Every day, terabytes of data being a trade secret is processed, without which our Customers will not be able to run their basic business activity.
Owing to the fact that using our services involves the highest level of trust from our Customers, we try our best to properly protect this information from damage or unauthorized access.
Therefore, we apply a range of means guaranteeing a physical and environmental security of supported IT systems.
Find out more on how we secure your valuable data!
Five levels of security in iBard24
1. Login and Password
Known only to Customers and appropriately stored are the base of security.
2. SSL 128 bit Protocol
Encrypting the transfer of data on Customer's computer - iBard24 line with the use of SSL 128 bit Protocol. The same protocol is used in communication with online banking services, which are used by almost each one of us on a daily basis.
Thousands of institutions, for which security of data is a key aspect of their activity, have already trusted us.
Comarch Data Center
this is where we store our Customers’ data
Each of Comarch Data Center facilities is located away from seismically active areas and floodplains. The hydrologic analysis and experiences gained throughout the years confirm that there is no flood risk.
Deployment of facilities in different geographical locations allows us to offer dispersed architecture composed of a primary site and a backup facility (DRC). The backup facility is designed for providing the accessibility of systems in case of a failure or destruction of the primary site.
Physical security of the IT infrastructure is ensured by:
1. Strictly limited access to buildings and server room facilities as well as registration and control of access permissions.
2. Separation of security zones having different levels of restriction.
3. Permanent supervision of security services supported by surveillance systems.
4. Use of alarm systems and intrusion detection systems.
5. Application of procedures regulating the rules of physical access to facilities.
Organization of Comarch Data Center is aimed at reducing the risk and ensuring a high level of security to all IT resources. We provide accessibility of the infrastructure at the level of 99,82 % within a year, which complies with level Tier 3 according to TIA-942 standard.
Data processing systems must operate in particular conditions which guarantee their reliability and efficiency. We provide such conditions by using:
A common part of most of the systems operating in Comarch Data Center is the network infrastructure. It is a separate part of Comarch internal network, divided into zones dedicated to systems performing different functions and having different criticality levels.
Active devices used for building of Comarch Data Center LAN are produced by leading manufacturers of security and network solutions. The architecture ensures redundancy of the most important devices and access links. Currently, each facility uses links delivered by four independent operators, which contributes to minimization of the risk of inaccessibility of systems in case of failure of one of the links. Network topology assumes separating dedicated subnetworks for each system and Customer and therefore, disabling direct communication between two different environments. Separating of the network traffic between the zones is performed with the use of firewall systems. They are supplemented by intrusion detection systems, which analyze the network traffic in reference to potential attack attempts.
The primary aim of Comarch is provision of services to Customers at the highest level. It also refers to Comarch Data Center, which operates under the Integrated Management System implemented and maintained within the entire company. IMS in Comarch fulfills requirements of the following ISO standards: EN ISO 9001:2009, EN ISO 14001:2005, ISO/IEC 27001:2007, PN-N 19001:2006, PN-N-18001:2004.
A confirmation of fulfillment of specific standards is the Management System Certificate, issued by Polish Center for Research and Certification, cooperating with Comarch within supervision and certification audits.
Entities that have trusted Comarch Data Center: