Data Security:
OSTPL will protect the confidentiality of its customers" information, account information and personal communications to the fullest extent possible and consistent with the law and the legitimate interests of OSTPL, its partners, its employees and other customers of OSTLIndia services. To protect the loss, misuse, and alteration of information that is collected from customers, OSTPL has appropriate physical, electronic, and managerial procedures in place.
Physical Security:
OSTPL takes security very seriously; we ensure a safe and productive Internet environment. OSTPL actively and automatically monitors all of our systems for attempts at breaching our security or the security of our customers, or attempts to access systems or resources that are not available for customers to use or access. We bring to you a robust network that delivers the speed, reliability and Security you need. A direct connection to multiple Internet backbones from Above net, WorldCom and Quest ensure your site can be accessed quickly from anywhere in the world. Redundant power supplies, standby servers, and 24/7 live monitoring keep your site secure and available. We update all security patches time to time to ensure adequate security. Weekly backups are on Terabyte Backup Server. We have IPF W Firewall protecting your entire network and Black ice Firewall for additional security.
|
|
Security Features:
|
- 24/7 On-Site Security Guards
- Video camera surveillance
- Security breach alarms
- Fire suppression system
- Motion sensors
|
| |
|
|
Examples of security actions that will trigger security alarms to our 24 hour / 7 day staffed network operations center are, but are not limited to:
- Satan or port scans, full, half, fin or stealth
- Vulnerability probing of any kind on any machines or devices.
- Ping scans and Ping Floods and ICMP abuses
- SNMP attempts
- Mail host relay use or hi-jacking
- Telnet, FTP, R-commands, etc. to internal systems
- Attempts to access privileged or private TCP or UDP ports
- HTTP access without the use of a Web browser
- Multiple and frequent Finger attempts
- Excessive resource utilization
- Source route spoofing
- Smurf attacks
- IP number spoofing or masquerading
- Forging TCP packets or email header information
- Syn Floods
- OOB attacks
- Password cracking or guessing schemes
- Excessive email postings (SPAM)
| |