Reaching the Lost
We believe that the Lord has given us an opportunity to reach millions of people with the Gospel through the Internet. During the past seven years, we have been helping churches, schools, and other Christian ministries establish a presence on the Internet. We would like to help you get a clear presentation of the Gospel on the World Wide Web for your local community. Share Christ through your website using the online Bible, a 'Plan of Salvation' page, sermon uploads, and other outreach tools. We will continue to add new services as they become available.
A Dependable Data Center
The data center where we house our servers is a Tier-3 data center designed to host mission-critical servers and computer systems. The building is equipped with fully redundant cooling, power, and network lines. This redundancy ensures that if something does go wrong in the hardware at the data center, the server on which your site is located will not go down. In addition, ten 500 kW diesel-powered generators are on the premises in case of a power outage. Our data center houses servers for Emory University, Citrix, and a local hospital so you can be sure that your data is stored in a trusted environment.
Backups
We are very concerned that your data is kept safely. We perform weekly backups of all of our clients' files and daily backups of their databases. These backups are kept locally as well as on a backup system. In case of a hard drive failure, these backups will allow us to restore your data.
Network Security
System security starts with the facility itself. Our data center is guarded by armed security 24 hours a day, seven days a week, 365 days a year. In addition, biometric hand scanning, razor wire, and video camera monitoring are implemented to protect the servers.
Internally, the Crown Web Service network is a fully switched network. Traffic destined for a website hosted on a server is sent only through switching equipment necessary to deliver the information to that server. This minimizes the risk of someone sniffing or capturing traffic being sent across the network. We also employ firewalls, virus scanning, and malware protection to prevent hackers from gaining entry to your data.