• home
  • Company
    • About Soltech Consulting
    • Why Soltech Consulting
  • Outsourcing
    • Approach
    • Engagement Model
    • Delivery Model
  • Solutions
    • CRM Software Application
    • Enterprise Portal
    • Sales Force Automation
    • Knowledge Management
    • Workflow Management
    • Enterprise Resource Planning
    • Online Services
  • Methodology
    • Training & IT Recruiting
    • .NET
    • Sun J2EE
    • Open Source
    • Oracle Application
    • PeopleSoft
    • SAP
  • Quality
    • Development Methodology
    • Project Management
    • Project Confidentiality
    • Security Policy
    • Business Continuity
  • Services
    • Custom Software Application
    • Application Development
    • Web Services
    • Application Migrations
    • Application Maintenance
    • Database Administration
    • Database Migration / Porting
  • Software Product Development
    • Software Application Testing
    • Offshore Staffing Services
    • Extended Services
    • Business Process Outsourcing
    • Offshore IT Services Consulting
    • Internet Marketing
  • Industry
    • Overview
    • Health Care
    • Retail
    • Telecom
    • Manufacturing
    • Finance
    • Government
  • Contact
  • Quality
  • Development Methodology
  • Project Management
  • Project Confidentiality
  • Security Policy
  • Business Continuity

Security Policy

Soltech Consulting security policy is aimed at maintaining greater levels of physical and information security.

Data Access Security

  • Security Firewalls are installed to prevent unauthorized access to the network
  • Group policies in place for accessing PCs and workstations for authorized access
  • Access to important files and directories is given only to specific personnel
  • All email and web servers are located at an independent internet data center
  • GFS Backup policy in place. Monthly backups are stored at an off-site location and removable backups are kept safe with logs duly maintained. Daily backup are stored in fire-proof safe.
  • External security audits are enforced to assess any breach with multi level security management in control
  • By default, all ports (USB, Serial, Parallel) are disabled on PCs. Enabling of the required ports is done only on specific requests by the client
  • Physical security ensures no CDs, Pen-drives, movable media goes in and out of the facility without written permission from the management

Network Security

  • Each client's process is run on a separate VLAN/VPN when run off-shore/off-site
  • Software defined secure tunnels through the internet
  • Only client authorized personnel is allowed to access the VNC/VLAN/VPN. This setup prevents others from accessing the project information
  • Real-time Anti-virus and SPAM protection for desktops and servers
  • Annual maintenance and scheduled preventive maintenance in place for critical assets
  • Adequate spares are available for all critical infrastructure, thereby minimizing downtime
  • Wireless LAN in the office is also security protected

Voice Calls Security

  • Authorization for use of VoIP lines and is provided on a need or project basis
  • VoIP is password protected
  • ACD reports are generated on a weekly basis and analyzed
 
  • Solutions
  • CRM Software Application
  • Enterprise Portal
  • Sales Force Automation
  • Knowledge Management
  • Workflow Management
  • Enterprise Resource Planning
  • Online Services
  • Services
  • Custom Software Application
  • Application Development
  • Web Services
  • Application Migrations
  • Application Maintenance
  • Database Administration
  • Database Migration / Porting
  • Product Development
  • Software Application Testing
  • Offshore Staffing Services
  • Extended Services
  • Business Process Outsourcing
  • Offshore IT Services Consulting
  • Internet Marketing
  • INDUSTRIES
  • Overview
  • Health Care
  • Retail
  • Telecom
  • Manufacturing
  • Finance
  • Government
  • methodology
  • Training & IT Recruiting
  • .NET
  • Sun J2EE
  • Open Source
  • Oracle Application
  • PeopleSoft
  • SAP
@ Copyrights Soltech Consulting. All Rights Reserved Contact@