PPM Raum – securly, everything is under control.

Secure? Yes, of course!

 
 
 

Where is the data actually located?
The PPM servers are operated in a data centre in Cologne. One of the most modern and powerful data centres in Europe.

 

How is the security of the data ensured?
Gas extinguishing systems and physically separate fire sections, a contemporary access security system, 24-hour video surveillance including alarm system and security service as well as a multi-redundant internet connection via backbones to various providers secure the data at the highest level. In addition, all components of the platform are redundant at least in 3 times the quantity.

The data room itself is encrypted using SSL (256 bit). In addition, the data is protected by access rights. The access to the PPM Raum is exclusively encrypted. The PPM rights system can also be used to separate individual areas in the data room from one another for different users and groups. Passwords are stored encrypted in the databases as SHA hash and can not be read by anyone in plain text.

 

Who certifies the security system?
The data centre ensures excellent data security and flawless data protection through the TÜV-certified information security management system. The data centre has been certified by TÜV Süd with the coveted seal ISO 27001 and SSAE 16 / ISAE 3402. In addition, the data center is the first leading provider of cloud services to have ISO / IEC 27018 certification and C5 certification from the German Federal Office for Information Security (BSI).

 

How do you deal with possible hacker attacks?
All servers and network services are protected by firewalls against hacker attacks from the outside and are continuously monitored.

 

What is being done against viruses?
In addition, all set documents are scanned with uo-to-date anti-virus software to protect against contaminated files. Particularly threatening file types are rejected from the outset by the system.

 

Backup - is this done? How often?
The entire data in the data room is subjected to a backup 3 times a day. The backup servers run separately with uninterrupted power supply (UPS). Thus, it is possible at any time within minutes to restore the entire database in case of failure of a hardware component.

 

How can I find out who created what and when?
All users’ actions are logged, including:

-Each login or attempt with user ID, date and time

-All file actions in the data room (downloads, uploads, changes, shipping, knowledge etc.)

 
 
     security