Products
Services
Pricing Documentation
Servercore
Blog
Computing
Data Storage and Processing
Network Services
Security
Machine Learning and Artificial Intelligence
Home Servercore Solutions Security

Servercore Solutions Security

We safeguard the security of your projects and applications with multi-layered data protection. Our products are developed in compliance with international security standards.

We Ensure Protection of IT Systems and Data at 5 Levels

Monitoring the data centers territory 24/7

All Servercore data centers are protected from unauthorized access by CCTV cameras that record every entry into and exit from the building.

Security guards at the entrance to the server rooms

The buildings are equipped with turnstiles and security guards on duty. Visitors are required to present their passports and obtain visitor passes, which give them access only to permitted areas.

Constant monitoring of equipment racks

Servercore engineers monitor the data center systems around the clock and check the performance of the servers every 3 hours. A special notification system based on tablets promptly informs them about emergency situations.

Strict restriction of data access

Only authorized employees can access customer data after receiving approval through the internal system. Analytical data is provided in anonymized form and does not contain personal data.

Information security culture

All employees undergo mandatory training and testing to ensure understanding of security policies. The internal security team conducts regular phishing tests to check employee vigilance.

Training and implementation of new practices

We continuously train our employees and implement best practices in the field of information security. Our employees regularly attend conferences and are certified in information security.

Automation of settings

We use automation to manage network settings in order to reduce human error and ensure configuration consistency. When a Servercore network engineer makes changes, they are automatically applied to all devices on the network.

Restricting access to the management network

We isolate the management network from the internal corporate network. Only network engineers and technicians who maintain equipment can access network equipment management and monitoring functions. This reduces the risks of unintentional errors and unauthorized access.

Isolation of projects over the network and free DDoS protection

We offer three types of networks: Internet, local network, and private network of a global router. These networks are completely isolated from each other, which ensures that their operation will not be affected. Also, all customer projects are protected from DDoS attacks at the L3 and L4 levels absolutely free of charge.

Modular service approach in development

It allows us to localize and carefully design the logic of security-sensitive products. At the same time, we minimize the impact of changes within the product on its overall operation: they may affect only limited functionality. We completely exclude scenarios in which an update in the production system leads to failures.

Isolation of customer and service infrastructure

We physically and logically isolate the services we use to develop and deploy products from the services we provide to our customers.

Secure data deletion

We take great care in deleting our customers' data when they stop using our products. This process is automated in cloud environments.

Triple data replication for cloud servers

We store your data in a failover cluster of network drives. Each block is stored in three copies on different servers in different racks. If one copy becomes unavailable, the system will automatically switch to using the other two.

Regular pentests and protection against information leaks

Pentests simulate malicious attacks, allowing us to identify and fix potential vulnerabilities. Security experts are engaged for both internal and external audits. This is how we ensure that our control panel and other systems meet high security standards.

Use of encryption protocols and two-factor authentication

When users interact with our web services, all data is encrypted, ensuring its confidentiality during transmission and preventing leaks or unauthorized access.

Distribution of Responsibilities Between the Customer and Servercore

Network infrastructure
Hardware platform
Physical security
Virtualization platform
Middleware, API
Operating system
Network security (Overlay)
Application
Data
Customer
Dedicated servers
Cloud servers
Managed Kubernetes
Cloud databases, object storage
Control panel
Servercore

How to Additionally Protect Your Project

We have prepared a small guide for you to apply additional measures to protect your Servercore-based infrastructure.

Access control

How to limit access to Servercore resources.

Network security measures

How to work with traffic filtering, IPS, etc.

Security event management

How to log events in cloud, panel, and Managed Kubernetes.

Vulnerability management

Tools for scanning Servercore products and services for vulnerabilities.

Backup

How to set up backups for cloud servers, databases, and storages.

Antivirus protection

What free antiviruses you can use.

Data encryption

How to encrypt data on Linux servers and PostgreSQL cloud databases.

Managing secrets

How to manage secrets in Servercore.

Availability Zones and Partner Data Centers

Nairobi
Almaty
Tashkent
1 availability zone
Nairobi
Kenya
  • Dedicated Servers
  • Cloud Servers
  • Managed Kubernetes
TIER III Design
TIER III
ISO27001
PCI DSS
1 availability zone
Almaty
Kazakhstan
  • Dedicated Servers
  • Cloud Servers
  • Managed Databases
  • Managed Kubernetes
TIER III Design
TIER III Facility
ISO14001
ISO20000
ISO9001
ISO27001
ISO45000
1 availability zone
2 availability zone
Tashkent
Uzbekistan
  • Dedicated Servers
  • Cloud Servers
  • Managed Databases
  • Managed Kubernetes
Reliability level — N+1
TIER II
Tashkent
Uzbekistan
  • Dedicated Servers
  • Cloud Servers
  • Managed Kubernetes
TIER III

Servercore Licenses and Certifications

ISO 27001 certification

iCOLO
It indicates that:
— the information security management system of the iColo data center that hosts Servercore solutions complies with international standards,
— the security of the services provided is confirmed by independent auditors,
— the entry of your business into foreign markets will be significantly simplifed.

PCI DSS certification

Servercore
It indicates that Servercore provides a high level of security, confirmed by an independent auditor. This allows companies to host their systems that process cardholder data.

PCI DSS requirements apply to companies that process payment card data, including banks, acquiring systems, and insurance companies.

Tier III Design certification from Uptime Institute

iCOLO
It ensures that in the iColo data center:
— infrastructure design documentation complies with Tier III Uptime Institute standards,
— multiple redundancy of communication channels and power supply is provided,
— the fault tolerance ratio is at least 99.982% (no more than 95 minutes of downtime per year),
— hosted services will operate even during scheduled repairs or power outages.

PCI DSS certification

Servercore
It indicates that Servercore provides a high level of security, confirmed by an independent auditor. This allows companies to host their systems that process cardholder data.

PCI DSS requirements apply to companies that process payment card data, including banks, acquiring systems, and insurance companies.

Data network license

Servercore
It confirms Servercore’s right to design, build, operate, and provide telecommunications networks.

O’z Dst 2875:2014 certification

UNICON
It guarantees that the UNICON data center hosting Servercore solutions complies with the state standard of the Republic of Uzbekistan in the field of infrastructure and information security.

PCI DSS
certification

Servercore
It indicates that Servercore provides a high level of security, confirmed by an independent auditor. This allows companies to host their systems that process cardholder data.

PCI DSS requirements apply to companies that process payment card data, including banks, acquiring systems, and insurance companies.

Tier III Design certification from Uptime Institute

SAIRAM
It guarantees that in the Sairam data center:
— infrastructure design documentation complies with Tier III Uptime Institute standards,
— multiple redundancy of communication channels and power supply is provided,
— the fault tolerance ratio is at least 99.982% (no more than 95 minutes of downtime per year),
— hosted services will operate even during scheduled repairs or power outages.

Tier III Facility certification from Uptime Institute

SAIRAM
It confirms that the Sairam data center undergoes regular independent audits for compliance with previously certified project documentation and meets the requirements of Tier III Uptime Institute.

ISO 27001
certification

SAIRAM
It indicates that:
— the information security management system of the Sairam data center that hosts Servercore solutions complies with international standards,
— the security of the services provided is confirmed by independent auditors,
— the entry of your business into foreign markets will be significantly simplified.

Servercore Products to Solve Your Business Tasks

Cloud Servers

Virtual machines that scale with your business

Dedicated Servers

Performance and control for businesses that need high power

Managed Kubernetes

Effortless container orchestration for your applications

Managed Databases

Scalable and reliable data management in the cloud