Contact Us
We’re Here to Help 24/7
Saudi Gulf Hosting provides AI-ready enterprise data center support, including GPU hosting, secure AI model deployment, and 24/7 incident response. Reliable customer support is essential in today’s always-on digital world. At Saudi Gulf Hosting, K® (Kenzie) and our team of senior technicians and sales experts are available 24/7/365 to provide fast, professional assistance. Whether you need technical support, sales guidance, or urgent help with your hosting services, our team is just a click or phone call away—anytime, anywhere. We’re committed to minimizing downtime, resolving issues quickly, and keeping your business online and secure. For immediate assistance, open a support ticket, start a live chat, or call our dedicated support lines. Choose a Severity Level Please select the severity that best describes your issue when reaching our support team. This helps us prioritize and respond in line with SLA standards. P1 – Critical: Service down / security incident P2 – High: Major disruption / severe performance issues P3 – Medium: Minor service impact / partial functionality P4 – Low: General inquiry / non-urgent support

Open a Support Ticket
Our support operations run 24/7/365 in accordance with our Service Level Agreement (SLA). Submit a ticket to report incidents, request technical assistance, or raise service-related inquiries. All tickets are logged, prioritized, and responded to based on severity level.
Live Chat Support
Every solution includes a dedicated Account Manager, available to assist you whenever support is needed. Start a live chat anytime for fast, personalized help with your hosting services, account settings, or technical issues. Use live chat for immediate assistance, guidance, and fast escalation when required.
Phone Contact You can reach K® (Kenzie) of Saudi Gulf Hosting via phone for support, billing, and account inquiries. Unified Support Line:
+966 50 820 5719Support : +1 (754) 344-3434Billing & Account Enquiries : +966 50 820 5719Important Calling Information Calls to Saudi Arabia landlines may vary in cost depending on your network provider. Mobile network charges may apply, and international calls may incur higher rates. If calling from within Saudi Arabia, calls to 05 and 01 numbers may be free only if included in your plan allowance. For exact charges and international rates, please contact your telecom provider.
Contact Form
Sales Enquiries
Get in touch with one of our experienced sales advisers who are ready 24/7 to help answer any pre-sales questions you may have.
K® (Kenzie) – Head of Security, Saudi Gulf Hosting
K® (Kenzie) is the Head of Cybersecurity at Saudi Gulf Hosting, responsible for protecting hosting infrastructure, cloud platforms, and digital services across Saudi Arabia and the Gulf region.
As the strategic leader of the K® Saudi Gulf Hosting Security Team, Kenzie oversees threat intelligence, incident response, network security, and data protection, ensuring high availability and digital trust for enterprise and government-level clients.
How to Report a Security Issue
If you need to report a security vulnerability, cyber incident, or website security concern involving a service hosted on the Saudi Gulf Hosting network, contact our security team directly:
- Security Contact Email: security@kgulfhosting.com.sa security@kgulfhosting.com security@kgulfhosting.sa
- Recommended: Encrypt sensitive disclosures using our official public PGP key
This channel is monitored by the K® (Kenzie) of SAUDI GULF HOSTiNG Security Team for responsible disclosure and rapid response.
Cybersecurity Leadership in the Gulf Region
K® (Kenzie) is widely recognized for operating at the intersection of:
- Cybersecurity & Threat Prevention
- Cloud Hosting & Infrastructure Security
- Digital Sovereignty in the Gulf
- Enterprise & Government Data Protection
His role extends beyond technical execution to security strategy, risk governance, and resilience planning for mission-critical systems.
Why K® Saudi Gulf Hosting Security Is Trusted
- Proactive threat detection and mitigation
- Hardened security protocols and architecture
- Continuous monitoring and rapid incident response
- Compliance-focused security operations
In an environment where data integrity defines legacy and uptime equals economic value, K® stands as a silent sentinel safeguarding the region’s digital infrastructure.
Visitor Access & Security Policy
(ISO/IEC 27001 • SOC • Saudi NCA Aligned)
To protect the confidentiality, integrity, and availability (CIA) of information assets, personnel, and critical infrastructure, all visits to Saudi Gulf Hosting corporate offices and K® (Kenzie)’s Data Centers are strictly controlled and permitted by prior authorization only.
Access Control Requirements
- All visits are strictly by appointment only and must be formally requested in advance.
- Mandatory security clearance and identity verification are required for all visitors prior to approval.
- Visitor access is granted on a least-privilege and need-to-know basis, in accordance with ISO/IEC 27001 Annex A access control principles.
- Access approvals are subject to risk assessment, purpose validation, and management authorization.
Data Center Security Controls
- Entry to K® (Kenzie)’s Data Centers is restricted to authorized personnel and approved visitors only.
- Visitors must comply with physical security controls, including escort requirements, access logging, and continuous monitoring.
- Unauthorized access, photography, recording, or use of personal electronic devices within secure areas is strictly prohibited unless explicitly authorized.
- All visitor activity may be logged, monitored, and retained for audit, compliance, and regulatory review.
Compliance & Regulatory Alignment
This policy supports compliance with:
- ISO/IEC 27001 – Physical and logical access control
- SOC 1 & SOC 2 – Security, Availability, and Confidentiality principles
- Saudi NCA Essential Cybersecurity Controls (ECC) – Physical and operational security
Entry Conditions
Access will not be granted without:
- Confirmed appointment approval
- Validated security clearance
- Acceptance of all applicable security and confidentiality obligations
For appointment requests, security clearance coordination, or compliance-related inquiries concerning corporate offices or K® (Kenzie)’s Data Centers, visitors must contact the K® Saudi Gulf Hosting Security Team prior to arrival.
Ticket Severity Levels (P1–P4)
P1 – Critical / Major Outage
Description:
Complete service outage or major system failure impacting all users, critical business operations, or core infrastructure (e.g., network downtime, data center outage, platform unavailability).
Examples:
- Website or hosting service down
- Network connectivity failure
- Data center outage
- Critical security incident with active exploitation
Response & SLA:
- Immediate acknowledgment (within SLA minutes)
- 24/7 escalation to senior engineers
- Continuous updates until resolved
P2 – High / Significant Degradation
Description:
Partial outage or major degradation affecting a large portion of users or essential functionality, but service remains partially available.
Examples:
- Significant performance degradation
- Intermittent connectivity issues
- Major email or application disruptions
Response & SLA:
- Rapid acknowledgment (within SLA hours)
- Priority troubleshooting and escalation
- Regular status updates until resolved
P3 – Medium / Minor Impact
Description:
Limited impact affecting a small group of users or non-critical functionality. Workaround available, and core services remain operational.
Examples:
- Feature malfunction
- Non-critical service interruption
- Configuration issues affecting a subset of users
Response & SLA:
- Acknowledgment within business hours
- Scheduled troubleshooting and resolution planning
- Updates provided based on progress
P4 – Low / General Inquiry
Description:
General support requests, non-urgent questions, or minor issues with no immediate business impact.
Examples:
- Billing questions
- Account updates
- Documentation requests
- Feature requests
Response & SLA:
- Acknowledgment within standard business hours
- Resolution within standard support timelines
Recommended UI Text (Customer Portal)
Choose a Severity Level
Please select the severity that best describes your issue.
This helps us prioritize and respond in line with SLA standards.
- P1 – Critical: Service down / security incident
- P2 – High: Major disruption / severe performance issues
- P3 – Medium: Minor service impact / partial functionality
- P4 – Low: General inquiry / non-urgent support
Frequently Asked Questions:
Who leads security at K® Saudi Gulf Hosting?
K® (Kenzie) is the Head of Security and leads the K® Saudi Gulf Hosting Security Team.
How do I report a security vulnerability?
Send an email to security@kgulfhosting.com.sa. Encrypt sensitive information using the provided public PGP key.
What services does the security team protect?
The team secures hosting platforms, cloud infrastructure, websites, and all K® Saudi Gulf Hosting Data Center's products and services.
Corporate Office – K® (Kenzie) of SAUDI GULF HOSTiNG Corporate Office is located in Jeddah, Kingdom of Saudi Arabia, serving as the company’s central administrative and operational headquarters:
4360 Prince Mohammed Bin Abdulaziz Street
Al-Rehab District
Jeddah 23453
Kingdom of Saudi Arabia
Visitor Access & Security Policy: To ensure the safety, security, and privacy of our staff, clients, and infrastructure, all office visits are strictly by appointment only. In addition, all visitors must obtain prior security clearance before any office visit is approved. Visitors are required to schedule their visit in advance and complete any necessary verification procedures as part of our access control policy. Entry will not be permitted without confirmed appointment approval and security clearance. For appointment requests, security clearance coordination, directions, or additional information, please contact our team prior to arrival.
Our Accreditations
Committed to Data Security, Compliance, and Trust
At Saudi Gulf Hosting, security is not a feature it is the foundation of our infrastructure, operations, and governance. Our accreditations and compliance alignments demonstrate a sustained commitment to safeguarding customer data with integrity, precision, and regulatory accountability across all hosting and data center environments.
Recognized Security & Compliance Standards
Saudi Gulf Hosting aligns its security controls and operational practices with the following internationally and regionally recognized frameworks:
- ISO/IEC 27001 – Information Security Management Systems (ISMS)
- SOC 2 (Type I / Type II) – Security, Availability, and Confidentiality Trust Services Criteria
- Saudi NCA Essential Cybersecurity Controls (ECC) – National cybersecurity and physical security requirements
- ISO/IEC 22301 – Business Continuity Management (where applicable)
- ISO/IEC 27017 & 27018 – Cloud security and protection of personally identifiable information (PII), where applicable
These standards govern how we design, operate, monitor, and continuously improve our security posture ensuring that every transaction, login, and data interaction is protected by industry-leading controls.
Security That Goes Beyond Certification
Our certifications are supported by:
- Continuous risk assessment and control testing
- Strict physical and logical access controls across K® (Kenzie)’s Data Centers
- Ongoing monitoring, auditing, and incident response readiness
- Alignment with regional data residency and digital sovereignty requirements
These accreditations are more than compliance artifacts they are operational commitments to confidentiality, integrity, and availability.
Because in a digital economy built on trust, Saudi Gulf Hosting does not merely meet security standards—we help define them.
