Virtualization, ThinClient, Disabled external drives

One of the chief concerns in outsourcing has always been data security. When tons of critical and confidential information leaves its place of origin and is transmitted over the Internet and into strange hands, such concerns are completely justified. And with horror stories aplenty about intellectual property thefts, a client’s worry that his confidential company information will not be misused or abused is totally understandable.’s

stringent security measures make data theft an impossibility understands, respects and appreciates a client’s concern for data security.

Which is why it has spared no expenses or efforts in ensuring that client information remains safe and secure while it is with them.

When a client outsources to us, this is what they can expect:

  • Employee works in a ‘virtual environment’: If a client desires, their virtual employee can work in a ‘virtual environment’, with the employee’s PC and keyboard are connected directly with client’s system in the US, UK or Australia. In other words, all the client data which a virtual employee handles will be stored on the client’s server back home and not on their desktops here. The virtual employee can log onto the client’s server via Citrix or VPN (Virtual Private Network) technology.
  • ‘Virtualization’: The second type of ‘virtualization’ involves storing all client data on’s virtual server in our data centre and not on any employee PC or laptop. On a client’s request,’s IT team can install Linux Operating System on their employee’s system to create that desired virtual work environment where all work is carried out on a virtual machine.
  • Client can access employee’s system or work environment any time: In’s server room, the IT team can provide a client with a virtual environment, so that the client can access their employee’s system at any time and multiple users can also log in and work on virtual machines. This is especially suitable for those clients who have hired an entire virtual team.
  • Disabling external accessories and drives: Many clients request that their virtual employees be provided with PCs or laptops in which external accessories like a pen drive, CDs and DVDs cannot be used. ensures that these instructions are carried out.
  • Disabling websites and web mails: Websites and web mails (Gmail, Yahoo Mail, etc) can also be blocked on an employee’s system (again on client’s request) to further secure client data.
  • Our vigilant IT department:’s own website is under constant surveillance by the alert IT team, with its own Sonic Firewall scanning traffic continuously.
  • Powerful anti-virus and anti-Spam: Every employee’s desktop is equipped with powerful and latest anti-virus and anti-Spam programs.

Know more about hardware and infrastructure facility

Frequently Asked Questions about Data Security