
Structured routing
With MPLS, FNF India handles WAN routing, which lends itself to streamlined
processing, greater security, and improved network control.
Leveraging technology in a controlled manner to
cater to our clients' requirements
With MPLS, FNF India handles WAN routing, which lends itself to streamlined
processing, greater security, and improved network control.
MPLS allows packet filtering at firewalls and requires examination of packet
contents, including IP headers.
MPLS makes it easy for FNF India to interconnect sites and manage traffic patterns tied to Citrix, Web and application access. Multiple technologies converge into a single Internet Protocol network, extending the FNF India network to more business entities and expanding services to more network users
MPLS services feature multiple levels of QoS, allowing users to specify latency, jitter and packet loss minimum thresholds for each type of traffic (voice, video, email, bulk file transfers, etc.).
This means that, for example, the MPLS network treats latency- sensitive traffic, like voice and video, preferentially over less-sensitive traffic, and allows for the establishment of data-transporting priorities.
MPLS comes with guarantees from the carrier with respect to installation times and availability, enabling FNF India to provide better performance, reliability and efficiency.
MPLS allows packet filtering at firewalls and requires examination of packet contents, including IP headers.
The backbone of FNF India’s business operations and IT Infrastructure is built on an Information Security Management System based on the ISO 27001:2013 Information Security International standard.
FNF India operates out of three facilities in Bangalore, India, and all security controls and processes across locations are consistent and aligned as per the standard requirement.
In addition to being an ISO 27001:2013 certified organization, FNF India is also compliant with the SOC2Type2 security and availability criteria put forth in the Trust Service principles by the American Institute of Certified Public Accountants (AICPA).
Periodic monitoring and audits are performed internally to ensure compliance to the Information security controls of the organization. FNF India also undergoes annual periodic audits/assessments to maintain the ISO certification and report on the effectiveness of the security and availability controls performed by an independent certifying body.
FNF India operates out of three facilities in Bangalore, India, with physical security, access controls and video surveillance in support of multi-shift operations. FNF India is compliant with International Organization for Standardization (ISO) 27001-2013 and SOC2-certified.The purpose of a SOC 2 audit is to evaluate an organization’s information systems relative to security, availability, processing integrity, confidentiality and privacy. An independent audit was conducted to review, and attest to the design and operating effectiveness of FNF India’s controls as they relate to security and availability put forth by the American Institute of Certified Public Accountants (AICPA).
The ISO 27001-2013 certification specifies that FNF India’s information security management system (ISMS) is under explicit management control with respect to security policy, organization of information security, asset management, human resources security, physical and environmental security communications and operations management, access control, Information systems acquisition, development and maintenance, Information security incident management and business continuity management, and compliant with information security policies, standards, laws and regulations.
The Business Continuity Program at FNF India is an ongoing process, not merely a project. It is part of the company's culture and is supported by the Executive management. The plan is documented and reviewed on a regular basis.
FNF India’s business recovery methodology encompasses a five-stage plan - Response, Relocation, Recovery, Resumption and Return. The organization follows a strategic method to determine the best approach to respond to a business interruption and resume operations.
Redundant Infrastructure and Backup operations ensure, the critical business data is safeguarded and securely recovered on time when needed.