In order to reduce security risks to minimum, a holistic approach to security is required. Our security processes are born out of a clear definition of the threats to our system.

Security Goals

Privacy – Information within our infrastructure and systems will only be accessible by authorized users

Integrity – Data and information within our infrastructure cannot be tampered with by any unauthorized user

Data Protection – Data within the systems cannot be harmed, deleted or destroyed

Identification and Authentication – Ensures that any user of the system is who he claims to be and eliminates chances of impersonation

Network Service Protection – Ensures that networking equipment is protected from malicious hacking attempts or attacks that threaten uptime