Outsourcing, Offshoring, Accounting & Project Management, CRM Consulting and Corporate services

Security is a complete approach

Most managers tasked with evaluating outsourcing start their evaluation with cost savings, but few projects ever move forward without evaluating the security concerns. Therefore, at Brealant we view security as job #1.

IT Security

First we start with the security of each PC

 

Endpoint security

Endpoint Security

Devices are secured with endpoint security systems that protect from viruses, malware, and malicious attacks. 

 

Managed environment

Managed Environment



All devices are managed by a central login system that prevents unauthorized access as well as controls disallowed web-surfing of facebook, etc. 

 

Cloud solutions

Cloud Solutions

We deploy cloud file sharing, email, password vaults as this provides clients with the greatest control over security. 

Office access control

An important part of security is control of the office. Some of our clients use dedicated offices, and for those clients we deploy 

 

Cardkey access

Cardkey Access

All offices are controlled by card key access that is logged in our databases. 

 

Video Surveillance

Video Surveillance

Customers have the option of putting video cameras in dedicated offices. All shared offices have video systems installed. 

 

Background checks

Background Check

For clients that demand an additional level of security, we perform criminal background checks on selected employees. 

Information security best practices

Information Security

There are also standard best of breed steps to employ for information security. We encourage all clients to use these standards and we assist in monitoring compliance. 

We use internal procedures to minimize risk. Such mitigation measures include but are not limited to:

  1. Creating a paperless environment, preventing employees from writing down and removing information by ensuring that all work processes are done on the computer, without having to record anything on forms or notes.
  2. Prohibiting the use of cellphones and cameras on the floor.
  3. Prohibiting paper, pens and digital recording devices from being brought onto the floor.
  4. Preventing internet access for employees on the floor.
  5. Limiting functionality and access of personal computers or terminals used by call center agents (for example, disabling USB ports). Companies may also use data loss prevention software to block attempts to download, copy, or transmit sensitive electronic data.