GIS Server Hosting, Welcome to HostGIS

HostGIS is the established leader in providing fully managed servers for open source geospatial applications. We provide high speed GIS servers, world-class multiple Tier 1 network connections, and professional systems administration. Services include daily security monitoring and hardening, daily backups, and regular off-site backups of the backups we already include in our monthly lease options. We are also available to provide geographic information system programming and consulting on a full project or as-needed basis. We have developed GIS systems in a wide range of industries including transportation, social services, fishing and oceanographic data, harbor management, agriculture, forestry, engineering, oil and mineral exploration, real estate, water quality monitoring, and many others.


In one experiment we performed, a default-installed Linux system was left without a firewall and with a poor choice of passwords. It was taken over by hackers at 18 hours of uptime, and was immediately used to attack other computers on the Internet.

Security is a must for the business of today. Many server companies assume that you will provide your own security; but if you're not an expert, then your data is at risk!

Our network repels literally thousands of attacks every day; and we work hard to keep your company safe and secure.

  • Ongoing monitoring and testing for viruses, Trojans, and rootkits. We do this automatically, but we also work directly with you to ensure that the upgrade doesn't interrupt your work day or break your applications.
  • Free high-priority upgrades of your system software, including PostgreSQL and MySQL databases, Apache webserver, PHP, and other sensitive components.
  • A firewall, managed by our system administrators adjusted to your specifications. Don't worry if you don't understand firewalls; we are glad to work with you, discussing how best to secure your server without keeping you from your work.
  • Vulnerability testing via Nessus, the industry standard in proactive security-risk monitoring. Server scans are performed weekly.
  • Multiple layers of attack detection and prevention. For traffic allowed through the firewall, anomaly detection systems (OSSEC) provide a potent second line of defense, detecting signs of abuse and automatically terminating connections.
  • Advanced post-intrusion detection systems. If something does get through, our file alteration monitor (Tripwire, an industry standard) will tell us; giving us the proper indications of how best to address the issue.
  • Password auditing. We use John The Ripper, the de facto standard in password-strength checking, to ensure that your users have chosen strong passwords.
  • Backups. The last line of defense, but a valuable one. If things really go wrong, we have backups going back two weeks.

If you take your hands off the wheel, your car will keep driving itself. But is that really a good long-term solution?