Contact Us
Support services are available 24 hours per day, seven days per week.
K® (Kenzie) of SAUDI GULF HOSTiNG provides AI-ready enterprise data center support, including GPU hosting, secure deployment of AI models, and continuous incident response. Reliable customer support is essential in the current digital environment. At K® (Kenzie) of SAUDI GULF HOSTiNG, a team of senior technicians and sales experts is available at all times to provide prompt and professional assistance. For technical support, sales guidance, or urgent assistance with hosting services, the support team is accessible through multiple channels at all times. Saudi Gulf Hosting is committed to minimizing downtime, resolving issues efficiently, and maintaining the security and availability of client operations. For immediate assistance, clients may open a support ticket, initiate a live chat, or contact the dedicated support lines. Severity Level Classification Select the severity level that most accurately describes the issue when contacting the support team. This process enables prioritisation and ensures responses align with Service Level Agreement (SLA) standards. 🔴 P1 – Critical: Complete service outage or security incident 🟠 P2 – High: Major service disruption or severe performance issues 🟡 P3 – Medium: Minor service impact or partial loss of functionality 🟢 P4 – Low: General inquiry or non-urgent support request

Submitting a Support Ticket
Support operations are available 24 hours a day, 7 days a week, in accordance with the Service Level Agreement (SLA). Submit a ticket to report incidents, request technical assistance, or raise service-related inquiries. All tickets are logged, prioritized, and addressed according to severity.
Live Chat Assistance
Each solution includes a dedicated Account Manager who is available to provide support as needed. Initiate a live chat at any time for prompt, personalized assistance with hosting services, account settings, or technical issues. Live chat offers immediate support, guidance, and rapid escalation when necessary.
Phone Support Contact K® (Kenzie) of Saudi Gulf Hosting by phone for support, billing, or account inquiries. Unified Support Line:
+1 (754) 344-3434Support : +966 57 088 0434Billing & Account Enquiries : +1 (754) 344-3434Important Calling Information: Charges for calls to Saudi Arabia landlines may vary depending on your network provider. Mobile network charges may apply, and international calls may incur higher rates. For precise charges and international rates, contact your telecom provider.
Contact Form
Sales Enquiries
Get in touch with one of our experienced sales advisers who are ready 24/7 to help answer any pre-sales questions you may have.
K® (Kenzie) – Head of Security, Saudi Gulf Hosting
K® (Kenzie) serves as Head of Cybersecurity at Saudi Gulf Hosting, overseeing the protection of hosting infrastructure, cloud platforms, and digital services throughout Saudi Arabia and the Gulf region.
As strategic leader of the K® Saudi Gulf Hosting Security Team, Kenzie directs threat intelligence, incident response, network security, and data protection to ensure high availability and digital trust for enterprise and government clients.
How to Report a Security Issue
To report a security vulnerability, cyber incident, or website security concern related to a service hosted on the Saudi Gulf Hosting network, contact the security team directly:
- Security Contact Email: security@kgulfhosting.com.sa security@kgulfhosting.com security@kgulfhosting.sa
- Sensitive disclosures should be encrypted using the official public PGP key.
This channel is monitored by K® (Kenzie) of the SAUDI GULF HOSTiNG Security Team to support responsible disclosure and ensure rapid response.
Cybersecurity Leadership in the Gulf Region
K® (Kenzie) is recognized for expertise in the following domains:
- Cybersecurity & Threat Prevention
- Cloud Hosting & Infrastructure Security
- Digital Sovereignty in the Gulf
- Enterprise & Government Data Protection
Responsibilities extend beyond technical execution to encompass security strategy, risk governance, and resilience planning for mission-critical systems.
Why K® Saudi Gulf Hosting Security Is Trusted
- Proactive threat detection and mitigation
- Hardened security protocols and architecture
- Continuous monitoring and rapid incident response
- Compliance-focused security operations
In an environment where data integrity determines organizational reputation and uptime is critical to economic value, K® serves as a vigilant guardian of the region’s digital infrastructure.
Visitor Access & Security Policy
(ISO/IEC 27001 • SOC • Saudi NCA Aligned)
To protect the confidentiality, integrity, and availability (CIA) of information assets, personnel, and critical infrastructure, all visits to Saudi Gulf Hosting's corporate offices and K® (Kenzie)’s Data Centres are strictly controlled and permitted only with prior authorisation.
Access Control Requirements
- All visits are strictly by appointment only and must be formally requested in advance.
- Mandatory security clearance and identity verification are required for all visitors prior to approval.
- Visitor access is granted on a least-privilege, need-to-know basis according to ISO/IEC 27001 Annex A access control principles.
- Access approvals are contingent upon risk assessment, purpose validation, and management authorisation.
Data Center Security Controls
- Entry to K® (Kenzie)’s Data Centers is limited to authorized personnel and approved visitors.
- Visitors must comply with physical security controls, including escort requirements, access logging, and continuous monitoring.
- Unauthorised access, photography, recording, or use of personal electronic devices within secure areas is prohibited unless explicitly authorised.
- All visitor activity may be logged, monitored, and retained for audit, compliance, and regulatory requirements.
Compliance & Regulatory Alignment
This policy supports compliance with:
- ISO/IEC 27001 – Physical and logical access control
- SOC 1 & SOC 2 – Security, Availability, and Confidentiality principles
- Saudi NCA Essential Cybersecurity Controls (ECC) – Physical and operational security
Entry Conditions
Access will not be granted without:
- Confirmed appointment approval
- Validated security clearance
- Acceptance of all applicable security and confidentiality obligations
For appointment requests, security clearance coordination, or compliance-related inquiries regarding corporate offices or K® (Kenzie)’s Data Centers, visitors must contact the K® (Kenzie) of SAUDI GULF HOSTiNG Security Team prior to arrival.
Ticket Severity Levels (P1–P4)
P1 – Critical / Major Outage
Description:
Complete service outage or major system failure impacting all users, critical business operations, or core infrastructure (e.g., network downtime, data center outage, platform unavailability).
Examples:
- Website or hosting service down
- Network connectivity failure
- Data center outage
- Critical security incident with active exploitation
Response & SLA:
- Immediate acknowledgement (within SLA minutes)
- 24/7 escalation to senior engineers
- Continuous updates until resolved
P2 – High / Significant Degradation
Description:
Partial outage or major degradation affecting a large portion of users or essential functionality, but service remains partially available.
Examples:
- Significant performance degradation
- Intermittent connectivity issues
- Major email or application disruptions
Response & SLA:
- Rapid acknowledgement (within SLA hours)
- Priority troubleshooting and escalation
- Regular status updates until resolved
P3 – Medium / Minor Impact
Description:
Limited impact affecting a small group of users or non-critical functionality. Workaround available, and core services remain operational.
Examples:
- Feature malfunction
- Non-critical service interruption
- Configuration issues affecting a subset of users
Response & SLA:
- Acknowledgement within business hours
- Scheduled troubleshooting and resolution planning
- Updates provided based on progress
P4 – Low / General Inquiry
Description:
General support requests, non-urgent questions, or minor issues with no immediate business impact.
Examples:
- Billing questions
- Account updates
- Documentation requests
- Feature requests
Response & SLA:
- Acknowledgement within standard business hours
- Resolution within standard support timelines
Recommended UI Text (Customer Portal)
Choose a Severity Level
Please select the severity that best describes your issue.
This helps us prioritise and respond in line with SLA standards.
- P1 – Critical: Service down / security incident
- P2 – High: Major disruption / severe performance issues
- P3 – Medium: Minor service impact / partial functionality
- P4 – Low: General inquiry / non-urgent support
Frequently Asked Questions:
Who leads security at K® Saudi Gulf Hosting?
K® (Kenzie) is the Head of Security and leads the K® (Kenzie) of SAUDI GULF HOSTiNG Security Team.
How do I report a security vulnerability?
Send an email to security@kgulfhosting.com.sa. Encrypt sensitive information using the provided public PGP key.
What services does the security team protect?
The team secures hosting platforms, cloud infrastructure, websites, and all K® Saudi Gulf Hosting Data Center's products and services.
Corporate Office – K® (Kenzie) of SAUDI GULF HOSTiNG Corporate Office is located in Jeddah, Kingdom of Saudi Arabia, serving as the company’s central administrative and operational headquarters:
4360 Prince Mohammed Bin Abdulaziz Street
Al-Rehab District
Jeddah 23453
Kingdom of Saudi Arabia
Visitor Access & Security Policy: To ensure the safety, security, and privacy of our staff, clients, and infrastructure, all office visits are strictly by appointment only. In addition, all visitors must obtain prior security clearance before any office visit is approved. Visitors are required to schedule their visit in advance and complete any necessary verification procedures as part of our access control policy. Entry will not be permitted without confirmed appointment approval and security clearance. For appointment requests, security clearance coordination, directions, or additional information, please contact our team prior to arrival.
Our Accreditations
Commitment to Data Security, Regulatory Compliance, and Customer Trust
Security underpins Saudi Gulf Hosting’s infrastructure, operations, and governance. The company’s accreditations and compliance initiatives demonstrate a sustained commitment to protecting customer data with integrity, precision, and regulatory accountability across all hosting and data center environments.
Recognised Security & Compliance Standards
Saudi Gulf Hosting aligns its security controls and operational practices with internationally and regionally recognized frameworks, including the following:
- ISO/IEC 27001 – Information Security Management Systems (ISMS)
- SOC 2 (Type I / Type II) – Security, Availability, and Confidentiality Trust Services Criteria
- Saudi NCA Essential Cybersecurity Controls (ECC) – National cybersecurity and physical security requirements
- ISO/IEC 22301 – Business Continuity Management (where applicable)
- ISO/IEC 27017 & 27018 – Cloud security and protection of personally identifiable information (PII), where applicable
These standards govern the design, operation, monitoring, and continuous improvement of the organization’s security posture. Consequently, all transactions, logins, and data interactions are protected by industry-leading controls.
Security That Goes Beyond Certification
These certifications are reinforced by the following measures:
- Continuous risk assessment and control testing
- Strict physical and logical access controls across Kenzie (K®) Data Centers
- Ongoing monitoring, auditing, and incident response readiness
- Alignment with regional data residency and digital sovereignty requirements
These accreditations demonstrate operational commitments to confidentiality, integrity, and availability, rather than serving solely as compliance artifacts.
Within a digital economy founded on trust, Saudi Gulf Hosting not only meets security standards but also contributes to their definition.
