Our Information Security Policies:
- • Stringent Information Security Policy
- • Virus Free Environment.
- • Automated Backup and Recovery Software
- • Isolated Operating Environment
- • No Removable Disk Access
- • No USB/Network Access
- • Policy based Internet Access
- • Secure Server Room
- • Locked with Authorized Access
- • Completely Monitored Server and Network Resource Access
- • Systems staffs having Data Control and Recovery Experience
- • Checkpoint Driven Access Control Lists
- • Weekly Auto-Change Password Policy
- • The FortiGate-110C ,80C and Checkpoint firewalls delivers consolidated, fully integrated network security, throughput with two GbE and 8 10/100 interfaces
- • Paper Free Environment