Contact Us
Site Map
Legal Notices

Copyright © 2010 Vologic Inc. All rights reserved.


Multiple authentication schemes (including biometric devices, rolling key algorithm tokens, authentication of location by verification of IP address, strict automated password rules, denial of access based upon time/day schedule)

Intrusion Detection Systems

Secure Sockets Layer (SSL) for 128 bit encryption

Multiple Firewalls


Utilize third party vendors to review Internet security by probing for known software weaknesses, attempting “hacks” into network systems, and reporting all results

Network directory software logs all activity for audit trail

Network-resident anti-virus software scans all connections for virus attacks

Controlled physical access to facilities

Proximity cards required for access to building and data centers

Video monitoring and recording,

Complete environmental monitoring of HVAC and power

Failsafe lock hardware and procedures

24 hour security alarm system

Inert gas and dry-pipe fire-suppression system

home / about us / company profile / security and auditing
Contact Us


Our Partners

Profile and Objectives


Accessibility and Portability

Disaster Recovery and Business Continuity

Internet Initiative

Effective Automation

Flexibility and Scalability

Return on Investment (ROI) and Profitability

Security and Auditing