Data Security

Data Security First

Penta’s priority approach to data security places the safety of your data above everything else. Multi-factor authentication, independent penetration testing and 24/7 security engineers included as standard.


Multi-layered Security

Security at the heart of everything
Whatever the service, data security is the priority. Penta deployes the latest best practices, monitored and maintened by industry-leading experts.

Hover over the diagram to read more.

Remote user

Users from your organization whatever the location connect to Penta's infrastructure using secure Virtual Private Network technology and bank-level multi-factor authentication.

Internet Service Providers (ISPs)

Connections to Penta's data centers is made through either dedicated connections leased from specialist network providers or through commercially available Internet Service Providers (ISPs).

Network control

Every aspest of Penta's infrastructure is built in a High Availability configuration. This means that all hardware and software components are duplicated so that there is no single point of failure.

  • Continuous monitoring by Intrustion Prevention and Detection Systems (IPS/IDS) with engineers on standby to react to any suspicious activity
  • External and internal load balancers (Ext/Int LBs) to ensure traffic is routed efficiently and ensuring seamless uptime in case of failures
  • External and internal firewalls (Ext/Int FWs) for optimum traffic control and hacking defenses

Local Area Networks

Network traffic is routed to either the user facing front end Local Area Network (LAN) or the seperate back end LAN where the data resides.

Storage Area Networks (SANs)

Redundant Storage Area Networks (SANs) are safely isolated behind multiple security layers and only accessible through specific routes defined and controlled by Penta's team of network security engineers.

The SANs are continually backed up and replicated across at least geographically separated sites to ensure your data is always safe and accessible.

Office connectivity

Your company connects into the secure Penta network through a dedicated fiber optic connection or through an IPSec site-to-site Virtual Private Network (VPN) as a backup connection.

The network configuration means that intruders have to work their way through Penta's external and internal security measures if accessing from the outside the company.

And if accessing from within the company, intruders would still have to make their way through Penta's tough internal security protocols.

Quality and security – Trusted by Swiss banks

25Cutting-edge technology, monitoring and patching by specialists and regular penetration testing by renowned security firms ensures your data remains safe.

  • Continuous security monitoring and patching
  • Network and IT security specialists on call 24/7
  • Penetration testing by renowned independent ‘ethical hackers’
  • Third-party auditing of IT operations by Big Four auditing firms

Is the cloud secure?


Any server, computer or laptop connected to the internet is exposed to the same risk of compromise. The question is therefore not ‘is it secure’ but rather ‘which security measures are in place?  When a burglar chooses to rob one house over another, it is because he chooses the one with the weakest security. Similarly, hackers scour the internet looking for weak points of entry into computer systems.  Ask yourself, can my IT security match what a specialist provider – with decades of experience and dedicated security specialists – can deploy?