We take security very seriously and have developed a comprehensive set of practices, technologies and policies to help ensure your data is secure. Security is essential in working with customers’ information, the CMS2CMS team builds the service on effective and security-focused practices.
This document outlines some of the mechanisms and processes that we have implemented to help ensure that your business data is protected. CMS2CMS security is grouped in 4 different areas: Physical Security; Network Security; People Processes and Redundancy and Business Continuity.
Physical Security Layer
Our data centres are hosted on secure facilities. It includes:
- High-security video-monitored around all perimeter
- Entry via a transponder key in electronic access control terminals
- Surveillance cameras for 24/7 monitoring of access routes
Furthermore, it is protected from physical and logical attacks, and from natural disasters such as fires or floods.
Network Security Layer
CMS2CMS network security team protects your data against the most sophisticated electronic attacks. We use the best and proven practices of network security. CMS2CMS offers the following preventive measures:
- network firewalls
- DDoS preventions (We use the latest hardware appliances and sophisticated perimeter security technologies, providing you with first-rate protection against large-scale DDoS attacks.)
- network posture assessment
Application Security Layer
Our service provides you with HTTPS-encrypted communication, role-based authorization, and validation of all requests to ensure the security on the application level.
On a regular basis, we scan all systems to prevent any vulnerabilities. The software is constantly updated, so all connections to the previous version are limited, logged and checked.
We comply with your confidentiality and guarantee that all your CMS data is 100% secure before, during, and after the migration procedure. We take appropriate security measures to protect against unauthorized access to or unauthorized alteration, disclosure or destruction of data. These include internal reviews of our data collection, storage and processing practices and security measures, as well as physical security measures to guard against unauthorized access to systems where we store personal data.
All the questions, comments, requests and complaints regarding your data security and the information we hold are welcome and should be addressed to CMS2CMS at firstname.lastname@example.org
CMS2CMS complies with GDPR regulations, more info on this you can find on our GDPR Compliance page.