preloader

Business Continuty Management

Cloud Storm Software maintains a comprehensive, thoughtful process to ensure business continuity and ultimate reliability.

Infrastructure

Our dedicated IT department is responsible for Infrastructure Engineering, Infrastructure Change and Release Management. They keep clients informed about all significant events concerning the functioning of the information infrastructure on a 24x7 basis via Email2SMS-enabled mobile phones.

Computing Facilities

We have more than 400 workstations and 30 servers in our datacenters. All of them are equipped with efficient air conditioning, fire protection and UPS power protection systems. Each server is built on the RAID technology.

Network Services Reliability

Failover capabilities are implemented for main network services, such as Mail, DNS, Internet Access, Active Directory and development servers. The Mail Server backup is performed via two backup servers. This mechanism ensures the retention and stability of all incoming and outgoing mail.

Security Management

We have developed a number of documents covering our Security Policy: General Network Usage Policy, Sensitive Information Encryption and Exchange Policies. General compliance with our security policy and regulations is ensured by the usage of logon scripts and Group Policies.

Staff Security

We perform careful security checks of every person who applies for a job with Cloud Storm Software. Our Confidentiality Agreements are an important part of the security system, and every employee we hire is required to sign such an Agreement. All security-related cases and incidents are tracked and resolved by Department Managers. We inform every person we hire about the Company’s security standards and keep this knowledge up to date by organizing special training programs on a regular basis.

Physical Security and Access Control

We imply a multi-level access control system. At the most basic level of our security process is ensuring every person who accesses our offices has the appropriate ID badge to permit entry. The next level of access control is electronic access cards, each possessing unique radio metrics, given to every employee who is authorized to access the floors of our buildings. We have installed effective video monitoring and alert systems in our offices and have arranged Governmental Security Service’s (Police) protection of our property. The access control system is managed from a single central control point, although each data center’s security system is independent.

Customers Data Protection

We understand that security of our clients’ data is the No. 1 priority for our business. Sensitive data is exchanged via SFTP server, and PGP is used for email encryption, providing compliance with ISO standards for information security. We also strictly follow all governmental rules and regulations for emergency issues.

Additional Сapacities

For development purposes we use virtualization technology, which enables us to build a separate operational environment for each project and thus increase resource allocation flexibility and effectiveness.

Security Monitoring

All processes are constantly monitored by the administrative team. Vital information on all important changes and incidents is tracked and logged via Syslog Server for future audit.

Backup Process and Disaster Recovery

The Information Life Cycle Management (ILM) process we have developed at Cloud Storm Software includes a set of data protection and other security-related activities. A special data recovery scenario is presupposed for each kind of potential data loss situation (e.g., hardware or software failure, computer virus, human factor, etc.). The process of backup copy creation is regulated by the Backup Process Plan.

Effective backup procedures are ensured by a number of physically distributed backup locations in Cloud Storm Software’s offices in Minsk, with dedicated servers in several countries of the world, providing a high level of backup data encryption.