Information security is carried out using:
1) Protection of the perimeter of the data center network, including firewall, intrusion detection and prevention (IDS / IPS-system), protection against DDoS-attacks, in-line anti-virus, protection against data loss (DLP), filtering web-traffic and the protection of web-applications.
2) Protection of data transmission channels, including SSL VPN technology to protect mobile access, «Site-to-site» VPN to protect data between offices and data centers.
3) Protection of the server segment and hosts, including integrated end-host protection system (integrated network security solutions and protect against malware on hosts), protection against data loss at the host level (plus sensitive data), access control and authentication system.
4) information security management system, including the management console means of protection, system of collection, analysis and correlation of information security events (SIEM).
5) Ensuring the continuity operation of the datacenter , including backup and recovery, cloud technologies, clustering to ensure continuity of operation of the subsystems.
6) Compliance with information security requirements, including sectoral requirements, international standards and best practices, legislative requirements, internal information security policy.