top of page

Security Statement

Last updated: 15 September 2025

1. Introduction

Data security and operational reliability are the foundation of every migration we perform. Migrations from VMware to Proxmox VE are carried out according to our defined rules and methodologies, which minimise risks, protect data integrity, and ensure a smooth transition with minimal service downtime. We understand that IT infrastructure is critical for all companies — any error or data loss can have major operational consequences. That is why we approach each project with emphasis on precise preparation, testing, and control of all migration steps.

2. Data Protection

For migrations from VMware to Proxmox VE we have many measures, rules, and technologies in place aimed at preventing data misuse, loss, damage, or unauthorised access. We do not use public cloud services unless explicitly part of the project, so data remains fully under the customer’s control. Every system access is limited to specific authorised persons and governed by the “least privilege” principle — only those who truly need access receive it. We audit not only accesses but also configuration changes where the end systems allow.

Data integrity is continuously checked throughout the migration process — from creating migration snapshots to the final verification of system functionality in the target environment. Each migration phase is audited and included in the final report for the customer. All data is transmitted exclusively over secure encrypted channels.

3. Risk Mitigation and Testing

Before migration, a technical analysis of the infrastructure is performed in which we map services, their dependencies, and critical points. We also rely on the customer’s existing and available system documentation. Based on this documentation and our analysis we create a detailed migration plan with clearly defined steps, schedule, and recovery scenarios.

This plan also includes a testing phase during which we simulate transfers and verify data consistency in an isolated environment before moving to production.

For larger projects we use phased migration — individual parts of the infrastructure are migrated in pre-planned steps to minimise operational downtime of servers and services

4. Transparency and Communication

We believe trust is built on open communication. Every customer has visibility into all project steps — from the initial analysis through testing, migration, and deployment.

If needed, we also offer an independent third‑party review of the migration so the process can be verified completely transparently

5. Security Standards

We follow recommendations from NIST SP 800-53, ISO27000, and the GDPR regulation that governs handling of personal and operational data. Internally we adhere to principles of secure access, encryption, and restriction of administrative rights. All data transfers are monitored and audited.

The Proxmox VE platform is based on open source, which enables independent review of security mechanisms and rapid deployment of fixes when vulnerabilities are discovered. This approach provides greater transparency and allows quick response to new threats without dependence on proprietary vendors

6. Data Sharing

We do not sell or rent your data. We may share personal data with:

  • Trusted service providers under data processing agreements

  • Regulatory authorities, if legally required

7. Security Commitment

Security measures are part of all stages of the migration project — from initial analysis to completion. Throughout the migration we monitor the stability of all affected systems, evaluate operational logs, and recommend any further optimizations. The customer can rely on the new environment running securely, efficiently, and without hidden risks.

Our goal is for the migration to be not just a technical transfer of data, but a considered step toward a more open, stable, and sustainable long‑term infrastructure.

For questions or inquiries contact:

Sericesto
[Business Address] XXXXX
security@sericesto.com
+420 731 378 007

bottom of page