ProcStat is an ISO 9001:2015 certified company, adhering to the international standard for quality management systems. This certification demonstrates our commitment to customer focus, strong leadership, employee engagement, process-driven operations, continuous improvement, evidence-based decision-making, and effective relationship management across all our core functions.
ProcStat is ISO 27001:2022 certified, the global standard for Information Security Management Systems (ISMS). This certification ensures we meet stringent requirements for information security policies, physical and environmental security, asset management, and compliance. We are committed to continually improving our ISMS to safeguard your data effectively.
Our security standards and protocols ensure that we can mitigate security threats and vulnerabilities
World-class Infrastructure Implementation
Top-tier security standards
Ongoing assessment and enhancement
We follow stringent infrastructure protocols to guarantee the highest level of security.
Dedicated Infrastructure
Each employee is assigned a fixed office and workstation.
Access Control Systems
Employee access to office floors is restricted based on designation.
Video Surveillance
CCTV cameras provide 24/7 surveillance across all areas.
Mobile Phone Restriction
Mobile phones are not permitted on the office floor.
Document Printing Restriction
Only team leads and higher ranks have access to printers.
Fire Safety
Comprehensive fire safety equipment is installed and maintained.
DVD and external drives are disabled for security.
A star topology network structure is implemented.
Workstations are secured with password protection.
Passwords are required to be changed every 30 days.
Centralized control for resources, access, and configuration management ensures uninterrupted customer service.
Clear desktop and desk policies are enforced.
Access to communication channels like chat tools and public emails is restricted.
Periodic audits are conducted for threat assessment and mitigation.
Centralized data storage is utilized for efficiency.
Content filters and antivirus are employed for network security.
Network perimeters are monitored with IDS/IPS systems.
Data loss prevention measures are implemented.
Network scans and penetration testing are conducted for security assessment.
A compliance officer oversees email monitoring for adherence to regulations.
Single-source logging is implemented for unified event tracking.
Vulnerability audits are performed to identify potential risks.
External audits are engaged for independent evaluation.
Application audits are carried out to ensure security and compliance.
SSL VPN access for remote employees.
Firewall equipped with content and website filters.
Systems secured with password protection.
Dedicated group email IDs for clients.
Secure internet browsing with anti-virus and firewall protection.
Whitelist domains to allow emails only from authorized personnel.
USB and cell phone access is prohibited.
No access to office Wi-Fi using personal mobile devices.
Policy for Acceptable Use
This policy outlines the rules and guidelines that employees must follow to use organizational IT assets and access the ProcStat network or internet, serving as a standard onboarding requirement.
Data Access Control Guidelines
This policy establishes access protocols for ProcStat data and information systems, including standards for user access, network controls, operating system security, and password complexity.
Change Implementation Procedure
This policy details the formal process for implementing changes in IT, software development, and security operations.
Information Security Protocols
This policy encompasses a range of security controls, emphasizing employee accountability and adherence to rules regarding sensitive information and IT assets.
Incident Management Strategy
This policy provides a structured approach to incident management, outlining procedures for addressing and remedying operational incidents.
Remote Connection Policy
This policy defines acceptable methods for securely connecting to ProcStat’s internal networks from remote locations.
Electronic Communication Guidelines
This policy governs employee usage of various electronic communication tools as defined by ProcStat.
Disaster Recovery Plan
This policy outlines the disaster recovery plan, ensuring a structured response as part of the business continuity strategy in the event of a disaster.
Emergency Operations Plan
The BCP (Business Continuity Plan) policy describes ProcStat’s operational procedures during emergencies to maintain business functions.
Robust Passwords
Implementation of strong password protocols that combine uppercase and lowercase letters, numbers, and special characters.
Advanced Firewall Protection
Stringent firewall configurations to safeguard the network by filtering both incoming and outgoing internet traffic.
Comprehensive Malware Defense
Protection against viruses, adware, worms, trojans, and other malware through advanced anti-virus solutions.
Consistent Software Updates
Regular patching and updating of all computers managed by a central server.
Device Security Measures
Disk-level data encryption and restricted user access through passwords on all company devices.
Regular Data Backups
Strict adherence to pre-scheduled data backup sessions for data integrity.
Employee Data Security Training
Ongoing training programs designed to enhance awareness of data security practices.
Join us in celebrating the diverse experiences of those who have chosen our outsourced services —where satisfaction finds its voice.
Considering if ProcStat is your ideal partner?
Reach out for a tailored strategy that unveils infinite opportunities for growth!
Request a Call