Security Overview

CRM-services recognizes that the confidentiality, availability and integrity of our customers’ information are vital to their business operations. We use a multi-level security approach to protect key information, constantly monitoring and improving our application, systems and processes to meet the growing demands and challenges of security.

Secure data centers

Our services are located in top-tier datacenters in Finland.

Physical security

•    Concrete-walled Data Center premises
•    Computing equipment in access-controlled steel cages
•    Video surveillance throughout facility and perimeter
•    Automatic anti-burglary alarm systems
•    Data Centers engineered for local seismic, storm, and flood risks
•    24-hour security, including foot patrols and perimeter inspections
•    Access control system with triple door access

Environmental controls

•    Humidity and temperature control
•    Redundant (N+1) cooling system

Power

•    Underground utility power feed
•    Redundant (N+1) UPS systems
•    Redundant power distribution units
•    Redundant (N+1) diesel generators with on-site diesel fuel storage

Network

•    Redundant internal networks
•    Network are built based on cross-connected 10Gbps switches
•    High bandwidth capacity

Fire detection and suppression

•    Duplicated fire alarms and automatic fire gas extinguishing systems
•    Fire resistant structures

Secure system usage and sessions

•    Connection to the CRM-service environment is via TSL cryptographic protocols
•    Individual user sessions are identified and re-verified with each transaction, using a unique token

Network protection

•    Perimeter firewalls block unused protocols
•    Internal firewalls segregate traffic between the application and database tiers
•    Intrusion detection detects and alerts security events
•    A third-party service provider continuously scans the network externally and alerts changes

Backups

•    All data are backed up to daily to other data center premise and kept safe 30 days
•    Data are transmitted across encrypted links

SaaS service production

•    All servers and networks runs on redundant environments
•    Services are on VMware based server
•    Enterprise level SAN disk systems

Software security

•    Our Security persons monitor notification from various sources and alerts from internal systems to identify and manage threats.
•    We follow OWASP (www.owasp.org) recommendations.

Become a CRM reseller