Our Solutions

Security

Our Commitment to Security and Reliability

At Samlink, we understand that security is always a priority for our clients. Safety and security of banking systems has become more crucial than ever before. With appropriate resiliency in place, banks can confidently navigate the digital world of new business opportunities and thrive in a changing technological landscape.

We are committed to providing the right risk-based level of security for our clients.

Protecting Your Business and Ensuring Continuity with Security Services

In today’s rapidly evolving digital landscape, financial businesses face an ever-increasing number of cyber threats. At Samlink, we always start with the risks before applying necessary controls to protect our clients. Our security requirements are driven by both contractual agreements with our clients and their regulatory frameworks, and also through our corporate wide cybersecurity and privacy standard. Our goal is to prevent unnecessary interruptions or incidents that could compromise the security of our clients’ data.

In the event of a cyber incident, our team is ready to respond quickly to minimize the impact on your business. Our back-end services ensure that all functions are hosted with high availability, security, and reliability, and are maintained to meet any future expectations.

At every step, we prioritize the right risk-based level of security to give you peace of mind.

Operational Security: Protecting Information with a Five-Step Approach

Operational Security is about the day-to-day security measures that must be in place and followed up to protect sensitive information. At Samlink, we are working with a five-step approach related to operational security activities: identify, protect, detect, respond, and recover.

 

Protecting Workstations and Servers with Security Features and Functions

We take proactive steps to secure our users’ workstations with a mix of security features and functions designed to reduce risks, e.g., malicious code, intruders etc. The network is monitored, and only approved traffic is allowed into or out of the network. Our servers are made secure by applying different techniques that limit access from any unauthorized sources.

 

Firewalls and Denial-of-Service Protection

We use firewalls to filter traffic from the internet to our internal network and vice versa. We also protect our network against denial-of-service attacks, where attackers try to drown the servers with access attempts. This is achieved through proactive monitoring and preventative measures designed to keep your data safe.

 

Regular Scanning and Vulnerability Management

Scanning of the entire environment is done regularly to identify vulnerabilities that can impact Samlink and our clients. We lean towards a risk-based vulnerability management approach that puts focus on the vulnerabilities that can be exploited by an attacker. This proactive approach ensures that we can stay ahead of potential threats and quickly address any security concerns that may arise. Our team works with you to identify critical business functions and systems, and to develop contingency plans that enable you to recover quickly in the event of an incident.

“In the end clients measure us on our resilience against cyber threats and our capability to quickly restore services again.”

Thomas Keisu
Chief Information Security Officer

Arto Sorvoja Blog
Blog

DORA Brings New Requirements for Banks – We Support Our Customers in the Transition

  The Digital Operational Resilience Act (DORA) and the NIS2 cybersecurity directive will impact on the operations of European banks in the future. From January 2025, all European banks including Finnish banks will have to operate within the framework of these new requirements. Samlink is highly prepared to take a…

Read more
News

Why is Vulnerability Management Important?

Vulnerability management is something that most IT organizations struggle with due to the share volumes of identified vulnerabilities. A vulnerability is a weakness either in software or by using old and perhaps outdated versions of software and protocols. Sometimes, it can be man made by using bad passwords and/or less…

Read more
News

Secure Home Environment When Working Remote

After Covid struck across the Globe more people than before are working from remote, i.e., mostly their home. This has forced organizations to booster their VPN connections so more users can be connecting at the same time, but little or even no thoughts have been given to the security around…

Read more