Team Work

We work united and take pride in our stability, standardization and growth!

inner-banner.jpg

Security and IP Protection

At Gillan E Solutions confidentiality of sensitive data is taken very seriously. Intellectual property is protected through legal documentation and NDA agreements.Our clients are our assets and we protect our assets in every possible way.Comprehensive steps are taken to protect their data and projects are safeguarded through strict information and data security policies.

Intellectual Property Protection

Information Non-Disclosure

  • NDA agreements are signed prior to any exchange of information between Gillan E Solutions and our clients
  • At the point of recruitment, it is mandatory for each personnel to sign up a Proprietary Information Agreement as a proactive step.
  • Unauthorized access to any kind of data or information is restricted through security measures and access panels.

Project-based IP Segregation

  • Information exchange is made secure by dedicating teams to each project who are prohibited from exchanging any data or information with each other.
  • Organizational culture is developed on a highly positive note to promote family like environment with an atmosphere of trust and faith.
  • LAN have been set up to disperse each dedicated team physically from another for security purposes at different locations.

Security Policies

Physical Security

  • Employees are given employee codes and badges for identification purposes.
  • Each employee is given access to limited locations within the office building. Each floor is carefully screened for identification of visitors and surveillances are conducted trhough cameras.
  • Smoking is prohibited on our premises to reduce risks of fire hazards.
  • Wirings and plugs are all outside the resource rooms. This way a risk free physical environment is provided where physical resources are safe from hazards.

Data Security

  • Firewalls are installed on each workstation to prevent unauthorized access.
  • Group Policies control the authorized access of each employee.
  • Files and directories with confidential information are protected through access controls.
  • An independent data server is connected with email and web servers for protection
  • Backups are maintained and updated on a daily basis and monthly basis. Backup and recovery logs are kept on separate physical locations.
  • No CDs, papers, flash drives or other storage media is allowed outside or inside the premises without permission from the administration.

Network Security

  • VPN/VLAN/VNC are protected through access controlled rights
  • Servers and computers are protected through registered top of the line anti viruses
  • Downtime is reduced significantly by quick replacements of malfunctioning equipments and devices.
  • Security enabled technology is used to build Wireless LAN at Gillan E Solutions
Facebook