• Security personnel man our centers 24/7
• Stringent electronic smart card access control for all employees/visitors who enter our premises
• Additional access control devices and CCTV monitoring systems to restrict un-authorized entry into our centers
• Fire prevention and disaster evacuation plans and procedures for minimum damage
• Adequately trained teams which understand clients' security requirements
• Legally binding confidentiality agreements for all staff members
• Information is shared only with people involved directly in the project, on only need-to-know basis
• VMC ensures staff's awareness and sensitivity towards security issues and imparts special training for clients where additional security is required.
Technology-driven detection systems to ensure complete data security
No external drives on the systems to prevent data theft by the staff
Back-Up Drive Management for all workstations with restricted print permissions to prevent misuse
Well-maintained audit trails for all our system activities including internet usage
Network and Windows Login, PC 'locking' and secure email with digital signatures
Single sign-in to enterprise and desktop applications
100% redundancy for business continuity:
Internet redundancy through Marine Optic Fiber Cable (Trans-Atlantic and Trans-Pacific), and satellite communication
Power redundancy through power failover system, UPS and power generators.
VMC takes security and confidentiality of client information very seriously and that is why we have implemented stringent security safeguards and processes for every information touch-point. Since our processes are clear and well-defined, we are able to immediately detect and handle any information breach and provide 360° security
Our security process comprises of four stages: Planning, Protection, Detection, and Response. These four stages drill down to all security aspects related to People, Technology, Physical, and Network infrastructures
• Systems
• Process
• Training
• Documentation
• Awareness.
• Identification
• Authorization
• Confidentiality
• Integrity
• Enforcement.
• Accountability
• Audit
• Intrusion Detection
• Non Repudiation
• Availability.
• Triage
• Recovery
• Reliability
• Corrective Action
• Improvement.