Our IT Risk Management Methodology
We perform Risk Management for all software applications that we use, whether developed by us or sourced from 3rd-party vendors.
Our Configuration Management Procedure
D3S requires traceability of configuration for software products delivered to our customers, as well as for systems installed on our hardware.
Our Approach to Disaster Recovery
D3S maintains detailed plans for the recovery of our systems and infrastructure in the event of a disaster.
How We Select Vendors
We select vendors based on their ability to support the needs of our customers, as well as the security and availability of our solutions.
How We Ensure Business Continuity
D3S maintains detailed plans to ensure the total continuity of our business services in event of an emergency.
Our Data Center Architecture
D3S’s hosted computing environment operates within two data centers managed by one of the leading hosting providers in the Czech Republic.
How We Monitor Our Systems
D3S uses cutting-edge tools, including Loki, Grafana and Prometheus, to actively monitor key components of our production infrastructure.