WWW.ENTERPRISEITWORLD.COMRS 20 | PAGE S 44 | VOLU ME 07 | ISS UE 05 @entitworld @enterpriseitworld @enterpriseitworld FOR THE CIOs. BY THE CIOs. AUGUST 2022 THE RISE OF LOW CODE NO CODE SOFTWARE LCNC adoption amongst business managers will push digital transformation. But it is not a threat to developers PASHISH16KAMOTRA FOUNDER CEO, TITAN WORKSPACE VARADHARAJANDINESH CHIEF PRODUCT OFFICER KISSFLOW SUBRATOBANDHU REGIONAL VICEOUTSYSTEMSPRESIDENT
The supplement story of the magazine would have relevant quotes from the top CIOs in India. InterviewsPLUS and Case Studies Catch interviews, guest articles and case studies of recent applications from the Industry stakeholders, IT/ITES Vendors and IT leaders and CIOs from the Enterprise IT World CIO Community.
FROM
The enterprises in United States of America who were making tom - tom about public cloud are now moving back to hybrid. The cost advantage that they were advocating about the public cloud is now taken a backseat. It does not mean public cloud including AWS, Google Cloud, Azure are slowing down in their grow. The market is exploding, and adoption is changing. Since there is a lot of complexity in adop tion and pricing, the IT leaders are trying to make a balance. Good, bad and ugly app the aspects would be available depending upon how you handle the technology pieces.
NEXT SPECIALMONTH COVER
The next issue is dedicated to the Industry 4.0. We would like to take feedback from the CIOs and OEMs and create our judgment on the same.
Keeping the entire value proposition in perspec tive, we have organization a hybrid cloud event in Bangalore on 9th of September. This is going to be a great thought leadership event where the stake holders can come in and share their experiences. You are welcome to join and learn along with your team members.
hyperscale cloud. Today, very rigid organizations including Government and Public Sector, Healthcare, BFSI, Retail, Media and Entertainment are adopting heavily into the hybrid cloud. the concept of all public and all on premise is a passe.
AUGUST 2022 ENTERPRISE IT WORLD 3 EDITOR’S LETTER
Hello Friends. When we compare the ages from technology adoption in the industry, challenges were every time and every age. But today the challenge is not from technology side it is rather from the manageability side. Today’s challenge is finding right resources and finding right mapped technology. IT leaders are not able to move out of their own boundary and look at appropriate technology. Therefore, outsourcing is the game. It has a flip side too. Management is looking for the whole situation differently. If the IT leader is asking for the alterna tive, the question comes why? Are you not capable to handle the situation unless the organization is very large, and workload is very high. So, in order to stay in the game and stay relevant, hybrid mode is the best option. Some of the work load to be executed by the owners and some should be given to the cloud. But it is so complex that when one enters the proposition, he needs to map the environment properly before taking any decision. Now globally hybrid cloud is growing at a very faster rate of 22% +. The trend is about moving to MAKING A BALANCE IN WORLD SANJAY MOHAPATRA SANJAY@ACCENTINFOMEDIA.COM Send in your inputs to sanjay@accentinfomedia.com STORY 4.0
INDUSTRY
SUPPLEMENT QUOTES TOP CIOS
HYBRID
CONTENTS VOLUME 07 | ISSUE 05 | AUGUST 2022 | WWW.ENTERPRISEITWORLD.COMEditorial 03 News 06 MORE INSIDE INTERVIEW: /20Decodingransomware-as-a-service:Howtheundergroundbusinessworks 16 Publisher: Sanjib Mohapatra Chief Editor: Sanjay Mohapatra Managing Editor: Anisha Nayar Dhawan Sub Editor: Kumari Ambika Art Director: Shadab Khan Web Designer: Sangeet Technical Writer: Manas Ranjan Lead Visualizer: DPR Choudhary MarketingMARKETINGManager: Tanu Malik Marketing Manager: Kunal Yadav SALES CONTACTS Delhi 6/102, Kaushalya Park, Hauz Khas New E-mail:Phone:Delhi-11001691-11-41055458info@accentinfomedia.com EDITORIAL OFFICE Delhi: 6/103, (GF) Kaushalya Park, New Phone:Delhi-110016,91-11-41657670 / info@accentinfomedia.com46151993 Printed, Published and Owned by Sanjib Mohapatra Place of Publication: 6/103, (GF) Kaushalya Park, Hauz Khas New PhoneDelhi-110016:91-11-46151993 / 41055458 Printed at Karan Printers, F-29/2, 1st floor, Okhla Industrial Area, Phase-2, New Delhi 110020, India. All rights reserved. No part of this publication can be reproduced without the prior written permission from the Subscription:publisher.Rs.200 (12 issues) All payments favouring: Accent Info Media Pvt. Ltd. FOR THE CIOs. BY THE CIOs. INTERVIEW “Zero Trust Needs To Become The Hybrid Workplace’s IT Corner stone’: Ram ManageEngine”CybersecurityVaidyanathan,Evangelist, 22 RAM VAIDYANATHAN SECURITY “Happiest Minds Tech nologies announces the launch of end-to-end Security Services for Healthcare” 36 VIJAY BHARTI “Blockchain: A pos sible antidote for cybercrime?” RAM GUESTBARANIDHRANTALK25 CIO TALK “Future of Digital Banking” 28 AMIT JAOKAR COVER THESTORY RISE OF LOW CODE NO CODE SOFTWARE LCNC adoption amongst business managers will push digital transformation. But it is not a threat to developers ENTERPRISE IT WORLD AUGUST 20224
Yotta Infrastructure, in partnership iWeb Technol ogy Solutions, has launched an integrated suite of Academic & Administrative Enterprise solutions for educational institutions. The solution, known as EdUniverse, digitises and automates activities crucial for several departments, including HR, Procurement, Finance & Administration, and Teaching and NonTeachingRajeshStaffs.Garg, EVP, Chief Digital Officer & Head –Cybersecurity at Yotta Infrastructure, said, “Institutes today want a customised yet simple and effective solution to digitise and automate their activities.
Yotta Launches EdUniverse -An Integrated University Management Solution ITWORLD ROUND UP Source: Gartner ENTERPRISE IT WORLD AUGUST 20226
BRIEFDATA
9.5%BudgetsMarketingHaveIncreasedtoofOverallCompanyRevenuein2022
Leveraging the domain expertise of iWeb Technol ogy Solutions and combining it with the quality and service assurance of Yotta, we are delivering a scalable, affordable, and reliable Integrated University Manage ment Solution (IUMS) for campuses/institutions of all sizes. In addition, our module-based approach helps institutions right-size their requirement, without paying for additional services they might not need or use.”In an age of hybrid academia, students demand real-time support and resolution of issues that allow them to continue their learning pursuits without any roadblocks. EdUniverse is supported by industryleading uptime of Yotta’s robust cloud platform, Yotta Enterprise Cloud, hosted at the state-of-the-art, robust and India’s only Uptime Institute Certified Tier IV data center facility – Yotta NM1 in Mumbai for 99.99% uptime. Moreover, institutions maintain data sovereignty as their data is stored in India.
SANJAYBY @ACCENTINFOMEDIA.COM
Recordent is looking for individuals who have the entrepreneurial drive in them to be able to succeed with this programme.”
CIO EVENTS LTI Strengthens Strategic Collaboration with Microsoft
launches its new channel partner program, at Pan India202206-07levelSEP, MENA SecurityInformationConference 25-27 SEP, 2022 International Conference on Communication and Network Technology 10-14 OCT, 2022 2022Gitex 11 2022OCT, Accelerators X Awards 2022 PLACE: HILTON RIYADH, HOTEL & RESIDENCES, RIYADH, SAUDI ARABIA BY: DWTC, DUBAI BY: ENTERPRISE IT WORLD MEA PLACE: DWTC, DUBAI PLACE: TOWERS,EMIRATESDUBAIPLACE: FRANCEPARIS, AUGUST 2022 ENTERPRISE IT WORLD 7 NEWS BRIEF // IT WORLD
Recordent
Winny Patro, CEO & Co-Founder, Recordent said, “We have always believed in the strength that people carry with them when they seek to succeed. The DSI programme with its payout structures ranging from INR 45,000 to INR 85,000 per month will help all who be a part of this journey to be able to take a step in their journey to financial independence, professional learnings, and personal success.
Recordent launch of its pan-India affiliate program, empowering the partners at PanIndia level. With the launch of this programme Recordent seeks to partner with over 650 people in 130 cities in India. The industry leading payout plan will be the highest in the Fintech domain and is poised to be a potential disruptor, impacting a major change in the MSME sector through Recordent’s value proposition.Thepartnership expansion programme will be conducted in four phases across India and will make sure to reach every corner of the country to select the best candidates in taking forward Recordent’s vision of helping everyone enrolled under this programme in generating high personal income as per their potential. The DSI programme seeks to find and hone individuals who come with a strong entrepreneurial mindset, working profession als in the Fintech domain like CA, CFA or consultants, strong people skills and who will be able to undergo training and Sales in digital modes. The right attitude with a skills can also be utilised by college students, home makers, retirees, software or insurance agents and networked professionals like CA, CFA, social media influencers and entrepreneurs to be a part of the DSI programme.
Larsen & Toubro Infotech announced the expan sion of its collaboration with Microsoft to focus on developing high-value cloud solutions for enterprises. As a part of this multi-year collabora tion, LTI has launched a dedicated Microsoft business unit that develops and offers end-to-end digital transformation solutions. Through this association, LTI will also train 12,000 professionals from its existing workforce on various Microsoft technologies by 2024. The main objective of this effort is to enable skill development of LTI employees that are a part of Microsoft unit and enhance their competencies across technologies like cloud, data, IoT and security.Nachiket Deshpande, Chief Operating Officer, LTI, said, “LTI has a long-standing relationship with Microsoft as a strategic partner, service provider, and customer. Our reaffirmed partner ship with Microsoft will enable us to innovate and offer 170+ distinct services to our joint customers. Additionally, we will also focus on training and upskilling of our talent pool that is a part of the dedicated Microsoft business unit, to empower them to meet changing business and market requirements.”
Trend Micro Maintains Strong Lead in Cloud Workload Security Market
Customers want two-way, real-time interactions that can solve banking problems as they happen, no matter where they are. 15% are frustrated when they cannot complete a loan application using messaging service and 57% have even switched banks to get a better mobile experience. This desire for personal ized banking and being able to communicate easily is more pronounced in younger cus tomers, as over 80% of Gen Z surveyed want to solve even more complex tasks using digital channels including completing a loan applica tion or sharing personal information to get tailored financial product recommendations.
LAMA
Sinch report reveals consumers want better ways to get real-time financial services and connect with their bank
Getting answers instantly In addition, 73% say they want their questions answered quickly, but just 58% experience this. While most banks offer support via email or in-app communication channels, they have yet to capitalize on the opportunity to connect 1:1 with customers and build stronger relationships through text messaging. It’s about securing trust The research shows a positive technology experience is highly correlated with securing consumer trust. Banks that do not deliver on good experiences are significantly less likely to have customers that say they trust their banks. Trust is also gained by knowing when human interaction with a customer is needed.
AUGUST 2022 ENTERPRISE IT WORLD 9 NEWS BRIEF // IT WORLD
TONY DE
RITIKA SURI, DIRECTOR, TECHNOLOGY PARTNERSHIPS, GOOGLE CLOUD
SAIDS/HE IT
“Emerging threats and evolving technology needs are at the forefront of challenges in cyber security.”
“Trend Micro celebrated its continued leadership role in the fast-growing global market for cloud security, according to the latest the IDC market share report on Cloud Workload Security*. Throughout two years of global crisis, enterprise leaders invested in cloud infrastructure and services to streamline business processes, lower costs and create innovative new customer experiences. They also turned to trusted partners to manage and mitigate the resulting cyber risk. That’s created a market for cloud workload security which surged 36% year-on-year in 2021, according to the IDC market share report.” SECURITY LA VICE PRESIDENT OF PRODUCT MANAGEMENT, CYBERRES
QUICK BYTE ON Consumers want far more personalized mobile banking experiences that make it easy for them to get real time 1:1 support any where, says a survey of 3000 global consumers in more than 10 countries including India, commissioned by Sinch . With 64% feeling comfortable discussing personal/sensitive financial matters with their bank via mobile messaging, but about 62% wishing to have human conversations for personal finance advisory, the survey shows customers would benefit from a greater level of interactive personalized communication with their banks and financial partners.
“The availability of remote functions from BigQuery is an exciting and critical evolution of Google Cloud’s platform for our customers.”
ENTERPRISE IT WORLD AUGUST 202210 ITWORLD // NEWS BRIEF
Tesserent Appoints George Katavic as Managing Partner, Tesserent Federal
Dr.Tathagato Rai Dastidar – Founder & CEO, SigTuple, said, “It is truly an honour for us to partner with the HORIBA India team. In a very short time, HORIBA has disrupted the market and emerged as a leader in the small-midsized lab and the high-end market – covering 10,000+ customers in the region. AI100 added to HORIBA’s existing portfolio, enables a complete automation solution to be offered to all labs.
Western Digital has partnered with the film “Darlings” as their exclusive digital storage partner. The film stars Alia Bhatt, Shefali Shah, Vijay Varma and Roshan Matthew, and will premiere on Netflix on Aug. 5th, 2022. Gaurav Verma, Producer and COO, Red Chillies Entrainment, said, “As content producers, we know how important it is to find a safe and convenient way to store all the content related to a film. With Western Digital’s SanDisk® and SanDisk Profes sional line of products on board, all our data storage needs were handled seamlessly, and we are glad to have partnered with them on Darlings.”
Also, as a part of the partnership, Western Digital has launched a digital video campaign (DVC) featuring the lead character of Darlings, Badru, played by Alia Bhatt, highlight ing the benefits of a SanDisk dual drive, a simple and convenient data transfer device. The DVC focuses on the SanDisk Ultra® Dual Drive Go USB Type-C™, popularly known as the ‘Mobile Ki Pen drive’ that easily frees up space on compatible mobile devices with a USB Type-C port, such as smartphones and tablets, and can quickly transfer files to compatible USB-A devices, such as computers and even smart TVs.
SigTuple leverages AI & robotics, to automate the error prone and inefficient manual microscopic review of samples in laboratories. SigTuple’s AI100 is the premier solution for AI-assisted digital pathology. Its AI based cell classification is presented to a patholo gist on a cloud platform, standardising the quality and increasing the efficiency of the pathologist multifold. Further, showcasing the microscopic view of the slide remotely, drives seamless transi tion from manual microscopy to digital microscopy and enables tele-pathology.AI100iscomplementary to HORIBA’s existing product portfolio and through this partnership, HORIBA and its affiliates will distribute AI100 across the Indian subcontinent.
Western Digital Partners with the Film ‘Darlings’ for Its Digital Campaign Showcasing SanDisk Ki Pen Drive” HORIBA & SigTuple partner to drive AI powered digital microscopy
EXECUTIVE MOVEMENT
With a vision to replace the manual microscope in the labora tory, SigTuple’s AI100 currently automates the microscopic review of the two most common tests coming to the lab – peripheral blood smear and urine, with plans to add AI capabilities for more tests on the same platform.
“Mobile
Paddy Srinivasan as the President & Chief Executive Officer atGoToCohesity Appoints Sanjay Poonen as CEO and President Brillio Appoints Camie Shelmire as Chief People Officer GlobalLogic IndiaSalesDadhwalArvinderjitCommvaultPresidentAppointmentAnnouncesofNewandCEOappointsSinghasDirectorofEngineeringfor&SAARC
About The Book Shiv Shivakumar, or Shiv as he is popularly known, is one of India’s longest-serving CEOs. He is cur rently the group executive president at Aditya Birla Group. He has worked across multiple industries and categories, and has handled over sixty brands in his career.
in the Canalys Endpoint Security Vendor
Author In this book, Shiv Shivakumar points out that today, unlike in the past, all the three elements are your responsibility. With in-depth interviews with top leaders across the spectrum and an insightful foreword by Sachin Tendulkar, The Art of Management is a must-read.
Airtel awards its first 5G contract in India to Ericsson
Bharti Airtel has awarded its first 5G contract in the country to Ericsson with deployment to get underway in August 2022. Ericsson is Airtel’s long-standing connectivity partner and pan-India managed services provider, with a partnership spanning more than 25 years and covering every generation of mobile commu nications. The latest 5G partnership follows the close of 5G spectrum auctions in India on July 26.
“5G presents a game-changing opportunity to drive the digital transformation of industries, enterprises and the socio-economic develop ment of India. With our 5G network, we aim to deliver the full benefits of 5G connectivity, fuel India’s journey towards a digital economy and strengthen the country’s position on the world stage.”Airtel will deploy power-efficient 5G Radio Access Network (RAN) products and solutions from the Ericsson Radio System and Ericsson microwave mobile transport solutions. Ericsson will be providing 5G connectivity in 12 circles for Bharti Airtel. In addition to an enhanced user experience for Airtel customers – spanning ultra-high-speeds, low latency and large data handling capabilities –Ericsson 5G network products and solutions will also enable Bharti Airtel to pursue new, innova tive use cases with its enterprise and industry customers. The Art of Managementthe Recognized as a Performer Performance Index for PRICE RS. (HARDCOVER)309.00 WHERE AMAZON.IN
Acronis
High
Q1 2022
BY SHIVAKUMARSHIV SHELFBOOKAboutthe
Oleg Melnikov, Chief Technology Officer at Acronis, said, “We are pleased that Canalys recognizes Acronis as a lead ing endpoint protection platform provider,” “As security risks increase, businesses need more than simple, traditional backup solutions. This recognition from Canalys showcases the need for companies to adopt holistic cyber protection solutions like Acronis’ to protect their IT infrastructure in the face of modern cybersecurity threats.”AlexSmith, Canalys Vice President, said, “Acronis’ position as a high per former in our Endpoint Security Vendor Performance Index is a testament to the company’s stellar market performance and outstanding offerings.”
Acronis, has been recognized as a High Performer in the Canalys Endpoint Security Vendor Performance Index for Q1 2022. The company, praised for being a cyber protection pioneer, realized an 18.8 percent growth in revenue compared to the first quarter of 2021. Canalys, releases the quarterly Endpoint Security Vendor Performance Index research to highlight market share and trends within the endpoint protection industry. Specifically, it “assesses vendor performance, in terms of customer adop tion, within the endpoint security market during the last 12 months (July 2021 to June 2022).”
In the 2022 report, Canalys praises Acronis’ endpoint security solution that is integrated with data backup and recovery services. Acronis was officially classified as an endpoint protection platform (EPP) provider for the first time when it was added to Canalys’ Endpoint Security Vendor Performance Index in April 2021. Since then, Acronis expanded its endpoint security solutions, announcing several integrations with leading service provider platforms, and launching enhanced capa bilities of the company’s flagship, all-in-one cyber protection platform for service providers, Acronis Cyber Protect Cloud.
UPDATEGLOBAL
Gopal Vittal, MD and Chief Executive Officer, Airtel, says: “As our trusted, long-term technology partner, we are delighted to award our first 5G contract to Ericsson for 5G deployment in India.”
AUGUST 2022 ENTERPRISE IT WORLD 11 NEWS BRIEF // IT WORLD
The Jalan-Kalrock Consortium has selected IBS Software to power the relaunch of Jet Airways. This selection will provide a range of technology platforms to support Jet Airways’ relaunch as a people-focused airline for the digital age. As technology partner, IBS Software will deliver cutting-edge capabilities in passenger service systems (PSS) encompassing bookings, inventory and revenue management, departure control system, loyalty management, as well as a latest generation website and mobile app, designed to optimize the entire passenger and retail experience.
Sanjiv Kapoor, Chief Executive Officer for Jet Airways, said, “Jet Airways is coming back determined to take technology, services, and customer experience to a new level. Technol ogy with a human touch is at the heart of everything we want to achieve, starting with getting the basics right by addressing recur ring pain-points in the customer journey, both online and at the airports, while also addressing the pain-points commonly faced by airline staff” “In IBS Software we found an ideal partner with the experience and expertise required to deliver the technology platforms and collaboration that will help us deliver on our promise to bring back an even better Jet Airways to those eagerly awaiting its relaunch, as we enter an exciting new era for the airline.”
Tata Communications, enhances its InstaCC™ platform with digital features to transform customer engagement of enterprises. It stitches a secure, connected digital fabric that allows global enterprises and end users to connect across varied channels ranging from social media to web browsers to mobile applications and company websites. This allows global enterprises to engage with customers in an intelligent, seamless and user-friendly way, across their preferred channel. The InstaCC™ platform, an omnichannel Contact Centre as a Service (CCaaS), strengthens Tata Communications position as a global end-to-end digital customer experience (CX) orchestrator.
US TELECOMMUNICATIONS PLAYERS BENEFIT FROM OTSI’S BUSINESS TRANSFORMATION CAPABILITIES
Redington announces Q1FY23 Results; Continues Strong Momentum with 25% Consortium Selects IBS Software to Power Passenger Service, Booking, and Loyalty Systems for Jet Airways
DIGEST
The market for business intelligence and analytics (BIA) continues to grow in both overall size and importance as every organization looks to drive more value from their data, especially in the cloud. As the report states, “Business intelligence and analytics software is one of the most visible pieces of the technology stack that enables data-driven or data-informed decision making and greater enterprise intelligence. While data warehouses, data lakes, lake houses, and various data integration and data intelligence software form the foundation of an organization’s data and analytics technology architecture, it is BIA software that data analysts, business analysts, and others in the organization interact with daily.”
Mr. Rajiv Srivastava, Managing Director, Redington Ltd, said,“We are very pleased with the results of the first quarter of FY23. While the growth of technology industry is stabilising globally, our execution aligned to the strategic pillars of innovation, technology and partnerships is driving strong, differentiated outcomes. At Redington we are working towards addressing technology friction – the gap between innovation and adoption –across different sectors by democratizing accessibility and availability of a wide range of technology products, solutions, and services.”
Y-o-Y growth Qlik Named a Leader in IDC MarketScape: U.S. Business Intelligence and Analytics Platforms 2022 Vendor Jalan-KalrockAssessment
Redington announced its financial results for Q1FY23, which ended on June 30, 2022.
Qlik® was recently named a Leader in the IDC MarketScape: U.S. Business Intelligence and Analytics Platforms 2022 Vendor Assessment (Doc# US48061021, July 2022). IDC Mar ketScape is the IT industry’s premier vendor assessment tool, providing in-depth quantitative and qualitative technology market assessments. In this report, IDC detailed the value of Qlik Analytics and its complete range of capabilities designed to help organizations drive more insights and value from their data, especially in hybrid cloud environments.
Object Technology Solutions India Pvt Ltd (OTSI), has provisioned a cost-effective and an easy-to-manage software delivery mechanism for Network Maintenance & Release Management of both BSS and OSS systems to one of the largest telecommunications companies in the US market. The client offers cellular services and is a significant worldwide Internet carrier, having a wide mobile, wireless and internet network provisioned from multiple OEMs, including Samsung, Alcatel, Lucent, Motorola, Nokia, Ericsson, Aircel, Huawei, Cisco.
PINE LABS LAUNCHES SECOND INNINGS PROGRAM IN ASSOCIATION WITH NATEKAR SPORTS AND FITNESS
ENTERPRISE IT WORLD AUGUST 202212 ITWORLD // NEWS BRIEF
TATA COMMUNICATIONS ENHANCES INSTACC™ PLATFORM WITH DIGITAL
It has been a strong quarter for the company with an aggressive performance across all business segments and geographies. Global revenues have grown a healthy 25% YoY and at 315.8 crores PAT has grown 33%. Operating margins for the quarter have expanded with a 34% YoY.
FEATURES
Pine Labs announced the hiring of six former Indian athletes under its ‘Second Innings’ program, an initiative to reskill and employ retired sportspeople in India. The company has partnered with Natekar Sports & Fitness (NSF) which is led by its founder Gaurav Natekar who is a former India number 1 tennis player, Arjuna Awardee, double Asian Games gold medalist, and son of the legendary Indian badminton star Late Nandu PineNatekar.Labs and NSF will be mapping each of these hired athletes to the right job within the Pine Labs organisation and provide the necessary skill development training as well. These new hires will be entitled to the same perks as existing employees, and they will also be a part of the Pine Labs Annual Review process.
Oracle announced the next generation of Oracle Fusion Sales, a sales automation application that identifies high-quality sales opportunities and guides sellers to close deals faster. Part of Oracle Fusion Cloud Customer Experience (CX) and powered by artificial intelligence (AI), Fusion Sales automatically provides sellers with quotes, proposals, and recommended steps to help them increase productivity, close more deals, and instill confidence among buyers. Nearly one third of sellers struggle to close deals and meet quotas, according to a recent study conducted by CRM analyst firm Beagle Research Group in partnership with Oracle. The study, “Does Your CRM Leave Money on the Table,” highlights the struggles that sellers face with customer churn and archaic sales processes. In turn, sellers have noted that they are open to greater automation and trust AI to take on greater responsibilities, including qualifying leads (70 percent), identify ing priority deals (60 percent), and tracking deal progress (80 percent).
MANAGEMENT MANTRA
Mr. Kishore Shah, Head – SPOCHUB (an initiative by ESDS), said, “This associa tion will be the best suit for every onion and garlic producer as it will connect the farmers with a government organization that is dedicated to their wellbeing through an easy-to-use medium. ICAR- DOGR services offered through Famrut will help simplify the farmers’ jobs in their field with a solid research-based, and data-driven Decision Support System.
ESDS Software Solution Limited has associated with ICAR – Directorate of Onion & Garlic Research (DOGR), Pune (ICAR- DOGR), an institute of repute that focuses on merging innovation with entre preneurship in Agriculture. The association has been formed to aid farmers with a Decision Support System for guidance and management of onions and garlic. ESDS’ innovative digital agro platform ‘Famrut’ assists the farmers to extract high yield & thereby income from their land by linking them with appropriate stakeholders in the agricultural ecosystem. Through Famrut, ESDS aims to provide farming solutions to farmers across the nation.
TeamViewer, announced a major expansion of its partnership with RealWear, a leading provider of assisted reality wearable solutions for frontline industrial workers. TeamViewer’s remote access software is integrated into the newly announced RealWearTeamViewer’sCloud.software is delivered as RealWear Cloud Assistance – an embedded service in RealWear Cloud, providing real-time technical support and enhanced collaboration, allowing subscribers’ IT and Business Operations to remotely set-up, configure, deploy and analyze a fleet of RealWear devices. TeamViewer’s technol ogy uniquely enables subscribers to accelerate the time-to-production and troubleshooting for RealWearAlfredodevices.Patron, EVP of Business Development at TeamViewer, said, “It’s a great milestone to become a larger part of RealWear’s ecosystem and tech stack and to launch remote device support in a standardized way for the first time,” “We’ve already deployed our enterprise Augmented Reality software Frontline on thousands of RealWear devices across numerous customer sites all over the world. With the new integration of our remote connectivity capabilities into its cloud platform services, RealWear can offer its customers a new level of remote support for the devices themselves. This integration reinforces TeamViewer’s position as the de facto standard for remote access to both IT and non-IT devices in industrial environments.”
R. B. Kale, Officer-In-Charge at ICAR – Directorate of Onion & Garlic Research (DOGR), expressed his thoughts that development of online platforms in collaboration of ICAR-DOGR & ESDS will help to connect the organization with millions of farmers.
AUGUST 2022 ENTERPRISE IT WORLD 13 NEWS BRIEF // IT WORLD
“It is important to me to have a tighter focus on where I spend my time to have the greatest impact.”
ESDS’ association with ICAR enables a strong Decision Supports System for farm ers that will help them in varietal selection, pest and disease management, and nutri tion management for onion and garlic. It will also provide advisory support system, and market support system. Additionally, it will have an onion and garlic knowledge portal with technology repository and a registration platform for the onion and garlic stakeholders like farmers, farmer producer organizations, exporters and private organizations.
De facto standard for remote access: TeamViewer to become first embedded remote connectivity provider on RealWear Cloud offering
Oracle Automates the Tasks Sellers Despise with Next Generation CRM ESDS Affiliates with ICAR to deliver Decision Support System for Farmers Mohit Aron, Founder and Chief Technology and Product Officer, Cohesity
ENTERPRISE IT WORLD AUGUST 202214 ITWORLD // NEWS BRIEF
Funding Round
The CyberRatings results noted that Juniper vSRX achieved the highest rating of “AAA” for Threat Protection with Juniper blocking 100% of tested exploits and evasions without a single false positive.
Juniper Networks received a “AAA” rating in the first-ever Cloud Network Firewall evaluation by CyberRatings.org, a nonprofit member orga nization that provides transparency and expert guidance on cybersecurity risks via research and objective product testing.
Murali Bollu, CEO of ZenQ, said, “Becoming a part of Qualit est means becoming a part of something bigger,” “Qualitest and ZenQ share a common vision to provide the most advanced and customer-centric quality engineering capabilities available in the world. By joining forces, we will leverage our varied expertise to assure the quality of our clients’ deployments and their overall operational readiness.”
Sunil Thomas, Co-founder and Executive Chairman, CleverTap, said, “Our vision has been to reshape the way businesses engage with their con sumers and bring the tech to MarTech.
Qualitest Hyderabad-acquires based quality engineering company ZenQ
Series
This is the latest in a series of third-party tests, analyst reports and customer wins that validate Juniper’s Connected Security portfolio, which sets the bar for security effectiveness, performance, scale and cost savings across a wide array of use cases – from Zero Trust data centers and workload protection – to secure SD-WAN and SASECyberRatingstransformation.tested
CleverTap,has signed definitive agreements to raise US$105M in a Series D funding round led by CDPQ, a global investment group who com mitted US$75M, with participation from IIFL AMC’s Tech Fund, along with existing investors Tiger Global and Sequoia India. The funds will be used to support CleverTap’s global expansion and enhance the develop ment of its world-class solutions and technology.Founded in Mumbai in 2013 and headquartered in Mountain View, California, CleverTap’s customer engagement and retention SaaS platform leverages machine learning and artificial intelligence to offer a comprehensive user engagement suite that enables brands to build valuable, long-term relationships with their customers.
Led by CDPQ Qualitest, the acquisition of ZenQ PvT Ltd., an India-based software testing company. This acquisition not only extends Qualit est’s strong geographical footprint in India with ZenQ’s facilities in Hyderabad, but also adds to their NextGen capabilities in Phygital, Analytics, Blockchain, and DevOps. Through this acquisition, Qualitest will add ZenQ’s 600+ quality engineers to its ranks, along with an energetic and effective leadership team that will support Qualitest’s growth and deepen its expertise.
Founded in 2003, ZenQ is a leading provider of software testing services in various industries, including healthcare, BFSI, education, and retail. ZenQ’s clients will benefit from Qualitest’s technologically advanced quality engineering solutions, positioning the combined businesses as the preferred digital transformation partner with expansive global resources.
Juniper Networks vSRX Achieves Highest Rating in Inaugural CyberRatings.
In June 2022, CleverTap completed the acquisition of San Francisco-based Leanplum, a leading multi channel customer engagement platform, further strengthening its footprint in North America and Europe. In the same month, it also unveiled Tesser actDB™, the world’s first purpose-built database designed to dramatically improve user engagement and reten tion for digital consumer brands.
org Cloud Network Firewall Test
CleverTap Raises US$105M in D
Juniper Networks vSRX Virtual Firewall deployed within an AWS environment, a deployment scenario that has become a popular use case with public cloud usage expected to grow 20.4% in 2022, according to Gartner (Forecast: Public Cloud Services, Worldwide, 2020-2026, 1Q22 Update). Juniper vSRX achieved top scores across all five tested categories: ■ AAA in Threat Prevention: 100% exploit block rate with 0 false positives ■ AAA in Performance: 974 Mbps overall rated performance ■ AAA in Management & Reporting Capabilities ■ AAA in TLS/SSL Functionality: Supporting 100% of the tested cipher suites and encryption use cases ■ AAA in Routing & Policy Enforcement Perfect Security Effectiveness & Low TCO
CleverTap’s subscriptionbased solution has been adopted by a loyal customer base of 1,200 brands in 100 countries representing 10,000 apps across industries including Fintech, eCommerce, Subscription, On Demand, and Streaming media.
SANJAYBY @ACCENTINFOMEDIA.COM COMMUNICATIONSCUSTOMER IMPLEMENTINGSIMPLIFIED: SMS MESSAGING FOR REAL BUSINESS OUTCOMES ELLEN
▪ Communicating in a Way that Users Want – The best way to achieve results is to listen to your customers. SMS Comparison reports that 9 out of 10 consumers would like to communicate with businesses through text message, making it an important channel for grow ing engagement.
▪ Cost-Efficient, Reliable & Direct Communications – On average, SMS yields much higher results than other channels, which can boost the cost-efficiency of marketing campaigns. On top of this, it provides a reliable and direct way to send important communica tions through to the user’s most important device – their mobile.
For enterprises, engaging with their end users using their preferred communication channel is a big value-add, but can be a challenge without the right tools and expertise. On top of this, many enterprises are feeling the pressure with “Business messaging shouldn’t be complicated. It should be as easy as eCommerce, where a user can point, click, and get the result they want.”
In terms of marketing strategy, according to Gartner, SMS can result in open rates as high as 98%, compared to just 20% for email. To tackle the decline in traditional email communica tions, enterprises should consider an SMS strategy to increase open rates and maximise engagement. An expert partner can make messaging simple in any enterprise. With a simple and powerful approach to business messaging and an easy-to-use platform, enterprises can further their understanding of different communications channels, as well as use cases and opportunities.Thisenables them to connect with their customers, innovate and grow using business messaging. It not only improves marketing efforts, but can also enhance customer experi ence, and boost security when incorporating 2FA for additional authentication when logging into apps and services. With a friction-free approach, enterprises can quickly deliver a range of positive outcomes including:
▪ Security & Customer Protection – Using SMS for 2FA is key for improving security and giving customers confidence that their data is protected. The additional layer of security is important for securing operations and building a trusted brand.
increasing demands for different messaging use cases. These include andtoshouldusebusinessinteractiveandmessaging,person-to-applicationaccessAuthenticationTwo-Factor(2FA)tosecurelyplatforms,plusA2Pand(P2A)withmorecompaniesconsumersmovingtowardschatsandAI.Anyonethatwantstoenterthemessagingmarketormessagingintheirbusinesshavefriction-freeaccesstheseserviceswithanintuitiveuser-friendlyplatform.
▪ End-to-End Customer Experiences – SMS campaigns can provide useful and relevant communications throughout the entirety of a customer’s journey.
Enterprises need to change their approach to reaching customers to achieve top levels of engagement, increase security, grow relationships, and reduce costs.As an increasing number of enterprises move forward with their digital transformation journey, they need to expand their communications channels beyond traditional Email. They can evolve in the SMS space to improve marketing efforts and customer experience, as well as security through 2FA. However, a lack of experience and expertise in SMS, plus skills gaps in their internal teams, can make it difficult to get started and grow in the market.
Building an SMS Strategy
Growth in omni-channel business messaging is accelerating, and there is a huge opportunity to reach more customers with simple, efficient, and trusted application-to-person (A2P) SMS messag ing services VELICKOVSKA
AUGUST 2022 ENTERPRISE IT WORLD 15 TELXIRA // GUEST COLUMN
MANAGING DIRECTOR AT TELXIRA TELXIRA
ResearchandMarkets expects the Global A2P SMS Market to reach $74.7 billion by 2026, up from the $59.1 billion reported in 2020.
Understanding Your Messaging Journey Business messaging shouldn’t be complicated. It should be as easy as eCommerce, where a user can point, click, and get the result they want. The challenge is to find a business messaging part ner that understands the market, acts as a guide, and delivers a platform that is easy to use.
16 ENTERPRISE IT WORLD AUGUST 2022 COVER STORY // LCNC
BY SANJAY@ACCENTINFOMEDIA.COM OF CODE NO CODE SOFTWARE
D LCNC // COVER STORY AUGUST 2022 ENTERPRISE IT WORLD 17
LCNC adoption amongst business managers will push digital transformation. But it is not a threat to developers
igital transformation in organizations is at full throttle driven by the need to modernize, innovate and take advantage of new technologies. Yet 70% of transformation initiatives do not meet the desired objectives, according to a telling report by Boston Consulting Group. Among other factors, the report clearly indicated the need for a businessled modular technology and data platform. This is where the story of Low Code No Code (LCNC) platforms comes in and the reason why this market segment has gained so much prominence in recent times. The digital transformation imperative is making software eat the world and software-driven systems are becoming the critical differentia tors to achieve competitive distinction.
THE RISE
LOW
“Sometimes, IT may not prioritize these projects and LCNC empowers business owners to take it up and solve their own challenges. For example, a global oil and gas company has developed an application for fuel reconciliation and it is designed by business users. Another application by an FMCG major was developed by business users to manage product write-offs.”
ENTERPRISE IT WORLD AUGUST 202218 COVER STORY // LCNC
“We are looking at facilitating modernization of legacy environment by enabling developers to build new capabilities and reducing the workload by 70% with our platform-based development environment.” According to a 2021 TechRepublic survey, 47% of respondents indicated that their organizations use LCNC platforms, which provide numerous benefits and help with transformation by easing the implementation of key initiatives. Amongst those who do not use LCNC, 20% indicated that they would adopt LCNC within next 12 months. Nasscom estimates the LCNC global market to be USD13.8 billion in 2021 and it is expected to grow at a CAGR of 28% between 2021 and 2025. Low code application platforms account for the major part of the market with RPA and process automation being the most popular deployments.
The No-Code Census 2020 report estimates that application development is 4.6x faster, 4.6x more affordable, and 4.8x easier using LCNC platforms. For example, the BPass offering from Titan WorkSpace which is built on Microsoft SharePoint enables business users to configure a workflow and bring it into production within one day cutting down the development cycle from six months.Speaking about the inherent value proposition of the solution, Ashish Kamotra, Founder CEO of Titan Workspace says, “Titan Workspace reduces the CIOs journey to extract more value from Microsoft 365 and SharePoint. By automating 90% of the work needed to develop new applications, workflow and capabilities, the platform empowers enterprise to do things within a few months what could have taken a few years. Our platform enhances collaboration, optimizes workflow, enables document sharing and extends the Intranet to guest users—all with a few clicks.”
So what exactly is LCNC and why is it becoming so popular?
DINESH VARADHARAJAN CHIEF PRODUCT OFFICER, KISSFLOW
One of the reasons for the rapid adoption for LCNC is the high demand for software developers and the associated challenges of attracting talent, high salaries and managing attrition. IDC predicts that by 2025 there will be a global shortfall of 15% full-time software developers compared to the demand and the shortfall of shortfall of 1.4 mil lion developers in 2021 will increase to 4 million by 2025. Not surprisingly a top reason for LCNC adoption is to improve developer retention, followed by the need to accelerate development, fulfill staffing requirements and to simplify the development experience.
Closer home, the LCNC market in India has been pegged at USD 400 million in 2021 which has been experiencing a 15% growth since 2019 with the largest chunk of revenues, approximately 70%, coming from the global market. The Nasscom report published during the early part of this year says that the Indian market has around 150 players comprising bootstrapped start-ups.
The fervour around LCNC is evident in a Gart ner estimate that pegs by 2024 65% of all applica tions will be built around LNCN platforms.
SUBRATO BANDHU REGIONAL VICE PRESIDENT, OUTSYSTEMS
LNCN platforms are tools designed for people who either do not know how to code or have no time to code. However, these platforms are built on coding languages like PHP, Python, and Java even though end users need not bother about what runs in the background and can simply use visual development environments to drag and drop program components, link them, and watch what occurs. Users have a wizard-style paradigm to build, test, and deploy apps and are enticed to tinker around due to the inherent simplicity.
Pandemic has provided the much-needed push to modernize IT and application development is exploding as businesses seek provide a seamless customer experience.
As the benefits of digitalization seep into the layers of organizations, employees are beginning to see the benefits and are keen to leverage digital to further enhance benefits. Many organizations are already reaping the benefits of RPA and it is becoming evident that the RPA can become force multipliers when it is accompanied by process optimization. And this has become one of the drivers for LCNC adoption as process owners want to further RPA benefits by optimizing workflow on LCNC platforms.
ASHISH KAMOTRA FOUNDER CEO, TITAN WORKSPACE
One of the value propositions of LCNC is to simplify complex integrations within the enter prise and with third-party applications and this has enabled organizations with legacy systems to embark on the digital journey by designing modern applications. Says Subrato Bandhu, Regional Vice President, Outsystems, a platform that offers out-of-the-box integration capabili ties with complex systems, “We are looking at facilitating modernization of legacy environment by enabling developers to build new capabilities and reducing the workload by 70% with our platform-based development environment.”
These applications are now being extended to the global counterparts without having to worry about scalability as the Kissflow platform manages it.
“Business applications with complex architec tures that connect different data sources to run multiple processes and have a secure design and governance framework form the core of digital organizations.”SavvyITorganizations have understood the benefits of LCNC and are taking the initiative to empower business. IT teams are working with business to identify the ideal platforms, ensure security and governance framework and handholding them in the development process to unleash more digital within the organization.
LCNC for Agile and Responsive Organizations Ease of use and simplicity inherent in a LCNC platform empowers line of business managers to experiment, iterate and innovate faster. Common applications being built on LCNC platforms include workflow management systems, conver sation bots and virtual assistants. Often process owners use a simple decisionmaking structure to design automated workflows that can be used across multiple departments in an Thisorganization.enablesto cut down the production time of bringing out new features, capabilities and processes as opposed to the traditional approach of working with the in-IT team or a third-party provider which required a lot of time and resources.According to Gartner the needs of businessdriven hyperautomation will be one of the top drivers for low-code adoption through 2022 as business owners will want to create and execute their own “Sometimes,ideas.IT may not prioritize these proj ects and LCNC empowers business owners take it up to solve their own challenges,” says Dinesh Varadharajan, Chief Product Officer at Kissflow, a Chennai-based LCNC platform with customers across the world. Dinesh offers interesting insights into unique use cases, “The platform is aimed at three perso nas – users, process managers and the IT team and we have very many interesting instances of citizen developers wherein process managers have designed and developed interesting applications to solve specific business problems. For example, a global oil and gas company has developed an application for fuel reconciliation in oil tankers and it is designed by business users. Another application by an FMCG major was developed by business users to manage the write-off processes for products. These are unique use case to solve business specific problems and will not be avail able off the shelf.”
Outsystems’ Subrato insists that high coding will always remain very critical for businesses.
But does LCNC pose a threat for developers. This is very unlikely according to the TechRepub lic survey which indicates that 63% respondents do not think it will result in few jobs for develop ers. Low code cannot solve complex business problems which require highly skilled developer expertise, yet LCNC can make the developer’s work easier by automating their jobs as well.
LCNC // COVER STORY AUGUST 2022 ENTERPRISE IT WORLD 19
“By automating 90% of the work needed to develop new applications, workflow and capabilities on M365 and SharePoint, Titan Workspace empowers enterprise to do things within a few months what could have taken a few years. Our platform enhances collaboration, optimizes workflow, enables document sharing and extends the Intranet to guest users—all with a few clicks.”
Road Ahead: LOB managers actively participate in digitalization Thanks to LCNC digital transformation will likely get a push from line of business managers as they become active participants in streamlining processes and enhancing customer experience.
IDC predicts more of line of business managers will become prolific at developing applications by using LCNC and the share of such developers is slated to grow from 39% in 2021 to 58% in 2025.
Why is Ransomware-as-a-Service a thriving business?
Ransomware-as-a-Service (RaaS) has turned into a lucrative business as threat actors need not have the technical expertise to develop malware. They license it from ransomware groups, lowering the barrier of entry into the world of cybercrime. Ransomware operators provide the ransomware and the infrastructure, and recruited affiliates are tasked with breaking into networks to deploy the malware.Ransomware groups utilise recruitment, marketing and advertising tactics to attract affili ates for their programs. Affiliate programs offer insiders within corporations potentially millions of dollars in exchange for deploying ransomware within their organizations. Affiliates are provided playbooks on how to deploy the ransomware, lowering the technical barrier, which is one of the primary reasons why RaaS is a thriving business.
Who are the different actors in the ransomware ecosystem and what makes them a major threat to organizations? The ransomware ecosystem has three key players — Ransomware groups, affiliates and initial access brokers (IABs). Ransomware groups are the face of the ecosystem, responsible for developing the ransomware, managing the infrastructure behind hosting stolen files and negotiations with victims. Affiliates are the pillars holding up the structure of the ransomware ecosystem because they’re the ones doing the dirty work of infecting organizations in myriad ways. Affiliates identify attack pathways by purchasing access through Initial Access Brokers or by using common attack vectors such as spearphishing, brute-forcing RDP systems, exploiting unpatched or zero-day vulner abilities and purchasing stolen credentials from the dark web. Initial Access Brokers or IABs are a group of cybercriminals who specialize in gaining access to an organization’s IT infrastructure. They specialize in gaining initial access to organizations using similar techniques as affiliates. They offer access to the highest bidders — this could be an affiliate purchasing access or the ransomware group itself developing a working relationship with IABs directly. What are the hiring and marketing strategies RaaS groups deploy to enlist IABs and affiliates? Like every organized crime outfit that recruits outsiders to carry out dubious operations, ransomware groups too have their own methods of recruitment. These groups pay their affiliates enormous amounts of money. For instance, Lock Bit 2.0 provides instructions on how organization insiders can be part of the “affiliate recruitment” by offering “millions of dollars” and anonymity in exchange for credentials and access. Another ransomware gang, ALPHV, upped the stakes by offering a 90% profit share with its affiliates. Each ransomware gang has their own set of requirements for each hiring post — this depends on the type of talent they want to recruit. Some look for credential harvesters, developers or affiliates. For instance, BlackMatter, which was earlier known as DarkSide, has different criteria for recruiting affiliates. DarkSide listed its own requirements for affiliates from experience to the knowledge required. What makes RaaS a self-sustaining business model? RaaS is a lucrative and self-sustaining business simply because of the amount of money in the ransomware ecosystem. Ransomware groups are impermanent. We have seen multiple ransom ware groups disappear over the years, either as a result of law enforcement action like REvil or out of their own volition like DarkSide, which rebranded as BlackMatter. We also hear numerous reports that newer groups include members of past ransomware groups. For instance, REvil was the successor to GandCrab, while Conti is considered the succes sor to Ryuk. When certain groups are dismantled, new groups capture the attention of affiliates seeking new partnerships. Affiliates and IABs are the engines driving the ransomware ecosystem. These threat actors are not linked to any one specific ransomware group and their services can be bought by the highest bidder. Even as old ransomware groups shut down and new ones emerge, affiliates and IABs remain in the ecosystem, making RaaS a self-perpetuating business model. Double and triple extortion tactics most often ensure ransom payments are made. What regulatory norms do governments need to implement, to ensure businesses pay more attention to install security measures to protect themselves against ransomware? We need to make it more difficult and less lucrative for cybercriminals by shoring up organisations’ security postures and escalat ing government countermeasures. If we work together, cyberattacks won’t be the big business they are now. To thwart attacks, the private sector must secure its systems properly while the government responds with deterrence measures.
With the advent of RaaS, double and triple extortion, ransomware groups are operating on a self-sustaining model with multiple actors working together, creating a dubious ecosystem of cybercrime
@ACCENTINFOMEDIA.COM
TENABLE ENTERPRISE IT WORLD AUGUST 202220 Q&A // TENABLE
DECODING AS-A-SERVICE:RANSOMWAREHOW THE UNDERGROUND BUSINESS WORKS AMBIKABY
Maintaining systems, using multi-factor authentication, limiting user privileges and understanding where you are most exposed have to be the first part of this equation.
Given the enormity of the threat RaaS outfits pose to businesses and critical infrastructure, how can organizations fortify themselves? The rising number of ransomware attacks is an obvious wake-up call for organizations as bad
assets in the network regularly ● Strengthening Remote
Ransomware wouldn’t thrive as a profitable business model if the risks are higher than the reward. Establishing deterrence requires organizations to maintain a sophisticated level of cyber hygiene. This can be done by implementing a variety of measures including: Multi-factor authentication, encryption and strong passwords for all accounts Continuously auditing permissions for user Identifying and patching vulnerabilities to business-critical Desktop monitoring of the Active Directory to detect misconfigurations ENGINEER, TENABLE
Tenable Research underpins our technology and our ability to serve our customers. We are market leaders in CVE coverage, assessing over 70,000 vulnerabilities; leaders in zero-day research, with over 400 vulnerabilities disclosed since January of 2019; and in most cases, our team provides coverage within 24 hours of finding new vulnerabilities.Lastbutnot least, we’ve expanded our scope through acquisition and R&D and are now recognized as leaders or significant players in the Operational Technology, Cloud Native, and Active Directory security markets.
AUGUST 2022 ENTERPRISE IT WORLD 21 TENABLE // Q&A
accounts ●
“We need to make it more difficult and less lucrative for cybercriminals by shoring up organisations’ security postures and escalating government countermeasures. If we work together, cyberattacks won’t be the big business they are now.”
What kind of interest have you observed from the region for your offerings?
and SATNAM NARANG SENIOR STAFF RESEARCH
● Antimalware and antivirus software to detect suspicious activities within the network
shadow users
We’ve continued to drive innovation in vulner ability management, and as a result, have grown our market share lead over the past three years.
●
Protocol ● Continuous
● Training employees about common attack vectors and the importance of cyber hygiene ● Conduct regular penetration tests and tabletop exercises to develop holistic incident response plans
● Regular updates for encrypted, offline backups
●
While attacks continue to increase in sophistication, the vast majority are oppor tunistic, preying on the fact that most teams are overwhelmed and unable to address even well-known vulnerabilities. Bad actors of all skill levels and motivations will continue targeting known vulnerabilities in popular software so long as they remain unpatched and vulnerable. So we are seeing the need for Exposure Management which draws on deep insights into all aspects of the modern attack surface - across assets, as things change, and with the context of interdependencies - to accurately gauge and prioritize exposure risk. Can you elaborate on your market approach?
actors are profiting from weaknesses in organi zational defenses. The logical solution would be establishing deterrence. This can be achieved by shoring up organizations’ security postures.
The attack surface has changed dramatically not only in the sheer volume of assets but also in the variety of assets that have become exposure risks. Shadow IT, public cloud, ephemeral resources, and more distributed infrastructure and applica tion deployment has made the attack surface highly dynamic and ever-changing. In addition, the assets that make up your attack surface are more interconnected than ever before, so exposure in one area can quickly become a breach in a critical part of the business.
• Single sign-on.
• Use of shadow applications: Many organisa tions don’t know the type and extent of applica tions used by employees. Many employees use unsanctioned applications to aid in their work; however, these applications could have security vulnerabilities and data could be leaked.
MANAGEENGINE ENTERPRISE IT WORLD AUGUST 202222 Q&A // MANAGEENGINE
• Use of unsecure networks: The corporate network within the perimeter of a business may be adequately protected; however, in today’s hybrid environments, employees work from homes, coffee shops, co-working spaces, airports, and even airplanes. These networks are not secure and are susceptible to adversaries intercepting and stealing data.
What are the various challenges faced by organisations while operating in a cloud-based security environment? The biggest security challenges while operating in a cloud-based environment are as follows:
• Moving controls as close to the data as possible: Security and access controls need to be placed as close to the data as possible to reduce the attack surface. This is why the use of a VPN is not enough to secure sensitive data.
• Cloud misconfigurations: Most of the cloud-based security incidents faced by organisa tions are due to settings not being configured properly. In fact, a majority of incidents have happened due to a single misconfiguration.
• Lack of visibility: More than 90% of organisations around the world use a multicloud strategy. In such a climate, it’s difficult for organisations to get visibility into all user activity in a single pane of glass. This is critical to monitor activity across different cloud deployments and correlate events to detect threats.
How has hybrid work culture paved the way for an increase in cybercrimes? Hybrid work has paved the way for an increase in cybercrimes in the following ways:
While AD360 enables organisations to imple ment effective identity and access management policies, Log360 is a unified SIEM solution with cloud security and data loss prevention capabili ties. All of our solutions are easy to install, deploy, and use. They feature intuitive dashboards and give actionable insights. Our mission is to bring all of IT together and help IT administrators make intelligent decisions.
• Microsegmentation: The network must be divided into logical microsegments to maintain granular access and security controls.
• Data exfiltration: In a cloud environment, employees may maliciously or unintention ally download sensitive data into third-party applications. This is not ideal in terms of security. Furthermore, this data could also be easily shared with unauthorized collaborators.
• The use of unmanaged devices: Employees in a hybrid setup tend to use their own personal devices such as laptops, mobile phones, and tablets for work. Many times, these devices are not patched properly and carry vulnerabilities that are exploited by attackers.
@ACCENTINFOMEDIA.COM
• Data is not protected by firewalls anymore: In traditional corporate networks, sensitive data was protected by firewalls, VPNs, and intrusion prevention systems. This was because the data still resided within the walls of a business. But today, data can be anywhere; in fact, more and more data is housed within the cloud. In such a climate, the risk of identity-based attacks is high.
• The principle of least privilege: Users should only get the minimal level of access necessary to perform their jobs (just enough access). Access privileges should be based on risk levels and roles. Just-in-time access should also be implemented to limit the amount of time users have privileged access.
ManageEngine’s role in helping organizations understand and ensure seamless implementation of Zero Trust? Zero Trust is a philosophy, and organisations need to first plan their vision before implement ing it. ManageEngine crafts software that enables organisations to implement several aspects of Zero Trust. ManageEngine solutions can help organisations perform:
• Asset and data discovery.
• The use of dynamic policies: Authentication methods should be based on user context and the sensitivity of the resource being accessed. Context includes the device location, device state, and network health.
• The use of SaaS-based applications: The average employee today uses more than 10 cloud applications for work purposes. While this has productivity benefits, it also carries the risk of both malicious and unintentional data leakage.
How does Zero Trust help secure the data infrastructure of organisations? Zero Trust helps secure organisations’ sensitive data through:
• Multi-factor authentication.
ZERO TRUST NEEDS TO BECOME THE HYBRID WORKPLACE’S IT CORNERSTONE’: RAM VAIDYANATHAN, CYBERSECURITY EVANGELIST, MANAGEENGINE AMBIKABY
• Comprehensive, continuous log collec tion: It is vital to constantly check for threats and reassess trust. The collected logs should be used to improve the organisation’s security posture.
ManageEngine build and offer more than 60 different software solutions that solve challenges for IT Share the brief about the organization and what are your service offerings? ManageEngine is the IT management division of Zoho Corporation, and it was founded in the year 2002. We build and offer more than 60 different software solutions that solve challenges for IT administrators across four broad areas: IT service management, IT operations, endpoint manage ment, and cybersecurity. In the realm of cybersecurity, we have two major software solutions, AD360 and Log360.
• We have been featured and recognized by analyst firms such as Forrester, KuppingerCole, GigaOm, and Quadrant Solutions.
• We have won awards such as Cyber Defense Magazine’s award for UEBA, threat detection, cloud security, and more.
• Gain visibility into the organisation’s security posture.
“Most of the cloud-based security incidents faced by organisations are due to settings not being configured properly. In fact, a majority of incidents have happened due to a single misconfiguration.”
• Create playbooks and workflows for automatically responding to threats. What have been your organiza tion’s achievements and your future plans? Elaborate?
• Proactively detect threats in the network based on behaviour instead of signatures.
• For more information, please see: log360-awards-and-recognitions.html.www.manageengine.com/log-management/https://
RAM VAIDYANATHAN CYBERSECURITY EVANGELIST, MANAGEENGINE
• Recognise deviations from the baseline and assign risk scores accordingly.
AI and automated architectures will become essential for effective Zero Trust. AI can be used to:• Set baselines of expected activities for users and devices.
• ML-powered anomaly detection for proactive threat detection based on risk scores. ManageEngine provides two solutions, Log360 and AD360, that help with effective threat detection and identity and access management, respectively.
• We have been recognized in the Gartner Magic Quadrant for SIEM for the last six consecutive years.
Potential of AI and automated architecture to ensure agility and intelligence in threat remediation?
• Dynamic analysis of logs from all parts of the network.
AUGUST 2022 ENTERPRISE IT WORLD 23 MANAGEENGINE // Q&A
• Identity and access management.
OTSI has executed?
OTSI has a good track record of successfully implementing digitisation, enterprise solutions, analytics and cloud solutions to leading Govern ment organisations, State Governments, public sector undertakings and Oil and Gas PSUs.
OTSI worked with Ministry of Petroleum, GAIL, Indian Oil Corporation and Indian Navy and delivered analytics solutions using SAS Tool and Open source stack.
OTSI has also worked with the Ministry of Home Affairs (MHA) for ICJS – Interoperable Criminal Justice System. It has partnered with state governments as well.
“Across industries and sectors, Artificial Intelligence is one of the more prevalent emerging technologies. It has become a powerful companion to big data. Insights derived from a combination of the two can help organisations scale new heights.”
OTSI ENTERPRISE IT WORLD AUGUST 202224 Q&A // OTSI
In BFSI segment, Kotak Securities Limited (KSL), a subsidiary of Kotak Mahindra Bank has chosen Altair’s Panopticon Platform for data visualization to augment data presentation needs facilitating proactive business decisions. OTSI and Altair are collaborating to ensure that KSL’s business objectives are met effectively. We are currently engaged with Indian Bank and Bank of Maharashtra and delivering Analytics solutions using SAS Tool.
OTSI has been assigned with Inter Company Optimization for NORD India. The requirement is to handle export sales situations from India to Thailand and Germany.
AMBIKABY @ACCENTINFOMEDIA.COM CHANDRA TALLURI, CHIEF EXECUTIVE OFFICER, OBJECT TECHNOLOGY SOLUTIONS INDIA (OTSI) DEEP DOMAIN AND TECHNICALPOSITIONSEXPERTISE OTSI
Kindly brief us on the recently executed NITI Aayog’s National Data and Analytics Platform (NDAP)?
Which are the other major projects
Delivers critical projects successfully, customer focus as core value and cost-effective service models with multi-shore facilities AS A STRONG PLAYER
OTSI worked with the Ministry of Corporate Affairs (MCA) to set up a business intelligence/ data mining and analytics unit in the Ministry and generate customised statistical reports using business intelligence, data mining, and analytics tools to be used by the government departments for policymaking and regulatory purposes. The main priority of this project is to demonstrate the potential of data mining, visualisation, and interactive reporting on the company filing forms submitted by companies to the MCA21 system.
OTSI has developed NITI Aayog’s National Data and Analytics Platform (NDAP). It’s a more outcome-based project and we are the sole technology partner involved in this project. This is one of the prestigious projects. Many big names have participated in the RFP which was primarily targeted at Tier 1 partners. The platform aims to improve last-mile delivery and enable seamless use of Indian Gov ernment data through an intuitive, user-friendly platform. NDAP is a one-stop shop for Govern ment’s data in a way that is truly useful to users (citizens to policy makers). The portal currently offers 203+ datasets from more than 47+ Central Government Ministries and Agencies and across 14 Sectors and will add new datasets up to the village level in the future.
OTSI has successfully delivered in digitalizing and transforming the Transport Department services for the state of Andhra Pradesh.
Using specially designed algorithms, the data fetched from various Government portals is processed to ensure uniformity in semantics so that two different datasets can be compared. This means that our software enables Government data to be presented in a user-friendly format, and promotes data-driven decision making and research. As of today, we have analyzed and processed more than 30,000 source files from various departments and combined them into 203 datasets on NDAP. We are working on getting more datasets to be onboarded onto the platform. We took every measure to make sure NDAP’s backend architecture is scalable and resilient to cater to the future needs of India.
2. Distributed (Decentralized): The Blockchain represents a distributed network of nodes that share the ledger. Public blockchains are also decentral ized, which means that anyone can host a node and join the blockchain network.
As the world digitizes in a rapid fashion, the associated risks have also increasedCybercrimemanifold.-Criminal activities involving computers and the inter
SANJAYBY @ACCENTINFOMEDIA.COM BLOCKCHAIN: A POSSIBLE ANTIDOTE FOR CYBERCRIME? RAM BARANIDHRAN CO- CTO, NNT, A CLOUD-NATIVE COMPANY ACQUIRED INFOGAIN
INFOGAIN net – has grown significantly. Victims lost an estimated USD 6.9 billion in internet enabled crimes in Advances2021.in the fields of Internet of Things (IoT), Artificial Intelligence (AI) means that virtually all devices that we interact with have a technology component and are usually connected to the internet as well. From intelligent vacuum clean ers, health monitoring wearables, Bluetooth enabled door locks to a vast array of digital payment options technology is embedded with every aspect of our lives. While all these solutions make our lives easier it also means that we are leaving behind a digital trail which if not guarded properly can be misused in many ways. This is where cybersecurity becomesGartnerparamount.definesCybersecurity as the practice of deploying people, policies, processes, and technologies to protect organiza tions, their critical systems and sensitive information from digi tal attacks. Businesses recognize the importance of Cybersecurity and have started investing heavily in this space. The global cyber security market was valued in excess of USD 150 billion in 2021 and will only grow further. Blockchain has the potential to be a key element in the cybersecurity space. The intrinsic properties of Blockchain allow for building trust in any system while ensuring that data cannot be tampered with. Blockchain is a shared distributed ledger that can store date ensuring immutability andAanonymity.blockchain is a safeguard tool for keeping the data stored through cryptography. According to industry reports, blockchain is becoming a promise to reality and an indeed integral part to organizational innovation today. Business leaders are putting money and resources behind the technology in more meaningful and tangible ways which is making the IT industry grow exponentially. A market report suggests, in India alone, 56% of businesses are adopting blockchain technology and making it a part of their core business. A few key properties of blockchain are:
3. Unanimous: All nodes in the blockchain network agree on a block before its recorded-on chain, ensuring a common view of data.4.Anonymous: The identity of the participants is anonymous or pseudonymous.5.Traceable:While identity is secure, all actions on blockchain are traceable. A common model used in developing security systems is the Confidentiality, Integrity and Availability triad (CIA triad). Blockchain intrinsically satisfies all •these.Confidentiality is ensur ing that data is kept secret. Blockchain uses public private key encryption to encrypt data ensuring that only the right person has access to data. Smart contracts using homomorphic encryption can perform computations on encrypted data without decrypting it making systems more secure.
1. Immutable: Each block contains a cryptographic hash of the previous block, a timestamp, and transaction data (generally represented as a Merkle tree). It ensures that data, once recorded, cannot be altered unless the entire chain is altered – which is not computationally feasible.
“India especially, through its recent colossal growth of IT enablement and cloud first ‘Digital India’ initiatives, has even greater requirements for proactive network monitoring practices.”
To win the battle of cybersecurity, Blockchain is emerging as one such solution that can help make breakthroughs in ensuring a secure and safe online world
• Integrity is ensuring that data is accurate and trustworthy I.e., it has not been tampered with. Data stored on a blockchain is immutable and all modifications on blockchain are traceable.
AUGUST 2022 ENTERPRISE IT WORLD 25 INFOGAIN // GUEST COLUMN
EMEA, PARK PLACE TECHNOLOGIES PARK PLACE
“India especially, through its recent colossal growth of IT enablement and cloud first ‘Digital India’ initiatives, has even greater requirements for proactive network monitoring practices as these cloud first initiatives are set against a backdrop of widespread internet outages.”
Subhead - India especially, through its recent colossal growth of IT enablement and cloud first ‘Digital India’ initiatives, has even greater requirements for proactive network monitoring practices &
Effective proactive network monitoring is a key consideration in supporting today’s modern networks which are increasingly dynamic, complex, and must facilitate the extraordinary growth of network data. To keep pace with all this additional traffic and device usage, today’s network admins require at-a-glance and in-depth discovery, monitoring, and optimisation, housed in a single interface in order to control their globally networked, cloud driven and remote estates. Only by utilising a singular control pane can admins realistically con trol and effectively monitor often thousands of devices, badged with hundreds of hardware makes and models. For end users, network monitoring can make the difference between a poor digital experience and a highly enabled one. India especially, through its recent colossal growth of IT enablement and cloud first ‘Digital India’ initiatives, has even greater requirements for proac tive network monitoring practices as these cloud first initiatives are set against a backdrop of wide spread internet outages, often effecting remote workers and remote offices. In cloud enabled environments, this places even greater pressures on comprehen sive network monitoring. Without such a holistic, centralised and ongoing monitoring approach, it can become impossible to effectively manage and predict performance, security and health issues. At worst unchecked, it can mean enterprises are left vulnerable, slow performing or worse, taken completely off-line. At best, using effective network monitoring solutions provides network admins with a centralised control hub to see where things are going wrong, or critically, where they may go wrong in the near term, and apply remediation fixes before issues can occur. But it’s a mistake to link network monitor ing solely to troubleshooting. Detailed network monitoring is predictive, protective and highly performance-enhancing for devices and network data alike and allows for maximum uptime. It provides a constant gage on overall network health, with the precision capability to drill down to individual device level to isolate and fix problems far faster than through manual intervention checking inventory. Reducing the mean time to repair (MTTR) is a key KPI of every network manager to give business continuity and zero impact to the end user experience. Of course, it all starts with a thorough up-to-date understand ing and viewpoint of what’s running on the infrastructure. No longer can network admins use static ITAM listings compiled at regular intervals in the year to know what’s running on the estate and possibly causing an issue.
ENTERPRISE IT WORLD AUGUST 202226 GUEST COLUMN // PARK PLACE TECHNOLOGIES
SANJAYBY @ACCENTINFOMEDIA.COM NETWORK MONITORING: THE KEY TO ESTABLISHING DATA CENTER VISIBILITY AND EMBRACINGTECHNOLOGIESNEW IAN SHEARER MANAGING DIRECTOR, APAC
Continual, automated discovery is now the expected norm to allow network admins to flag and find devices that may otherwise remain undetected and may go on to present wider security issues. Once ongoing discovery is in place, next comes monitor ing. Traditionally, network admins used fault monitoring solutions to track failures, but modern network monitoring also incorporates speed and performance indicators as slow performance often indicates a likely near-term problem or device failure. Typically, an ongo ing monitoring solution will flag server overloads, system crashes, sub optimally performing devices that need attention, and highlight that network connections are all running well. Reporting metrics are likely dashboard driven and usually divided into three pillars that include response times, availability status and uptime. Collecting and analysing such network data allows businesses to optimise business performance, meet and exceed Service Level Agreements (SLAs) and provide a window on network health for overall IT planning.
The endeavor that has had an impact on healthcare all across the world is innovation in manufacturing. What difference is Instashield making in Med Tech innovations? Instashield is a plug and play device that delivers the necessary signals to the electron emitters that produce hypercharge high velocity electrons, which interact with the negative seeking s-protein of the corona family of viruses, thus, reducing infectivity and preventing air and surface borne transmission of the corona family of viruses. Its hyper charged cannons fire trillions (1-100 tril lion electrons per second) of negatively charged ions, creating an electron cloud across closed spaces. A single device has an effective coverage area starting 5,000 square feet and activates within 18 min.
“Instashield has a huge market especially now that in the last couple of months we’ve seen the pandemic and its impact on human lives and the economy.”
AMBIKABY @ACCENTINFOMEDIA.COM HITESH M PATEL, PROMOTER AND DIRECTOR INSTASHIELD IONISER MARKET WILL SEE A HUGE DEMAND IN COMING TIMES
INSTASHIELD AUGUST 2022 ENTERPRISE IT WORLD 27 INSTASHIELD // Q&A
Instashiled is a Pulg-N-Play Device That Kills Coronavirusupto99.9%
What is the road map for Instashield? If you look at the ioniser market the demand and product available, the kind of challenges you find in the market is that most companies are only promoting products to combat viruses.The challenge is it is only purifying the air and as far as the certifications and some other challenges are concerned, they are not able to prove the technology to the fullest. So, it is definitely ending at purifying the air and claiming it is killing the viruses – but is not so currently with the current ioniserHavingmarket.saidthat, Instashield has a huge market especially now that in the last couple of months we’ve seen the pandemic and its impact on human lives and the economy. What is the mission and vision of Instashield? To effectively give the consumer a preventive machine which is more of a wellness machine. What are your future plans in terms of territory expansions and product? There is a huge opportunity in this particular space. Especially when it comes to a device that goes beyond air purifying. Instashield is perfect for the large market space because the landscape is very big – this product is fit for all offices, homes, schools, institutions, hotels, hospitals – so the market is very huge for us. Currently the go to market strategy is to go both offline and online and have started appointing distributors in Mumbai, Pune, Hyderabad, and now we are expanding to other markets like Bangalore, Chen nai, Kerala to start with. What is the R&D that has been involved with Instashield? Instashield Medical Device is a Patented Technol ogy backed by science and has received support from TSIC, ARCI and is an accredited lab tested & certified by CSIR-CCMB and other labs like EMTAC, Vimta, with CE for exports CDESCO, ISO 13485 and thus ensuring that its 100 % safe for human, and environment. The Brand is registered with MSME, Start-up India and GEM portal with Go green as a sustainable product.
What Instashield is all about? We are all living in challenging times due to the on-going pandemic and has poised serious health issues around the world. Researchers including Virologists and WHO itself believe that coronavirus is pandemic and have warned that the world would have to live with it forever. A lot of researchers have put in efforts to find ways to control the virus through vaccines and other measures but these all are not sufficient and do not have a high efficacy rate. Understanding the need for a safe alternative, Narishma Chary Mandaji, a rural innovator who is known for re-glowing the dead tubelights, after extensive research and experiments, has come up with a technology which is capable of killing all sorts of viruses including the SARS-CoV. His technology has been imbibed in Instashield, a break through innovative Medical Device, which uses first of its kind CCMB approved Virus attenuation technol ogy that disables all kind of virus including SARSCoV2 up to 99.9% efficacy in an enclosed space, in air, and on the surfaces.
@ACCENTINFOMEDIA.COM
SANJAYBY
Digital Banking Systems are highly versatile which enables them to expand services much faster and to enhance customer satisfaction to the highest level of cost-effectiveness while maintaining security and flexibility OF DIGITAL BANKING NKGSB
Something trending these days.. Neobanks? Neobanks is a term given to the “Banks of the Future” because they are entirely operate online with no physical branches. Neobanks, commonly referred to as “digital banks” are quickly establish ing themselves as an acceptable substitute for traditionalCurrently,banks.Neobanks in India rely on their partner banks to provide their services. This is because the RBI has not yet given a green flag to banks to become completely digital yet. When it comes to the benefits for the custom ers, Neobanks often provide exciting offers such as higher interest rates and a number of additional advantages that are not available with traditional banks.&hence Neobanks are spreading quickly in India. The expansion of the Indian digital banking platform market is anticipated to be a consequence of the Neobanks establishment in the country responsible for an increased demand for digital banking platforms.
The action is in accordance with the initiative of Digital Banking by Nirmala Sitharaman, the Finance Minister. The plans are to establish DBUs in 75 districts to mark India’s independence’s 75th Anniversary. This has been officially confirmed by the Indian Banks’ Association (IBA) stating that 75 digital banking units (DBUs) will be operational by July 2022 across all state-run institutions, ten banks in the private sector, and one small finance bank.
platforms.Withdigital payments rising to their peak during the pandemic, the market for digital banking platforms in India got a huge boost. Further accompanied the efforts of the Indian government to transition the country to a cashless society.Apush from Government programmes like Digital India play a crucial role in taking internet connectivity to further parts of India, resulting in helping more people to join hands for the growth of digital banking platforms. What adds to it is India’s growing smartphone industry, the mobile banking segment holds the biggest market share. Mobile banking is expand ing across the nation as a result of the demands of new generation clients, who value quick satisfac tion and want one-click solutions for everything, including payments and other banking services. As a result, the market for digital banking platforms in India is quickly expanding too.
FUTURE
Growth of Digital Banking in India After the COVID-19 pandemic outbreak, the demand for online banking platforms in India experienced phenomenal development. Custom ers and businesses quickly migrated to digital banking platforms, as a result, greatly accelerating marketWhilegrowth.theuse of technologies like cloud computing and machine learning gained traction during this time. It became a blessing in disguise for India’s growth in adapting digital banking
ENTERPRISE IT WORLD AUGUST 202228 CIO TALK // NKGSB BANK
Digital banking refers to the banking on your fin gertips, concluding all the financial transactions entirely online without using paper documents used in Stone Age like demand drafts, pay-in slips, or cheques. It just not gives you an access but to execute all banking operations online also an overview of your financials without having to visit a branch. With that it allows users to conduct almost all standard banking tasks whenever they want, without any restriction. Its fascinating that Digital Banking Systems are highly versatile which enables them to expand services much faster and to enhance customer sat isfaction to the highest level of cost-effectiveness while maintaining security and flexibility, digital banking relies on a high level of process automa tion which is web-based services and APIs also the blockchain technology.
Benefits of Digital Banking Enhanced Security: Addressing cyber security problems such as the need to secure consumer data is now being tackled as a result of the developments in digital banking. Consumer data can be stored in an encoded format, strengthening data security. The customers now have the ability to quickly modify their security preferences and transaction caps which can also help in minimizing financial fraud at the consumer’s level. With the daily currency exchange, there was a possibility of acquiring fake currency and counterfeit notes in the past but now as money transactions are made digitally, digital banking eliminates that possibility as well Customization of Customer Service Artificial Intelligence (AI) and Machine Learning (ML) based customization can be made possible by digital banking software. Now banks can provide customers with significant financial solutions, interactive tools, and educational tools to enhance their experience.
In a nutshell, the modern banking system cre ates real-time data streams and accelerates critical analytics to enable fully digital customer journeys.
Since it’s easier said than done, we still need to fight the constraints obvious within the digital banking landscape such as strong worries about data security, along with the dangers of cyberattacks and fraudulent activity. What is Digital Banking Unit (DBU)?
It is a specialized fixed point business unit or hub that consists of minimum digital infrastructure for delivering and servicing existing financial products and services digitally. The services are available in both self-service and assisted modes to give customers cost-effective and convenient access to digital experience in an effective, paper less, secure, and connected environment with the majority of services being available.
In addition, digital banks currently offer a number of services traditional banks simply can’t, such as the ability to buy gold, cryptocurrencies, and stocks straight from the banking app.
“Mobile banking is expanding across the nation as a result of the demands of new generation clients, who value quick satisfaction and want one-click solutions for everything, including payments and other banking services.”
Alongside the services that once required lengthy delays are now swift and time-free. Through the digitization of banks, rural India has benefited theThemost.search for the nearest bank and long-dis tance commutes are over. People can now access banking features with the push of a button.
There are several unfounded fears that people have about using the internet for banking ser vices. Cases of fraud are frequently exaggerated, which adds to the fear factor, causing a number of uneducated consumers to be afraid to use digital banking. Adopting New Technology For banks looking to achieve full digital transfor mation in a shorter amount of time, increasing investment in technological integration, prioritiz ing cyber security, continuously working toward digital upskilling of existing talent, and continu ously innovating and building digital products for customers are Collaborationessential.withcompanies that specialize in providing digital financial services, such as Fintechs and NeoBanks, will help ensure banks embrace digital technology quickly. This will fur ther help the development of an interconnected, sustainable, and future-proof digital environment.
Great Profits & Lower Operational Cost Banks operating costs have been significantly cut by digital banking as they require minimum physical infrastructure and human resources. Thus banks are now able to offer better interest rates on deposits while also charging lesser costs for services. Furthermore, digital banks can also sell their products and services to younger, tech-savvy generations online, which has also contributed to the revenue increase.
Many people can’t take advantage of digital bank ing services due to a lack of internet connectivity and technical education. Furthermore, many parts of India still continue to have extremely low literacy rates. This is a serious obstacle to the widespread adoption of digital banking throughout the country.
RPA (Robotic Process Automation) RPA can assist in automating some monotonous finance and accounting operations, allowing operational staff to concentrate on less repetitive but more important activities. They can under stand human language much better and manage more complex operations when paired with AI, machine learning, deep learning, and natural language processing skills.
JAOKAR
24×7 Availability
The Conclusion India is a technologically advanced country. We are adapting to new technologies and at the same time, we are continuously innovating new technologies. All financial institutions today have placed a high focus on Digital Transformation. Digitalization is no longer an option but an experience which is today’s consumer demands.
Fear of Online Frauds
AMIT CDO & NKGSBCISOBANK
The majority of banking functions can now be used by consumers while they are at home, at work, or even on the go. Virtue digital banking. Money transfer, online bill payments and invest ments are now made easier, quicker and safer.
Rather a need for businesses and banks due to declining deposit margins, more competition, and changing customer mindsets. As a result, the future of digital banking in India is bright, and we may expect new innovations in banking services in the near future.
Bridging the Gap Towards Digital Banking: Education & Accessibility
AUGUST 2022 ENTERPRISE IT WORLD 29 NKGSB BANK // CIO TALK
On the other hand, IP traffic or flow of data across the internet is a more reliable source that is high-fidelity, agnostic and service focussed. By transforming this data into smart data, it allows CSPs to obtain the visibility and level of information necessary to improve the customer experience.CSPscan get a real-time overview of their network services, technologies, and subscribers. They are infused with user experience as they span all devices, network infrastructure, and applications consumed. Smart data is the key to improving customer experience by delivering the insights needed to ensure good network performance for CSPs.
@ACCENTINFOMEDIA.COM
Cyber-resiliency has evolved from being an IT Security initiative to a
Arbor Cloud delivers an integrated, ondemand solution to both enterprises and service providers with comprehensive protection from modern, high-volume DDoS attacks that target bandwidth, ‘low and slow’ attacks targeting applications and infrastructure, and concurrent, multi-vectorNETSCOUTattacks.Threat
NETSCOUT TO CYBERSECURITYADDRESS CHALLENGES
Only cross-silo collaboration between these two teams can quickly and effectively determine whether an IT service event is a performance issue or a security incident which is sorely needed in today’s organizations’ complex digital infrastructure.Withthiscollaboration, organizations can improve network performance, reduce security risk and accelerate security incident detection and response.
Its solutions continuously evolve with the changing business needs
Enterprise networks are becoming more complex and cyber-attacks are increasing exponentially. Explain how network visibility is crucial to addressing security challenges? Visibility has always been crucial and is gaining further importance as the infrastructure is getting more complex and multifold. For instance, while there are business benefits brought about by Digital Transformation and Cloud adoption, they also come with a few challenges with loss of visibility and lack of control being the top two. When the applications are spread beyond the DC into CoLo, Cloud, or SaaS environment, there are several edges to the combined network. The IT team either has limited or no visibility into it. The team also has no direct control over these environments, with automation and orchestration topping up the existing challenges.
But for solving any business problem, we first require proper network visibility of the traffic flow. Network visibility solutions should evolve with changing business needs. It is important to have a solution in place, which maintains visibility across the entire chain irrespective of where they are hosted and accessed from.
EFFECTIVELY AMBIKABY
ENTERPRISESSUPPORTS
NETSCOUT ENTERPRISE IT WORLD AUGUST 202230 Q&A // NETSCOUT
How is NETSCOUT SYSTEMS INC., supporting businesses to deal with the constantly evolving cyber threat landscape? Enterprises are under constant attacks and the severity is only going to increase with bad actors leveraging new-age tools and technologies. According to IDC, 86 percent of boards of direc tors see cybersecurity as a top priority in 2022. Organizations require a way to integrate how they defend against both inbound and outbound attacks.NETSCOUT Arbor Edge Defense (AED) addresses that need. By using stateless packet processing technology and armed with highly curated global threat intelligence, AED acts as a network perimeter enforcement point where it detects and blocks inbound cyberthreats and outbound malicious communication in bulk and acts as the first and last line of perimeter defense. It automatically blocks inbound DDoS attacks and other commodity cyber threats to maintain network or service availability and takes the pressure off downstream security devices like next-gen firewalls. It alerts security teams of compromised internal hosts and helps them to stop a data breach.
Intelligence helps in the war against internet-scale threats by identifying and remediating threats with the Active Threat Level Analysis System (ATLAS).
Our world-class ATLAS Security and Engi neering Research Team (ASERT) deeply research malware campaigns and botnets at a global level, providing much-needed context to the overall threat environment. What is key to improving the customer experience for communi cation service providers? All organizations in the service industry strive to deliver optimal customer experience. With the digitization of services, it is very crucial for IT teams to understand what is happening inside the network.Having insights into device behaviors and their Quality of Service (QoS) experience, Com munication Service Providers (CSPs) can ensure enterprise network performance that leads to optimal user experience. Data is key to know ing how the network works and providing the visibility required to identify problems and make prompt repairs. CSPs have a large database of servers, telemetry, history, and stream where data is accessible but flawed due to variable fidelity, vendor dependency, and infrastructure focus.
How can the collaboration between IT and cybersecurity teams at the organization ensure the protection of resources from cyber-attacks? Cybercrime has increased to unprecedented levels in the recent past. Bad actors are exploit ing new vulnerabilities and disrupting VPN networks, firewalls, and cloud-based tools used by WFH employees. Operations can freeze leading to financial losses, customer churns, and brand damage. IT teams ensure an efficient experience for employees and customers and security teams are focussed on protecting assets and address ing security issues. Challenges are aggravated further when IT and cybersecurity teams do not collaborate effectively.
For this, they require operating comprehen sible visibility at the edge and integrated analysis throughout the transaction ecosystem. With so many edges, in today’s IT environ ments, there are gaps in visibility making it a challenge to determine whether the problems are occurring at the client edge, network edge, data center, or cloud edge. Traffic problems at these edges can result in delayed logins, slow responsiveness, and even outages with key business applications, negatively impacting employee productivity and customer service.With limited visibility across so many edges, the ITOps team requires vendor-agnostic tools that can quickly identify the source of issues.
Organizations should look for scalable solutions that use curated threat intelligence data to identify potential threats to incorporate cyber resiliency as a business strategy.
In today’s remote and hybrid work culture, what are the new challenges faced by ITOps teams? How is NETSCOUT helping organizations address them? Yes, the hybrid mix of remote and onsite work has become the new normal. ITOps team has the responsibility of delivering a good end-user experience in a hybrid work model by ensuring collaborative tools and business applications deliver a superior end-user experience. This model relies heavily on UC&C and collabora tion systems with the majority of employees using video conferencing for remote work. With corporate infrastructures becoming more complex, relying on multiple vendors to deliver vital services, both to home and office workspaces is common. ITOps teams face the challenge of being able to identify and resolve problems at the earliest. With SaaS, UCaaS, and data center-based services operating at the edge, they are under pressure to assure the end-user experience.
NETSCOUT’s Smart Edge Monitoring is a new, patent-pending architecture that provides complete visibility and insights for IT teams to assure the highest quality employee digital experi ence for any network or application regardless of where users perform their jobs. Early detection and rapid resolution of such problems reduce employees’ frustration and lost productivity and may even avoid broader-scale outages. What kind of interest have you observed from the region for your offerings? India is a mature market and market trends especially in cyber security are very similar to other developed markets like the US and Europe. Customers are increasingly interested in the availability, integrity, and confidentiality of their data and services. The government and regulatory authorities are also playing important roles in educating and spreading awareness about cyber security threats.
“With the pandemic accelerating the digital transformation journey, remote connectivity became crucial. With remote working becoming the norm, cyber attackers reacted accordingly, leading to varied attacks targeting enterprise networks.” key business strategy. Explain? With the pandemic accelerating the digital transformation journey, remote connectivity became crucial. With remote working becoming the norm, cyber attackers reacted accordingly, leading to varied attacks targeting enterprise networks. Triple extortion attacks are being used to increase the odds of the extortion payment. This consists of encryption data with ransomware and demanding payment for a decryption key and stealing data with the threat to expose or sell publicly unless payment is received. The attacker launches a DDoS attack to prove the seriousness of the threat, block communication to internal network resources and overwhelm security teams. Attacks have extended to devices used by organizations to support remote work initiatives. In addition to the increase in overall attacks, there is a rise in secondary and tertiary attacks as well. These changes to the attack vectors are driving enterprises to rethink their approach to cyberresiliency which is the ability to predict, resist, recover from and adapt to massive changes in cyberattacks. Prior to the pandemic, the cyber resiliency plan was more of a security initiative but now with the changes in enterprises, IT, and security, it has evolved into a business strategy. Cyber resiliency improves a company’s ability to identify and measure risk, while also improv ing visibility for both IT and Security teams with the responsibility of protecting resources.
VINAY SHARMA REGIONAL DIRECTOR, INDIA AND SAARC, NETSCOUT
AUGUST 2022 ENTERPRISE IT WORLD 31 NETSCOUT // Q&A
CISCO ENTERPRISE IT WORLD AUGUST 202232 Q&A // CISCO INDIA & SAARC
In the hybrid world of work, one of the key chal lenges to address is to ensure that everyone has a great collaboration experience, equal oppor tunities, and an outlet to voice their opinions, regardless of their physical location. And this is where the integration of Slido in Webex shines.
We also have Webex for Customer Experi ence that enables companies to create lifelong relationships with customers, including the ability to listen, engage, augment, learn, and adapt. Therefore, we are continually re-investing in our platform to align with evolving customer needs to empower remote workers and make their Webex experience 10x better than in-person interactions.
Firstly, we have Webex’s People Insights feature that aligns with the goals people set personally for their meetings, work-life integration, connections, and focus time, helping people work smarter and combat burnout. Secondly, we firmly believe that eliminating language barriers is one significant step in making the platform inclusive. Through our real-time translation feature, Webex custom ers can preview translations from Hindi into 100+ languages. Our AI-powered gestures capture body language and let participants interact more naturally. Thirdly, we have also introduced AI-powered noise removal and speech enhance ment technology. Fourthly, Webex simplifies communications via robust calling, meeting, and messaging features integrated into the frequently used apps. It integrates seamlessly with industryleading apps and tools so you can get more done without toggling between applications. Lastly, the integration of ThousandEyes into Webex Control Hub provides better experiences for Webex Suite users by empowering IT admins to proactively monitor app performance issues. As emerging technologies like virtual reality and augmented reality make their way into video conferencing technology, virtual meetings will slowly shift to the usage of AR headsets and immersive 3D photorealistic holograms. Last year, we also launched Webex Hologram in global markets, the industry’s only real-time meeting solution that leverages augmented reality headsets to combine feature-rich Webex meeting functionality with immersive 3D holograms. How Cisco Webex offers top-notch data privacy & security to customers? As cyber-attacks get more sophisticated and vir tual meetings grow more regular, it is paramount for businesses, regardless of size and sector, to identify and leverage the right virtual collabora tion platforms to assure data safety and security of the workforce and external stakeholders. Today, organizations need flexible and inclusive solutions with security built into them and not just bolted on.
One can host interactive meetings for 10 to 10,000 participants and run live polls and quizzes, making meetings more inclusive, productive, and meaningful. It also allows the presenter to collect feedback and drive engagement in real-time.
With feature-loaded innovations like live transcriptions, noise cancellation, virtual backgrounds, AI assistant, and more, Cisco Webex offers an effective collaboration that drives enhanced customer experience
For participants that might be hesitant to ask a question or share their voice, Slido’s ability to display questions anonymously enables a higher degree of participation and feedback.
CISCO WEBEX PLAYS CRITICAL ROLE IN POWERING AN INCLUSIVE FUTURE AMBIKABY
@ACCENTINFOMEDIA.COM
As we go deeper into the digitally connected world, we want to enable a shift away from the reliance on in-person interactions, opening the global economy and giving everyone a seat at the table—no matter where the table is. Can you explain how Cisco’s acquisition with Slido is helping the Webex platform?
And by using Slido to crowdsource questions in advance, presenters can be sure to share content that resonates – ultimately leading to a more constructive session.
In the era where digital CX is on high priority for any business, how is Webex improving its virtual meeting experiences? Today we live in a hybrid world, where video conferencing has become our way of life. Collaboration without compromise has become mission-critical, especially as these platforms continue to facilitate critical functions like governance, citizen services, banking, and more. According to Gartner, by 2024, in-person meetings will account for just 25% of enterprise meetings, a drop from 60% prior to the pandemic. Undoubtedly, hybrid working is here to stay, as employees and businesses are seeing tangible benefits across key indicators – from improved overall employee wellbeing to better productivity and work performance. Nonetheless, to fully leverage the opportunities of a hybrid world, it is important that organizations provide a best-inclass virtual experience to their employees and customers alike. At Cisco, our purpose is to power an inclusive future, and Cisco Webex plays a critical role in achieving this by enabling everyone, regardless of geography, language, and personality type, to participate in virtual meetings. To make the most of the hybrid era, organizations need to make sure their solutions are flexible, inclusive, supportive, secure, and easily managed on the backend by IT, and Webex is all about simplicity. With our feature-loaded innovations like live transcrip tions, noise cancellation, virtual backgrounds, AI assistant, and more, we are offering an effective collaboration that drives enhanced customer experiences. They are focused on enabling seam less and secure collaboration, smart hybrid work experiences, and intelligent customer experiences.
What are the latest innovations introduced to the Cisco Webex platform? Are any specific innovations focused only on the India region? Besides enhancing collaboration capabilities, Webex has been updated with over 1000 new innovations in the last 12-18 months to give users an uninterrupted, immersive, and intelligent experience. Cisco Webex features span advance ments for the hybrid workforce, workplace, events, and IT teams. Our innovations are flexible and adaptable for any workstyle or device, irrespective of the location.
What have been your organiza tion’s achievements and your future plans?
Our Webex portfolio is at the centre of our customers’ strategies for securely empowering teams and increasing productivity. Webex has a 360-degree approach to security, including strong encryption, highly secure search, device and browser protection, and retention and archiving defined by customers’ policy. Additionally, Cisco’s Security and Trust organization oversees security and privacy for Webex and publicly discloses security vulnerabilities. We have also upgraded Webex Meetings to use Zero Trust security, with identity verification and added support for Webex Devices – only authenticated users can view messages and files in Webex spaces. Security and privacy are core to Cisco. Protect ing customer data is an ongoing priority, and we continuously invest in compliance capabilities and adhering to the country’s regulation policies.
“As cyber-attacks get more sophisticated and virtual meetings grow more regular, it is paramount for businesses, regardless of size and sector, to identify and leverage the right virtual collaboration platforms to assure data safety and security of the workforce and external stakeholders.”
At Cisco, we are committed to using technol ogy to empower a workforce and transform workspaces. During the pandemic, Cisco Webex has been instrumental in keeping people safe and connected while ensuring business continuity across sectors. With Webex, we have helped edu cational institutions, healthcare frontline workers, and government agencies in India connect seamlessly and securely during the pandemic. We are continuing this momentum and helping the automobile manufacturer – Maruti Suzuki augment their offerings and reach a broader customer base across India. Maruti customers can come to their website and request a virtual tour of the showroom and the car they wish to explore from the comfort of their homes. It allows them to have a rich audio-video interaction with the ability to share the screen and co-create the car customizations through the 3D rendering of the cars. We are also enabling e-justice in India with the supreme court and many state high courts using the Webex platform to deliver justice today. Our vision with Webex is to empower digital workers on the planet to participate equally in a global economy. If we do this right, we can level the playing field – creating opportunities regardless of geographic borders, socio-economic background, or language. We know that we are just at the start of a journey to redefine the meet ing experience. This is a huge undertaking that will profoundly impact our lives, our communi ties, and our companies. As an organization, we believe the time to act on this vision of powering an equitable future is now, and we have the technology and, more importantly, the intent to make a real difference. What volume of growth are you expecting from the Indian market in the post-Covid era? Globally, Webex had around 600M monthly participants since the onset of the crisis and was one of the few platforms with the global scale to empower the digital workforce. India consistently continues to record the second-highest usage outside of the US. Even with people moving back to the office, the numbers reveal that Webex meetings in March 2022 were over 25% higher than in March 2020. The rapid digitization occur ring agnostically across the country is commend able and a testament to India’s appetite for digital innovation. Forrester recently projected the tech spending in India to grow 8.7% in 2022, one of the highest in the Asia Pacific region. Therefore, we expect to foresee a massive opportunity for Cisco Webex in this digital world.
AUGUST 2022 ENTERPRISE IT WORLD 33 CISCO INDIA & SAARC // Q&A
Webex offers advanced data loss prevention (DLP) capabilities to ensure more visibility and control over sensitive data. Thus, Webex is the best choice for security-conscious organizations around the world.
MINHAJ ZIA DIRECTOR FOR COLLABORATION SALES, CISCO INDIA & SAARC
@ACCENTINFOMEDIA.COM
Says Prabhuraj Patil, Commercial Director, Physical Access Control Solutions, South Asia, HID Global What is your role in HID Global and how has the PACS business been doing in India?
Can you talk more about the recent HID exclusive Global PAC- survey?
● User convenience: 60% of the respondents cited ‘ease of use’ as their primary reason to shift or adopt a newer access control technology. Besides security and seamless technology, both users (employees, residents or visitors) and busi nesses (security, facilities and IT teams) alike look for convenience.
● Contactless solutions and mobile access: 42% of respondents said they plan to upgrade to mobile-ready systems. This means that busi nesses will benefit from increased operational efficiency, while users (employees/visitors) will find using their mobile devices easier and more convenient. The survey also indicated that the pandemic played a role in the increased demand for contactless physical access control. About 32% of respondents cited they are looking to adopt touchless solutions, including contactless biometrics.
HID ENTERPRISE IT WORLD AUGUST 202234 Q&A // HID GLOBAL
Some of our recent offerings include: ● HID Mobile Access ● Next Generation HID Signo Readers ● HID Aero Controllers ● Seos Credential Technology
The definition of a ‘secure place’ and need for enhanced security continues to evolve. There are numerous triggers for these changes – increasing cyber-attacks, shift to hybrid or remote working, higher mobile device penetration and so on. Having been in the electronic security industry for over two decades, I have personally seen the access market ecosystem drastically transform. A significant portion of my security journey has been with HID Global which began in 2013. Within the company, I had the opportunity to oversee businesses in India as well as the SAARC region. Currently, as the Commercial Director for PACS, I look after the entire access control business for South Asia. With increased demand for holistic security and proliferation of mobile devices, there is a strong upward trend in the adoption of advanced physical and mobile access control solutions in India. A recent industry report pegged the coun try’s access control market to grow up to USD 313.11 million by 2030. Therefore, there is no denying the tremendous opportunity this market holds. India remains a key market for us and the last few years we have seen a steady uptake for our cloud and mobile-based solutions among enterprises. In addition, we have also seen interest from banks, educational institutions, healthcare units and government entities.
● Open standards and interoperability: 49% of respondents selected the ability to support new tech in the future as one of the top three features in a new access control solution, and 33% included integration with existing security platforms as being important. This means that businesses are moving away from proprietary models and adopting open standards-based technology which allows for software upgrades via the cloud. One in five respondents added that interoperability and open standards will be among the top trends to shape the coming future of physical access control. Therefore, actively tracking market changes and being able to cater those needs can be a game changer for players within this space. With over three decades of rich industry experience and sev eral global successes, we like to share our findings with the larger security community. With these valuable insights, we hope to grow collectively as an industry and support our related stakeholders.
INDIA IS A RAPIDLY GROWING ACCESS CONTROL MARKET FOR US AMBIKABY
We recently published a report in partnership with IFSEC Global titled “New State of Access Control Report Underscores Growing Demand for Future-Proof Mobile Solutions”. We surveyed over 1,000 respondents across the UK, EMEA, North America, and the Asia Pacific for their comprehensive insights into the current state of the physical access control market, challenges and future industry trends. The report also sheds light on regional disparities, complexities in decision making and challenges related to upgrading. Some key highlights from our survey:
Please share your thoughts on the current physical access control (PAC) market. And, what are some of the commonly seen challenges users face when implementing PAC technology? The dynamic nature of this market is evident when we compare this year’s report to our 2020 report. The 2020 report states that 51% of respondents believed their current system either met or exceeded their requirements. Within just two years that figure dropped to 41%. Several market triggers can contribute to these changes, with the pandemic being the biggest one in the last two years. As per this year’s report, ‘security’ and ‘convenience’ were among the top challenges with respect to implementation. 40% said that their biggest challenge was protecting against security threats while being able to issue and revoke ID credentials efficiently was selected by 37%. The pandemic in addition posed a fresh set of challenges when it came to administering access control credentials. What are your plans for the PACS business in India in the next quarter of 2022? India is a rapidly growing access control market. Industry reports state that hardware upgrades will continue to rank highest in India, followed by software and services. Demand for contactless biometric solutions like facial recognition is also expected to grow in the country. As for industrywise adoption, we can expect IT businesses to continue being the biggest adopters, followed by BFSI, Defense, Manufacturing, Healthcare, Logistics and Government institutions. Undoubtedly, the Indian market is ripe with opportunity. As global leaders in access control
“During the pandemic, it became evident that adopting or transitioning to new technology was no longer an option but a necessity for businesses to stay secure.”
AUGUST 2022 ENTERPRISE IT WORLD 35 HID GLOBAL // Q&A
During the pandemic, it became evident that adopting or transitioning to new technology was no longer an option but a necessity for businesses to stay secure. Often, legacy security solutions use proprietary technology that is too static and offers little or no provision for functional enhancement. Unable to adapt, businesses could become easily prone to attacks. In many cases, legacy technolo gies are anchored to obsolete software, devices and protocols, making it difficult to drive change in the access control infrastructure. Therefore, it is crucial for decision-makers like CIOs to work with technology partners who can provide solutions that are seamless and do not create obstacles. Adopting interoperable technologies with high-frequency credentials and modern encryption standards will ensure the best security and easily support new functionality.
What are the key challenges CIOs face when implementing new tech onto old or existing infrastructure (when it is not a green field project)?
technology, we look forward to further strength ening our presence in the coming months. How are you managing this dynamic market in terms of resourcing and manpower, do you have any plan which you want to share? Our investments will be primarily targeted toward enhancing business operations, address ing customer needs, increasing brand awareness and ensuring our customers have a seamless experience.
PRABHURAJ PATIL COMMERCIAL DIRECTOR, PHYSICAL ACCESS CONTROL SOLUTIONS, SOUTH ASIA, HID GLOBAL
VIJAY BHARTI SVP, HEAD OF SECURITY PRACTICE, AND CISO HAPPIEST MINDS TECHNOLOGIES
Vijay Bharti, SVP, Head of Security Practice, and CISO of Happiest Minds Technologies said, “We have provided cyber security services to leading healthcare providers across geographies, but with COVID there was a sudden surge in the demand for cyber security for their Digital Transformation journey. I take great pleasure in announcing that we have launched a Centre of Excellence (CoE) for security services in the healthcare industry. This focused initiative will help us understand the pain points of healthcare service providers in-depth and build actionable solutions and services around them.”
ENTERPRISE IT WORLD AUGUST 202236 SECURITY // HAPPIEST MINDS TECHNOLOGIES
AMBIKABY @ACCENTINFOMEDIA.COM
Srinivas Iyengar, Vice President, Head of Healthcare and Life sciences, Happiest Minds Technologies, said, “With care delivery going beyond hospital walls, patient-generated health data becoming an integral part of defining care pathways, the influx of connected devices, healthcare is experiencing a very high degree of disruption. The speed at which digital and emerging tech adoption is unprecedented and under these circumstances, one of the biggest challenges that the healthcare industry is facing is cyber threats which put patient safety and privacy at risk. We had a strong center of excellence for cyber security and since the last year, we have been helping the healthcare industry as well in this endeavor. Our deep expertise in Cyberse curity and a decade of experience working with healthcare customers has enabled us to formally launch our specialized cybersecurity services for healthcare customers.”
Born Agile’ launch of its Cybersecurity services in the healthcare vertical
HAPPIEST Happiest Minds Technologies Limited, a ‘Born Digital . Born Agile’ launch of its Cybersecurity services in the healthcare vertical. Cybersecurity for healthcare provides end-to-end security services for the Healthcare industry by applying a robust and proven framework tailored to meet regulatory requirements, digital security best practices, and cutting-edge tools & technologies. Happiest Minds enables cyber security for healthcare businesses with a 360⁰ approach by applying a robust and proven framework built per regulatory requirements, digital security best practices, and best-of-the-breed tools and technologies. These services will help custom ers stay updated with evolving governance policies and tighten their healthcare security posture using leading technologies AI/Big Data/ Behavioral and analytics. The company ensures that your organization complies with regulatory requirements (HIPAA/HITRUST) and becomes a resilient healthcare provider.
“With care delivery going beyond hospital walls, patient-generated health data becoming an integral part of defining care pathways, the influx of connected devices, healthcare is experiencing a very high degree of disruption.”
HAPPIEST MINDS TECHNOLOGIES ANNOUNCES THE LAUNCH OF END-TO-END SECURITY SERVICES FOR HEALTHCARE
Solutions Factory – Tech Data CoE has the capability to design and build solutions capa bilities around Cloudera’s offerings, with pre-built assets and materials that allow business partners to jump-start their data journey with Cloudera. Leveraging Tech Data allows them to explore cross-solutions capabilities in this domain.
Sales Acceleration – Tech Data’s CoE can also function as an extended pre-sales support for driving sales opportunities through POCs, demos, or solution design. This empowers business part ners to rapidly expand customer reach.
SANJAYBY
VICE PRESIDENT, ASIA PACIFIC AND JAPAN, CLOUDERA VICE PRESIDENT, ADVANCED SOLUTIONS FOR MDC & ANALYTICS, TECH DATA ASIA PACIFIC
& JAPAN REMUS LIM BENNETT WONG HAPPIEST MINDS TECHNOLOGIES ANNOUNCES THE LAUNCH OF END-TO-END SECURITY SERVICES FOR HEALTHCARE Partnership to support growth of the data analytics market in the region AUGUST 2022 ENTERPRISE IT WORLD 37 CLOUD COMPUTING
“We are committed to the success of our cus tomers and partners and believe this partnership will allow our partners to service our customers better. Through the Tech Data CoE facility and our collaboration with a broader network of partners, business partners will be empowered with Clou dera’s skills, pre-built end-to-end solution assets, POCs and demos that facilitate solution discovery and formulate the right data driven use cases for our customers. Customers can speed up their access to insights while ensuring control and secu rity over multiple cloud environments and data centers. The wide range of offerings will cater to multiple facets of cloud infrastructure such as data centers, hyper-converged infrastructure, hybrid cloud, and DevOps. This flexibility allows them to unlock more value from their data while working towards being data-first,” said Remus Lim, Vice President, Asia Pacific and Japan, Cloudera.
Representing the view of end-users, SS Lim, Managing Director for PTC Systems shared “The ability to harness data provides great insights for companies, and Tech Data’s CoE for Cloudera is an excellent value-add for the customers. Through this CoE, we have a platform to conduct idealiza tion workshops and demonstrate value creation as an outcome of Digital Transformation.”
@ACCENTINFOMEDIA.COM
Tech Data’s CoE is a guided approach to enabling growth across next generation tech nologies. It is an end-to-end approach designed to drive growth through enablement, technology innovation, market ready solutions, and its ben efits include:
Partner Enablement – Tech Data Practice Builder Methodology empowers business part ners to expand their sales and pre-sales capabilities in data & analytics by leveraging Tech Data CoE’s Practice Builder enablement framework.
Tech Data announced a new milestone in its longstanding partnership with Cloudera – the hybrid data company that empowers busi nesses to transform complex data into clear and actionable insights – in the Asia Pacific and Japan (APJ) region. The partnership will foster a deep collaboration between Tech Data and Cloudera that equips business partners in the region to be Cloudera-ready with Tech Data’s Centre of Excellence (CoE). The partnership supports Tech Data’s strategy of driving hybrid cloud motion. This emphasises the capabilities of the hybrid data platform on the Cloudera Data Platform (CDP) that business partners can look forward to. Commenting on the development, Bennett Wong, Vice President, Advanced Solutions for MDC & Analytics at Tech Data Asia Pacific & Japan, said, “The enterprise cloud landscape is fast evolving where the onus is on providing custom ers with the highest quality of service on managing IT infrastructures and applications. This partner ship will enable us to provide cloud services to clients with efficiency, remote-ability, and safety.”
With the rising anxiety in the Indian market to meet the Sustainable Development Goals of 2030, more companies are expanding their environmental, social and corporate governance (ESG) programmes to stay competitive in global markets. Today, ESG is a top business priority that leaders are actively working towards to align their plans with SDG mandates. As difficult as it is to develop strategies because of the sheer number of factors to take into con sideration, it is a larger challenge to operationalize ESG across organizations. In a conversation with Enterprise IT, Arjun Ramaraju, CEO of Conneqt Business Solutions, a leading IT and BPM services provider in India, said the company has launched “ESG as a Service” to reduce operating costs and offer a consultative approach to ESG adoption in the country. The service, launched in collaboration with BillionLives, aims to bring about a difference in how enterprises perceive and calculate their ESG output.
What kind of impact can digital service companies make on ESG adoption goals for organisations in the current environment? Digital service companies have a profound impact on ESG adoption goals globally as well as in India. Sustainability related goals, targets, and perfor mance can all rightly measured through technol ogy. Environmental disclosures which cover various aspects including energy usage, air pollut ant emissions, GHG emissions, transitioning to a circular economy, waste generator, biodiversity, and the like, can all be tracked through new-age technology. While there are several enterprises who very well understand ESG by the nature of the businesses they are in, many need professional expertise to ensure that their intent is translated into reality. With the help of new-age technology, key collaboration and our industry expertise, we hold the ability to provide business services in the market, which supports the assessment and sustainability goals for any large enterprise in the country today. We track how companies approach workplaces, communities, gender, social diversity, differently enabled employees and policies in terms of social disclosures. Apart from keeping a track of a company’s ESG performance, we also evaluate societal and investor expecta tions from the enterprise at large. We are able to get multiple stakeholders and functional teams within an organization to come together to see how companies can meet their ESG compliance. Hence, transformation is happening within the digital services companies to become a reliable service provide helping enterprises in their ESG journeys.
AMBIKABY @ACCENTINFOMEDIA.COM
How is Conneqt helping companies realise their ESG goals? What is the tech infrastructure used in this process? We believe that the acceleration of ESG can be a significant business advantage for enterprises, right from value creation, increased access to capital, reduced risks, and increased focus on the environment. At Conneqt, we have partnered with Billion Lives to launch “ESG as a Service”. With a deep tech platform that helps customers and enterprises addresses ESG right across the value chain, we are focused strongly on building and strengthening adherence for companies. As we are primarily focused on technology enabled business services, “ESG as a Service” provides a great opportunity for us to address how ESG adoption and adherence can be taken care through new-age technologies. We have a very structured game plan with an innovative approach to transform, modernize, and run ESG programs while simultaneously monitor ing industry trends using sentiment analysis technology.Weareredesigning ESG processes for compa nies with a holistic strategy that includes analys ing ESG readiness through maturity surveys, materiality assessment, and sustainability strategy and reporting, as well as assurance reporting and ongoing performance monitoring. We have also adopted new age technologies such as AI to generate peer benchmarking and sentiment analysis while adopting a consultative approach, offering enterprises customised solutions to maintain their ESG health.
AS ESG GAINS PROMINENCE, TECH IS TRACEABLEENABLINGCOMPLIANCE:
ARJUN RAMARAJU, CEO, CONNEQT BUSINESS SOLUTIONS IT/ITES companies find newer revenue models
CONNEQT ENTERPRISE IT WORLD AUGUST 202238 Q&A // CONNEQT
What is the current ESG adoption landscape in India? The integration of environmental and financial norms has become a growing trend in India and there has been consequent awareness on ESG adoption across the country today. A number of organizations have started to assess, manage and disclose their ESG commitments. Investors and other stakeholders are also looking at traditional financial metrics along with their ESG commit ments and working towards integrating environ ment, social and governance goals aligned with the norms that are laid out within the country. This trend is only going to grow further and at Conneqt too we have taken steps to accelerate our ESG journey. The adoption of ESG as a metric to evaluate corporate performance is going to be necessitated.
Which segments in India have adopted ESG planning at an accelerated pace? Eventually we will witness ESG adoption across sectors but industries such as energy, resource intensive companies, auto manufacturing
“As we are primarily focused on technology enabled business services, “ESG as a Service” provides a great opportunity for us to address how ESG adoption and adherence can be taken care through new-age technologies.” industries, chemicals and consumer goods are embracing the sustainable growth in a bigger way in the country. Besides this, several other segments are also keen to make an impact on their how they are addressing their social goals and commitment to the environment. Retail and e-commerce companies are re-analysing their packaging, materials, vendor associations and the like. There is also a larger revolution in consumerfocused industries given consumers expectations of wanting to be associated with brands which have strong commitments to environment, society and governance.
ARJUN RAMARAJU CEO, CONNEQT
How is Conneqt managing the dynamic market demands in terms of resourcing and manpower? Technology is certainly a key focus and employees with the right skill sets play a large role for any company to do well. We have very strong employee policies which levy great importance to the overall employee value chain. In addition to that, as a company with a focus on digital, we have set up strong competency centers on digital, which are powered by strong tech alliances with the leading OEMs. We are supremely focused on nurturing digital IT talent from within through upskilling initiatives which is a strong value proposition for us to be able to attract skilled talent.
AUGUST 2022 ENTERPRISE IT WORLD 39 CONNEQT // Q&A
The electronic design automation (EDA) industry is experiencing strong financial growth and is making a vital contribution to the success of much larger semiconductor and electronic systems industries. As more systems companies move to design their own chips and electronic products, what are the key EDA trends impacting the pace of innovation?
Design-for-context raises several challenges and opportunities for EDA tool providers such as: ● Creation of collaborative workflows, includ ing better process, data, and intellectual property (IP) management across design and test phases, that allow many specialists to work together efficiently and effectively.
● Utilization of model-based system engineer ing (MBSE) with system level, hierarchical design and varying levels of model fidelity depending on the type of simulation (circuit, system, or network).
THREE TRENDS SHAPING THE FUTURE OF EDA SANJAYBY @ACCENTINFOMEDIA.COM
The electronic design automation (EDA) industry is experiencing strong financial growth and is making a vital contribution to the success of much larger semiconductor and electronic systems industries. We converse with Niels Faché, vice president and general manager of PathWave Software Solutions, Keysight Technologies to discuss the key trends in EDA
Drivers of design for context in product development teams include increased system complexity, more demanding performance and cost requirement tradeoffs, and shorter develop ment lifecycles. To address these issues, EDA vendors and users are seeing closer collaboration in the ecosystem from developers of components (such as an RFIC), to a sub-system (such as a radar), and a system (such as an autonomous drive system) to address integration challenges and optimize performance.
● Improvement of models, including measurement-based models, that increases the accuracy of simulations. Accurate simulations earlier in the design process enable development teams to reduce validation and verification risks and the need for iterative and costly physical prototyping.
● Increasing the number of simulations through high performance compute (HPC) and parallelization in the Cloud.
● Providing a formalized validation framework in simulation environments to sign-off on component compatibility in the required design context.Design for context requires closer partnerships between EDA companies with greater interoper ability between EDA, computer-aided design (CAD), computer-aided engineering (CAE), and test tools. It also calls for better integration of EDA tools with product lifecycle manage ment (PLM) systems and greater investment in simulation and test process and data management to raise Trend:productivity.Chipusage in all types of products is becoming ubiquitous and the semiconductor industry is now serving an increasing number of customer segments. How is this effecting the EDA industry?A:Chip demand currently outstrips supply, and this situation clearly has worsened during the pandemic. On a recent trip to Europe, Keysight’s chip design and manufacturing customers confirmed that demand is 30 percent higher than supply. Some chip fabs are fully booked for the next 2 years. However, companies are adding foundry capacity over the next 18 to 24 months that will likely result in a re-balancing of supply andThedemand.semiconductor industry is cyclical and there have always been demand cycles in chip manufacturing that have a downstream effect on the EDA vendor community. For example, automotive has been a cyclical industry for a long time. Other applications such as consumer and healthcare have occupied fab capacity during automotive down cycles. The diversity of applica tions and industry segments is helping to keep fab utilization high. Secular growth is strong and the “electrification of everything” is massively increasing the need
ENTERPRISE IT WORLD AUGUST 202240 TECH TRENDS // KEYSIGHT
Trend: Electronic product design is moving toward domain-specific orientation. What impact does domain-specific design have on EDA tool developers and users? A: It is not enough anymore for product developers to just consider the traditional specifications for a chip or board. They must also now consider the context in which their products will be integrated and used.
KEYSIGHT
AUGUST 2022 ENTERPRISE IT WORLD 41 KEYSIGHT // TECH TRENDS
Trend: Customers are demanding that chips and electronic systems last longer and function correctly throughout their lifetimes. This is particularly important in safety-critical markets like automotive and mission-critical markets like data centers. How do EDA tools address product aging, quality, and reliability concerns?
“Secular growth is strong and the massivelyof“electrificationeverything”is increasing the need for new chip sets.” for new chip sets. Simple 8- or 16-bit microcon trollers are no longer sufficient for many applica tions that need more advanced computational processing and connectivity. Start-ups continue to sprout up at a rapid pace creating new design starts and innovative products. The fabless model allows the industry to handle a growing spectrum of applications while making efficient use of semiconductor manufacturing capacity. There will be a continued need for EDA products to meet new design functionality and validation efforts. Design teams need better tools, IP blocks, and consulting services from EDA companies. Expanded use of chips in customer markets is a very positive development for EDA vendors whose growth and success rides in part on design starts and wins. More designs started means more demand for engineers and the EDA tools they use to get their jobs done faster with intelligent automation and higher productivity.
NIELS FACHE VICE PRESIDENT AND GENERAL MANAGER OF PATHWAVE SOFTWARE SOLUTIONS, KEYSIGHT TECHNOLOGIES
A: Design for reliability is nothing new for Keysight because the company’s instrument prod ucts have very stringent lifetime requirements. Reliability becomes a net positive only if fully embraced throughout design, manufacturing, and test processes. Keysight incorporates reliability best practices into its instrument product life cycles that have positively influenced its design and simulation tools over many years of develop ment. Keysight’s own internal tool users and commercial customers are increasingly interested in making sure circuits stay within electrical and thermal limits. This seems simple, but can be quite challenging, especially when considering environment and process variation.
Chips are Increasingly part of a much larger system interconnected through different packag ing technologies. Modeling these interconnect and packaging details is what makes designing for reliability so difficult. For example, space applications require built-in redundancies and special design patterns to increase radiation hard ness. This approach is also used in other mission critical applications such as healthcare. Reliability and aging (wear out) requirements are gaining importance in IOT, automotive, and consumer products where once aerospace and defense was the leading driver. As the cost of mistakes go up in these new applications, the importance of simulation on design quality increases. Keysight’s PathWave design tools enable simulation and analysis of signal and power integrity and electromagnetic effects, which directly affect quality and reliability. The impact for EDA tools could become even more significant if design customers push for simulation-as-signoff from the industry. This requires validation of software through independent test suites or test bodies. EDA tools and IP are also helping to predict and avoid field failures. Real-time data collection and analysis using embedded sensors and AI/ML software techniques promises to address silicon product reliability and aging soon.
“In order to defend against the broadening attack surface, security teams need an adequate level of visibility across workloads, devices, users and networks to detect, protect, and respond to cyber threats.”
● Ransomware actors incorporate cyber extortion strategies. The predominance of ransomware attacks, often buttressed by e-crime groups’ collaborations on the dark web, has yet to let up. Fifty-seven percent of respondents have encountered such attacks in the past 12 months, and two-thirds (66%) have encountered affiliate programs and/or partnerships between ransom ware groups as prominent cyber cartels continue to extort organizations through double extortion techniques, data auctions, and blackmail.
● APIs are the new endpoint, representing the next frontier for attackers. As workloads and applications proliferate,23% of attacks now compromise API security. The top types of API attacks include data exposure (encountered by 42% of respondents in the past year), SQL and API injection attacks (37% and 34%, respectively), and distributed Denial-of-Service attacks (33%).
CHAD SKIPPER GLOBAL SECURITY TECHNOLOGIST VMWARE
● Lateral movement is the new battleground. Lateral movement was seen in 25% of all attacks, with cybercriminals leveraging everything from script hosts (49%) and file storage (46%) to PowerShell (45%), business communications platforms (41%), and .NET (39%) to rummage around inside networks. An analysis of the telemetry within VMware Contexa, a full-fidelity threat intelligence cloud that’s built into VMware security products, discovered that in April and May of 2022 alone, nearly half of intrusions contained a lateral movement event.
Additional key findings from the report include:
VMWARE REPORT WARNS OF DEEPFAKE ATTACKS AND CYBER
AMBIKABY
Burned out security teams fight back against geopolitically motivated attacks and lateral movement inside networks VMWARE VMware, released its eighth annual Global Incident Response Threat Report, which takes a deep dive into the challenges faced by security teams amid pandemic disruptions, burnout, and geopolitically motivated cyberattacks. Sixty-five percent of defenders state that cyberattacks have increased since Russia invaded Ukraine, accord ing to report findings. The report also shines a light on emerging threats such as deepfakes, attacks on APIs, and cybercriminals targeting incident responders themselves.
EXTORTION
@ACCENTINFOMEDIA.COM
ENTERPRISE IT WORLD AUGUST 202242 SECURITY // VMWARE
● Cyber pro burnout remains a critical issue. Forty-seven percent of incident responders said they experienced burnout or extreme stress in the past 12 months, down slightly from 51% last year. Of this group, 69% (versus 65% in 2021) of respondents have considered leaving their job as a result. Organizations are working to combat this, however, with more than two-thirds of respon dents stating their workplaces have implemented wellness programs to address burnout.
Chad Skipper, global security technologist at VMware, said, “In order to defend against the broadening attack surface, security teams need an adequate level of visibility across workloads, devices, users and networks to detect, protect, and respond to cyber threats,” “When security teams are making decisions based on incomplete and inaccurate data, it inhibits their ability to implement a granular security strategy, while their efforts to detect and stop lateral movement of attacks are stymied due to the limited context of their systems.”
Rick McElroy, principal cybersecurity strategist at VMware, said, “Cybercriminals are now incorporating deepfakes into their attack methods to evade security controls,” “Two out of three respondents in our report saw malicious deepfakes used as part of an attack, a 13% increase from last year, with email as the top delivery method. Cybercriminals have evolved beyond using synthetic video and audio simply for influ ence operations or disinformation campaigns. Their new goal is to use deepfake technology to compromise organizations and gain access to their environment.”
rh-msd2019-a5-print-ad-pathed-201907.pdf 1 1/7/19 12:40 PM RNI NO: DEL ENG/ 2017/ 69906 Postal Reg. No.: DL-SW-01 / 4200 / 17-19 Date of Publication: 15 of Every Month Date of Posting: 1 & 2 of Every Month