Customer data under strong protection: cloud security
Pro-Data

Certified infrastructure and advanced security technologies
in Kazakhstan and Uzbekistan.

Get advice

Our key protections

PCI DSS is a certified cloud for working with payment data

We guarantee secure processing of payment information that meets the strict PCI DSS requirements.

Quarterly ASV scan

As part of PCI DSS (Payment Card Industry Data Security Standard), our infrastructure is periodically scanned for vulnerabilities on a quarterly basis.

Veeam solutions — data backup and recovery

We provide reliable backup and fast data recovery using Veeam's advanced technologies, ensuring service continuity.

Fortinet — advanced traffic filtering technologies

We use Fortinet solutions to block cyber attacks and unauthorized access.

DDoS protection from Qrator — effective protection against attacks

Qrator intelligent traffic filtering protects services from DDoS attacks without loss in performance

Multi-level backup system

Regular backups with geo-distributed storage allow you to quickly restore data in the event of a failure.

Security technologies

Data encryption

We use advanced encryption algorithms to protect information at all stages, from transmission to storage. This ensures that data remains private and inaccessible to attackers.

Network segmentation

The division of network infrastructure into isolated segments minimizes the risks of leaks and unauthorized access, ensuring strict control of interactions within the network.

Backup

Automated backup processes ensure data safety even in case of unforeseen situations. Our customers can be sure that their information is always protected.

Monitoring and auditing

Continuous monitoring of infrastructure events allows you to quickly identify potential threats and prevent incidents before they occur.

Quarterly security audit

Our infrastructure is periodically scanned quarterly
for vulnerabilities.

Ensuring that the infrastructure is up to date and secure

Every quarter, we audit all service managers and hosts using Tenable, a specialized tool for identifying vulnerabilities.

Automated vulnerability scanning

The analysis covers operating systems, services, and installed packages, identifying items that are outdated or do not meet security requirements.

Prompt elimination of vulnerabilities

After identifying potential risks, we promptly update the OS, service packages and software, eliminating vulnerabilities and ensuring compliance with security standards.

Answers to frequently asked questions

Here are answers to frequently asked questions we receive from our current and potential customers.

How is DDoS protection provided?

How does data encryption work?

What level of data backup is provided?

Who has access to customer data?

How can I check the Pro-Data security level?

Is Web Application Protection (WAF) available on demand?