Infrastructure

Improved IT Infrastructure stability and availability...

Our Infrastructure

Located in the heart of IT Hub of Noida (Delhi NCR), Our state-of-the-art software development facilities spanning over 450 sq. ft. of the covered area have the capacity to base more than 100 employees in one shift. Awapal Solutions have a highly secure, efficient and well-architectured infrastructure. We follow global security practices that maintain security and comfort within the organizational surroundings. With our sturdy internal infrastructure, we ensure the safety and security of employees and data through proper and periodical risk-management audits and quality-checks.

Our operational infrastructure that facilitates flawless work flow through comprehensive network security, employee security, and physical security, we deliver quality services to our clients.

Some of the key facilities

High-tech machines

  • Desktop: Over 70 + Work Stations with a capacity to increase. (Individual spaces for design team, development team, customer support team, testing team and marketing team).
  • Printers & Scanners: Laser Jet, Desk Jet, High-Speed Scanners etc.
  • Projector: In-house staff training facility with Projector, and other interactive tools.
  • Power Supply: Uninterrupted Power supply with strong backup facilities

Systems Environment Servers

  • Windows 2003 & 2008 and Linux
  • Servers over LAN / WAN
  • Back-up Server
  • Error free structured cabling for high speed data access
  • Capacity of intensifying multiple database-server and multiple data /document
  • Servers in USA, for hosting applications and remote data transfer

Hi-Speed Connectivity

  • Ultra-speed internet connectivity
  • Dedicated Leased Line connections as backup for Internet
  • New-age modem, routers and other related equipments
  • 24/7/365 availability of dedicated lines ensuring connectivity with customers through telephones, VOIP, web chat and emails.

Data & Network Security

  • While natural disasters cannot be prevented, virus attacks and hacking can be prevented largely. We use Trend Micro/ McAfee AV software, which are regularly updated and distributed enterprise-wide. Even in extreme case of virus attack, the containment mechanism enables the impact at minimum level and recovery is achieved through vendor support.
  • The use of necessary firewall and other security techniques prevents unauthorized access and ensures the highest levels of data integrity and security.
  • Backups of all data and systems are kept in geographically remote locations for disaster recovery purposes.

Access Control System

  • Proper verification and recording of all materials including computers, media and documents entering and leaving the premises by security personnel
  • Provisioning of equipments such as fire and smoke detectors, zonal panels, warning sirens and a public address system.
  • Keeping a copy of backups of all data and in geographically remote locations

Physical Security

  • Round the clock manned security
  • Fire Safety
  • Controlling and recording the entry and exit of the visitor