Cybersecurity

Information Security Policy

Multi-layer security system protecting your enterprise data.

Last updated: January 4, 2026

Security is priority at Xylentis. We apply a Shared Responsibility Model.

Security Layers

Encryption

SSL (transit) and At-rest encryption.

Physical

Tier 3 DC, access control, surveillance, fire suppression.

Network

Anti-DDoS, Hardware Firewall, IPS/IDS.

Backup

Automated backup (per plan), safe distributed storage.

Monitoring

24/7 Monitoring for anomalies.

Access

2FA, strict permissions, full access logs.

Compliance Standards

ISO 27001

ISO 27001 (DC)

PCI DSS

PCI DSS (Payment)

SOC 2 Type II

SOC 2 (Process)

GDPR

Cybersec Law & GDPR

Infrastructure

Robust infrastructure platform:

Tier 3

Data Center

Anti-DDoS

Protection

Layer 3/4/7

Firewall

Customer Responsibilities

Customers play a key role in security:

  • Set strong passwords, change periodically. Enable 2FA.
  • Update security patches for website source code (WordPress, Plugins...).
  • Scan admin PC for viruses.
  • Do not share login info.
  • Proactively backup data locally.

Incident Response

Response process:

1

Detection

System alert or customer report.

2

Containment

Lock IP, suspend attacked service to prevent spread.

3

Investigation

Analyze logs, find cause and vulnerability.

4

Recovery

Assist customer to restore service and patch.

Report Vulnerability

Email [email protected] to report security issues.

[email protected]
Information Security Policy | Xylentis | Xylentis