Enterprise & Cloud Hosting
Email: Call: +65 6288-6264
Security PoliciesWith nearly 2.5 million visits worldwide accessing Vodien services, our customers, which include individuals, and businesses large and small, count on Vodien's security and data protection to meet their needs. As a result, security is taken very seriously here at Vodien, and we have developed a system of processes, technologies, and policies to help ensure that your account, and all the data within it, is secure.
Our security practices cover five different areas: Physical Security; Network Security; Server Security; People Security; and Redundancy and Business Continuity.
Our datacenters are in secure facilities that are located in areas with no history of natural disasters such as earthquakes, fires, floods, etc.
We protect your websites and data against sophisticated electronic attacks. The following is just an intentional partial, generic description of our full network security practices. If you require further details on our network security, please get in touch with us.
As with our network security processes, our server security is tightly regulated. The following is not an exhaustive list of processes that we follow to ensure security on our servers.
We focus not just on the technology but on people as well. Policies about escalation, management, and daily operations are well-defined to manage security risks.
Redundancy and Business Continuity
One of the core principles of our network and infrastructure design is redundancy, because we know that it is not a matter of if, but a matter of when, that hardware fail. As such, we have designed our network and servers with the following in mind:
The areas listed above and brief and generic for security reasons, but we have taken great steps to ensure that our security policies, and architecture are reliable and secure.
For more information about our security here at Vodien, please feel free to contact us.
The above stated Securities Policies are correct as of 27 Nov 2013.