"We know that Security is as good as breaks of a vehicle, and it is an imperative in any Enterprise IT landscape for running an organization"
Use and Implementation of Cloud in business
We use private cloud only. Our cloud is built on a MPLS cloud; all our applications are accessible to every location of CG and its companies across the continents. To us, cloud means putting all applications that pertains to applications that are running our operations. We have a complete authorization program that limits the accesses to these applications.
Building an effective DLP programme
Use of Data comes with a responsibility, this need to be done in three front People, processes and Technology; we need to address this in all these aspects for a successful DLP program. We have educated users on this aspect through our IT policy which our employees need to go through before accessing any applications. We have put many processes for data transfer requirement to any other media is restricted and done at centrally. Then we use technology to monitor the events that is related to data and its usage.
Maximizing the cost efficiency for information security
Information Security is an important aspect for our organization, as our products are made using our own technology, protecting this Intellectual property the information security plays a major role in this regard. We have put proper authentication systems like access application and our net work is completely secured and we deploy information security tools and prevention of malicious codes through Emails and Internet websites. So our company is well aware of the fact that security is the investment that ensures the IP protection of our own technology products, and increases the productive use of IT assets.
Mobile devices to minimize threat, loss and risk
When we use Black berry as our enterprise mobile, we could sleep well as this is one of the robust enterprise mobile with a secured access to the Email and application, But after the proliferation of Iphone, Ipad Samsung ‘s Galaxy and other windows 8 phones and tablets, of course we are not able to decide the risk quotients on these developments. We have been closely observing for any possible the security lapses in these devices , but we need to wait for it to reach a maturity level, then there will be a solution arrive for them to be deployed with the kind of safely that black berry has given so far.