applications with the premium Softaculous auto-installer. Browse software from WordPress to Joomla to PHPBB, and install in one click.

SpamExperts
SpamExperts

We filter all mail that arrives or is sent on our systems. Mail is sent out through external providers. This means that you will never had blacklisting issues when sending to external mail accounts.

MailChannels
MailChannels

Along with Spam Experts, MailChannels gives us redundancy for outbound email deliverability.

Imunify360
Imunify360

Imunify360 proactively protects against malware infections and viruses on websites.

PHP selector
PHP selector

Choose between both the latest and older version of PHP. Older versions (going back to 5.2!) are patched and secured. No extra charges for legacy support.

WP-CLI
WP-CLI

The WordPress command line interface, available on all systems, to allow you to manage your WordPress sites without a web browser.

Jetbackup
Jetbackup

We backup twice a day to offsite servers. Jetbackup allows you to browse, download and restore backups from within your control panel.

AutoSSL / LetsEncrypt
AutoSSL / LetsEncrypt

Automatic SSL provisioning for every live domain or subdomain. We use either LetsEncrypt or Comodo depending on issuance times.

SitePad
SitePad

The easy-to-use drag and drop website builder.

CloudLinux
CloudLinux

Cloudlinux is a modification to the Linux operating system which limits the amount of resources that an individual user can utilise.

On a shared hosting server, because multiple users run on the same hardware and operating system, without Cloudlinux there is a risk that one user could monopolise the server resources, or cause the server to crash.

We use Cloudlinux as a means to protect other users from malicious or erroring scripts, rather than as a way to limit actual website resources. If a website hits our Cloudlinux limits it likely either has an error, or has outgrown shared hosting. If you don't have caching enabled, you should add it - read more here or ask our support team.

Shared HostingReseller (per cPanel acct)
StandardStandard
RAM (PMEM)1-2GB2GB
CPU Processes (Speed)1-2 cores2 cores
File limit (Inodes)UnlimitedUnlimited
Entry processes (Nproc)3030/cPanel account
Iops10241024
IO50MB/S250MB/S

Webserver configuration

Every server or hosting account we offer runs on a standardised web server that supports the vast majority of things any website needs, and is optimised for a mixture of performance and stability.

HTTP3 web server

The latest version of the HTTP protocol which provides more efficient site loading.

Litespeed PHP module

Efficient PHP handler with caching support

Memcached

General purpose memory-caching server

Redis

High speed Key/Value store. Excellent for speeding up WordPress sites.

NodeJS support

Popular javascript runtime environment

Python support

Popular programming language with designed with readability in mind.

OpCache

PHP RAM based object cache.

Passenger

Apache module for running NodeJS or Python web applications.

MariaDB

Open source drop in replacement of MySQL designed to offer higher performance.

Managed WordPress

Our custom built WordPress platform is designed to run WordPress efficiently and consistently, with a large number of usability features.

Infrastructure

We achieve complete isolation between WordPress sites by containerising each installation. Each container can be scaled and adjusted dynamically to suit the needs of your site.

Kubernetes
Kubernetes

Kubernetes is a Google containerisation technology. It create worker containers for your site, and also auto-heals should there be any issues.

Brotli compression
Brotli compression

Brotli Compression

LetsEncrypt
LetsEncrypt

WPCli
WPCli

Internal systems

Security at scale

Stablepoint was started by industry veterans, who knew that as a hosting business grows, security becomes fundamental. When we are contacted by a client, we need to be able to verify and assist them, only once security is passed. Every change on a system, made by both clients and staff, needs to be tracked and logged. Access to servers and systems needs to be locked down by privilege level.

At the same time we need to be able to manage all systems from a central network operations team, we have to be quick to notice problems, and we have to have quick efficient ways of accessing systems to solve issues.

Security at scale
Restricted access
Restricted access

Access to particular feature levels on servers is heavily locked down to each individual staff member by VPN and LDAP authentication.

LDAP authentication
LDAP authentication

Access to any Stablepoint internal system requires LDAP authentication from a staff member

Centralised logging
Centralised logging

Every system we have logs data to our centralised Elasticsearch clusters, giving us instant visibility over our whole server estate

Jivo Live Chat