VESTA Cyber Security
GENERAL OVERVIEW

At Vesta, all software (Backup and Productivity) and operating systems (Server and Client) are continuously updated and verified to check for security issues or vulnerabilities that could compromise business operations.

A brief description of the implementations introduced in Vesta’s enterprise infrastructure in the highlighted macro areas follows in detail.

Server and Network

Corporate resources and data are managed from local servers in isolated infrastructures and protected from unwanted access through Firewalls and multi-factor authentication systems with which, only approved and registered users can log in.

The infrastructure presents security systems at the enterprise network level, isolating access to the Wireless network on multiple segmented layers, from which core enterprise resources cannot be accessed.

Computer Client

Client computers are protected with Remote Monitoring and Management tools and Advanced Enterprise Cyber Security Platform to check the status of machines and prevent any cyber security problems.

The system is responsible for checking and monitoring the status of the operating system and installed software.

On each pc in Vesta, data is encrypted in memory drives at the individual machine level. It is not possible to copy data to external memory drives. Only registered users are allowed access to the machines.

Data Backup

Multiple regular backups are performed on separate decentralized and delocalized NAS systems to ensure that data loss is impossible and full recovery is guaranteed even in the event of natural disasters.
All backups are encrypted by design, and backups are relocated through encrypted communications in servers located in the European territory.