Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

Today is the age of Security.

ReCom consulting firm develop all application with maintaining every


option regarding information security to client end. While delivering application to the client, ReCom
asks for the options that client want to have from their standard level to maintain their information
secured. Let’s have a look that why ReCom applications are more secured than any other web
applications in the market.

ReCom has the following distinctions regarding development and delivery of web applications:

➢ Training:
To the employee level ReCom has wonderful trained up employees to conduct official activities
and development. Training includes ISMS Security Training, Risk management training, Asset
management training, IT training, Server and Data management training. Trainings are
overviewed half-yearly of every year. New employees are always trained of by ReCom standard
before onboarding.

➢ Development:
ReCom develops every application in Microsoft .NET framework. All security option regarding
this framework are properly applied to application according to standard and opportunity.
Identity Server, Role based authentication, Token Based Authentication, Login and Terminal
tracing are example of our development.

➢ Security Options for Login:


According to Clients demand and global standard we have already implemented the following
options for SSO(Single Sign on) from the clients end.
1. ADFS Authentication for Single Sign On, (In Cloud Server)
2. Azure AD Authentication for Single Sign On, (In Cloud Server)
3. Local AD Authentication for Single Sign On, (In Local Server)
4. Token Based Single Sign On (Cloud and Local Server)

➢ Security Options for Network/Connectivity:


For maintaining the secured communication between client to our web application access we
have already applied the following options:
1. Site to Site VPN,
2. GRE over IPSEC VPN Tunnel,
3. Security Diagram of Firewall and VPN (Both Cloud and Local Server),
4. SSL Certified web hosting,
5. Segregation of Application Server and Database Server
6. Both Cloud and Physical server VPN Tunnel establishment

ReCom Consulting Ltd.


➢ File Security Options:
Besides NDA with the specific client ReCom maintain the following options for File Security
1. Bitlocker in Physical Server
2. User and IP based authentication in Cloud server access.
3. Login and Logout record checklist from Application
4. Data and File Encryption with SHA256
5. PGP Encryption regarding Bank data transfer

➢ Security check and Audit:


ReCom maintains the security options regarding to standard of ISO:27001. To keep up-to-dated
ReCom conducts the following options regularly in every year on need
1. VAPT of Server and Applications.
2. Internal Security Audit
3. Maintaining Register of Server access, Database backup and restore.

ReCom Consulting Ltd.


Our Security Authentication Work History....

ADFS Authentication for Single Sign On,

Security Diagram(Both Cloud and Local Server),

Azure AD Authentication for Single Sign On,

Token Based Authentication,

Site to Site VPN,

GRE over IPSEC VPN Tunnel,

Bitlocker,

VAPT of Server and Applications,

Login and Logout record checklist from Application,

ISMS Security Training,

Data and File Encryption,

PGP Encryption,

ISO:27001 Internal Audit.

ReCom Consulting Ltd.

You might also like