We have developed a number of documents covering our Security Policy: General Network Usage Policy, Sensitive Information Encryption and Exchange Policies. General compliance with our security policy and regulations is ensured by the usage of logon scripts and Group Policies.
Staff Security »
We perform careful security checks of every person that is applying for a job. Confidentiality Agreements are an important part of the security system and every employee we hire is to sign such an agreement. All the security-related cases and incidents are tracked and resolved by Department Managers. We inform all the people we hire about the Company’s security standards and keep this knowledge up-to-date by organizing special training programs on regular basis
Additional capacities »
For development purposes we use virtualization technology which enables us to build a separate operational environment for each project and thus increase resource allocation flexibility and effectiveness. This technology is based on the usage of VMware Server 1.0, VMware ESX Server 3.0 and VMware Infrastructure for project monitoring.
Security Monitoring »
All the processes are constantly monitored by the administrative team and vital information on all the important changes and incidents is tracked and logged via Syslog Server for future audit.
Backup Process and Disaster Recovery »
The Information Life Cycle Management (ILM) process we have developed at Iflexion includes a set of data protection and other security-related activities. A special data recovery scenario is presupposed for each kind of potential data loss situation (e.g. hardware or software failure, computer virus, human mistake, etc.). The process of backup copies creation is regulated by the Backup Process Plan.
Effective backup procedures are ensured by a number of physically distributed backup locations Iflexion has in its offices in Minsk, dedicated servers in several countries of the world and high level of encryption of backup data.