Intellectual Property Protection
Security and intellectual property
concerns receive careful attention from us at all times. A system
that
is adhered to by every employee and affiliate qualifies as truly effective security in our eyes. We
take
extensive precautions to protect our customers’ business information and intellectual property
rights.
Different levels of acceptance and scrutiny are applied to a broad range of security practices and
policies.
How we protect your intellectual
property?
Information
Non-Disclosure
- In order to protect client confidentiality and integrity, every
client engagement at Sukra are protected by relevant non disclosure agreements that
include both unilateral agreements as well as mutual non disclosure agreements as
necessitated.
- At the time of joining our company , every employee enters into
an individual NDA with the company along with a proprietary information agreement.
- It is expressly forbidden to use, copy, publish, summarize, or
move confidential material off of the company’s premises or to disclose it directly or
indirectly to someone who is not participating in the project.
- During their employment, employees are prohibited from engaging
in any other business, and after their job ends, they are also forbidden from using any
of their expertise in a way that could result in unfair competition.
Project Based
IP Segregation
- Usage of dedicated resources for each project to enable
prevention of unauthorized access to the client’s proprietary information.
- A strong ethical framework exists within Sukra, which
discourages a well as ensures that no unauthorised information is exchanged between
projects.
- Every project team can be segregated into a separate secure
physical location and can work within a dedicated LAN segment.
Professional
Security Services From The Experts
- Our security experts, use proprietary toolsets, the latest
security threat intelligence principles and advanced countermeasures to help clients
build effective and secure applications, enhance their security posture and in turn
enhance their business operations.
- Only authorized personnel have the permission to access
important files and directories.
- Authorized access to network resources is prevented by
security fire walls.
- Backups are saved in secured areas.
Network
Security
- The access to the VPN/VLAN/VNC is restricted to authorized
personnel only.
- Workstations and servers are spam protected and virus
protected in real time mode.
- Important infrastructure elements can be quickly replaced in
case of malfunction to minimize system downtime.
- Wireless LAN’s are configured using latest security enabled
technologies.
Data Security
- Unauthorized access to network resources are prevented via
security firewalls.
- Authorized access to PC’s and workstations are managed using
group policies.
- Only authorized personnel have the permission to access
important files and directories. E-mail and web-servers reside on an independent
cloud server.
- Established backup and recovery policy.
- Backups are performed on a monthly and daily basis. Monthly
backups are stored in a secure location and the backup logs are diligently
maintained.
- The established system of multi-level security management
are monitored regularly through external security audits which facilitate the
discovery and mitigation of existing and possible security weaknesses.
- No removable media (including CDs, flash memory storage
devices etc.) may leave the facility without written permission from the
administration.