Our locations are based in data centers with highest demands for security and reliability. To ensure the physical safety of data we use industry standard solutions such as:
- 24/7 security and access monitoring
- Access control to the building, server rooms and server cabinets
- 24/7 video surveillance systems
- Biometric and 2FA access control systems
- Redundand Uninterruptible Power Systems and Autonomous Diesel or Gas Generators
- Redundand network feeds
We use our own equipment in all locations – both server and telecommunications systems. Access to the infrastructure for maintenance is provided by a multi-level control system, including key authorization, two-factor checks and access restrictions from trusted sites. We use the role based access control which allows access to a particular component based on strict security policies. All activity related to access to infrastructure components is logged and constantly monitored.
Security of user data
We believe that user data has the highest priority in protecting information. This means access to information hosted on physical or logical storages is strictly limited and regulated. Technical support engineers and data center personnel unable to access user data without direct order from authorized data owner (user) and after agreeing the necessary details with the data owner. Direct access to hypervisors is limited only to a group of engineers who performing maintenance these infrastructural components.