April Issue 2021

Page 1

@entitworld

@enterpriseitworld

@enterpriseitworld

R S 2 0   |   PA G E S 3 2   |   V O LU M E 0 6   |   I S S U E 0 1

WWW.ENTERPRISEITWORLD.COM

FOR THE CIOs. BY THE CIOs. APRIL 2021

NITIN SETH

CEO, INCEDO INC.

MAXIMIZING RETURNS

FROM DIGITAL TECHNOLOGY

INVESTMENTS

P-22




EDITOR’S  LETTER

DIFFICULT TIME BUT NEED TO TAKE BOLD STEPS

Hello Friends.

Dear IT Leaders We have already into a serious pandemic and the fight is against an unseen enemy. Like enemy and enemy are friends similarly, Covid- 19 pandemic and cyber thieves are friends. Therefore, we have to save our businesses and save our people also. There is no way that we can check the movement of the pandemic as it has spread out to every corner. Every worker is vulnerable to the virus and every machine is vulnerable to the cyberattacks. Being leaders you have to take bold steps and say on the face of the management the steps that you need to take to deter both the attacks. You may need more budget, you may need better technologies, better go for it. If you keep quiet and buck down to the pressure of the management, trust me you will be a catalyst to the attacks. All these years in the past you have taken the things slowly on your stride but now there is no chance of taking the things lightly. It is war against us and every weapon available with us has to be utilized and every individual in our team has to be equipped

NEXT MONTH SPECIAL

with multiple skillsets. So that you can deter the disaster from occurring. Imaging your manpower or team who are managing DC or application or even your development team who are healthy today may fall sick tomorrow, what would you do. You need to equip your workforce with multiple skills so that if someone falls sick the other person can take over his position and business continuity remains intact. The major concern in today’s date is business continuity and cyber security. Equip the system with best of the breed cyber security solutions. You need to collaborate with the OEMs, consultants, your peers and even the resellers to procure the best of the breed solutions to be useful at the time of any attack. I do not say that you will keep on doing this for ever but at least this quarter you have to do that. In addition to this keep motivating your workforce. The first phase of virus outbreak or first lockdown period was not that serious as I personally realise but this phase is very very dangerous. Even ask your management to take care of the family of your workers so that they remain happy and motivated. Keep taking to them so that they do not feel fatigue. If you do all these things and take bold steps, later on you would not have any regret that you did not do enough to save your people and business. Rest is in the hands of time.

S A N J AY M O H A PAT R A S A N J AY @ A C C E N T I N F O M E D I A . C O M

COVER STORY

SUPPLEMENT

DC ISSUE

QUOTES FROM TOP CIOS

The next issue is an Anniversary issue of Enterprise IT World. We would like to take feedback from the CIOs and OEMs and create our judgment on the same.

The supplement story of the magazine would have relevant quotes from the top CIOs in India.

PLUS

Interviews and Case Studies

Catch interviews, guest articles and case studies of recent applications from the Industry stakeholders, IT/ITES Vendors and IT leaders and CIOs from the Enterprise IT World CIO Community.

Send in your inputs to sanjay@accentinfomedia.com 4

ENTERPRISE IT WORLD    APRIL 2021


CONTENTS

FOR THE CIOs. BY THE CIOs.

Publisher: Sanjib Mohapatra Chief Editor: Sanjay Mohapatra

V O L U M E 0 6   |   I S S U E 0 1   |   APRIL 2021  |   W W W . E N T E R P R I S E I T W O R L D . C O M

Managing Editor: Anisha Nayar Dhawan Sub Editor: Nidhi Shail Designer: Shadab Khan Web Designer: Vijay Bakshi, Sangeet Technical Writer: Manas Ranjan Lead Visualizer: DPR Choudhary MARKETING Marketing Manager: Vaishali Shukla SALES CONTACTS Delhi 6/102, Kaushalya Park, Hauz Khas New Delhi-110016 Phone: 91-11-41055458 E-mail: info@accentinfomedia.com EDITORIAL OFFICE

SECURITY

Delhi: 6/103, (GF) Kaushalya Park, New Delhi-110016,

16 4PROVIDERS KEY STEPS FOR HEALTHCARE TO COMBAT

Phone: 91-11-41657670 / 46151993 info@ accentinfomedia.com

RANSOMWARE SECURITY: /20 Why Is Risk Management a Crucial Aspect of Industry 4.0?

MORE INSIDE

NITIN SETH

“Maximizing Returns from Digital Technology Investments”

Phone: 91-11-46151993 / 41055458

Printed at Karan Printers, F-29/2, 1st floor, Okhla Industrial Area, Phase-2, New Delhi 110020, India. All rights reserved. No part of this publication can be reproduced without the prior written permission from the publisher. Subscription: Rs.200 (12 issues) All payments favouring: Accent Info Media Pvt. Ltd.

Editorial~ ~~~~~~~~~~~~~~~~~~~~~~~~~ 04 News~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 06

22 DIGITAL TRANSFORMATION

Printed, Published and Owned by Sanjib Mohapatra Place of Publication: 6/103, (GF) Kaushalya Park, Hauz Khas New Delhi-110016

26

24 CIO TALK

BOHITESH MISRA

“How Data Poisoning Attacks Can Corrupt Machine Learning Models”

28

CASE STUDY

UC

“Jigme Dorji Wangchuck National Referral Hospital (JDWNRH) ”

PRAMOD SHARDA

“IceWarp Witnesses an unprecedented demand for its Business Email and Collaboration Solutions”

APRIL 2021    ENTERPRISE IT WORLD

5


ITWORLD

ROUND UP

CenturyPly Introduces Innovative Solution Firewall Technology B Y S A N J AY @ A C C E N T I N FO M E D I A . C O M

CenturyPly has announced yet another innovative solution in its Architect ply and Club Prime range of ply – launch of Firewall technology to ensure that its customers get critical time to act and be safe in case of fire. Firewall Technology is the outcome of arduous and indigenous research work done by the organization. The organization has decided to offer this benefit currently to its customers at no additional cost. Firewall technology involves use of nano-engineered particles, which are embedded in the polymer matrix of plywood, giving it best-in-class firefighting properties. Ordinary plywood once ignited rapidly gets destroyed, it acts as a medium to spread fire within minutes. It also generates a lot of smoke. The rapidly spreading fire ignites and destroys everything in its 6

ENTERPRISE IT WORLD  APRIL 2021

way, the smoke hinders rescue operations and may suffocate people to death. Before one can realise and act, the raging fire causes irreparable losses like loss of life, trauma, injuries, mental disorders, emotional and financial instability and loss of precious belongings. CenturyPly now enriched with Firewall technology is certified as the best in class by Indian Standards (IS 5509), American Society for Testing Material (ASTM E84) and British Standard. (BS476 Part 7) when measured against critical parameters like flammability, spreadability, penetration, smoke developed index. Century Ply with Firewall Technology is best prepared to fight against self-disintegration due to fire and to contain the spread of fire and smoke generation.

D ATA BRIEFING

72% of Data & Analytics Leaders Are Leading or Heavily Involved in Digital Transformation Initiatives



ITWORLD  //  NEWS BRIEF

Asia/Pacific 2021 ICT Spending to Grow by 4.9%: IDC Reports

The pandemic has been a driving factor in accelerating the rate of digital adoption and stirring up the consumer offerings – both of which has helped ICT Spending to show a positive outlook in 2021. According to the latest release of Worldwide ICT Spending Guide Industry and Company Size, IDC forecasts Asia/Pacific* ICT Spending to grow by over 4.9%, to reach $924 billion in 2021 and expected to reach $1 trillion by 2024. The lifting of lockdowns across the region has helped increase consumer demand. As vaccines begin to be rolled out in the first half for some countries, and the rest by the second half of the year, revival of economic activities takes center stage. Faster adoption within business towards an accelerated digital journey clubbed with improvements in offerings are helping to boost technology spending. Furthermore, Supply chains are gradually improving across all countries within the region allowing a boost

CIO

in production and supply to the global market. “Government bodies within the region have launched various initiatives to revive the economy, indirectly allowing enterprises to allocate budgets to improve both product offerings and digital adoption,” says Mario Allen Clement, Senior Market Analyst for IDC IT Spending Guides, Customer Insights & Analysis.

Cloudera Collaborates with NVIDIA to Accelerate Data Analytics and AI in the Cloud

Cloudera Data Platform (CDP) will integrate the RAPIDS Accelerator for Apache Spark 3.0. on NVIDIA computing platforms, the software enables enterprises to accelerate data pipelines and push the performance boundaries of data and machine learning (ML) workflows to drive faster AI adoption and deliver better business outcomes, without changing any code. With the release earlier this year of Applied ML Prototypes (AMPs) in CDP and the power of NVIDIA computing, customers like the IRS and Office for National Statistics UK can not only jumpstart fully packaged ML use cases, but also accelerate data processing and model training at a lower cost across any on-premises, public cloud, or hybrid cloud deployment. Enterprise data engineers are utilizing data sets on a magnitude and scale never seen before, such as transforming supply chain models, responding to increased levels of fraud, or developing new product lines. For data scientists, the bottlenecks created by massive amounts of data directly impact the cost and speed at which companies can train and operate models across the organization.

EVENTS

13 MAY 2021

17 MAY 2021

20 MAY 2021

21 MAY 2021

11-12 OCT 2021

12:00 PM ET Drive More Successful Customer Support Experiences in 2021 and Beyond

4:00 PM to 5:00 PM Bounce back with Technology Advantage

2:30 PM IST 11:00 AM CEST Turbocharge your Netflow for Ransomware Detection

4:00 PM to 5:00 PM Bounce back with Technology Advantage

4:00 PM to 5:00 PM Open Networking & Edge Summit + Kubernetes on Edge Day 2021 LOS ANGELES, CALIFORNIA

8

ENTERPRISE IT WORLD  APRIL 2021


NEWS BRIEF   //  IT WORLD

Microsoft Acquires Nuance

S/HE SAID IT

DARÍO GIL

SVP AND DIRECTOR OF IBM RESEARCH

“The IBM innovation reflected in this new 2 nm chip is essential to the entire semiconductor and IT industry.”

Acquisition will combine solutions and expertise to deliver new cloud and AI capabilities across healthcare and other industries Microsoft Corp and Nuance Communications have entered into a definitive agreement under which Microsoft will acquire Nuance for $56.00 per share, implying a 23% premium to the closing price of Nuance on Friday, April 9, in an all-cash transaction valued at $19.7 billion, inclusive of Nuance’s net debt. Nuance is a trusted cloud and AI software leader representing decades of accumulated healthcare and enterprise AI experience. Mark Benjamin will remain CEO of Nuance, reporting to Scott Guthrie, executive vice president of Cloud & AI at Microsoft. The transaction is intended to close this calendar year. Microsoft has accelerated its efforts to provide industry-specific cloud offerings to support customers and partners as they respond to disruption and new opportunities. These efforts include the Microsoft Cloud for Healthcare, introduced in 2020, which aims to address the comprehensive needs of the rapidly transforming and growing healthcare industry. Today’s acquisition announcement

QUICK BYTE ON

represents the latest step in Microsoft’s industry-specific cloud strategy. Nuance is a pioneer and a leading provider of conversational AI and cloud-based ambient clinical intelligence for healthcare providers. Nuance’s products include the Dragon Ambient eXperience, Dragon Medical One and PowerScribe One for radiology reporting, all leading clinical speech recognition SaaS offerings built on Microsoft Azure. Nuance’s solutions work seamlessly with core healthcare systems, including longstanding relationships with Electronic Health Records (EHRs), to alleviate the burden of clinical documentation and empower providers to deliver better patient experiences. Nuance solutions are currently used by more than 55% of physicians and 75% of radiologists in the U.S., and used in 77% of U.S. hospitals. Nuance’s Healthcare Cloud revenue experienced 37% year-over-year growth in Nuance’s fiscal year 2020 (ended September 2020). Microsoft’s acquisition of Nuance builds upon the successful existing partnership between the companies that was announced in 2019.

“Among continued web-based attacks, website visitors are looking for signs of trust that the site they are visiting is legitimate and secure.” J I N D R I C H Z E C H M E I S T E R , D I R E CTO R O F I T S E C U R I T Y , Z O N E R S O F T WA R E , A . S

SECURITY

TSCAB Chooses Aruba’s SD-Branch Solution for Seamless Business Connectivity and Services “Telangana State Co-Operative Apex Bank (TSCAB), a state cooperative bank committed to rural and agriculture development across Telengana state, is implementing Aruba’s SoftwareDefined Branch (SD-Branch) solution to enable seamless core banking applications access. This enables centralised branch management, monitoring and troubleshooting of gateways and network switches across its 413 branch offices and data centres. The entire solution will be monitored, managed, and orchestrated using Aruba Central, a cloud-native service designed to unify the management of campus, branch, remote and data centre networks. APRIL 2021   ENTERPRISE IT WORLD

9


ITWORLD  //  NEWS BRIEF

OpenText Launches OpenText World Europe and Asia Pacific

Extreme IX Partners with CtrlS Establishes Internet eXchange Point at CtrlS data center in Mumbai Extreme IX, India’s leading Internet Exchange Point recently collaborated with CtrlS Datacenters to start its POP in CtrlS facility in Mahape, Navi Mumbai to provide consumers access to superior interconnection services. The launch of the Point of Presence (PoP) in Navi Mumbai is a part of the recently announced expansion plans to address the growing internet consumption while ensuring buffer and lag-free experience, making it a total of 12 PoPs in Extreme IX – Mumbai. The strategic partnership with CtrlS will extend cutting-edge technology to the members of the network, thus making the interconnection seamless. Through these points of access, the

EXECUTIVE

company in collaboration with CtrlS is consistently working towards extending its mission to help the internet service provider ecosystem by boosting local traffic exchange. Commenting on the announcement of the new locations, Raunak Maheshwari, Executive Director, Extreme group shared, “Extreme IX since the beginning of its operations in India is working towards establishing a well organised data transfer ecosystem. We are elated to announce our partnership with CtrlS. Our strategic and long-lasting collaboration to extend services across the country will help bring internet-enabled content closer to the end-consumers while encouraging more companies to adopt our services.”

OpenText announced the dates for OpenText World Europe (April 14-15) and OpenText World Asia Pacific (May 20-21). These will be two of the largest events OpenText has ever held, using an interactive virtual format to connect directly with customers across Europe and the Asia Pacific region. Each two-day event will bring together OpenText leadership and experts, guest speakers, strategic partners and industry professionals to discuss market trends, explore the opportunities within the European and Asian markets, and show customers how they can grow faster with OpenText. “Businesses of all sizes are looking to grow, increase efficiency, and improve sustainability,” said Mark J. Barrenechea, OpenText CEO & CTO. “At OpenText World we will be launching our Grow with OpenText program, which will bring together everything organizations need to transform their business and accelerate growth. No matter their point of departure, OpenText can guide customers on a successful journey to the Ultimate Cloud™.” A highlight of both events will be Cloud Editions, OpenText’s native cloud platform, featuring the next generation content services platform as well as significant updates across all five OpenText Clouds. Cloud Editions will support customers as they enable modern work, connect global supply chains, create modern customer experiences, strengthen cyber resilience and accelerate development.

MOVEMENT

InMobi Appoints Krista Thomas Senior Vice President and Global Head of Marketing for InMobi Marketing Cloud

ColorTokens has appointed Vats Srivatsan as its President and Chief Operating Office

Pradeep Chankarachan Joins Micron to Head Global Enterprise Application Team

Manish Kishor joins Andhra Pradesh MedTech Zone Limited as Head of IT

10 ENTERPRISE IT WORLD  APRIL 2021

Michael Fleshman Joins New Relic as CTO, India and Asia-Pacific

Jing Tian to Lead Software AG as the Vice President in Australia and New Zealand


NEWS BRIEF   //  IT WORLD

BOOK

SHELF

Boundary Boss: The Essential Guide to Talk True, Be Seen, and (Finally) Live Free

GLOBAL UPDATE

BY

TERRI COLE (AUTHOR)

Auth0 Launches Organizations to Manage Business Customer Identity Auth0 launches Organizations, a purposebuilt feature enabling providers of B2B SaaS applications to seamlessly manage their business customers—a use case Auth0 defines as Business Customer Identity. Organizations is Auth0’s enhanced way for enterprise app teams to manage customers and partners in any multi-tenant, B2B, or SaaS application. With Organizations, B2B implementations are less complex, enabling faster speed-to-market and a better overall experience for business customers and partners. Business Customer Identity remains largely unaddressed by today’s Workforce Identity and Customer Identity Access Management (CIAM) solutions, forcing those who build and deliver B2B SaaS applications to cobble together features to address their unique use case. This requires significant customised configuration leading to high ongoing maintenance and configuration costs, slower time to market, and more difficult use case expansion and new app development. Business apps are not just used by individuals, but by teams and entire companies, all of which need easy and

secure onboarding, flexible membership provisioning, access control, and SSO setup. Convenience for B2B users is also increasingly in demand, prompting enterprises to provide similar seamless experiences to business partners as they do for consumers. Auth0 Organizations solves all of these issues and more, offering customisable identity management of any business customer or partner. Key benefits of Auth0 Organizations include: n Simple Business Customer Onboarding: Auth0’s APIs and SDKs can easily model entire business organisations, and rapidly-implemented admin dashboards manage SSO, Role-Based Access Control, and flexible user management workflows. n Custom-Branded Federations: The ability to customise the login experience with branded login and registration flows ensures that business customers feel at home. n Faster, Easier Deployment: Less complex implementations shorten time to market; and integrations are accelerated as new products are built or acquired.

PRICE

$16.33 (HARDCOVER) About The Book In Boundary Boss, psychotherapist Terri Cole reveals a specific set of skills that can help you stop abandoning yourself for the sake of others (without guilt or drama) and get empowered to consciously take control of every aspect of your emotional, spiritual, physical, personal, and professional life. Since becoming a Boundary Boss is a process, Cole also offers actionable strategies, scripts, and techniques that can be used in the moment, whenever you need them.

Key Feature: This book is for women who are exhausted from over-giving, overdoing, and even over-feeling. If you’re getting it all done but at the expense of yourself, give yourself the gift of Boundary Boss.

Parle Products Teams up with IBM to Drive Growth Through Hybrid Cloud

IBM is working with Parle Products Pvt Ltd (Parle) to help it more quickly and effectively bring its products to market by leveraging IBM Cloud. Parle will leverage IBM’s transformative hybrid cloud and AI capabilities, along with its leading security and industry expertise with IBM’s

business consulting and technology services. This will help Parle get its products, such as Parle-G, the world’s top-selling biscuit by volume — to market at the right time and in the right place. By embracing a hybrid cloud-based approach, Parle expects to innovate more quickly – finding new ways to get its products into the homes of consumers, even as the global pandemic creates challenges in the supply chain and mandates that some employees work remotely. Through streamlining operations and achieving greater scalability to meet changing demands, Parle expects to witness business growth in India and beyond.

Ajay Chauhan, Executive Director, Parle Products, said, “As the largest biscuit brand provider in India, our priority is meeting the growing demands of Indian consumers. By working with IBM to accelerate our journey to the cloud and strengthen our security posture, we will work to uncover new ways to reduce time-to-market and streamline operations – a significant milestone for us.”

APRIL 2021   ENTERPRISE IT WORLD

11


ITWORLD  //  NEWS BRIEF

Cynet Activates Competitive Replacement Program for Customers Migrating to Cynet 360 XDR Platform

Cynet, provider of the world’s first autonomous XDR platform, announced the Cynet Competitive Replacement Program. The initiative brings Cynet 360, the company’s autonomous XDR platform, to small and medium enterprises determined to upgrade from competitive solutions. Cynet’s first replacement offer focuses on Mcafee Total Protection. McAfee’s enterprise security software business was recently acquired by private equity firm Symphony Technology Group (STG). By offering an easy migration path and a subsequently greater feature set at a compelling price, organizations can advance without risk to Cynet 360. Under the terms of the program, customers are able to deploy and benefit from Cynet 360 autonomous XDR immediately and begin paying for the software only when the existing contract with McAfee ends. The program ensures customers that the software achieves desired outcomes before making a commitment, reducing risk while saving money.

Microsoft Announces Enterprise Solution for SME/ Bs in India Microsoft India has announced the general availability of Dynamics 365 Business Central, a comprehensive business management solution for small and medium-sized businesses. An all-in-one cloud solution, Dynamics 365 Business Central helps companies ensure business continuity by connecting sales, service, finance, and operations teams to help them transform faster and deliver better results. It brings the rich functionality and full flexibility of Microsoft Dynamics Navision, the company’s enterprise resource planning (ERP) app, to deploy in the cloud or on-premises. It can be accessed from any mobile device to conduct business on-the-go. Customized for India, the solution comes with inbuilt features that address local regulatory and market requirements for ease of business, including a tax engine comprising over 500+ pre-configured use cases and business scenarios for Goods and Services Tax (GST), Tax Deducted at Source (TDS), and Tax Collected at Source (TCS). The availability of the new solution was announced at Building a Resilient Future, a summit organized to discuss building resilience among India’s small and medium businesses (SMBs). Shri Nitin Gadkari, Minister for Road Transport & Highways and the Minister of Micro, Small and Medium Enterprises, Government of India, Rajiv Sodhi, Chief Operating Officer, Microsoft India, Rekha Talluri, Chief Financial Officer, Microsoft India, Harish Vellat, Country Head – Small, Medium & Corporate Business, Microsoft India, Praveen Mellacheruvu, Lead – Business Applications, Microsoft India, and Mike Morton, General Manager, D365 Business Central, Microsoft, were some of the key speakers during the summit.

Task Telecom International Chooses Telesmart. io [Telesmart.io]Telesmart.io, an expert in global number and messaging services, has been selected by Task Telecom International, a leading provider of international voice connectivity and SMS solutions, for its purpose-built DID inventory management solution. The modular and fully API-enabled platform automates the supply chain experience across number and messaging services. The Telesmart.io inventory management platform makes it simple to monetise the opportunity in serving resellers, customers and the burgeoning Communications 12 ENTERPRISE IT WORLD  APRIL 2021

Platform as a Service (CPaaS) and Unified Communications (UC) marketplace. With a full suite of APIs, Task Telecom International can easily add providers, customers and inventories to an all-in-one solution, or seamlessly integrate individual modules with existing business systems. By partnering with Telesmart.io, Task Telecom International gains an immediate on-demand revenue opportunity, along with full control, visibility, analytics, routing and switching capabilities.

DIGEST CISCO APPDYNAMICS EXPANDS GLOBAL SAAS OFFERING WITH FIVE NEW LOCATIONS Cisco AppDynamics, the industry leading Business Observability platform, has expanded its SaaS offering through five strategic new locations, enabling fast, secure and reliable access to the AppDynamics Business Observability platform. Built on Amazon Web Services (AWS), new locations in Cape Town (South Africa), Hong Kong (China), London (England), São Paulo (Brazil) and Singapore will provide regional customers and partners with access to full-stack observability solutions that are secure, scalable and adhere to their local data residency regulations, enabling companies to deliver a superior digital experience Recent research from Gartner indicates that almost 70 percent of organizations using cloud services today plan to increase their cloud spend in the wake of the disruption caused by COVID-19. DATA TRANSPORT AUTOMATION ACCELERATED BY STATELESS AND PACKETFABRIC Stateless and PacketFabric have come together to give data science teams more control over hybrid and multi-cloud data workflows. This joint solution provides point-and-click setup and configuration of the secure data transport needed to move data between data centers, application clouds, branch offices, edge data aggregation sites and more. “Building data transport today requires a complicated and time-consuming setup of network devices, connectivity, and cryptic transport configurations between many endpoints,” said Eric Keller, Stateless CTO. “At Stateless, we’re changing the paradigm for networking. Companies need routing, not routers. Data science teams shouldn’t have to understand the intricacies of BGP just to move data between clouds. Now, they can set up, configure, and change their entire multicloud connectivity infrastructure in minutes.” “Combining Stateless’ microservices approach to network functions with the security, performance, and reach of PacketFabric’s backbone—and automating everything—will give customers the speed and agility they need without sacrificing security, control and visibility of their networks.” said Dave Ward, PacketFabric CEO. “It’s the easy button for data scientists to get the most out of the network without the long lead times and costly implementations they’ve had in the past.”


NEWS BRIEF   //  IT WORLD

MANAGEMENT

MANTRA

The managerial remuneration has to be a fair multiple of the compensation of the lowest level employee. Narayana Murthy, Co-Founder, Infosys

Druva Secures $147 Million Investment to Extend Market Leadership

Druva raises investment of $147 million as the company rapidly scales in response to accelerated demand for its platform. The fundraise was led by Caisse de dépôt et placement du Québec (CDPQ), a global investment group, with a significant investment by Neuberger Berman, each of which manage more than $300 billion in net assets. The round, which raises the company’s valuation above $2 billion, also included participation from existing investors Viking Global Investors and Atreides Management. As organizations quickly move workloads to cloud environments, adopt SaaS solutions, and combat rising cyber threats, this new investment will fuel continued expansion of Druva Cloud Platform to meet today’s unprecedented needs, and extend the company’s industry leadership as it defines tomorrow’s data

protection. “Rising volumes of stored data, rapid adoption of cloud and deployment of SaaS applications, regulatory frameworks and cybersecurity concerns have accelerated the demand for data protection and management solutions for businesses,” said Alexandre Synnett, Executive Vice President and Chief Technology Officer, CDPQ. “The working-from-home dynamic experienced globally has further accentuated the need for cloud-based data protection solutions and we believe Druva is in an excellent position to seize opportunities and enhance its clients’ agility and data compliance.” With the ability to deliver faster time to value and help businesses manage, protect, and govern critical data during their digital transformation efforts, Druva Cloud Platform’s customer base has expanded substantially during 2020, while the adoption of multiple Druva Cloud Platform products has increased by 50 percent in the same time period. In the last year, the company’s data under management has grown by more than 40 percent as Druva supports industry leaders, disruptors, and pioneers including GameStop, Marriott, NASA, National Cancer Institute, Pfizer, and Regeneron Pharmaceuticals.

Bharti Airtel Brings Focus on Digital, India, International and Infrastructure

Bharti Airtel rejigs internal structure to sharpen the focus on exploring the digital opportunity in India while enabling it to unlock value. The new structure envisages Airtel Digital Limited folding into the listed entity, Bharti Airtel. This will now house all of the digital assets spanning Wynk Music, Airtel X stream, Airtel Thanks, Mitra Payments platform used by a million retailers, Airtel Ads, Airtel IQ, Airtel Secure, Airtel Cloud and all future digital products and services. The digital ambition of Bharti Airtel Limited is closely intertwined with the spine that connectivity provides across the country. It is therefore intended to house all the telecom businesses in a newly created entity, Airtel Limited – a wholly owned subsidiary of Bharti Airtel Limited. Bharti Telemedia, the 100% arm operating DTH services will sit alongside Airtel Limited for now. It is intended to eventually fold the DTH business into Airtel Limited to move towards the NDCP vision of converged services to customers.

Happiest Minds and Beatroute Partner to Offer Revenue Realization Solutions for CPG Industry Happiest Minds Technologies Limited and BeatRoute have entered into a strategic partnership to solve typical revenue realization problems faced presently by the CPG industry . The complex CPG eco-system is characterized by multiple channels and relationships including Modern Trade, General/Traditional Trade and other B2B channels that require a seamless, holistic solution to enable smart selling physically as well as digitally. This partnership empowers CPG enterprises with a goal-oriented Digital Transformation journey, by leveraging new age technologies such as

ML, Store Analytics, Sales Process Gamification, Bots and Social Channels to drive Sales Uplift and provide brands with a competitive advantage. “Happiest Minds offers a full stack of solutions for the CPG industry, focused on business outcomes that leverage principles of next-gen technologies for maximum impact. The current pandemic has scaled the need for automation and business driven technology implementation. This is where the Happiest Minds and Beatroute Partnership enters, by offering revenue realization solutions for the post pandemic CPG industry,” said Rajiv Shah, CEO, Digital Business Services,

Happiest Minds. “The CPG industry is adapting to the new normal in the post pandemic world, characterized by the highly connected shopper, endless choices at Retail and a reset of brand loyalty. The partnership with Beatroute complements Happiest Minds’ suite of CPG offerings and will provide brands with next-gen digital solutions for increased market share and deeper collaboration with channel partners ” says Veena Sriram, Vice President and Head, Retail & CPG, Digital Business Services, Happiest Minds.

APRIL 2021   ENTERPRISE IT WORLD

13


ITWORLD  //  NEWS BRIEF

NeoSOFT Technologies Partners with Tonik for its first Neo Bank in the SEA region

NxtGen launches SpeedCloud India’s first Application Services Platform for the global markets. Set to liberate Public Cloud Service usage from proprietary technologies. NxtGen, a leading Cloud Technologies and Datacenter provider in India with existing Enterprise Cloud Services (ECS) operations has launched its public cloud computing platform SpeedCloud available for global markets. Backed by best-in-class technology components and powered by Intel, Canonical and Hewlett Packard Enterprise, SpeedCloud™ is NxtGen’s endeavour is to simplify and strengthen the adoption of opensource technologies in the country. The Indian cloud computing market is pegged at $2.2 billion, according to a recent NASSCOM study while adoption of public cloud services is expected to grow to $4.1 billion as per a forecast by Gartner Inc., a US-based research and advisory company. SpeedCloud™ is based on OpenStack and is uniquely equipped to

help users to adopt cloud services at value based price points, compared to existing industry options. Enterprises should save up to 82% compared to global service providers and also get superior performance. SpeedCloud accelerates enterprises, start-up and individual developer efforts to build differentiated applications take it to market in matter of weeks by leveraging comprehensive resources available on-demand. n Bare-metal servers for Gaming, High-performance Computing & low-latency database servers n High-performance virtual machines not just infrastructure as a service (IaaS), but also developer frameworks, SQL/NoSQL databases, n Managed Kubernetes as a Service and a new high-performance LXD containers from Canonical n Software as a Service – ready applications built by NxtGen’s in-house team and other ISVs are available.

NeoSOFT Technologies, one of India’s leading IT consulting and software solutions provider, is proud to be the exclusive technology partner of Tonik (Southeast Asia’s first digital bank) to launch their first innovative Neo Bank in the Philippines. This Neo bank is built on cloud-native, open API, multi-cloud strategy and delivered over true Agile/DevSecOps mode, is fully digital with no branch and will revolutionize the way money works in Southeast Asia Tonik entrusted NeoSOFT for its talent pool adroit in diverse technology areas to develop its pivotal Neo Bank mobile and web application. Working on the philosophy of trust, transparency, and accountability, NeoSOFT has driven value and innovation throughout the entire product development cycle. Certified engineers, top-notch skills, and adeptness on the latest tools and frameworks have been the pillars behind Tonik’s Neo Bank’s successful launch. “NeoSOFT is happy to see Tonik drive transformation in the spectrum of Neo Banks and be passionate about improving people’s financial lives through the use of technology in an era of absolute disruption triggered by new-age technologies like AI, ML, Edge Computing, Automation, etc. Since our inception in 1996, NeoSOFT has chronically emerged as “Digital Transformers”, helping enterprises reimagine their business for the digital age and build innovative software products,” says Nishant Rathi, CEO and Founder of NeoSOFT Technologies.

Accenture Acquires Core Compete Expands Capabilities and Talent in AI-powered Supply Chain, Cloud and Data Science Accenture has acquired Core Compete, a cloud analytics services firm headquartered in Durham, North Carolina, with additional offices in the UK and India. Core Compete enables digital transformations with cloud-native solutions that deliver artificial intelligence (AI) and machine learning-infused business outcomes, to serve a diverse client base across the US and UK, with particular focus on supply chain, retail and financial services. Terms of the transaction were not disclosed. 14 ENTERPRISE IT WORLD  APRIL 2021

Founded in 2012, Core Compete’s team of more than 260 professionals will join Accenture’s Applied Intelligence practice, strengthening how the company helps clients shape and execute their cloud-based data and AI strategies to drive more business value. Powered by a deeply skilled group of data science, data engineering and cloud engineering consultants, the majority of whom have skills across all major cloud providers, Core Compete is well-positioned to meet a significant need in the market. Accenture research shows that two-thirds of CxOs are planning to increase spending on AI

and over 60 percent will invest more in cloudbased technologies. “Over the past year we’ve seen cloud adoption increase, enabling organizations to unlock the enterprise value from data and AI strategy at speed,” said Sanjeev Vohra, global lead for Accenture Applied Intelligence. “Core Compete’s approach to cloud analytics transformation helps us further accelerate time to value for our clients, giving them the right tools, strategy and talent to reap the full benefits of being data-driven.”


BY SANJAY@ACCENTINFOMEDIA.COM

CLOUD COMPUTING

No more of those late overbudget never complete cloud data migration initiatives. No more of the stress and anxiety of quality uncertainty in the outcomes and missed performance target. No more worries about the technical debt you have been carrying for the past several years. Businesses face several challenges in their migration of data and analytics workloads to cloud native platforms viz, lack of knowledge about the inner workings of mission critical workloads, fragility due to complex customization of proprietary code, tedious effort and quality issues with manual conversion of complex workloads, lack of predictability leading to cost and time risks etc. xForm Solutions(www.xformsolutions.com) partners with you to ensure that your cloud data migration initiatives are successfully completed 5X faster and at least 50% cheaper, all the while reducing your technical debt and modernizing your data workloads with 100% guarantee on outcome accuracy. xForm Solutions, an enterprise based in Bangalore, offering best-in-class products and services globally in the data and analytics transformation domain, has announced the launch of their ETL migration pluginswithin their “xForm Accelerate” product and ETL assessment plugin within their “xForm Insights” product for Informatica. With this launch, xForm Solutions have brought to businesses a key capability in their cloud modernization journey.The Informatica ETL migration plugin accelerates the migration from Informatica ETL platform to cloud-agnostic but cloud native Spark based ETL platform implemented through multiple languages of customer’s choice namely, Python, Scala, Java and R.The Informatica ETL assessment plugin helps customers to not only prioritize their workloads for migration but also builds a knowledge repository reducing their technical debt. xForm offers unique value proposition to the data and cloud domain through their assessment and automation products built on the foundation of xForm’s proprietary language, grammar and the engine. This engine enables the highly configurable and fully automated plugins across multiple categories of products such as ETL, EDW and Reporting. This suite of plugins for the assessment of any legacy system and “Any=>Any” conversion from any legacy system to any new-age system drive the cost, speed and accuracy benefits as well. Most importantly, this automation engine continuously improves migration accuracy through cognitive learning of xForm grammar. In summary, their “xForm Insights” product addresses the lack of knowledge and visibility of the legacy systems and offers detailed insights about their inner workings, thus reducing the technical debt of the company, reducing the risk

ACCELERATE YOUR DATA MIGRATIONS TO CLOUD WITH XFORM SOLUTIONS of migration of fragile but mission critical systems and prioritize the systems for migration based on their complexity and potential for optimization. Next, their flagship “xForm Accelerate” product offers automation driven acceleration in the migration of the complex legacy workloads in “Lift & Shift” mode as well as “xForm-Modernize” mode. While both modes migrate all code types across EDW, ETL and reporting to a cloud native outcome, the “xForm-Modernize” mode enables further optimization for lifelong cost-savings in future usage. Both “xForm Insights” and “xForm

acceptance criteria you wish to apply. Of course, they offer technology transfer, training and documentation to your team and also a maintenance contract if you would like them to take care of the same. In addition, with their high-powered team of data architects and SMEs, xForm also offer data transformation consulting service “xForm Discovery” to businesses to help them define the cloud migration objectives, strategy, blueprint and roadmap. Beyond Informatica assessment and conversion, xForm Solutions team has aggressive targets

Cognitive Learning of xForm Grammar that drives continuous improvement in the Engine performance on accuracy of conversion Accelerate” are offered as SaaS products with a simple and intuitive no-code UI with subscription licensing model, but can also be deployed to a private cloud, if you choose so. While the SaaS products offer you flexibility of usage, if you have well defined requirements with a known project timeline and prefer a service model, xForm Solutions’ Transformation Implementation Service offering “xForm Build“, a managed service with Silver and Gold model, addresses that need. In this comprehensive managed service,xForm team will take full responsibility for ensuring 100% migration of your workloads or as per the

on their product roadmap comprising of plugins for source EDW systems such as Teradata and Netezza, other ETL format such as Data Stage as well as Snowflake for the target cloud platform, of course all of these addressing both the “Lift & Shift” as well as the “xForm-Modernize” models. The power of the xForm grammar and engine enables very quick and accurate development of these plugins and beyond.

To access the complete article log on to: https://www.enterpriseitworld.com/

APRIL 2021    ENTERPRISE IT WORLD

15


SECURITY   //  COMBAT RANSOMWARE

Globally, ransomware attacks have been one of the biggest threats to cybersecurity, particularly in the healthcare sector. In fact, in November 2020 the United States FBI, Department of Health and Human Services, and Cybersecurity and Infrastructure Security Agency issued strong warnings of an “increased and imminent” 16 ENTERPRISE IT WORLD    APRIL 2021

threat of ransomware attacks on hospitals and other healthcare providers. This announcement followed a previous attack on Universal Health Services (UHS), on one of the largest chains of healthcare facilities in the U.S., that knocked its systems offline. While patient care was still safely provided while UHS restored its computers, the

fact that adversaries even targeted UHS and then succeeded at the attack is eye opening. How did we get here? In one sense, this has been a long time coming. Hospitals and health systems are, quite unfortunately, ripe for ransomware and other cyberattacks. Some of the factors most responsible for the rise in healthcare-


COMBAT RANSOMWARE //  SECURITY

4 KEY STEPS FOR HEALTHCARE PROVIDERS TO COMBAT RANSOMWARE targeted cyberattacks are due to the nature of the industry itself, like decentralized operations across hospitals and healthcare providers, and exponentially growing volumes of patient health information being captured and stored electronically (i.e. electronic health records) by health systems. COVID-19 is also, in many ways, a culprit for these accelerating healthcare ransomware attacks. The sudden onset of the pandemic forced healthcare providers to very quickly set up emergency COVID-19 facilities, with little time to plan out robust IT security infrastructures to protect these facilities. On top of that, the practically overnight shift to telehealth and remote working meant scores of new security gaps were opened – and discovered by attackers – just as quickly. This trend has moved in tandem alongside another disturbing one: a growing sophistication among ransomware groups. Instead of large-scale, brute force attacks, ransomware attackers have rapidly shifted to more focused, strategically planned and executed strikes – resulting in more precise attacks that are harder to detect and defend against. This is no assembly line, mass-produced product; this stuff is the craft beer of malware. And it’s the reason why resurgent ransomware gangs like Ryuk, which has been credited with one-third of all ransomware attacks occurring in the past year, have had such devastating success by targeting healthcare providers. So how do they respond? Here are four key steps every healthcare provider needs to undertake to get ahead of their growing ransomware problem.

Identify your weak points. Ransomware attackers move alarmingly quickly. If a target opens a phishing email attachment, it only takes a little over three hours for the cybercriminals to begin performing recon across the target’s network; within a day, they’ll have accessed a domain controller and begun deployment of their ransomware package. So knowing where your vulnerabilities are is critical. Servers with Remote Desktop Protocol (RDP) enabled, unpatched web servers, and a lack of multifactor authentication for logins are all common and key weak points that attackers will exploit. IT hygiene + companywide awareness and education. The obvious next step once you’ve identified your weak points is to patch them. Don’t have two-factor authentication? Implement it. Security definitions out of date? Update them. RDP servers are enabled? Shut them down or put them behind a VPN. This is as much an awareness issue as an IT one. Anyone in the organization that sends an email, has a password, or uses a device to log onto a network needs to know and practice basic IT hygiene, including creating stronger passwords and knowing how to spot spear-phishing emails. If they don’t know what that means, they need to be taught. The security of a hospital’s network is only as strong as its weakest password. Implement EDR with human-led threat hunting. Endpoint detection and response (EDR) shores up security defenses for every device linked to a

ABOUT DAN SCHIAPPA DAN SCHIAPPA IS CHIEF PRODUCT OFFICER AT NEXT-GENERATION CYBERSECURITY LEADER SOPHOS. HE’S A TRANSFORMATIONAL AND STRATEGIC LEADER WHO ORCHESTRATES THE COMPANY’S TECHNICAL STRATEGY, PLAYING AN INSTRUMENTAL ROLE IN ARCHITECTING TECHNOLOGIES; OVERSEEING PRODUCT MANAGEMENT AND RESEARCH AND DEVELOPMENT; AND ENSURING PRODUCT QUALITY. WITH A PASSION FOR EDUCATION AND INSPIRING THE NEXT GENERATION OF CYBER TALENT, DAN ALSO SERVES AS CHAIR OF THE UNIVERSITY OF CENTRAL FLORIDA’S DEAN’S ADVISORY BOARD, WHERE HE OVERSEES VARIOUS ASPECTS OF THE SCHOOL’S ELITE CYBERSECURITY PROGRAM.

network, while also providing crucial information on potential threats to response teams who track down and neutralize these issues. This goes hand-in-hand with the human touch of a threat hunting team, whose expertise at recognizing red flags and attack patterns, and parsing the context of impending threats, empowers organizations to proactively go after the problem – ejecting ransomware packages from networks and neutralizing threats at their root cause – rather than sitting in a reactive position. Deploy lightning-fast incident response. Ransomware moves fast, so healthcare providers need to be able to move faster. Sophos Rapid Response does exactly that: a first-of-its-kind offering that accelerates hospitals’ and health systems’ ability to identify, neutralize, and expel cybercriminals from their networks. The speed of your response is critical; it’s the difference between an executed or thwarted ransomware deployment – and potentially, life or death for patients. Sophos Rapid Response provides the lightning-fast edge that healthcare providers need to stay a step ahead of ransomware gangs, minimizing the damage done to their networks, recouping otherwise lost costs, reducing recovery time, and ultimately helping to preserve the speed and quality of patient care – even potentially saving lives. With ransomware, the clock is always ticking and every second counts. It’s not an unbeatable threat, but being able to tackle the ransomware problem means hospitals and health systems can’t waste any time on deploying a combination of robust security defenses and proactive, rapid response measures. APRIL 2021    ENTERPRISE IT WORLD

17


SECURITY   //  WORLD PASSWORD DAY

RICK MCELROY, PRINCIPAL CYBERSECURITY STRATEGIST, VMWARE SECURITY BUSINESS UNIT

“Using a password is as antiquated as using a standard key on your front door — it’s locked but someone

can copy the key or pick the lock and still get access. For this reason, it’s important to prioritize multi-factor authentication, in the form of behavioral and continual authentication, and move away from a central store of identities, which can easily be hacked. Moving forward, we’ll begin to witness hand and fingerprint biomarkers, two-factor authentication with a mobile device and facial recognition replace traditional password authentication processes. At some point in the future, DNA will probably be used to verify identity in the medical field. Long term, I could see a future where a combination of measurements like a heartbeat and brain waves could be used, making it more difficult than ever for cybercriminals to break the digital lock.”

As you know passwords is to prevent identity theft and other cybercrimes. Therefore there is a need of strong password to be created by every person whether it is B2B or B2C customers. bout 80% of data breaches in 2019 were caused by pass18 ENTERPRISE IT WORLD    APRIL 2021

GENESIS OF WORLD PASSWORD DAY CELEBRATION word compromise Password breach. Often people are seen reusing password and using password for many of the accounts, which results in breach of password by the perpetrators easily. Therefore there is a requirement of awareness from all the stake holders how to create a strong and complex password and how to change the password construct regularly. Keeping this in mind the global chipset maker According to the Asia Pacific consumers surveyed, when using a new website or online service, the main frustrations are creating a password that has to meet certain requirements (53%), entering private information such as a passport number, tax file number, medical card number, etc. (52%) and having to fill in long login or sign up forms (50%). In fact, consumers across APAC find password management more frustrating than their European counterparts. Only 44% of consumers surveyed in Europe find creating a password that must meet certain requirements frustrating, and 42% are frustrated by having to enter private information. This frustration leads to 89% of APAC consum-

ers reusing passwords for more than one account – and more than half (51%) admitted to doing so frequently. And it’s not just in Asia Pacific. Across the world, password reuse is still alive and well, with nearly nine in ten consumers (88%) admitting to the practice. Keeping all the consideration in mind, way back in 2013, Intel had created World Password Day on the first Thursday of May (May 6) and the first World Password Day! was celebrated in 2013. Following is the recommendation from Richard for Businesses “For businesses, this is an opportunity to listen to their customers and make changes to the login process. Technologies exist to stop users from getting frustrated, while protecting them against fraud. “Passwordless and biometric security are already mainstays of multifactor authentication, and adaptive technologies are already on the market that can offer that security without the friction. “We need to see technology adapt to humans, not the other way around. Passwords will inevitably make way for alternatives that are driven by the adoption of the WebAuthn


WORLD PASSWORD DAY //  SECURITY

JACQUELINE JAYNE,

RICHARD MARR,

DR. CATARINA KATZER,

SECURITY AWARENESS ADVOCATE, KNOWBE4 APAC

GENERAL MANAGER, APAC AT AUTH0 MAINTAINED

LEADING CYBER PSYCHOLOGIST

“The average person “Consumers are has anywhere frustrated with the between 70 and 100 standard password passwords, and it is simply not and username method of possible to remember them all. Especially when you consider that passwords need to be unique, complex, and depending on where you read it anywhere between 8 and 20 characters. When it comes to password hygiene we still have a long way to go.”

standard, but businesses need to prepare for that transition now.” Following is the recommendation from Richard for Consumers “These findings show that for many of us, the password hygiene message simply hasn’t yet sunk in deeper than the frustrations we feel. This means our personal data, often across multiple platforms and accounts, could be at risk. World Password Day is the perfect reminder for all of us to take stock of our apps and online accounts, and carve out a bit of time today to download a password manager across our devices and develop strong, unique passwords.” Following are some tips from Jacqueline that one can do to keep the passwords secure, strong and safe: l Keep your passwords private – never share a password with anyone else. l Never ever reuse a password (ever). l Invest in a Password Manager Tool .

authentication. As humans, we aren’t suited to remembering long, complex alphanumeric combinations, and need easier, faster and more secure forms of authentication, and it’s partly because of this that we’re seeing a rise in successful cybercrime. It’s time we consider the role of businesses in promoting a safer internet by offering more secure and convenient alternatives to passwords.”

Use multi-factor authentication (MFA) l when you can and where it makes sense. l Use passwords of at least eight (8) characters or more (longer is better). l Use a combination of uppercase letters, lower case letters, numbers, and special characters (for example: !, @, &, %, +) in all passwords. l On the web, if you think your password may have been compromised, change it at once and then check your other website accounts for misuse. l

And if one is looking to create a create a strong, complex password, here’s a way to develop a strong password that’s very hard to crack: l Think of a phrase or sentence with at least eight words. It should be something easy for you

“The majority of online users are now well aware that there are security problems with using the

same username and password combination to register for multiple services. But we try to suppress that psychologically in the brain. The more extensive a registration process appears, the less inclined we are to go through with it. Convenience and simplicity play a major role here, which means we need to rethink security [in a way that doesn’t compromise the customer experience].”

to remember but hard for someone who knows you to guess. It could be a line from a favourite poem, story, movie, song lyric, or quotation you like. Example: “I Want To Put A Dent In The Universe” l Remove all but the first letter of each word in your phrase: IWTPADITU l Replace several of the upper-case letters with lowercase ones, at random: iWtpADitU l Now substitute a number for at least one of the letters. (Here, we’ve changed the capital “I” to the numeral 1: iWtpAD1tU l Finally, use special characters ( $, &, +, !, @) to replace a letter or two — preferably a letter that is repeated in the phrase. You can also add an extra character to the mix. (Here, we’ve replaced the “t” with “+”, and added an exclamation point at the end.) : iW+pAD1tU! . APRIL 2021    ENTERPRISE IT WORLD

19


SECURITY   //  INDUSTRY 4.0

Risk management, as a whole, is about regularly analyzing, identifying, and reacting to potential risk factors throughout the life of an operation. It’s ultimately about proactive management and solutions. Want to guess how you can drive proactive and preemptive systems? If your answer is through the deployment of 20 ENTERPRISE IT WORLD    APRIL 2021

smart and connected technologies — like the kind established under Industry 4.0 — then you’re already one step ahead. What Does This Have to Do with Industry 4.0? Industry 4.0 is a digital revolution for the

manufacturing and commercial industries. It calls for the use of smart technologies, including IoT sensors, to generate contextual data to inform and drive future action. But it’s how that data is used that defines this new generation of operations. The contextual data doesn’t just enable proactive responses. It also empowers automation


INDUSTRY 4.0 //  SECURITY

WHY IS RISK MANAGEMENT A CRUCIAL ASPECT OF INDUSTRY 4.0? and efficiency to boost output, reduce operating costs, and improve the entire supply chain. By its very nature, it deals with the concept of risk management. In other words, when manufacturers and commercial entities adopt Industry 4.0 technologies and solutions, they are by extension also adopting more complex yet effective risk management solutions. However, let’s make it clear that just because you are taking on something like that, it doesn’t necessarily mean you’re going to put it to good use. Why Risk Management Is Crucial to Industry 4.0 A massive influx of smarter and more actionable data doesn’t mean much if you’re not leveraging the insights it provides. If it’s all just flowing constantly into the machine, driving automation and reactive systems — with little to no oversight — risks are increased exponentially. A paper on emerging risk management in Industry 4.0 explains it best: “Industry 4.0 enables real-time planning of production plans as well as dynamic self-optimization. The productive model based on Industry 4.0, in addition to improving processes in terms of efficiency and quality, can help improve safety as well as sustainability and the industry image.” “However, industrial processes configured for advanced manufacturing processes and technologies can increase levels of complexity of production processes and introduce high dynamism into processes, creating the so-called smart working environments.” What’s more, the data being collected, processed, analyzed, and leveraged can contain highly sensitive details about an operation, including trade secrets. While that data may be

necessary to keep the operation going, it can also bring down an entire organization if it falls into the wrong hands. This introduces a whole new layer to risk management requirements. Applying the Data to Risk Management The Industrial Internet of Things (IIoT) and similar technologies are becoming more prevalent in the manufacturing and commercial industries, and it’s for the better. They are helping to transform legacy operations through the kind of contextual data we’ve already discussed. They also pose many new challenges and present new opportunities for failure all across the supply chain, not just within manufacturing facilities and plants. This is a huge problem, and it’s going to get worse before it gets better. Fortunately, there are programs in place to help organize and improve risk management strategies, even with the rollout of Industry 4.0. ISO 27001, for instance, proposes an information security management standard for effectively managing related risks and appropriately dealing with cyber-threats. As more data is generated and handled, it’s only natural that new vulnerabilities will appear, as well as many potential vectors of attack. Organizations will have to address these challenges and come up with new ways to protect their operations, digital assets, and sensitive information. But it’s not all about the security of the data. Beyond cyber risks, it’s also essential that the available information is being properly utilized. Industrial analytics can enable systems like self-diagnosis for manufacturing gear, identify efficiency bottlenecks, improve supply chain communication collaboration, and so much more. It shows just how critical Industry 4.0,

EMILY NEWTON, TECH AND INDUSTRIAL JOURNALIST, AND EDITOR-IN-CHIEF, REVOLUTIONIZED.

and its related technologies are to the future of manufacturing and the industrial world. Some of these data points, such as equipment self-diagnosis, lower risks merely by empowering new opportunities. If you know the performance of a machine and can compare those statistics with historical data, you can accurately identify when equipment might fail, malfunction, or die completely. This significantly lowers risk by allowing for proactive solutions, which is the key to risk management. In that scenario, maintenance crews can repair or service the equipment in advance to prevent downtime. Or, if you know the hardware is going to fail altogether, you can order and have a replacement at the ready. This brings up an important distinction, and it’s that Industry 4.0 data is flowing, processed, and available in real-time. Because these solutions are always-on and constantly reporting information, manufacturers can react at unprecedented speeds. Again, this contributes to a more proactive approach, as opposed to reactive, which is crucial to successful risk management programs. Industry 4.0 Tricks of the Trade: A New Normal While many have hailed Industry 4.0 as a revolution, and rightly so, it’s not all that different from previous operational generations. The most significant difference is that you’re taking the digital insights and applying them to future actions and events. Most importantly, it’s about doing that as an automated and smarter process to boost efficiency, output, and reliability. Initially, that lowers risk by eliminating some of the operational challenges you might see without Industry 4.0 in place. At the same time, it also increases risk in other areas, namely in IT and cybersecurity. That makes it clear that Industry 4.0, as beneficial as it may be, still comes with a unique set of challenges and complications, which we all must acknowledge and react to. We must prepare, plan, and react to ensure risks new and old are accounted for. What is that, if not the general foundation for risk management? APRIL 2021    ENTERPRISE IT WORLD

21


DIGITAL TRANSFORMATION  //  DIGITAL TECHNOLOGY INVESTMENTS

Why is there such a gap between potential and impact, and how can companies narrow that gap? The biggest problem is that most businesses today are playing catch-up when it comes to digital transformation. Instead, companies should learn from the digital natives and play offence rather than defence. Full digital adopters are able to extract meaningful impact from their investments, such as a 25 per cent increase in productivity, twice improved customer retention rates and two to three times faster growth than their peers.

Nitin Seth, CEO, Incedo Inc. Nitin Seth is CEO of Incedo Inc., a technology services firm focused on Digital Transformation and bestselling author of “Winning in the Digital Age: Seven Building Block of Successful Digital Transformation”. Prior to Incedo, he was COO of Flipkart; Managing Director and Country Head of Fidelity International India; and Director of McKinsey’s Global Knowledge Centre in India. He graduated in engineering from IIT Delhi and received his MBA from IIM Lucknow. For more information on successful Digital Transformation and to reach the author go to www. WinningInTheDigitalAge.com

BY SANJAY@ACCENTINFOMEDIA.COM

MAXIMIZING RETURNS FROM DIGITAL TECHNOLOGY INVESTMENTS

D

igital transformation is one of the biggest trends of our generation, and enormous resources are being poured into it annually. However, when we look below the surface, we see that 70 per cent of digital initiatives fail, according to Harvard Business Review.1 Many firms see suboptimal ROI on their digital investments as the technology budget keeps increasing but results are not visible. Overall, the rate of full digital adoption is fairly low. Based on my experience across key industries, the rate of full adoption has been only 5-10 per cent (though digital adoption has got a sharp

22 ENTERPRISE IT WORLD    APRIL 2021

boost over year 2020 because of the Covid-19 pandemic). For example, according to Celent (via The Financial Brand), only 11 per cent of banking institutions are executing an omni-channel strategy,2 while 50 per cent of banks are still only researching omni-channel capability. Personalization, in many cases, is also extremely limited. While Red Point Global found that 63 per cent of customers today expect personalization,3 BCG found that only 15 per cent of enterprises are true personalization leaders.4 The rate of real- time data leverage is extremely low, with only 1 per cent of all data collected ever analysed and used,5 and only 16 per cent of brands are very effective at delivering real-time interactions6

Why problems persist for companies embarking on digital transformation When it comes to digital transformation, frequently large enterprises struggle finding the root of their problems. In my experience of working with large legacy enterprises, I have seen four common root causes: • Data infrastructure incapable of handling big data: The existing data infrastructure has limitations when it comes to leveraging unstructured data to drive insights. Originally created to deal with structured data, this infrastructure wasn’t prepared for the explosion of big data. The pieces are hard to change once defined since the addition of new data dimensions requires expensive design and reprocessing effort. Moreover, legacy data infrastructure makes it very hard to get to a deeper level of granularity of insights. For example, when have you last seen a bank as precise at personalization as Amazon?. • IT processes do not support experimentation and agile methods: Traditional IT deployment cycles, as they are currently set up in many legacy enterprises, are not designed to support and drive the ‘test, learn, adapt’ paradigm of modern analytics. These processes should be based on experimentation. If something has to fail, it has to fail fast. You try something, measure the results, fail, change things, try again. Instead, in a legacy enterprise, you have to first spend a lot of time doing the analysis and making sure you get it right the first time, because if you fail it may be fatal. • Back-end systems cannot handle realtime transactions: In most legacy enterprises, these systems end up being a bottleneck. They simply aren’t designed to handle probabilistic choice-based workflows to enable real-time responsiveness to customer signals. Have you tried opening a bank account online? It’s not possible, precisely because in most banks the back-end systems are not able to support this service or deliver real-time customer services online. As a result, businesses are unable to realize


DIGITAL TECHNOLOGY INVESTMENTS   //  DIGITAL TRANSFORMATION

the true potential of tightly coupled systems and automation for real-time customer services and end-to-end transformation. • Legacy business processes are too slow given changing expectations in the digital age: The basic ‘mindset’ of these processes is all about control, risk management and being comprehensive. These processes were designed to get things right the first time without fail. As a result, businesses have built very complex processes to avoid failure. But, as with anything very complex, it is hard for it to be fast in real-time. The legacy mindset of the ‘right-the-first-time’ process design makes it difficult to drive iterative experimentation-based improvements. In other words, even if the technology works, business processes end up slowing things down. Changing the Game To achieve lasting change, I believe legacy companies need to stop playing defence and start playing offence. They should take lessons from the digital native companies that have leapfrogged them by reimagining these dimensions. The main point is that digital initiatives themselves should be leading strategy and not the other way around. This will allow businesses to drive speed to market, unlock ROI and – most importantly – change the game from one of

defence to offence. Here are some specific and actionable best practices from digital natives that can help legacy enterprises significantly increase ROI from their digital technology investments. A. Cloud-native architecture This architecture is an essential piece of the puzzle, and luckily for us, it is already here. In recent years, cloud strategy has moved from enabling compute resources to providing an integrated platform as a service (PaaS). Gartner says that by 2022, 75 percent of all databases will be deployed or will have migrated to a cloud platform. When fully realized, cloud standardizes technical skill sets, creating talent acquisition leverage and enabling improved development process, further accelerating time to market. Leveraging AWS, Azure and GCP (Google Cloud) provides the best-of-breed infrastructure, with the added advantage that these cloud providers continue to evolve and innovate at a rapid pace. That means enterprises can configure highly scalable end-toend solutions quickly. So, what businesses need to do is to develop comprehensive cloud application and data migration strategies. B. Agile and adaptive by design

Modern infrastructures must be highly adaptive, agile and measured. Continuous adaptation and experimentation must be built into the strategy. The good news is that cloud architecture allows new development models for maintaining continuity while integrating change. Agile architectures compose and avoid system/team monoliths, while adaptive portfolio management process is critical to success. Experimentation and measurement drive impact-based prioritization. In other words, an agile mindset must be embraced by the organization to yield benefits. Outcomes must be continually measured and evaluated in order to keep up with changing business conditions. C. Two-speed approach What is the best and most effective, practical way for legacy enterprises to tackle digital initiatives? Despite my recommendation that they play offence and not defence, going all-out or adopting a ‘big bang approach’ might not be the right strategy in most cases. This is because of the iterative nature of digital; you need to allow time for experimentation, learning and course correction. On the other hand, focusing on narrow use cases would amount to playing catch-up and thus would have little to no impact. So, it is critical to develop your ‘offence’ approach thoughtfully.

APRIL 2021   ENTERPRISE IT WORLD 23


CIO TALK // POISONING ATTACKS

ABOUT THE AUTHOR BOHITESH MISRA, PMP IS A DATA SCIENCE ENTHUSIAT AND A TECHNOLOGY EVANGELIST WITH MORE THAN 25 YEARS OF IT INDUSTRY EXPERIENCE RANGING FROM DEVELOPMENT AND MANAGING ENTERPRISE AND MISSION CRITICAL APPLICATIONS IN MANUFACTURING, TRAVEL, SOLAR, FINTECH, EDUTECH ETC. HE CAN BE REACHED AT BOHITESH.MISRA@GMAIL.COM AND CONNECTED THROUGH WWW.LINKEDIN.COM/IN/BOHITESH

BY SANJAY@ACCENTINFOMEDIA.COM

D

ata poisoning can render machine learning models inaccurate, possibly resulting in poor decisions based on faulty outputs. With no easy fixes available, security professionals must focus on prevention and detection. Machine learning adoption have exploded recently, driven in part by the rise of cloud computing, which has made high performance computing, network and storage more accessible to all businesses. As data scientists and product companies integrate machine learning into various products across industries, and users rely on the output of its algorithms in their decision making, security experts warn of adversarial attacks designed to abuse the technology. Most social networking platforms, online video 24 ENTERPRISE IT WORLD    APRIL 2021

platforms, large e-Commerce sites, search engines and other services have some sort of recommendation engine system based on machine learning algorithms. The movies and shows that people like on Netflix, the content that people like or share on Facebook, the hashtags and likes on Twitter, the products consumers buy or view on Amazon, the queries users type in Google Search are all fed back into these sites’ machine learning models to make better and more accurate recommendations.Various attack methods, including fooling a model into incorrectly classifying an input, obtaining information about the data that was used to train a model. Recommendation algorithms and other similar systems can be easily hijacked and manipulated by performing actions that pollute the input to the next model update. For instance, if you want

to attack an online shopping site to recommend product B to a shopper who viewed or purchased product A, all you have to do is view A and then B multiple times or add both A and B to a wish list or shopping basket. If you want a hashtag to trend on a social network, simply post and/or retweet that hashtag a great deal. If you want that new fake political account to get noticed, simply have a bunch of other fake accounts follow it and continually engage with its content. The user refers to retweeting the content continuously. This could mean the user in question controls many Twitter accounts. However, Twitter allows users to retweet, undo, and then retweet again. Re-retweeting serves to “bump” the content over and over again. Some Twitter accounts even use this tactic on their own content to fish for more visibility.


POISONING ATTACKS // CIO TALK

HOW DATA POISONING ATTACKS CAN CORRUPT MACHINE LEARNING MODELS Recommendation algorithms can be attacked in a variety of ways, depending on the motive of the attacker. Adversaries can use promotion attacks to trick a recommender system into promoting a product, piece of content, or user to as many people as possible. They can perform demotion attacks in order to cause a product, piece of content, or user to be promoted less than it should. Algorithmic manipulation can also be used for social engineering purposes. In theory, if an adversary has knowledge about how a specific user has interacted with a system, an attack can be crafted to target that user with a recommendation such as a YouTube video, malicious app, or imposter account to follow. As such, algorithmic manipulation can be used for a variety of purposes including disinformation, phishing, scams, altering of public opinion, promotion of unwanted content, and discrediting individuals or brands. You can even pay someone to manipulate Google’s search autocomplete functionality. Numerous attacks are already being performed against recommenders, search engines, and other similar online services. In fact, an entire industry exists to support these attacks. With a simple web search, it is possible to find inexpensive purchasable services to manipulate app store ratings, post fake restaurant reviews, post comments on websites, inflate online polls, boost engagement of content or accounts on social networks, and much more. The prevalence and low cost of these services indicates that they are widely used. It’s not news that attackers try to influence and skew these recommendation systems by using fake accounts to upvote, downvote, share or promote certain products or content. Users can buy services to perform such manipulation on the underground market as well as “troll farms” used in disinformation campaigns to spread fake news. What is data poisoning? Data poisoning or model poisoning attacks involve polluting a machine learning model’s

training data. Data poisoning is considered an integrity attack because tampering with the training data impacts the model’s ability to output correct predictions. The difference between an attack that is meant to evade a model’s prediction or classification and a poisoning attack is persistence: with poisoning, the attacker’s goal is to get their inputs to be accepted as training data. The length of the attack also differs because it depends on the model’s training cycle; it might take weeks for the attacker to achieve their poisoning goal. Data poisoning can be achieved either in a blackbox scenario against classifiers that rely on user feedback to update their learning or in a whitebox scenario where the attacker gains access to the model and its private training data, possibly somewhere in the supply chain if the training data is collected from multiple sources. Data poisoning examples In a cybersecurity context, the target could be a system that uses machine learning to detect network anomalies that could indicate suspicious activity. If an attacker understands that such a model is in place, they can attempt to slowly introduce data points that decrease the accuracy of that model, so that eventually the things that they want to do won’t be flagged as anomalous anymore. This is also known as model skewing. A real-world example of this is attacks against the spam filters used by email providers. In practice, we regularly see some of the most advanced spammer groups trying to throw the Gmail filter off-track by reporting massive amounts of spam emails as not spam. Between the end of Nov 2017 and early 2018, there were at least four malicious large-scale attempts to skew the classifier. Another example involves Google’s VirusTotal scanning service, which many antivirus vendors use to augment their own data. While attackers have been known to test their malware against VirusTotal before deploying it in the wild, thereby

evading detection, they can also use it to engage in more persistent poisoning. In fact, in 2015 there were reports that intentional sample poisoning attacks through VirusTotal were performed to cause antivirus vendors to detect benign files as malicious. No easy fix The main problem with data poisoning is that it’s not easy to fix. Models are retrained with newly collected data at certain intervals, depending on their intended use and their owner’s preference. Since poisoning usually happens over time, and over some number of training cycles, it can be hard to tell when prediction accuracy starts to shift. Reverting the poisoning effects would require a time-consuming historical analysis of inputs for the affected class to identify all the bad data samples and remove them. Then a version of the model from before the attack started would need to be retrained. When dealing with large quantities of data and a large number of attacks, however, retraining in such a way is simply not feasible and the models never get fixed. Some practical solutions for machine unlearning are still years away, so the solution at this point is to retrain with good data and that can be super hard to accomplish or expensive. Prevent and detect Data scientists and developers need to focus on measures that could either block attack attempts or detect malicious inputs before the next training cycle happens, like input validity checking, rate limiting, regression testing, manual moderation and using various statistical techniques to detect anomalies. For example, restrictions can be placed on how many inputs provided by a unique user are accepted into the training data or with what weight. Newly trained classifiers can be compared to previous ones to compare their outputs by rolling them out to only a small subset of users. Recommendation is to builda golden dataset that any retrained model must accurately predict, which can help detect regressions. Data poisoning is just a special case of a larger issue called data drift that happens in systems. Everyone gets bad data for a variety of reasons, and there is a lot of research on how to deal with data drift as well as tools to detect significant changes in operational data and model performance, including by large cloud computing providers. Azure Monitor and Amazon SageMaker are examples of services that include such capabilities. To access the complete article log on to: https://www.enterpriseitworld.com/ APRIL 2021    ENTERPRISE IT WORLD 25


CASE STUDY  //  MATRIX

JIGME DORJI WANGCHUCK NATIONAL REFERRAL HOSPITAL (JDWNRH) THE NATIONAL REFERRAL HOSPITAL TRUSTS MATRIX TIME-ATTENDANCE AND ACCESS CONTROL SOLUTIONS

BY SANJAY@ACCENTINFOMEDIA.COM

Project Highlights Application: Access Control, Time-Attendance and Visitor Management Users: 3,000 Devices: 200+ Locations: Thimphu, Bhutan (Single Location) Industry: Healthcare

Company Profile The Jigme Dorji Wangchuck National Referral Hospital is one of the top most renowned institutions in Bhutan delivering Healthcare services. The hospital caters to the population of Thimphu and neighbouring districts. The hospital not only functions as the National Referral Hospital for the entire country but also functions as: Regional 26 ENTERPRISE IT WORLD    APRIL 2021

Referral Hospital for the Western District, District Hospital for Thimphu District, Human resources pool and technical backup for District Hospitals, Clinical training centre for the Royal Institute of Health Sciences (RIHS) and Technical support to the Public Health Programmes. Challenges As the hospital works round the clock, one of the major concerns was to manage complex shifts of employees. Elevator control, where only users with access rights can call the elevator, was another challenge the hospital wanted to meet. Furthermore, the customer also wanted a solution, with the help of which the admin could assign entry and exit points for patients, visitors and employees. Lastly, the management wanted to restrict visitor entry to a pre-defined

time and rooms of the hospital for better visitor management. Solution Offered Matrix pitched its Access Control, Time-Attendance and Visitor Management Solution along with the different variants of biometric devices, which fulfills every requirement of this renowned Hospital. Around 206 devices were installed in the hospital that are used in controlling access at rooms and elevators. Devices were installed at the Main Entrance, Ward Rooms, Server Rooms, Outside Elevators and at Ramps on every floor to restrict access. So, there is no individual in the building who is not enrolled in the system. As the Hospital works 24 hours, there are multiple shifts in which the employees work. Through this, the Hospital could manage multiple shifts


MATRIX  //  CASE STUDY

of employees. Approximately, 700 visitor profiles were created with constrained time to visit, limited rooms to enter and a pre-defined route of access. Also, crowd at the elevator was controlled by restricting the use to only users with elevator access rights. Results JDWNRH fulfilled its requirement with Matrix People Mobility Solution and achieved the following results: • Improved Security by Restricting Un-authorized Entry Using Access Control Solution • Reduced Complexity of Shifts by TimeAttendance Solution • Crowd Controlling through Elevator Access Control • Time based and Zone based Entry Restrictions for Visitors and Patients

The Products

Product

Quantity

Description

COSEC VEGA FAX

47

Fingerprint and Card based Door Controller for Time-Attendance and Access Control Application

COSEC VEGA CAX

65

Card based Door Controller for Time-Attendance and Access Control Application

COSEC PATH DCFE

28

Fingerprint and Card based Door Controller with IP65

COSEC PATH RDCE

66

Card based Exit Reader with IP65

COSEC ENROLL CARD

1

Card Enrolment Station

COSEC ENROLL FINGER

1

Finger Enrolment Station

COSEC VEGA CPM EM PROX

112

EM Proximity Card Personality Reader Module for VEGA Series Door Controller

COSEC CPM EM PROX

1

EM Proximity Card Personality Reader Module

COSEC CENTRA LE

1

Application Server Platform with 1,000 Users and Expandable up to One Million Users for basic Access Control and Raw Event Data

COSEC LE TAM

1

Time-Attendance Module for COSEC CENTRA LE Users

COSEC LE ACM

1

Access Control Software Module for COSEC CENTRA LE Users

COSEC LE VMM

1

Visitor Management Module for COSEC CENTRA LE Users

COSEC USER100

5

User license for 100 users

About Matrix Established in 1991, Matrix is a leader in Security and Telecom solutions for modern businesses and enterprises. As an innovative, technology-driven and customer-focused organization, the company is committed to keeping pace with the revolutions in the Security and Telecom industries. With around 40% of its human resources dedicated to the development of new products, Matrix has launched cutting-edge products like Video Surveillance Systems - Video Management System, Network Video Recorder and IP Camera, Access Control and Time-Attendance systems as well as Telecom solutions such as Unified Communications, IP-PBX, Universal Gateways, VoIP and GSM Gateways and Communication Endpoints. These solutions are feature-rich, reliable and conform to international standards. Having global footprints in Asia, Europe, North America, South America, and Africa through an extensive network of more than 2,500 channel partners, Matrix ensures that the products serve the needs of its customers faster and longer. Matrix has gained trust and admiration of customers representing the entire spectrum of industries. Matrix has won many international awards for its innovative products.

For further information, please contact: Toll Free -1800-258-7747 E-Mail: inquiry@matrixcomsec.com Click: https://www.matrixaccesscontrol. com/?utm_source=Magazine&utm_ medium=Case%20Study&utm_ campaign=Case%20Study APRIL 2021    ENTERPRISE IT WORLD 27


STORY  //  UC

28 ENTERPRISE IT WORLD    APRIL 2021


UC  //  STORY

P R A M O D

S H A R D A

CEO, ICEWARP, INDIA & MIDDLE EAST

ICEWARP WITNESSES AN UNPRECEDENTED DEMAND FOR ITS BUSINESS EMAIL AND COLLABORATION SOLUTIONS

BY SANJAY@ACCENTINFOMEDIA.COM

I

SHISHIR DHULLA CHIEF TECHNOLOGY OFFICER, EMKAY GLOBAL FINANCIAL SERVICES LTD

ceWarp has witnessed an increased demand for its Business Email and Collaboration Solutions in India during and post-COVID-19 lockdown. The pandemic and remote working culture have prompted many businesses to revise their IT Strategies which further gave rise to the adoption of a full-fledged email and collaboration suite to meet their collaboration needs. The growing need for employees to communicate without interruption boosts the demand for team collaboration solutions to efficiently carry out team meetings and conferences. Wherein, IceWarp saw 60% of the growth for its solution among its new as well and existing customers. The Company saw 2-way growths one, where existing customers who were using plain vanilla email adopted Collaborative Platform. On the other hand, new customers looked for a cost-effective alternative to MO365 Though, this new way of or GSuite and opted for IceWarp. Verticals working has brought in that have adopted collaborative email challenges and opportunities solutions pre and post lockdown the most for everyone, however, are BFSI, Pharma Healthcare, Education, gradually, enterprises have and Manufacturing & FMCG. understood the importance of To name a few, Emkay Global Financial Services Ltd., a leader in the hybrid collaboration. And now, financial services sector, adopted Unified digital connectivity in the time of Communication Solution of IceWarp in COVID-19 is not just a necessity the time of COVID-19 Lockdown. They rather, it has become a lifeline started leveraging IceWarp’s On-Cloud ensuring business continuity in Platform with modules such as Archive, the social distancing scenario. IM, Outlook Sync, Active Sync, Teamchat & Web Conferencing.

Remote working has been adopted by organizations wherever possible and we feel proud that we have been the key enabler for organization to adopt the change.

IceWarp is the best in class Enterprise Messaging, Collaboration & Communication Suite. We feel empowered with this cloud solution

which is a robust platform and a secured framework that has helped us reduce our infrastructure costs and manageability issues during the lockdown.

It is not surprising that video and team collaboration tools will remain CIOs priority even in the coming times, seeing the current scenario, not many offices will be willing to open/reopen their office space completely. We are optimistic that the number of customers will increase very rapidly and the usage of collaborative tools in India will continue to rise”, added Sharda. APRIL 2021    ENTERPRISE IT WORLD 29


THE STUFF  //  PRODUCTS & SERVICES

CIO TOYS

B Y S A N J AY @ A C C E N T I N FO M E D I A . C O M

KODAK S3060 SCANNER FROM KODAK ALARIS

Looking at the massive digitization and paperless office, there is a high need of intelligent, secure and high – end scanners for all the organizations today. We were in the pursuit of finding out good scanners so that we can give our viewpoints which can be useful for the IT department of the organizations. We ended up finding the Kodak S3060 Scanner, which is a gold rated product and a replacement of i3000 family of products. Kodak S3060 Scanner processes the documents of all types in the scanner and directly deliver to your system to use it further. This is one of the very cost effective product with faster ROI yield. S3060 Scanner is one of the fastest and intelligent scanners that one might have seen in the industry in A3 range. This scanner takes every type of document starting from thick ID cards to paper documents to cheque leafs and sans in seconds; although it takes a little wider documents also. With 60 ppm / 120 ipm, S3060 Scanner is not a very impressive machine from its foot print but the amazing speed, accuracy and functionality changes the perception about the functionality of the scanner. You can scan the documents in a variety of formats and send to the destination. When you unbox the machine, it turns out to be a tiny scanning robot with dimension of 10 – inches height and a little more than 14 – inches of depth. You pull out the extension to hold the documents upto A3. This machine obviously a high-end and advancement over its predecessors as it offers best image quality with perfect page technology. The file size comes out of this scanner is the smallest with the given speed of 60 ppm. For the enterprise use, it comes with security features. Obviously 30 ENTERPRISE IT WORLD    APRIL 2021

the service would be offered directly from Kodak Alaris. The user can put 300 pages and it can scan in a minute only and executes 25, 000 paper scanning. The integrated large led display allows to do everything from the machine itself – no need to move from machine to workstation. In a sense, after the scanner gets set, there is no need of the computer at all. The inbuilt chip takes care of everything. Without the help of the laptop or desktop, the machine optimizes the documents starting from enhancing the quality of the paper from deskewing to auto orientation to auto cropping, auto sharpening, to background colour smoothing, and many more. The machine also recognizes the writing orientation and corrects it. The machine itself takes care of merging the images or splitting the images, etc. It is so easy to set up that the user can do customization as per their requirement without

the help of the IT department and even share among the fellow workers. It memorizes the individual profiles that one need not to set it up again and again. Price: Kodak S3060 MRP Rs. 303620 +18% GST Contact us: Kodak Alaris India Pvt. Ltd. Toll free : 1-800-210-8989 Email: askme@kodakalaris.com Website www.alarisworld.com More about the Product: https://www.alarisworld.com/en-in/solutions/ document-scanners/departmental/s3060-scanner Click the link to access the article: https://www.enterpriseitworld.com/


Transforming telecommunications enriching the customer experience atos.net


Date of Publication: 28 of Every Month Date of Posting: 1 & 2 of Every Month

RNI NO: DEL ENG/ 2017/ 69906 Postal Reg. No.: DL-SW-01 / 4200 / 17-19

PMP

TM

Peak Throughput up to

1.2Gbps


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.