Appexigo Technologies www.appexigotech.com. Human capital is increasingly being acknowledged as the most important investment for any company. Finding.

Slides:



Advertisements
Similar presentations
Tax Return & Planning Services
Advertisements

Wing B/1, Third Floor, Sardar Patel Mall, Above Sardar Hospital, Nikolgam Main Road, Ahmedabad – Gujarat, INDIA /
An Overview of the Workday Project
Red Flags Compliance BANKERS ADVISORY 1 Red Flags Compliance Fair & Accurate Credit Transactions Act (FACTA) Identity Theft Prevention.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
CYBER CAFÉ VISITOR TRACKING SYSTEM A Comprehensive Portal for Tracking Cyber Café Visitors.
No fewer than 54% of Indian workers are seriously considering leaving their jobs - Mercer Are our workforce driven to perform or driven out?
Accounting back office partnership proposal
The Organization eCore is a one stop solution for all your IT Security problems. We are a team of passionate like-minded Security Professionals who not.
Project Connect Online Affordable, Secure and Easy to Use Collaboration for Project Teams 01/21/2009.
Mobile Web products Brought to you by. Background Sentido started in 2004 as a web software development company (surveys) Soon started venturing into.
NSAA Information Technology Conference Planning the Scope of Your IT Audit _____________________________________ October 1, 2014 Jennifer Schreck, Audit.
An Overview of Enlace Staffing Solutions. Performance based hiring vis-à-vis qualification based hiring will increase productivity in your company. We,
Capeesh! See your company through your customers eyes.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Online Identity Authentication and Data Broker SNAP Director’s Conference September 23, 2013.
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
Information Security considerations for Outsourced ICT Services
Creating a Winning E-Business Second Edition
Creating a Winning E-Business Second Edition Operating Your E-Business Chapter 5.
Enterprise Security. Mark Bruhn, Assoc. VP, Indiana University Jack Suess, VP of IT, UMBC.
Prominent Systems Address: Plot No 13, Flat No 305, Yogeshwari Apts, Ravi Nagar. Nagpur Maharashtra (India) Contact Number:
IMonitor Software About IMonitorSoft Since the year of 2002, coming with EAM Security Series born, IMonitor Security Company stepped into the field of.
InformationWeek 2014 Strategic Security Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Human Resource The Recruitment Agency. ABOUT US HRRA (Human Resource Recruitment Agency) is an independent company specializing in staff recruitment since.
Creating a Winning E-Business Second Edition Operating Your E-Business Chapter 5.
Responding to a Security Incident Maryland Security Day March 2, 2004 Joy Hughes, CIO
Prepared by: Dinesh Bajracharya Nepal Security and Control.
AG+R Annual Review June AG&R ANNUAL REVIEW SECTION I.
Binsar Dudhatoli Consultants (BDC) Human Resource, Accounting, Taxation & other Business Consulting Service Partner.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
© 2008 Eventure Events. All rights reserved. Mitigating Business Risks with Strategic Workforce Planning Lina Doucet Bruce Power.
Data Security: Steps to Improved Information Security September 22, 2015 Presented by: Alex Henderson General Counsel and Chief Administrative Officer.
Cyber Security & Fraud – The impact on small businesses.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
INCIDENT RESPONSE IMPLEMENTATION David Basham University of Advancing Technology Professor: Robert Chubbuck NTS435.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
© MISHCON DE REYA MAY 2014 RECRUITMENT INTERNATIONAL FINANCIAL DIRECTORS’ FORUM Protecting your business from unlawful competition.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Advanced Secure Technologies Secure Document Technologies.
Ethic Management Solutions. Agenda Glance Mission & Vision Recruitment Services Services for Society Growth Our USP Expertise Our Approach Future.
What Can Go Wrong During a Pen-test? Effectively Engaging and Managing a Pen-test.
PARTNERING for your INTERESTS Companies invest in security to protect their people, property and information. In doing so, they are also protecting the.
Vision BackGround company was established for the purpose of employment delinquency prevention and apprehension. This tool is innovative and critical.
Supervisor Training On-Campus Student Employment.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
Candidate Verification Quality of Hire Presented by Marita Mutemi HR’s Networking Forum 5 st May 2016.
Computer Security Sample security policy Dr Alexei Vernitski.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Welcome to JP Consulting Services ~Connecting Talent with Opportunity~
The Source Personnel Information Service Employment Screening Excellence in Pre-Employment screening Security.
HOW IS PRE-EMPLOYMENT SCREENING BENEFICIAL TO EMPLOYERS. For more details, visit
Documents. Process. Data. Payables
People Inc. from P&A Software
Global HR Update Recruitment Process Optimization (RPO)
Unique Identification Number Project
Lecture 14: Business Information Systems - ICT Security
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
Work-force planning involves two major activities
COVER.
People Inc. from P&A Software
Trends like globalisation, technological innovation, growing work force, diversity, education and human capital is demanding the organisations to be better,
Challenges and Successes in the Zambian ICT Security Sector
COVER.
Neil Kirton and Zoë Newman
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

Appexigo Technologies

Human capital is increasingly being acknowledged as the most important investment for any company. Finding the right talent in the right job at the right time is a humungous challenge that the HR teams are facing in the current hiring scenario. Reported incidences of car drivers being involved in crimes in the IT/ ITeS sector, access to sensitive customer information in BFSI sector, instances of staff in educational institutions involved in exploitation cases all have led to growing awareness of the need for background screening of employees as well as vendor/contract staff. Organizations can protect themselves from such risks by implementing Background Screenings Process, either outsource or in-house. Appexigo Technologies

One in 3 persons has exaggerated / incorrect information about his previous employment. Over 80% of the persons joining organizations with criminal intention or with an intention to leak information to outsiders hides his / her permanent address. 42% of the frauds were committed by top management including directors and VPs shows a survey done by KPMG. Nearly 21% of applicants provide false information relating to tenure,role,salary conduct etc. One in 5 selected C.V. One in 5 selected C.V. has a significant incorrect information if known to you would have led to his not getting hired Appexigo Technologies

Cyber crime Lost in business Salary confusion Risk of Data Theft Wrong higher people High cost Time consuming Property Theft Appexigo Technologies

Established in 2010 providing 5 kind of service's Software Development Mobile software development Background check Data digitalization Education & Training Appexigo Background screening More than new candidates monthly Very large database Solution through Online ERP Tool Direct accesses to the client Highly qualified team Providing almost in all sector More then 50+ client. Strong quality and audit team engaged in validation & authentication Stamped document for all verification Appexigo Technologies

High qualified and strong team Strong IT Team Working through our BVS Software 1.Online investigation 2.Data capturing 3.Case monitoring through dashboard 4.Online case status report for companies. 5. Automatic allocation of cases to the team 6. Client can send data through online 7. Report preparation 8. Cases exported to the client 9. Automatic acknowledgment to the client 10.Less paper work Appexigo Technologies

Security: 1.Restriction of entering in software 2. 3-tire security for online data 3.USB drive, CD drive disabled 4.Firewall for network security 5.restricted access web based blocked 6.24X7 sever services and technical support 7.Resrited access for different clients 8.confidetialty of data at each level Appexigo Technologies

Snap shot of our BVS Software Appexigo Technologies

Employment verification Education verification Address verification GAP verification OFAC database check Reference check Criminal police/data base check Court check Integrity check Drug Test voter ID/ PAN/DL/other ID check Income tax Employee Background screening Services Appexigo Technologies

Contact Details: Mail ID : Web : A-54,sector 57, Noida (U.P) ,India. Tel: Mob Appexigo Technologies