Business Continuity

Colombus pays a lot of attention and maintains a comprehensive process to ensure business continuity and ultimate reliability.
Infrastructure
Our dedicated IT department is responsible for Infrastructure Engineering, Infrastructure Change and Release Management. They inform about all significant events concerning the functioning of the information infrastructure on the 24x7 basis by using mobile phones with Email2SMS service enabled.
Computing Facilities
We have more than 400 workstations and 30 servers in our datacenters. All of them are equipped with efficient air conditioning, fire protection and UPS power protection systems. Each server is built on the RAID technology.
Network Services Reliability
Failover capabilities are implemented for the main network services, such as Mail, DNS, Internet Access, Active Directory and development servers. The Mail Server backup is performed via two backup servers. This mechanism ensures that no incoming and outgoing mail is lost.
Security Management
We have developed a number of documents covering our Security Policy: General Network Usage Policy, Sensitive Information Encryption and Exchange Policies. General compliance with our security policy and regulations is ensured by the usage of logon scripts and Group Policies.
Staff Security
We perform careful security check of every person that is applying for a job. Confidentiality Agreements are an important part of the security system and every employee we hire has to sign such an Agreement. All the security-related cases and incidents are tracked and resolved by Department Managers. We inform all the people we hire about the Company’s security standards and keep this knowledge up-to-date by organizing special training programs on regular basis.
Physical Security and Access Control
We imply a multi-level access control system. On the first level our security service is checking our employees’ ID badges to ensure they are authorized to access the building. The next level of access control is based on the usage of electronic cards, each possessing unique radio metrics, that are given to every employee that is authorized to access the floors of our buildings. We have installed effective video monitoring and alert systems in our offices and have arranged Governmental Security Service’s (Police) protection of our property. The access control system is managed from a single central control point, although each data center’s security system is independent.
Customers Data Protection
We understand that security of our clients’ data is a number one priority for our business. Sensitive data is exchanged via SFTP server and PGP is used for email encryption. Thus compliance with the ISO standards for information security is provided. We also strictly follow all the governmental rules and regulations for emergency issues.
Additional Сapacities
For development purposes we use virtualization technology which enables us to build a separate operational environment for each project and thus increase resource allocation flexibility and effectiveness.
Security Monitoring
All the processes are constantly monitored by the administrative team and vital information on all important changes and incidents is tracked and logged via Syslog Server for future audit.
Backup Process and Disaster Recovery
The Information Life Cycle Management (ILM) process we have developed at Colombus includes a set of data protection and other security related activities. A special data recovery scenario is presupposed for each kind of potential data loss situation (e.g. hardware or software failure, computer virus, human factor, etc.). The process of backup copy creation is regulated by the Backup Process Plan.
Effective backup procedures are ensured by a number of physically distributed backup locations in Colombus’s offices in Minsk, with dedicated servers in several countries of the world providing high level of encryption of backup data.
Infrastructure
Our dedicated IT department is responsible for Infrastructure Engineering, Infrastructure Change and Release Management. They inform about all significant events concerning the functioning of the information infrastructure on the 24x7 basis by using mobile phones with Email2SMS service enabled.
Computing Facilities
We have more than 400 workstations and 30 servers in our datacenters. All of them are equipped with efficient air conditioning, fire protection and UPS power protection systems. Each server is built on the RAID technology.
Network Services Reliability
Failover capabilities are implemented for the main network services, such as Mail, DNS, Internet Access, Active Directory and development servers. The Mail Server backup is performed via two backup servers. This mechanism ensures that no incoming and outgoing mail is lost.
Security Management
We have developed a number of documents covering our Security Policy: General Network Usage Policy, Sensitive Information Encryption and Exchange Policies. General compliance with our security policy and regulations is ensured by the usage of logon scripts and Group Policies.
Staff Security
We perform careful security check of every person that is applying for a job. Confidentiality Agreements are an important part of the security system and every employee we hire has to sign such an Agreement. All the security-related cases and incidents are tracked and resolved by Department Managers. We inform all the people we hire about the Company’s security standards and keep this knowledge up-to-date by organizing special training programs on regular basis.
Physical Security and Access Control
We imply a multi-level access control system. On the first level our security service is checking our employees’ ID badges to ensure they are authorized to access the building. The next level of access control is based on the usage of electronic cards, each possessing unique radio metrics, that are given to every employee that is authorized to access the floors of our buildings. We have installed effective video monitoring and alert systems in our offices and have arranged Governmental Security Service’s (Police) protection of our property. The access control system is managed from a single central control point, although each data center’s security system is independent.
Customers Data Protection
We understand that security of our clients’ data is a number one priority for our business. Sensitive data is exchanged via SFTP server and PGP is used for email encryption. Thus compliance with the ISO standards for information security is provided. We also strictly follow all the governmental rules and regulations for emergency issues.
Additional Сapacities
For development purposes we use virtualization technology which enables us to build a separate operational environment for each project and thus increase resource allocation flexibility and effectiveness.
Security Monitoring
All the processes are constantly monitored by the administrative team and vital information on all important changes and incidents is tracked and logged via Syslog Server for future audit.
Backup Process and Disaster Recovery
The Information Life Cycle Management (ILM) process we have developed at Colombus includes a set of data protection and other security related activities. A special data recovery scenario is presupposed for each kind of potential data loss situation (e.g. hardware or software failure, computer virus, human factor, etc.). The process of backup copy creation is regulated by the Backup Process Plan.
Effective backup procedures are ensured by a number of physically distributed backup locations in Colombus’s offices in Minsk, with dedicated servers in several countries of the world providing high level of encryption of backup data.