X
View Mobile Number
Hi
I agree to the terms and privacy policy
Verifying...
1

Have a requirement?
Get Best Price

Hi
I agree to the terms and privacy policy
Verifying...
1

Have a requirement?
Get Best Price

Custom Profile

Security Management

We have developed a number of documents covering our Security Policy: General Network Usage Policy, Sensitive Information Encryption and Exchange Policies. General compliance with our security policy and regulations is ensured by the usage of logon scripts and Group Policies.

Staff Security

We perform careful security checks of every person that is applying for a job. Confidentiality Agreements are an important part of the security system and every employee we hire is to sign such an Agreement. All the security-related cases and incidents are tracked and resolved by Department Managers. We inform all the people we hire about the Company′s security standards and keep this knowledge up-to-date by organizing special training programs on regular basis.

Physical Security and Access Control

We imply a multi-level access control system. On the first level our security service is checking our employee′s ID-badges to ensure they are authorized to access the building. The next level of access control is based on the usage of electronic cards, each possessing unique radio metrics, that are given to every employee that is authorized to access the floors of our buildings. We have installed effective video monitoring and alert systems in our offices and have arranged Governmental Security Service′s (Police) protection of our property. The access control system is managed from one central control point, though each datacenter′s security system is independent.

Customers Data Protection

We understand that security of our client′s data in number one priority for our business. We use 256 bit AES algorithm for traffic encryption and 2048 bit public/private keys pair for authentication purposes. Sensitive data is exchanged via SFTP server and PGP is used for emails encryption. This way compliance with the ISO standards for information security is provided. We also strictly follow all the governmental rules and regulations for emergency issues.

Additional capacities

For development purposes we use virtualization technology which enables us to build a separate operational environment for each project and thus increase resource allocation flexibility and effectiveness. This technology is based on the usage of VMware Server 1.0, VMware ESX Server 3.0 and VMware Infrastructure for project monitoring.

Security Monitoring

All the processes are constantly monitored by the administrative team and vital information on all the important changes and incidents is tracked and logged via Syslog Server for future audit.

Tell us what you need, and we’ll help you get quotes
Tell us what you
need
Receive seller
details
Seal the deal
Pay with IndiaMART
Tell us what you need, and we’ll help you get quotes
I agree to the terms and privacy policy