What controls are in place to ensure security?

What controls are in place for intrusion detection (IDS), perimeter security, physical security, timely application of security patches, and data leak prevention?

We don’t publish our exact zone security toolsets by name. Our security infrastructure includes IDS, security stack components and security policies recommended by PCI Compliance council and industry experts. Exposing more than is stated here would actually provide a blueprint of our system that in itself might create an exposure if shared with the wrong person(s).

Have more questions? Submit a request

Comments

Powered by Zendesk