In our organization, extra emphasis is placed on information security: availability, integrity as well as confidentiality. Besides organizational measures, a large number of technical measures has been taken in order to achieve the required security. All our systems are redundant in order to maximize availability and to limit the maximum outage time in case of disruptions. We also only use high quality components from renowned brands such as IBM and Cisco. The confidentiality of data is guaranteed by a sophisticated structure and roles, rights, encryption and centralized data storage. Data integrity is assured by real-time synchronization of data to a separate system. This way we are able to reduce the risk of data loss to a time frame of several seconds. In order to be able to track changes at all times, audit logs are in place where necessary.