INFORMATION SECURITY

img

PEOPLE, PROCESS AND PRACTICES:

Our organization’s credibility has been built upon Three Pillars of Strength – People, Process, and Practices. All three are interdependent upon the others, and have played the most important role in our success story.

Our people are qualified, experienced, and above all dedicated in keeping the confidentiality intact; Always. Our processes are guided by stringent policies of data and information security that is certified by ISO 27001 standards. Our Physical Infrastructure ensures smooth workflow, and maintains maximum level of security when handling every bit of sensitive information. Entigrity proudly boasts the fact that there have been no security breaches at our office till date.

    PEOPLE
  • Dedicated IT Team for Constant Monitoring
  • Responsible & Dependable Employees
  • Employee Pool with Deep Knowledge of US Accounting
  • Experience on Major Accounting Software
    PROCESS
  • Employees Hired After Due Background/Reference Checks
  • Robust Policies to Safeguard Client Data
  • Non-Disclosure Contract at Employment Commencement
  • Paperless Operations

PRACTICES

  • Disabled USB and Data Transfer Devices
  • 24×7 CCTV Surveillance
  • Key Card Access-based Restrictions
  • Prohibited Mobile Devices of Staff
  • No Pens-Papers-Printers in the operations area
  • Controlled/Limited Internet Access
  • Restricted Social Media and E-Commerce websites
  • Blocked Access to Personal emails
  • Multi-Layer Authentication
  • Strong Firewalls and 256-bit SSL encryption
  • Process-defined Access to File Type Download and Access
  • Server access on a need-to-know basis
  • Monitored Instant Messaging and Email Exchange

Certification

ENTIGRITY is an ISO 27001 certified organization. ISO 27001 is the highest standard for Information Security Management System, defining a suite of activities for management of information security risks. Entigrity has policies and framework imbibed at its core and in culture and practice for identifying, and effectively managing security and information risks, thereby ensuring fulfillment of its commercial, contractual, and legal obligations.

What Our Clients Say

Need More Info?

Contact Now
Contact Us