What technology is used to deal with malicious attacks (encryption, firewalls, etc)?
Dial-in to our network is not allowed from outside and we do not allow access to LAN from outside using Internet. We allow selected employees to access outlook e-mails using VPN over Internet. To ensure an adequate and comprehensive ISM, monitoring controls such as password management and physical security were used to augment technical controls like firewalls and IPS. We have implemented Linux based Security Solution which include firewall / IDS Sensors / Syslog Server for managing the network devices. Syslog’s are maintained for period of one month. LAN is divided logically through VLAN’s according to the Project Requirements. We have created a separate VLAN for the management of all the Devices. Any configuration change is controlled by the change control process. All the security process is governed by our security policy manual. c. Business Continuity & Disaster Recovery In today’s highly competitive environment, businesses need to continuously innovate to meet the expectations of