{"id":4680,"date":"2019-07-03T10:54:18","date_gmt":"2019-07-03T09:54:18","guid":{"rendered":"http:\/\/www.onomi.co.uk\/?page_id=4680"},"modified":"2021-07-14T10:45:39","modified_gmt":"2021-07-14T09:45:39","slug":"database-security-iso27001","status":"publish","type":"page","link":"http:\/\/content.n4stack.io\/database-security-iso27001\/","title":{"rendered":"Database Security ISO27001"},"content":{"rendered":"

[et_pb_section fb_built=”1″ _builder_version=”4.0.11″ background_color=”#3d3d3d”][et_pb_row column_structure=”3_5,2_5″ _builder_version=”4.0.11″][et_pb_column type=”3_5″ _builder_version=”4.0.11″][et_pb_text _builder_version=”4.9.0″ text_text_color=”#ffffff” header_text_color=”#ffffff” header_4_text_color=”#ffffff” header_6_text_color=”#ffffff” custom_padding=”||3px||false|false”]<\/p>\n

Security & Trust<\/h1>\n

ISO 27001:2013 accredited services delivered by UK-based, SC cleared and BPSS screened consultants.<\/h6>\n

[\/et_pb_text][et_pb_button button_url=”\/contact-us” url_new_window=”on” button_text=”Get started” _builder_version=”4.9.0″ custom_button=”on” button_text_color=”#ffffff” button_bg_color=”#e05206″ button_border_color=”#e05206″][\/et_pb_button][\/et_pb_column][et_pb_column type=”2_5″ _builder_version=”4.0.11″][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ custom_padding_last_edited=”on|desktop” admin_label=”section” _builder_version=”3.22″ background_color=”#ffffff” custom_padding_tablet=”50px|0|50px|0″ custom_padding_phone=”” transparent_background=”off” padding_mobile=”off” make_fullwidth=”off” use_custom_width=”off” width_unit=”off” custom_width_px=”1080px” custom_width_percent=”80%”][et_pb_row column_structure=”1_3,2_3″ _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”1_3″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_image src=”http:\/\/content.n4stack.io\/wp-content\/uploads\/2019\/07\/Security_logo.png” show_bottom_space=”off” align_tablet=”center” align_phone=”” align_last_edited=”on|desktop” _builder_version=”3.23″ animation_style=”fade” animation_duration=”500ms” use_border_color=”off”][\/et_pb_image][\/et_pb_column][et_pb_column type=”2_3″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”3.27.4″ text_text_color=”#3e3e3e” background_size=”initial” background_position=”top_left” background_repeat=”repeat” use_border_color=”off”]<\/p>\n

Trusted services from a\u00a0UKAS ISO 27001:2013 certified provider<\/strong><\/h4>\n

Working with our clients data requires a level of trust that has to be backed with demonstrable evidence of robust governance. ISO 27001:2013 is a mandatory requirement for many of our customers and N4Stack has chosen to certify under the rigourous UKAS certification.<\/p>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”1_3″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_blurb use_icon=”on” font_icon=”%%228%%” icon_color=”#3e3e3e” icon_placement=”left” _builder_version=”3.19.18″ header_font_size=”11″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” max_width_tablet=”50px” animation=”off” use_border_color=”off”]<\/p>\n

Independent, regular external audits that review our\u00a0control measures<\/p>\n

[\/et_pb_blurb][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_blurb use_icon=”on” font_icon=”%%228%%” icon_color=”#3e3e3e” icon_placement=”left” _builder_version=”3.19.18″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” max_width_tablet=”50px” animation=”off” use_border_color=”off”]<\/p>\n

A mature Information Security Management System that dovetails with our clients controls<\/p>\n

[\/et_pb_blurb][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_blurb use_icon=”on” font_icon=”%%228%%” icon_color=”#3e3e3e” icon_placement=”left” _builder_version=”3.19.18″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” max_width_tablet=”50px” animation=”off” use_border_color=”off”]<\/p>\n

A formalised approach to information security processes, procedures and documentation<\/p>\n

[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ custom_padding_last_edited=”on|desktop” admin_label=”section” _builder_version=”4.9.0″ background_color=”#e05206″ custom_padding_tablet=”50px|0|50px|0″ custom_padding_phone=”” transparent_background=”off” padding_mobile=”off” make_fullwidth=”off” use_custom_width=”off” width_unit=”on”][et_pb_row column_structure=”1_3,1_3,1_3″ padding_mobile=”off” column_padding_mobile=”on” _builder_version=”4.9.0″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” make_fullwidth=”off” use_custom_width=”off” width_unit=”off” custom_width_px=”1080px” custom_width_percent=”80%”][et_pb_column type=”1_3″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_blurb title=”SC Cleared DBA’s” use_icon=”on” font_icon=”%%149%%” icon_color=”#ffffff” use_circle=”on” circle_color=”#f45206″ use_circle_border=”on” circle_border_color=”#ffffff” _builder_version=”3.0.87″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” text_orientation=”center” background_layout=”dark” use_border_color=”off” border_color=”#ffffff” border_style=”solid”]<\/p>\n

\nAll our DBA’s hold goverment sponsored Security Clearance and are also screened through BPSS & Disclosure Scotland.<\/p>\n

[\/et_pb_blurb][et_pb_blurb title=”Best Practice” use_icon=”on” font_icon=”%%75%%” icon_color=”#ffffff” use_circle=”on” circle_color=”#f45206″ use_circle_border=”on” circle_border_color=”#ffffff” _builder_version=”3.0.87″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” text_orientation=”center” background_layout=”dark” use_border_color=”off” border_color=”#ffffff” border_style=”solid”]<\/p>\n

\nThe DBA team have a wealth of experience to ensure both vendor and security best practice is adhered to.<\/p>\n

[\/et_pb_blurb][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_blurb title=”Customer Confidentiality” use_icon=”on” font_icon=”%%93%%” icon_color=”#ffffff” use_circle=”on” circle_color=”#f45206″ use_circle_border=”on” circle_border_color=”#ffffff” _builder_version=”3.0.87″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” text_orientation=”center” background_layout=”dark” use_border_color=”off” border_color=”#ffffff” border_style=”solid”]<\/p>\n

\nWe classify, label and handle any data we have access to in a customer environment as confidential\u00a0regardless of content.<\/p>\n

[\/et_pb_blurb][et_pb_blurb title=”Encryption ” use_icon=”on” font_icon=”%%95%%” icon_color=”#ffffff” use_circle=”on” circle_color=”#f45206″ use_circle_border=”on” circle_border_color=”#ffffff” _builder_version=”3.19.18″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” text_orientation=”center” background_layout=”dark” use_border_color=”off” border_color=”#ffffff” border_style=”solid”]<\/p>\n

\nAny secret credentials or passwords are only kept in a secured and encrypted password safe, controlled by audited governance.<\/p>\n

[\/et_pb_blurb][\/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_blurb title=”Business Continuity” use_icon=”on” font_icon=”%%135%%” icon_color=”#ffffff” use_circle=”on” circle_color=”#f45206″ use_circle_border=”on” circle_border_color=”#ffffff” _builder_version=”3.0.87″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” text_orientation=”center” background_layout=”dark” use_border_color=”off” border_color=”#ffffff” border_style=”solid”]<\/p>\n

\nOur services are resilient across multiple datacentres and we regularly test our continuity processes.<\/p>\n

[\/et_pb_blurb][et_pb_blurb title=”Secured Datacentres” use_icon=”on” font_icon=”%%144%%” icon_color=”#ffffff” use_circle=”on” circle_color=”#f45206″ use_circle_border=”on” circle_border_color=”#ffffff” _builder_version=”3.19.18″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” text_orientation=”center” background_layout=”dark” max_width_tablet=”50px” use_border_color=”off”]<\/p>\n

Our operational services are in datacenters with perimeter fencing, 24\/7 manned security, CCTV, ID Cards and IS27001 certification.<\/p>\n

[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.4.8″ background_color=”#ededed” saved_tabs=”all” global_module=”62027″][et_pb_row column_structure=”1_3,2_3″ _builder_version=”4.4.5″][et_pb_column type=”1_3″ _builder_version=”4.0.11″][et_pb_image src=”http:\/\/content.n4stack.io\/wp-content\/uploads\/2021\/07\/DBaaS-101-731×1024.png” title_text=”DBaaS 101″ url=”https:\/\/n4stack.io\/database-as-a-service-101\/” url_new_window=”on” align=”center” _builder_version=”4.9.7″ _module_preset=”default”][\/et_pb_image][\/et_pb_column][et_pb_column type=”2_3″ _builder_version=”4.0.11″][et_pb_text _builder_version=”4.9.7″ custom_margin=”20px||||false|false”]<\/p>\n

Database as a Service 101: The Beginner’s Guide to DBaaS<\/h3>\n

 <\/p>\n

Businesses have long turned to database managed services providers (MSPs) to help them keep their databases available and performant – and that\u2019s not going to change. More recently, however, those same businesses have been looking to MSPs to help them get more functional value from their data \u2013 whether that\u2019s through moving databases from private to public cloud infrastructure, building modern data warehouses or investing in analytics.<\/p>\n

In this guide, you\u2019ll learn more about modern database management services, the benefits they can bring to your business, and the key things to consider when choosing a DBaaS provider.<\/p>\n

[\/et_pb_text][et_pb_button button_url=”https:\/\/n4stack.io\/database-as-a-service-101\/” url_new_window=”on” button_text=”Download guide” button_alignment=”center” _builder_version=”4.9.7″ _module_preset=”default” custom_button=”on” button_text_color=”#ffffff” button_bg_color=”#e05206″ button_border_color=”#e05206″ background_layout=”dark”][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ inner_shadow=”on” custom_padding_last_edited=”on|desktop” admin_label=”section” _builder_version=”3.22″ background_color=”#ffffff” custom_padding_tablet=”50px|0|50px|0″ custom_padding_phone=”” transparent_background=”off” padding_mobile=”off” make_fullwidth=”off” use_custom_width=”off” width_unit=”off” custom_width_px=”1080px” custom_width_percent=”80%”][et_pb_row padding_mobile=”off” column_padding_mobile=”on” admin_label=”row” _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” make_fullwidth=”off” use_custom_width=”off” width_unit=”off” custom_width_px=”1080px” custom_width_percent=”80%”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”3.27.4″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” use_border_color=”off” border_style=”solid”]<\/p>\n

Security Blogs<\/h2>\n

[\/et_pb_text][et_pb_blog fullwidth=”off” posts_number=”3″ include_categories=”329″ show_comments=”on” _builder_version=”3.19.18″ use_border_color=”off”][\/et_pb_blog][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"

Security & Trust ISO 27001:2013 accredited services delivered by UK-based, SC cleared and BPSS screened consultants. Get started Trusted services from a\u00a0UKAS ISO 27001:2013 certified providerWorking with our clients data requires a level of trust that has to be backed with demonstrable evidence of robust governance. ISO 27001:2013 is a mandatory requirement for many of […]<\/p>\n","protected":false},"author":1,"featured_media":4682,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":""},"yst_prominent_words":[4971,5175,402,393,503,3191,3190,7521,1827,438,432,400,392,4975,394,4978,3192,509],"_links":{"self":[{"href":"http:\/\/content.n4stack.io\/wp-json\/wp\/v2\/pages\/4680"}],"collection":[{"href":"http:\/\/content.n4stack.io\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/content.n4stack.io\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/content.n4stack.io\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/content.n4stack.io\/wp-json\/wp\/v2\/comments?post=4680"}],"version-history":[{"count":6,"href":"http:\/\/content.n4stack.io\/wp-json\/wp\/v2\/pages\/4680\/revisions"}],"predecessor-version":[{"id":62048,"href":"http:\/\/content.n4stack.io\/wp-json\/wp\/v2\/pages\/4680\/revisions\/62048"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/content.n4stack.io\/wp-json\/wp\/v2\/media\/4682"}],"wp:attachment":[{"href":"http:\/\/content.n4stack.io\/wp-json\/wp\/v2\/media?parent=4680"}],"wp:term":[{"taxonomy":"yst_prominent_words","embeddable":true,"href":"http:\/\/content.n4stack.io\/wp-json\/wp\/v2\/yst_prominent_words?post=4680"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}