Background background

Quality and security

Security policy

Our IT security policy and all the actions related to it are based on many years of experience, meeting international standards and certificates as well as on stable and sustainable development of the company over the last three decades.

Guarantee of quality

Thanks to that we can guarantee our customers high quality and international level of IT security.

We reach a high level of security and quality

of services thanks to the following factors:
Physical protection
  • Two own data centers
  • 24/7/365 security
  • Guaranteed power supply
  • CCTV system
  • Fire safety system
  • Monitoring of the building 24/7/365
Procedural
  • ISO 27001 – information security management
  • ISO 27017 – cloud security management
  • ISO 9001 – quality management
  • Guaranteed level of services
  • Compliance with PCI DSS standard
Legislative
  • Compliance with the GDPR
  • Meeting the requirements of the KNF
  • Clearly specified place of data storage
Financial
  • Operations insurance of PLN 20 MLN
  • 30 years on the market
  • Revenue diversification

Monitoring Centre

All provided services are supervised 24 hours a day, 365 days a year by qualified operators.

24/7/365 customer service icon
24/7/365 customer service
Comprehensive support icon
Comprehensive support
3-tier support model icon
3-tier support model, first, second and third lines of support with appropriate qualifications.
Dedicated portal icon
Dedicated portal for reporting problems and commissions, each user has their own account.
Verification of authorization by security department icon
Verification of authorization by security department.
Verification of quality of provided services by quality department icon
Verification of quality of provided services by quality department.

Security policy

Our IT security policy and all the actions related to it, including documentation, are based on the provisions of the document of the Polish Committee for Standardization PN- ISO/IEC 17799 entitled: “IT technology. Security techniques. Practical principles of information security management”.

Isolation of sensitive systems

Sensitive systems (server/computers that process sensitive or secret information) are isolated from public networks by firewalls. Access to the rooms in security zones is protected by a multi-tier access control system.

Get to know more about Polcom Data Center