Welcome Guest
Security refers to the protection of data, networks and computing power. The protection of data (information security) is the most important. The protection of networks is important to prevent loss of server resources as well as to protect the network from being used for illegal purposes. The protection of computing power is relevant only to expensive machines such as large supercomputers.
Our Software Assurance services help identify security problems at any phase of the development lifecycle - and within the development process itself.
For each offering, we will identify and focus our efforts on those areas where your application or process is most at risk, report back what problems/vulnerabilities are found, and provide remediation advice. We have assisted world-class organizations with meeting their business goals through:
  • Security reviews of business critical applications
  • Cyber security initiatives preventing, detecting, and responding to attacks
  • Software security training
  • Software testing best practices and automation
  • Software development resulting in secure software
  • Portfolio risk analysis
A security test provides a clear understanding of your software application's vulnerabilities and attack surface - and is used to fix vulnerabilities, implement mitigating controls, and isolate problems in your development practice. ROOTS security policies are aimed at providing high levels of physical, data access and network security to you.
Data Access Security
  •  Security Firewalls are installed to prevent unauthorized access to the network.
  • Group policies in place for accessing PCs and workstations for authorized access.
  • Access to important files and directories is given only to specific personnel.
  • All email and web servers are located at an independent internet data center.
  • GFS (Grand-Father-Father-Son) Backup policy in place. Monthly backups are stored at an off-site location and removable backups are kept safe with logs duly maintained. Daily backup are stored in fire-proof safe.
  • External security audits are enforced to assess any breach with multi-level security management in control.
  • By default, all ports (USB, Serial, Parallel) are disabled on PCs. Enabling of the required ports is done only on specific requests by the client.
  • Physical security ensures no CDs, Pen-drives; movable media goes in and out of the facility without written permission from the management.
Network Security
  • Each client's process is run on a separate VLAN/VPN when run off-shore/off-site.
  • Software defined secure tunnels through the internet.
  • Only client authorized personnel is allowed to access the VNC/VLAN/VPN. This setup prevents others from accessing the project information.
  • Real-time Anti-virus and SPAM protection for desktops and servers.
  • Annual maintenance and scheduled preventive maintenance in place for critical assets.
  • Adequate spares are available for all critical infrastructures, thereby minimizing downtime.
  • Password protected Wireless LAN.
Phone: +91-94784-81527 Email: info@rootsitservices.com
© 2003-2018 Roots Infocomm Ltd.