Thermo Fisher Scientific to Acquire PPD, Inc., a Leading Clinical Research Organization Learn more

Information Security

Protecting Our Data & Systems

Protecting our data and systems

Thermo Fisher Scientific invests a significant amount of time and effort in developing and deploying secure platforms to meet the needs of our customers. We utilize a defense-in-depth approach to security, which ensures no protective mechanism is a single point of failure. Our protection systems are broken into several areas: network, infrastructure, data protection, and data center management.

Data protections

  • Use of encryption for data at rest and data in transit where necessary
  • Standardized processes for sanitization and destruction of assets
  • Employees and contractors are granted access to systems and applications on a strict need-to-know basis to protect confidentiality, integrity, and availability of customer and internal data.

Network protections

  • Redundant firewalls
  • Intrusion detection and prevention
  • Distributed denial of service protection
  • Web application firewalls for externally facing websites and applications

Server/client endpoint protection

  • Anti-virus/anti-malware
  • Web content filtering for all employees and contractors
  • Spam/malicious email blocking
  • Continuous operating system patching
  • Standard equipment configuration
  • Next-generation endpoint security for advanced threat detection, protection, and response

Data center management

  • 24x7 staffing with strict access control systems and procedures
  • Full environmental management with redundant power backups