Intellectual Property
In today’s digital world, protection of IP is of paramount importance to the OEM and AREL understands this better than anyone else. We take multi-layer protective measures in safeguarding our customer’s interests. The process of IP protection starts with the NDA process, involving all stakeholders including customers, suppliers, service providers, contractors and our own employees. A series of measures are adopted across the organization on this matter. Customer information, documents, product data, and sensitive information is digitally locked with controlled access. Apart from this, processing, testing, and design areas are controlled through digital and physical barriers allowing access to only authorized personnel. Apart from all these, we also recognize the need for a culture of ‘responsibility’ which is driven through the fifth element of our core values, “Respectful behavior and Ethical Practices” in the way we conduct our business.
We believe that the world today is getting more and more vulnerable to digital security. Henceforth we have adopted very strong measures to protect ourselves from any intrusion into our digital world and thereby protect our shareholders, customers, suppliers, partners, and all other stakeholders. The following note on ‘Cyber Security’ explains the strong measures taken by the Amara Raja group in this regard.
Cyber Security Program
Amara Raja takes its cyber security seriously and we follow stringent policies and security controls to maintain our security posture against all kinds of external and internal threats. Adhering to ISO 27001 compliance, we have the best in breed and next generation security solutions, augmented with the largest civilian Threat Intelligence Platform from Symantec. Being the deepest set of threat intelligence in the industry, it provides proactive, detective and investigative services in coping with all kinds of cyber threats.
We have Next Generation Firewalls covering our entire perimeter from the world’s topmost OEMs in the domain that protect our infrastructure, data, assets, and users from all kinds of external intrusions and network attacks. The Intrusion Prevention System provides bidirectional protection. Our Email Infrastructure has Advanced Malware Protection that can thwart zero day exploits on top of the world’s leading antispam and content scanning capabilities. We do employ cloud-based web security that acts as our web gateway giving us the capability to respond to any kind of threat within two seconds in any part of the globe. All end user devices are protected with advanced endpoint protection capabilities on trusted and non-trusted networks with secure encrypted communication channels.
Not only we maintain internal security on data, and users through hardened systems with the help of manual and automated Vulnerability and Penetration Testing runs and a well-defined governance model to drive Change Management and Access through continuously improved process and policies, but we also subscribe to the dark web and security performance watch-out services to take preventive measures much before any threat can be materialized against our cyber assets and information that can potentially jeopardize interests of our employees, customers, vendors, and various stakeholders.