About Us

JCGI was established in 2015 as successor of Refcon Oy Finland I India. The founders of Refcon Oy (parent company) founded JCGI to emphasise their focus in area of technical recruitment and service for IT and Cyber Security. JCGI has proven international talent sourcing and providing expertise alongside mature technology support experience.

Overview :
  • IT Consultant
  • Cyber Security Consultant
  • Staffing Organization
  • International Recruiting Consultant
  • our services

    HR Consulting

    Recruitment Process Outsourcing

    Outsourcing Contract Staffing


    IT and Cyber Security Consultant

    Training Service

    Payroll Services

    Technology Support

    Value for Customers

    Managed Services

    Product Quality

    Performance Testing

    Planning & Tracking

    Service Quality

    Resoure Metrics

    Training and Development

    Offical Training Partner

    Training Channels

    • Training by Internal Staff
    • Training by External Faculty
    • Sponsored Training

    Comprehensive Security Policy

    Basic Principles

    • Attention to Security of Overall Infrastructure
    • Tactic Security concept for specific building blocks

    Hardware Security

    • MERAKI cloud controlledfirewall
    • Concept of DMZ Implemented

    Identity Management

    • Identity Management and Provisioning plans to prevent workplace identity theft and educate employees on the dangers of the crime

    Instant Messaging & Peer-to-peer Programs

    • Comprehensive Usage policy
    • MS Lyne as the standard IM & Skype
    • Certain applications controlled and customized

    Physical Security

    • Each authorized personnelis screened and provided with Magnetic Card
    • Entry to server rooms restricted and access allowed only to authorized individuals

    Software Security

    • Firewall,Windows security, Application security
    • Usage statistics/ Content filtering
    • Controlled and MonitoredInternet access

    Virus Protection

    • Implemented Patch Management Policies
    • Centralized Automatic Anti-Virus Updates

    Intellectual Property

    • Security priority for protecting information assets
    • All productslcensed for usage
    • Partnership programs for latest releases

    Clients