Background

Intellectual Property Protection

Security and intellectual property concerns receive careful attention from us at all times. A system that is adhered to by every employee and affiliate qualifies as truly effective security in our eyes. We take extensive precautions to protect our customers’ business information and intellectual property rights. Different levels of acceptance and scrutiny are applied to a broad range of security practices and policies.

How we protect your intellectual property?

Information Non-Disclosure
  • In order to protect client confidentiality and integrity, every client engagement at Sukra are protected by relevant non disclosure agreements that include both unilateral agreements as well as mutual non disclosure agreements as necessitated.
  • At the time of joining our company , every employee enters into an individual NDA with the company along with a proprietary information agreement.
  • It is expressly forbidden to use, copy, publish, summarize, or move confidential material off of the company’s premises or to disclose it directly or indirectly to someone who is not participating in the project.
  • During their employment, employees are prohibited from engaging in any other business, and after their job ends, they are also forbidden from using any of their expertise in a way that could result in unfair competition.
Background

Background
Project Based IP Segregation
  • Usage of dedicated resources for each project to enable prevention of unauthorized access to the client’s proprietary information.
  • A strong ethical framework exists within Sukra, which discourages a well as ensures that no unauthorised information is exchanged between projects.
  • Every project team can be segregated into a separate secure physical location and can work within a dedicated LAN segment.

Professional Security Services From The Experts
  • Our security experts, use proprietary toolsets, the latest security threat intelligence principles and advanced countermeasures to help clients build effective and secure applications, enhance their security posture and in turn enhance their business operations.
  • Only authorized personnel have the permission to access important files and directories.
  • Authorized access to network resources is prevented by security fire walls.
  • Backups are saved in secured areas.
Background

Background
Network Security
  • The access to the VPN/VLAN/VNC is restricted to authorized personnel only.
  • Workstations and servers are spam protected and virus protected in real time mode.
  • Important infrastructure elements can be quickly replaced in case of malfunction to minimize system downtime.
  • Wireless LAN’s are configured using latest security enabled technologies.

Data Security
  • Unauthorized access to network resources are prevented via security firewalls.
  • Authorized access to PC’s and workstations are managed using group policies.
  • Only authorized personnel have the permission to access important files and directories. E-mail and web-servers reside on an independent cloud server.
  • Established backup and recovery policy.
  • Backups are performed on a monthly and daily basis. Monthly backups are stored in a secure location and the backup logs are diligently maintained.
  • The established system of multi-level security management are monitored regularly through external security audits which facilitate the discovery and mitigation of existing and possible security weaknesses.
  • No removable media (including CDs, flash memory storage devices etc.) may leave the facility without written permission from the administration.
Background

logo Helpdesk

close
  • Icon

    Loading...

send