Our emphasis on security

17-09-2013

The growing threat of increasingly sophisticated hackers and cyber-attacks constantly puts IT security to the test. Your website or application is your window to the world, and, for most organizations, critical for the success of their business. At the same time, we know being available on the Internet can expose your environment to attacks from those who want to harm or steal from your business. A successful attack can shut you down or severely restrict the availability of your mission critical applications, damaging your brand reputation, and ultimately inflicting an unacceptable loss of revenue. We at Basefarm are committed to providing the highest possible security for your environment.

Secure operations

Security is not a component, but something that must permeate all parts around an IT service. At Basefarm, we ensure that security is taken into consideration in every step of the service delivery. We believe that security is key to our customers, and we continuously work to improve the security of our customer solutions from both a vulnerability and operational perspective. 

Security across the entire service lifecycle

Few hosting providers offer full-coverage security in their operations. Thus, clients are often forced to consult safety experts when security concerns are forced upon them after a major incident or when they belatedly need to review their de facto operational security. We focus on security across the entire service lifecycle, which means that we are designing secure operating environments, have a full range of security services that we tailor to the needs of each customer, and can advise on security issues or concerns.

Secure operations – the benefits

We have extensive experience in setting up secure and robust operating platforms, and we ensure that security is taken into consideration from the beginning. Below, you can read more on how we work with security in every step of the service lifecycle:

Optimal Secure Solution - Our pre-sales engineers first examine your specific needs as a customer, and creates an architecture that will meet your requirements as well as giving feedback on how we believe your current environment could be improved upon (for instance; redundancy, dual data center solutions, private clouds, firewalls, backup, DDoS protection, PCI DSS compliant enterprise solutions, disaster recovery, etc.). We ensure that you get high-end components, both hardware and software, together with the latest technology adapted to master the continuous stream of security challenges.

Accountability - We are responsible for the operation of your mission critical applications so that you meet both business and legal requirements. Once the solution is operational, security permeates our daily work, processes, and procedures—from incident handling to complex, yet stringent, change management. Your dedicated customer team delivers actionable feedback on your application code from the perspectives of security, stability, and performance.

If a security incident occurs, we follow our security-incident process promptly and professionally. All security incidents are reported to our SIRT, the Basefarm Security Incident Response Team, for further analysis. Our SIRT advise the responsible engineers in Basefarm operations.

Local physical security- We place our cloud infrastructure in our own secure data centers in Scandinavia and in the Netherlands, which allows you to control in which countries your data is being stored. We do have high physical access regulations and guard the facilities from intrusion.

Fast action- We keep you informed, in real time, if a security incidents should strike that affects your environment, so that you quickly can make decisions and take actions to minimize potential injury.

Preventive approach- We implement preventive measures to protect against future threats, in order for you to focus on your work while we make sure that you have the latest protection against various threats and vulnerabilities. For example, we ensure that our customers’ environments are patched regularly; either automatically or manually depending on each customer’s needs.

Learn more about our offerings of security services here, and how our security experts can help you.

Read more about what we can do for your organization.
Contact our specialists for detailed information.

DIRECT CONTACT

btn-top