cyber security

Protecting our computer systems, networks, devices, and programs from cyber attacks is a priority for us to safeguard our clients’ information and sensitive data.

perimeter security

Our approach consists of multiple layers of protection to create a more effective defence.

Perimeter security safeguards our network limits from malicious attacks of hackers, intruders, and other unwanted individuals.

We protect our devices through powerful antivirus software and firewalls that monitor incoming and outgoing network traffic and block unwanted outsiders or unrecognized sources.

We have also activated a 24 hr. monitoring system from an external society that:

constantly supervises the correct functioning and upgrade of our firmware and systems

intervenes in case of serious situations or suspicious warnings coming from our devices

The double server system guarantees continuity of service: thanks to a specific software, we can migrate our workloads from one server to the other one with no downtime

constantly supervises the correct functioning and upgrade of our firmware and systems

intervenes in case of serious situations or suspicious warnings coming from our devices

The double server system guarantees continuity of service: thanks to a specific software, we can migrate our workloads from one server to the other one with no downtime

In this way, our clients can be sure we are always fully operational.

disaster recovery and backups

Hackers can also take advantage of bugs to access the system; our software is constantly upgraded to avoid any possible attack.

  • Our disaster recovery and backup plans are based on a sophisticated software, world leader in backup, recovery, and data management solutions. Data and information are protected and always available, as they are stored in a secure and unchangeable repository for years.

We have also introduced a backup site located outside the main server area to avoid the loss of all data in case of some disaster.