Most managers tasked with evaluating outsourcing start their evaluation with cost savings, but few projects ever move forward without evaluating the security concerns. Therefore, at Brealant we view security as job #1.
First we start with the security of each PC
Devices are secured with endpoint security systems that protect from viruses, malware, and malicious attacks.
All devices are managed by a central login system that prevents unauthorized access as well as controls disallowed web-surfing of facebook, etc.
We deploy cloud file sharing, email, password vaults as this provides clients with the greatest control over security.
An important part of security is control of the office. Some of our clients use dedicated offices, and for those clients we deploy
All offices are controlled by card key access that is logged in our databases.
Customers have the option of putting video cameras in dedicated offices. All shared offices have video systems installed.
For clients that demand an additional level of security, we perform criminal background checks on selected employees.
There are also standard best of breed steps to employ for information security. We encourage all clients to use these standards and we assist in monitoring compliance.
We use internal procedures to minimize risk. Such mitigation measures include but are not limited to: