Technology FAQ's BPO Library
:: Technology ::  


Technology

The infrastructure has been designed to provide redundancy in the network and equipment; ability to integrate / manage all technologies. Best in Class Equipment; have been used to provide uninterrupted, quality service to the customer. In order to meet today's demanding BPO requirements D&K has developed substantial technology capabilities, including Internet enabled workstations for today's multi-channel contacts.

For optimal efficiency, our technical staff develops our programs in-house to meet your requirements. Our technology foundation is state of the art to provide optimal efficiency to our clients.

Our technical experts are specialists with multiple years of BPO technology experience and are focused on program requirements, accuracy, quality, and system's effectiveness. D&K's technology is state-of-the-art, giving you the leading edge in your customer program.

D&K has a World Class Facility located at Ahmedabad, Gujarat. Ahmedabad is fast emerging as a hub for IT companies. Positioned in the heart of city, the D&K's infrastructure is designed to provide reliability of performance, "always on" connectivity, security and power backups. D&K's truly carrier class telecom infrastructure has a very unique set of features, which are key factors in ensuring a 24 x 7 type of operation.


D&K's Security Measures

Physical Security

Close Circuit TV

- Cameras per floor and one camera installed in the Server room.
- Based on digital recording on hard disk.
- Remote viewing possible.
- 24X7 management by the security guards.

Network Security

Firewall

- Dual PIX in High Availability Mode.
- ISA based firewall after PIX providing flexible access policies.
- Dual Packet Filtering Firewall in High-Availability mode with VPN support. The stage one is Cisco PIX (with High   Availability option) with redundant physical boxes. Second stage is Microsoft ISA (Internet Security and Acceleration)   Server.

Secured V-LAN for Separate Clients

Provision is made for offshore clients to have their own Local Area Network secure by way of either separate physical network or through separate V-LAN. This kind of provision ensures complete security of data on the LAN.

WAN/LAN switches password

The password for the switches is to be changed every 30(thirty) days. Repeatability of password is to be avoided.

- The password is kept at a secure area.
- The password would be changed under following circumstances:
- Breach of password detected by Networks
- Any event that makes it a necessity to change the password as visualized by Head Networks
- At the expiry of usage period
- On resignation / termination of services of any Technology team member.


System Security

Antivirus protection

- Installation of antivirus software for each virus entry point on the network such as Internet gateway, mail servers, LAN   servers, desktop on LAN, laptops and standalone PCs.
- Updating program components and virus pattern files to stop the latest viruses.
- Disable floppy drive access on all workstations.
- Check and clean all floppies and CD media before using.
- Perform a Virus Cleaning exercise once in a week.
- Daily Backup and offsite storage of month end backup tapes.

User Data Security

Dedicated folders on file server. The access to these folders is dependent on the access privileges given to each individual user. All system files/directories are write protected from users.

- Backup for this server taken on a daily basis.
- The floppy drives at each of the user is disabled.
- As we are using Windows 2000 as an operating system, we have disabled the control panel access and command   prompt access for all the CSEs.
- No default administration access is allowed to CSEs and no access provided to users for modifying BIOS.
- CSR are given the access to the Internet as per the process requirement and all other access is denied.
- All the attachments in the mail going outside are restricted and are regularly screened by email content manager of   Trend Micro and in turn monitored by system and administration department.
- Incoming *.exe, *.eml etc attachments are not allowed and this list gets updated on ant virus software (EScan & Mail   Scan) updates. This is done to prevent the flow of disastrous viruses.
- No media is allowed inside the process floor.
- No user is allowed to carry the bags and any food item/beverages on the working floor.

 

Designed, Hosted & Maintained by URL Software Pvt. Ltd