*Website - Web tool to login, access the pages, view reports and for administrative actions
*Mobile App - Mobile version for the same features as Website
*Backend Server - Primary data center for the application (for both web and Mobile) Service Award
Bangalore, Karnataka, India
We use Public Cloud. Amazon Web service
*The primary application is hosted in AWS Singapore (Amazon web serivces)
*Customer Personal Information can be either hosted in AWS Singapore in an encrypted manner or can be stored in BIOS cloud based out of UAE
Yes
Business requirements document, Project Plan, user manuals/training materials
HRMS & SSO are recommended
No
No
Inhouse developed Product
Business requirements document, Project Plan, user manuals/training materials
We migrate HRMS data via SFTP using CSV file format
Demos are available and specific trainings are not required
*BGV for employees are conducted.
*Due diligence and screening done for vendors.
*NDA and confidentiality agreements are signed with employees.
*Information security and data privacy awareness trainings are conducted as part of induction
Bio-metric access control is places in all entry/exit points. CCTV cameras are in place and it is monitored regularly.
We request for educational certificates, experience letters, address proofs and ID proofs. Background verification checks are conducted to validate these documents submitted by employees
We have a formal disciplinary policy and it is communicated to all employees during our induction process. NDA is also signed with all our employees. Security roles and responsibilities are also communicated to employees
We conduct data privacy and information security awareness trainings as part of our induction and refresher trainings are conducted once a year
Employee exit policy is followed. On the day of exit, all the access to company proprietary data provided to employee will be removed. This is ensured by our HR manager and IT admin. Periodic access review audits are also conducted
*NDA is signed with all our employees and contractors.
*Data privacy awareness sessions are conducted and our policies are communicated to employees.
*Biometric controls are placed to avoid any unauthorised access to restrcited areas and these logs are reviewed periodically.
*Background checks are conducted for all our employees.
*CCTV cameras are in place and monitored regularly.
*Email Domain whitelisting and device policy are also in place
All of our entry/exit points are boimetric controlled and physical security guards are placed in entry/exit points
Restricted areas are controlled with biometric access and logs are reviewed. CCTV cameras are also in place and are monitored regularly
Our delivery and loading areas are separated from our information processing facilities. These areas will be monitored by CCTV cameras and security guards.
All of our entry/exit points are boimetric controlled and physical security guards are placed in entry/exit points. UPS is available to provide 24/7 uninterrupted power supply
Our IT administrators format our equipments as per our secural disposal policy before re-use and disposal of equipments
Sophos is used for anti-virus protection and Gsuite AV is used to scan the emails for any malicious attachements
PF sense firewall technologies are used and we have blocked audio & video streaming, peer to peer , and VPN. Freeradius is used for network authentication control. We have transparent proxy with firewall
Yes and it is communicated to employees
On a frequent basis our security team identifies latest patches to be installed and update the same
Network firewall infrastructure reviewed quarterly
Start your 14-day free trial. No credit card required.