Data Access Security
Security Firewalls are installed to prevent unauthorized access to the network
Group policies in place for accessing PCs and workstations for authorized access
Access to important files and directories is given only to specific personnel
All email and web servers are located at an independent internet data center
Backup policy in place. Monthly backups are stored at an off-site location and removable backups are kept safe with logs duly maintained. Daily backup are stored in fire-proof safe.
External security audits are enforced to assess any breach with multi level security management in control
By default, all ports (USB, Serial, Parallel) are disabled on PCs. Enabling of the required ports is done only on specific requests by the client
Physical security ensures no CDs, Pen-drives, movable media goes in and out of the facility without written permission from the management
Network Security
Each client's process is run on a separate VLAN/VPN when run off-shore/off-site
Software defined secure tunnels through the internet
Only client authorized personnel is allowed to access the VNC/VLAN/VPN. This setup prevents others from accessing the project information
Real-time Anti-virus, Ant and AntuPAM protection for desktops and servers
Annual maintenance and scheduled preventive maintenance in place for critical assets
Adequate spares are available for all critical infrastructure, thereby minimizing downtime
Wireless LAN in the office is also security protected
Voice Calls Security
Authorization for use of VoIP lines and is provided on a need or project basis
VoIP is password protected
ACD reports are generated on a weekly basis and analyzed
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment