Customer data is under reliable protection: security in the Pro-Data cloud

Certified infrastructure and advanced protection technologies
in Kazakhstan and Uzbekistan.

Get a consultation

Our key security measures

PCI DSS – certified cloud for working with payment data

We guarantee secure processing of payment information that meets the strict requirements of PCI DSS.

Quarterly ASV scanning

As part of PCI DSS (Payment Card Industry Data Security Standard), our infrastructure undergoes periodic quarterly vulnerability scanning.

Veeam solutions — data backup and recovery

We ensure reliable backup and fast data recovery using advanced Veeam technologies, guaranteeing the continuity of services.

Fortinet – advanced traffic filtering technologies

We use Fortinet solutions to block cyberattacks and unauthorized access.

DDoS protection from Qrator – effective attack protection

Qrator's intelligent traffic filtering protects services from DDoS attacks without loss of performance.

Multi-level backup system

Regular backups with geo-distributed storage allow for quick data recovery in case of a failure.

Protection technologies

Data encryption

We use advanced encryption algorithms to protect information at all stages – from transmission to storage. This ensures that data remains confidential and inaccessible to attackers.

Network segmentation

Dividing the network infrastructure into isolated segments minimizes the risks of leaks and unauthorized access, ensuring strict control of interactions within the network.

Backup

Automated backup processes ensure data safety even in unexpected situations. Our customers can be confident that their information is always protected.

Monitoring and audit

Continuous monitoring of events in the infrastructure makes it possible to promptly identify potential threats and prevent incidents before they occur.

Quarterly security audit

Our infrastructure undergoes periodic quarterly vulnerability scanning.

Guarantee of infrastructure relevance and security

Every quarter we audit all management services and hosts using Tenable, a specialized tool for identifying vulnerabilities.

Automated vulnerability scanning

The analysis covers operating systems, services, and installed packages, identifying outdated or non-compliant security elements.

Rapid vulnerability remediation

After identifying potential risks, we timely update the OS, service packs, and software, eliminating vulnerabilities and ensuring compliance with security standards.

Answers to frequently asked questions

Here are collected answers to the frequent questions we receive from our current and potential customers.

How is protection against DDoS attacks ensured?

How does data encryption work?

What level of data redundancy is provided?

Who has access to customer data?

How can I verify the security level of Pro-Data?

Is protection for web applications (WAF) provided upon request?