Protecting our Data and Systems

protecting data and systems

Thermo Fisher Scientific invests a significant amount of time and effort in developing and deploying secure platforms to meet the needs of our customers. We utilize a defense-in-depth approach to security, which ensures no protective mechanism is a single point of failure. Our protection systems are broken into several areas: network, infrastructure, data protection, and data center management.

Network protections

  • Redundant firewalls
  • Intrusion detection and prevention
  • Distributed denial of service protection
  • Web application firewalls for externally facing websites and applications

Data protection

  • Use of encryption for data at rest and data in transit where necessary
  • Standardized processes for sanitization and destruction of assets
  • Employees and contractors are granted access to systems and applications on a strict need-to-know basis to protect confidentiality, integrity, and availability of customer and internal data.

Server/client endpoint protection

  • Anti-virus/anti-malware
  • Next-generation endpoint security for advanced threat detection, protection, and response
  • Web content filtering for all employees and contractors
  • Spam/malicious email blocking
  • Continuous operating system patching
  • Standard equipment configuration

Data Center management

  • 24x7 staffing with strict access control systems and procedures
  • Full environmental management with redundant power backups