Security
Data Access Security
Security Firewalls are installed to prevent unauthorized access to the network.
-
Group policies in place for accessing PCs and workstations for authorized access.
-
Access to important files and directories is given only to specific personnel.
-
All email and web servers are located at an independent internet data center.
-
GFS Backup policy in place. Monthly backups are stored at an off-site location and removable backups are kept safe with logs duly maintained. Daily backup are stored in fire-proof safe.
-
External security audits are enforced to assess any breach with multi level security management in control.
-
By default, all ports (USB, Serial, Parallel) are disabled on PCs. Enabling of the required ports is done only on specific requests by the client.
-
Physical security ensures no CDs, Pen-drives; movable media goes in and out of the facility without written permission from the management.
Each client's process is run on a separate VLAN/VPN when run off-shore/off-site.
-
Software defined secure tunnels through the internet.
-
Only client authorized personnel is allowed to access the VNC/VLAN/VPN. This setup prevents others from accessing the project information.
-
Real-time Anti-virus and SPAM protection for desktops and servers.
-
Annual maintenance and scheduled preventive maintenance in place for critical assets.
-
Adequate spares are available for all critical infrastructures, thereby minimizing downtime.
-
Password protected Wireless LAN.