follow us on twitter
linkedin
facebook
Cobra Infrastructure and Technology

Infrastructure - Technology

At Cobra we fully understand the significance of having a secure Technology Infrastructure. Network data security and confidentiality of our client's documents receive the highest level of consideration by Cobra. We take a holistic approach to IT security through stringent policies on network and data security. We work with our clients to choose a database/review platform that can provide additional layers of security including encryption, folder and field-level security, added login/password security through RSA cards and other measures, if necessary.

Network Security

a) Secured VPN connectivity for content sharing
b) Seamless integration into Clients networks with the highest levels of security and confidentiality
c) Network log inspection by firewall administrator
d) VLAN to avoid merging of information of One Client from the information of another
e) Unified theft management device to monitor and track all incoming and outgoing packets
f) Traffic and bandwidth allocation prioritized and controlled at user/application level with QoS monitoring
g) Mail Security Appliance to control spam mails and viruses
h) Scheduled and random audits to ensure adherence to principles and procedures

Data Security

Cobra´s network and data security policies are comprehensive and complete. The data center is equipped with all the latest cutting edge technology hardware and software, and caters to the needs and security standards preferred by our clients. We have a two-tiered approach to data security by implementing security measures at both the database level (in conjunction with the hosting vendor); and at the local level through network and PC security. Certain salient points on data security are:

a) Confidentiality agreement signed by all employees of CLS
b) Data is encrypted or decrypted for maximum security
c) Transmission of data is secured over 128-bit SSL protocols
d) Periodic data-back up and monitoring facility
e) Multiple layers of User Id authentication and tracking
f) Usage of USB, CD/DVD drives, Floppy drives, Bluetooth, and optical devices blocked; prompt alert systems in place, in case of any violation
g) Adherence to rigorous password security standards
h) Clear Desk and Clear Work Place policy in place; paper works are regularly shredded
i) Restricted print access policy
j) Work is executed through Terminal and Citrix servers; Client related information/materials cannot be downloaded

Our top priority is to always ensure a seamless and secure environment for our client's documents to be managed and reviewed through the case lifecycle. See Infrastructure Facility for more information on our physical security.

 
loading