Home Site Map Contact Us
  • Company
    • About SkillsTor Info Solutions
    • Why SkillsTor Info Solutions
  • Outsourcing
    • Approach
    • Engagement Model
    • Delivery Model
  • Solutions
    • CRM Software Application
    • Enterprise Portal
    • Sales Force Automation
    • Enterprise Resource Planning
    • Microsoft Online Services
  • Methodology
    • Training & IT Recruiting
    • Microsoft .NET
    • Sun J2EE
    • Open Source
    • Oracle Application
    • PeopleSoft
    • SAP
  • Quality
    • Development Methodology
    • Project Management
    • Project Confidentiality
    • Security Policy
    • Business Continuity
  • Services
    • Custom Software Application
    • Application Development
    • Web Services
    • Application Migrations
    • Application Maintenance
    • Database Administration
    • Database Migration / Porting
  • Product Development
    • Software Application Testing
    • Offshore Staffing Services
    • Extended Services
    • Business Process Outsourcing
    • Offshore IT Services Consulting
    • Internet Marketing
  • Industry
    • Overview
    • Health Care
    • Retail
    • Telecom
    • Manufacturing
    • Finance
    • Government
  • Quality
  • Security Policy

Security Policy

SkillsTor Info Solutions security policy is aimed at maintaining greater levels of physical and information security. We follow ISO 17799 standards for security management.

Data Access Security

  • Security Firewalls are installed to prevent unauthorized access to the network
  • Group policies in place for accessing PCs and workstations for authorized access
  • Access to important files and directories is given only to specific personnel
  • All email and web servers are located at an independent internet data center
  • GFS Backup policy in place. Monthly backups are stored at an off-site location and removable backups are kept safe with logs duly maintained. Daily backup are stored in fire-proof safe.
  • External security audits are enforced to assess any breach with multi level security management in control
  • By default, all ports (USB, Serial, Parallel) are disabled on PCs. Enabling of the required ports is done only on specific requests by the client
  • Physical security ensures no CDs, Pen-drives,movable media goes in and out of the facility without written permission from the management

Network Security

  • Each client's process is run on a separate VLAN/VPN when run off-shore/off-site
  • Software defined secure tunnels through the internet
  • Only client authorized personnel is allowed to access the VNC/VLAN/VPN. This setup prevents others from accessing the project information
  • Real-time Anti-virus and SPAM protection for desktops and servers
  • Annual maintenance and scheduled preventive maintenance in place for critical assets
  • Adequate spares are available for all critical infrastructure, thereby minimizing downtime
  • Wireless LAN in the office is also security protected

Voice Calls Security

  • Authorization for use of VoIP lines and is provided on a need or project basis
  • VoIP is password protected
  • ACD reports are generated on a weekly basis and analyzed
Quick Links
  • Quality
  • Development Methodology
  • Project Management
  • Project Confidentiality
  • Security Policy
  • Business Continuity
  • Privacy Policy
  • Terms of Use
  • Contact Us
  • Sitemap

Copyright © 2003 SkillsTor Info Solutions. All rights reserved.