Security at the heart of everything
Whatever the service, data security is the priority. Penta deployes the latest best practices, monitored and maintened by industry-leading experts.
Hover over the diagram to read more.
Users from your organization whatever the location connect to Penta's infrastructure using secure Virtual Private Network technology and bank-level multi-factor authentication.
Internet Service Providers (ISPs)
Connections to Penta's data centers is made through either dedicated connections leased from specialist network providers or through commercially available Internet Service Providers (ISPs).
Every aspest of Penta's infrastructure is built in a High Availability configuration. This means that all hardware and software components are duplicated so that there is no single point of failure.
- Continuous monitoring by Intrustion Prevention and Detection Systems (IPS/IDS) with engineers on standby to react to any suspicious activity
- External and internal load balancers (Ext/Int LBs) to ensure traffic is routed efficiently and ensuring seamless uptime in case of failures
- External and internal firewalls (Ext/Int FWs) for optimum traffic control and hacking defenses
Local Area Networks
Network traffic is routed to either the user facing front end Local Area Network (LAN) or the seperate back end LAN where the data resides.
Storage Area Networks (SANs)
Redundant Storage Area Networks (SANs) are safely isolated behind multiple security layers and only accessible through specific routes defined and controlled by Penta's team of network security engineers.
The SANs are continually backed up and replicated across at least geographically separated sites to ensure your data is always safe and accessible.
Your company connects into the secure Penta network through a dedicated fiber optic connection or through an IPSec site-to-site Virtual Private Network (VPN) as a backup connection.
The network configuration means that intruders have to work their way through Penta's external and internal security measures if accessing from the outside the company.
And if accessing from within the company, intruders would still have to make their way through Penta's tough internal security protocols.