inquiry@ethicsplusuae.com +9714 345 1522

We have been a client of Ethics Plus for more than 6 years now. They have always performed a strong audit for us. I would highly recommend their services to anyone.



Regi Nair
General Manager
Mirnah Technology Systems, Saudi Arabia

Security Measures

1. Forced SSL Transfer

Hackers have many ways to intercept data that is transferred unsecurely over the Web. And now it's even easier with the wider use of laptops and wireless routers.

The best way to protect your data is to transfer the data over a Secure Socket Layer (SSL). SSL encrypts the data so it's absolutely useless to anyone who goes through the effort of capturing it.

You are always protected because the Server automatically recognizes if a user is trying to transfer information unsecurely. The Portal then forces the transfer to occur under an encrypted Secure Socket Layer.

2. SQL Injection Protection

SQL Injection is a method hackers use to break into databases. Once in a database, a hacker can easily wreak havoc. Millions of websites are hacked with SQL injection every year. Even the United Nations website was hacked using SQL injection and cost hundreds of thousands of dollars to repair.

Our Server renders SQL Injection attacks completely useless because it utilizes the "Best Practice" of parameterized data calls.

3. State-of-the-Art Firewall

Our host, uses a state-of-the-art CheckPoint UTM-1 Edge Firewall that is configured with the least number of ports open and advanced IP restrictions.

4. Real Time Virus Scanner

The servers are continually scanned for viruses and the virus database is updated every hour.

5. Encrypted "Cross Server" Backups

Another common hack is to attack and gain access to backups. Backup media often is held and transferred in "less secure" environments. Hackers know this and often find ways to gain access to backup data.

This is impossible with our Server because the backup files are encrypted and stored in extremely secure facilities. Even if a hacker got their hands on our backups, they would not be able to access any information because of the high-level file encryption.

6. FireSlayer - Denial of Service Attack Protection

The servers are additionally protected from denial of service attacks. A denial of service attack is made when a virus infects thousands of computers on the Internet. Then all those infected computers make repeated requests to a single server. The targeted server often can't handle the load, and it crashes. The FireSlayer system detects this kind of activity and automatically blocks the abusive traffic on the fly.

7. Operating System Hardening and Patch Management

There is a lot more to managing secure servers than you may realize. Server Operating Systems are not secure when they come out of the box. It takes highly skilled software technicians to hone and harden the System Software to minimize exposure to current and future threats.

Mobile Responsive By Pro Web Technos