Information Security

Our Information Security Policies:
  • • Stringent Information Security Policy
  • • Virus Free Environment.
  • • Automated Backup and Recovery Software
  • • Isolated Operating Environment
    • • No Removable Disk Access
    • • No USB/Network Access
    • • Policy based Internet Access
  • • Secure Server Room
    • • Locked with Authorized Access
    • • Completely Monitored Server and Network Resource Access
    • • Systems staffs having Data Control and Recovery Experience
  • • Checkpoint Driven Access Control Lists
  • • Weekly Auto-Change Password Policy
  • • The FortiGate-110C ,80C and Checkpoint firewalls delivers consolidated, fully integrated network security, throughput with two GbE and 8 10/100 interfaces
  • • Paper Free Environment