Security

Security Best Practices

Our commitment to security

At ETI-NET we are committed to ensuring the utmost security for your valuable information. We understand that your trust in our services is built upon safeguarding your data, and we take this responsibility seriously. Our dedicated team works tirelessly to implement robust security measures, employing the latest technologies to protect your information from unauthorised access, data breaches (and other potential threats), and diligently follow a comprehensive System Development Life Cycle (SDLC) to create a secure environment for your data.

Information governance

Our comprehensive security framework includes regular monitoring, encryption, multi-factor authentication, and adherence to industry best practices. We continuously update our systems to stay ahead of evolving cyber threats and maintain compliance with relevant regulations. Your data's privacy and integrity are central to our mission, and we invest in the necessary resources to ensure its safety.

Data Protection

Privacy by design and by default

ETI-NET is the worldwide leader in backup of critical data for industries that never stop. We develop software which allows NonStop servers to access modern storage technologies. Now in our third decade of operation, ETI-NET enjoys a reputation for delivering leading-edge components to major data-centers globally.

Continuous Monitoring

Our systems are under constant surveillance, allowing us to promptly detect and respond to any unusual activities or potential security breaches.

Multi-Factor Authentication

To bolster access security, we enforce multi-factor authentication, requiring multiple verification steps for authorised personnel to access sensitive data and systems.

Dynamic Compliance

We maintain compliance with the latest industry standards and regulations, adapting our security practices to align with legal requirements and security guidelines.

Change Management

Change Management is an integral part of our commitment to your security. Our rigorous protocols ensure that any changes to our systems undergo thorough testing and assessment to minimize potential risks. We believe that proactive change management is key to maintaining the stability and integrity of our services.

  • Structured Process: Our Change Management process follows a well-defined structure, including request submission, impact assessment, risk analysis, testing, and approval stages, ensuring a systematic approach to changes.
  • Risk Mitigation: Before implementation, changes are subject to comprehensive risk assessments to identify potential vulnerabilities and to implement appropriate mitigation strategies.
  • Testing Regime: Rigorous testing procedures are applied to all changes, including functionality, compatibility, and security assessments, guaranteeing that changes don't introduce unforeseen issues.
  • Transparency and Communication: We maintain open communication with stakeholders throughout the change process, providing insights into upcoming changes, potential impacts, and the expected benefits.