our services

HR Consulting

Recruitment Process Outsourcing

Outsourcing Contract Staffing


IT and Cyber Security Consultant

Training Service

Payroll Services

Comprehensive Security Policy

Basic Principles

  • Attention to Security of Overall Infrastructure
  • Tactic Security concept for specific building blocks

Hardware Security

  • MERAKI cloud controlledfirewall
  • Concept of DMZ Implemented

Identity Management

  • Identity Management and Provisioning plans to prevent workplace identity theft and educate employees on the dangers of the crime

Instant Messaging & Peer-to-peer Programs

  • Comprehensive Usage policy
  • MS Lyne as the standard IM & Skype
  • Certain applications controlled and customized

Physical Security

  • Each authorized personnelis screened and provided with Magnetic Card
  • Entry to server rooms restricted and access allowed only to authorized individuals

Software Security

  • Firewall,Windows security, Application security
  • Usage statistics/ Content filtering
  • Controlled and MonitoredInternet access

Virus Protection

  • Implemented Patch Management Policies
  • Centralized Automatic Anti-Virus Updates

Intellectual Property

  • Security priority for protecting information assets
  • All productslcensed for usage
  • Partnership programs for latest releases

Clients