When we set up a cloud environment, our main focus is to secure all the data and build a solid data security structure for the organization.
Security consists of several important settings, such as how data is stored, accessed, saved and protected.
We work with encrypted data volumes.
When data is encrypted, no unauthorised individual or entity can access and read it.
NETWORK AND DATA STORE SEPARATION
Each customer has its own storage which is not connected to any other system or customer.
It is highly unlikely that someone can get access to the data center and remove any equipment.
The security features such as fingerprint readers, access cards and restricted access meet the highest standards.
DATA / ENVIRONMENT ACCESS
We ensure data access via an encrypted Site2Site and Dial In VPN connection free of charge.
The SSL-encrypted RDS connection is also available, making the system accessible through a web browser via HTML5.
For higher security, we also provide 2FA. This service works with Sophos mechanism and a software token system on your cell phone.
We use state-of-the-art firewall and antivirus systems, therefore, Sophos is our partner of choice. IDS and IPS are implemented.
The configuration includes intrusion detection and standard port blocking.
All hosting offers come with an external backup solution, that copies our data to an independent and not permanently connected storage. This protects the backup
from being encrypted if you are hit by ransomware. The backup runs minimum once a day.
If needed, we can also create an ongoing backup that mirrors all your data to an external storage.