We are privileged to host your valuable data, and from years of experience and insight into critical infrastructure businesses, we understand the challenges and needs for highly secure operations. Rest assured that your Powel.net services are carefully designed to fulfil any security, privacy or legal requirements.
Security is never stronger than the weakest link. That is why our focus is on a holistic security design approach—engineered from end to end—from cloud to user. We utilise a "5M" approach that enables us to provide the best possible continuous security practices:
Our primary focus is securing our own boundaries/environment, as well as making sure our data centres for information storage complies with the industry standards of physical security and reliability.
With the ever-increasing use of cloud services, BYOD and the Internet of Things (IoT), the long-standing boundaries that traditionally formed the "hard" exterior of our businesses defensive posture are fast dissolving. This brings whole new ecosystem possibilities, as well as new ways of considering and dealing with security challenges.
Powel—like all progressive businesses—does not operate in a vacuum. That is why securing innovations, code and sensitive information within our physical "factories" is just as important as delivering solutions and services with "security by design."
Powel has conducted extensive independent penetration testing of its digital environment. Our inhouse Security Services (PSS) team proactively mitigates, identifies and contains the possibilities of significant security breaches on our corporate infrastructure—supported by state of the art monitoring capabilities as part of our 5M’s methodology.
By default, ANY coding process is built on security through defense of attack and reviews according to the following security standards:
1. Defence of threats to avoid attack from outside. Powel.net uses threat modelling to ensure security is built into the service from the very beginning. Modern threat modelling looks at a system from the perspective of a potential attacker—as opposed to a defender's viewpoint.
2. We apply security standards throughout our development process. This includes security in focus for design, build, test and code review in each development iteration.
3. Powel.net encrypts your information, rendering it unreadable to unauthorised personnel, even if they could break through your firewalls, infiltrate your network, or get physical access to your devices. Encryption transforms data so that only someone with the decryption key can access it.
Our proactive defenses are made possible by the use of active monitoring tools to authorise privileges:
Access control: To ensure we don’t keep sensitive data about you as well as making sure our access control to the services are flawless, we prefer that you log on with your Microsoft Azure AD credentials. This is the very same login you use with your Microsoft Office 365 account, and it is managed by Microsoft's world class security standards.
Secure Server operations: By using Microsoft Azure as our platform for services, we lean on one of the most certified security standards in the world.
Microsoft has made significant investments in the security of its platform, which, when combined with high levels of security-intelligence and strategic partnerships, helps keep our cloud-based products and services more secure.
While traditional boundaries are quickly disappearing, the threat landscape evolves. In this context, Powel’s security team recognizes the need to be adaptive, creative and responsive to change. We do so by embracing the need for endpoint security, cloud security services and other supporting capabilities.
However, if you have any questions or concerns about Powel.net security, do not hesitate to contact our dedicated security champions. Leave your contact information and we will get in touch shortly.