@entitworld
@enterpriseitworld
@enterpriseitworld
R S 2 0 | PA G E S 4 0 | V O LU M E 0 3 | I S S U E 0 9
WWW.ENTERPRISEITWORLD.COM
FOR THE CIOs. BY THE CIOs. NOVEMBER 2018
CASE STUDY
KAWASAKI TRUSTS MATRIX FOR CENTRALIZED VIDEO MONITORING KAWASAKI DEPLOYED MATRIX’S VIDEO... p 34
INDUSTRY ADVICE
MOBILITY AS A CATALYST FOR DIGITAL TRANSFORMATION NEW TRENDS LIKE IOT, ....p 22
EMBRACE DIGITAL OR BE LEFT BEHIND
Group CIO Puneesh Lamba explains how CK Birla Group of Companies decided to disrupt themselves, accept and adapt to the change..... p24
EDITOR’S LETTER
NOVEMBER TO DECEMBER: PLENTY OF OPPORTUNITY TO EVALUATE TECHNOLOGY Month of November is one of the beautiful months in the entire year, when
everyone remains in festive and casual mood but for our CIOs it becomes quite a hectic one as they get invitations to attend several knowledge forums and award ceremonies, which of course is good for them. On a different note, after a hard work for eleven months, our CIO friends deserve a break - some lighter movements for themselves and some knowledge enhancing opportunities too. So this year is no exception. Along with several other CIO events, Enterprise IT World is hosting its flagship CIO event, which is called “ChangeAgents200 Summit & Awards”. It means 200 CIOs, handpicked for their performance and future plan are coming to attend the 2-day event in Gurgaon’s Le Meridien Hotel and Karma Lake Lands. They would not only sit out and rub shoulders with each other under one roof for 24 – 36 hours. The event would see several tracks of presentations and panel discussions. Apart from the presentations, all the panel discussions would be by the eminent CIOs. The topics to be cover would include, digital transformation,
AI & ML, Block Chain, Analytics, enterprise security, etc. So, it is going to be a rocking event for all the CIOs who have been registered for the sessions and nominated for the award. So, from the engagement and knowledge sharing point of view, the events are beneficial for the CIOs. Reason being, the speed at which digitization is changing coming into the enterprises, it requires a different approach to adapt to and the CIOs do not have that much time and patient to learn all those skill sets from an Academy. What influences their mind is first hand information from the fellow CIOs. They understand the best practices and case studies; and accordingly, take decision there only. Of course, there would be technology vendors who would help them in choosing the right solutions and in many cases the vendors map the requirement and right size the solution to fit the budget of the CIOs. But the advantage of being informed and hands-on in any required solution or technology is that they can get product at the right price. In the November Issue, we have focused on a crucial aspect of new business operations today, Enterprise Mobility. With smartphones now mini PCs, there are limitless opportunities for Indian enterprises to benefit with dynamic employee efficiency on-the-go. We have also observed the volatile security landscape in Indian BFSI sector today and noted the headache the CIOs are constantly fighting with respect to maintaining a secure network in the domain. Lastly, the issue also features a number of CIO and vendor interviews, authored articles and industry insights on the two topics at hand. We hope you enjoy reading this issue and gain some valuable insights on the front.
S A N J AY M O H A PAT R A S A N J AY @ A C C E N T I N F O M E D I A . C O M
NEXT MONTH SPECIAL
SUPPLEMENT
COVER STORY
Technology Predications & CIO Expectations
The final issue of 2018 will feature an extensive year-end story with a two-pronged approach wherein we will be interacting with IT Solution Providers and Vendors and observe their predications for the Enterprise Technology Landscape in 2019. The other half of the feature will revolve around the perception and expectations of the Enterprise IT CIO Community moving into the new year. The story will observe their current vision and plans for 2019, projects they have in pipeline, technologies that they are looking to explore use cases aroung and finally their expectations from technology partners and vendors.
ChangeAgents200 Summit & Awards 2018 Event Coverage
The issues will feature an extensive coverage of the recently concluded Enterprise IT World ChangeAgents200 Mega CIO Summit & Awards which took place over 2 days on the 30th November and 1st December in Gurugram and was attended by over 200 of the leading CIOs, CTOs, CISOs and IT Heads from organizations across the country.
PLUS
Interviews and Case Studies
Catch interviews, guest articles and case studies of recent applications from the Industry stakeholders, IT/ITES Vendors and IT leaders and CIOs from the Enterprise IT World CIO Community.
Send in your inputs to sanjay@accentinfomedia.com NOVEMBER 2018 ENTERPRISE IT WORLD
3
CONTENTS
FOR THE CIOs. BY THE CIOs.
Publisher: Sanjib Mohapatra Chief Editor: Sanjay Mohapatra
V O L U M E 0 3 | I S S U E 0 9 | NOVEMBER 2 0 1 8 | W W W . E N T E R P R I S E I T W O R L D . C O M
Senior Editor: Chitresh Sehgal Associate Editor: Prashasti Bhatt Designer: Ajay Arya Assistant Designer: Rahul Arya, Deepak kumar Web Designer: Vijay Bakshi Technical Writer: Manas Ranjan Lead Visualizer: DPR Choudhary
MARKETING Marketing Manager: Nidhi Shail nidhi@accentinfomedia.com SALES CONTACTS
COVER STORY
Delhi 6/102, Kaushalya Park, Hauz Khas New Delhi-110016
14
INDIAN CIOS READY TO MAKE MOBILITY MAINSTAY
ABBYY’s FineReader 14
ORACLE
EDITORIAL OFFICE Delhi: 6/103, (GF) Kaushalya Park, New Delhi-110016, Phone: 91-11-41657670 / 46151993 info@accentinfomedia.com
Printed, Published and Owned by Sanjib Mohapatra Place of Publication: 6/103, (GF) Kaushalya Park, Hauz Khas New Delhi-110016
MORE INSIDE
Phone: 91-11-46151993 / 41055458
Printed at Karan Printers, F-29/2, 1st floor, Okhla Industrial Area, Phase-2, New Delhi 110020, India. All rights reserved. No part of this publication can be reproduced without the prior written permission from the publisher. Subscription: Rs.200 (12 issues) All payments favouring: Accent Info Media Pvt. Ltd.
Editorial~ ~~~~~~~~~~~~~~~~~~~~~~~~~ 03 News~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 06 INDUSTRY ADVICE ~~~~~~~~~~~~~~~~~ 22
28
23
“A STRONG CLOUD FOUNDATION KEY TO LEVERAGING ML”
4
E-mail: info@accentinfomedia.com
Today, Enterprise mobility perches at the top of most CIO priority lists. Enterprises across sectors are realizing that EMM is a necessity today and have set out to chart their strategies.
CIO TOYS / 38
INTERVIEW
Phone: 91-11-41055458
34
37
CIO TALK
CASE STUDY
STARTUP SHELF
“TECHNOLOGY AT EVERY TOUCH POINT OF PATIENT INTERACTION”
“KAWASAKI TRUSTS MATRIX FOR CENTRALIZED VIDEO MONITORING”
“BRINGING SMART PARKING TO INDIAN CITIES”
AJAY VIJ
ENTERPRISE IT WORLD NOVEMBER 2018
MATRIX
GET MY PARKING
There is no perimeter. Today, detecting threats quickly — and early — is key to confidently managing your cyberrisk. Building on decades of Big Data analytics experience, SAS® your highest-impact network threats in real time. Make incident response a non-event and get your confidence back.
Learn more. sas.com/cybersecurity SAS and all other SAS Institute Inc. product or service names are registered trademarks or trademarks of SAS Institute Inc. in the USA and other countries. ® indicates USA registration. Other brand and product names are trademarks of their respective companies. © 2016 SAS Institute Inc. All rights reserved. G28381US.0516
ITWORLD
ROUND UP
Blockchain set to supercharge global supply chains by 2025 B Y S A N J AY @ A C C E N T I N FO M E D I A . C O M
A new report by the Capgemini Research Institute revealed that blockchain could become ubiquitous by 2025, entering mainstream business and underpinning supply chains worldwide. Through investment and partnerships, the distributed ledger technology will dominate manufacturing as well as consumer products and retail industries, ushering in a new era of transparency and trust. The report, “Does blockchain hold the key to a new age of supply chain transparency and trust?”, provides a comprehensive overview into the busi-
nesses and geographies that are ramping up their blockchain readiness, and predicts that blockchain will enter mainstream use in supply chains by 2025. Currently, just 3% of organizations that are deploying blockchain do so at scale and 10% have a pilot in place, with 87% of respondents reporting to be in the early stages of experimentation with blockchain. Despite the optimism surrounding blockchain deployments, concerns remain around establishing a clear ROI, and interoperability between partners in a supply chain.
D ATA BRIEFING
829 Million
Number of Smartphone Users projected in India by 2022. Up from 404.1 Million in 2017 Source: Cisco Visual Networking Index
6
ENTERPRISE IT WORLD NOVEMBER 2018
ITWORLD // NEWS BRIEF
McAfee, Cisco team up to drive adoption of Open Security Platform
McAfee announced wide scale adoption of the Data Exchange Layer (DXL), including interoperability with Cisco Systems, the world’s largest provider of networking and enterprise security solutions, and new collaborations through the McAfee Security Innovation Alliance, the industry’s premier technology partnering program, demonstrating the industry move to collaborative, open and integrated security. “We must empower security teams to stop spending their time on tedious integrations and manual tasks and instead, focus on defending against adversaries,” said Raja Patel, general manager corporate products at McAfee. “Organizations should focus on maximizing the value of their environment with solutions that integrate, as opposed to layering new technologies that don’t speak to each other. Collaboration like we are doing with Cisco, IBM Security and others throughout the security industry is critical to closing information
CIO
gaps, breaking silos and providing the visibility we need to protect our most important assets from cybercriminals.” Increasing momentum, DXL and Cisco pxGrid, the open security information grid by Cisco, now work together to share threat event context and enable automation between the network and endpoint. With the two fabrics interoperating, organizations can now drive integrations with security solutions from hundreds of vendors. Through the OpenDXL initiative, integration orchestration are extended to open source and enterprise applications. “Cisco pxGrid and DXL interoperability mark the first time this has been achieved at such scale due to the wide cross-section of customers we each serve and the many that we share,” said Jeff Reed, SVP, product management, Security Business Group, Cisco.
Mumbai The telecom service providers are considering numerous architectural issues as they plan to transform their network infrastructure to support these new technologies.
30 NOV – 1 DEC
Gurugram The ChangeAgents200 Summit will gather over 200 of the biggest IT Leaders from across India for a daylong knowledge session, industry recognition ceremony and countless networking opportunities.
CLOUD AND NETWORK CHANGEAGENTS200 CIO VIRTUALIZATION INDIA SUMMIT 2018
ENTERPRISE IT WORLD NOVEMBER 2018
The project marks India’s first ‘real-world’ application of Industry 4.0 at the Nokia Conscious Factory in Chennai; Nokia increases levels of automation for enhanced efficiency, reliability and security in manufacturing, leveraging BSNL’s 4G LTE network for connectivity Nokia and BSNL are working together to implement the next level of industrial automation, leveraging 4G LTE technology to enable greater operational efficiency at Nokia’s Chennai plant. The project aligns with the Indian Government’s ‘Make in India’ program, which aims to promote excellence in manufacturing in the country. Nokia manufactures a range of telecom equipment across technologies at its Conscious* Chennai factory, which caters to both the domestic and international customers. The state-of-the-art factory will now leverage Industry 4.0 solutions such as Augmented and Virtual Reality (AR/ VR), connected Robotics, Artificial Intelligence, Big Data Analytics, and the Internet of Things to enhance operations and increase productivity.
EVENTS
28 NOV
8
Nokia partners BSNL to leverage Industry 4.0 at Chennai facility
4 – 5 DEC
7 DEC
CYBER SECURITY CONFERENCE
FINTECH SUMMIT
Hyderabad Experts and the public come together and share knowledge on cyber-crime and how to keep yourself within the boundaries of cyber security.
Mumbai Conference will cover financial services like payments, blockchain, lending, robo-advisors, insurance tech and personal finance, regtech, platforms, experience, implementations.
NEWS BRIEF // IT WORLD
State Co-operative Banks in India Leverage HPE’s Solutions
S/HE SAID IT
NILADRI SAHA,
DIRECTOR- MODERN DATA CENTER, DELL EMC, INDIA, DELL EMC
“It is crucial for CIOs to take the helm, engage the lines of business on their AI initiatives, and ultimately drive the AI agenda to ensure successful outcomes and mitigate risks.”
HPE has successfully migrated Andhra Pradesh State Co-operative Bank Limited (APCOB) and Telangana State Co-operative Apex Bank Limited (TSCAB) from their traditional storage infrastructure to the HPE 3PAR platform. This will enable customers to experience faster and seamless transactions through the banks’ Internet and mobile banking applications. Recently, as part of their hardware refresh process, both APCOB and TSCAB decided to replace their Unix-based systems with x86-based HPE servers to ensure predictable performance and easier hardware management. Additionally, the banks were exploring
QUICK BYTE ON
storage solutions, which could enable them to better utilize rack space in their respective data centers and run applications seamlessly with minimum downtime to deliver smoother and faster online transactions to customers. “Resilience, security and agility are absolutely essential for banks to ensure they are able to offer an exceptional customer experience,” said Som Satsangi, Managing Director, HPE India. “HPE 3PAR offers financial institutes like APCOB and TSCAB a flexible storage platform with the agility needed to keep pace with their growing business demands and high standards.
“With traditional IT boundaries disappearing, adversaries now have new targets. Companies face the risk of significant financial loss, damage to customer satisfaction and market reputation.” K E S H AV D H A K A D , G R O U P H E A D & A S S I S TA N T G E N E R A L C O U N S E L , C O R P O R AT E , E X T E R N A L & L E G A L A F FA I R S (CELA), MICROSOFT INDIA
SECURITY
31% Indian businesses wary of future cyber-attacks According to a recent Sophos The State of Endpoint Security survey, 31% of Indian organisations expect to be victims of a cyberattack in the future. While the Dirty Secret of Network Firewalls survey indicated that 30% IT managers think their organization’s current defenses are not sufficient to block cyberthreats they have seen in the past year. NOVEMBER 2018 ENTERPRISE IT WORLD
9
ITWORLD // NEWS BRIEF
SUSE, Alibaba Cloud team up to meet global Public Cloud demand
McAfee reinforces Security Innovation Alliance with new Partnerships McAfee continued growth of the McAfee Security Innovation Alliance (SIA) with the addition of 17 new partners and 16 newly certified integrations. McAfee SIA accelerates the development of open and interoperable security products, simplifies integration with complex customer environments, and provides a truly integrated, connected security ecosystem to maximize the value of existing customer security investments. According to the latest McAfee Labs Threats Report, in the past year there have been more than 240 publicly disclosed security incidents making it clear that cyberthreats continue to grow in sophistication and size. In that same time period,
EXECUTIVE
the total number of ransomware is up 57% over the year before, and malware has grown 34%. This highlights the need for the cybersecurity industry to work together to handle the challenges of today’s changing cyber threat landscape. “Today’s businesses are challenged more than ever before to stay ahead of the latest risks and cyberthreats,” said D.J. Long, vice president of strategic business development, McAfee. “McAfee understands that no single cybersecurity company can prevent every possible threat. The McAfee SIA program enables businesses to tap into certified integrated solutions from industry-leading providers to help protect data and minimize risk with fewer resources.”
SUSE and Alibaba Cloud are expanding their global strategic partnership in public cloud services in response to rapidly growing customer demand for cost-effective and flexible SAP workloads on public cloud. Alibaba Cloud has joined the SUSE Cloud Service Provider program, and SUSE Linux Enterprise Server and SUSE Linux Enterprise Server for SAP Applications are now available in the Alibaba Cloud Marketplace for customers worldwide. “Modern SAP systems running critical workloads need to meet the highest standards of availability for their SAP services running in customer data centers or on public cloud environments,” said Naji Almahmoud, SUSE Vice President of Global Alliances. “We are excited about our partnership with Alibaba Cloud, as it offers customers agility, pay-as-you-go capabilities and system availability up to 99.999 percent. SUSE and partners such as Alibaba Cloud are enabling customers to manage complexity, reduce cost and deliver the business-critical services that are powering their own digital transformation. SUSE works with customers’ preferred partners and vendors in this way to support innovation as well as optimization of their current infrastructure as they evolve their systems to meet business needs.” Dajiang Han, Head of Global Alliances, Alibaba Cloud Global, said, “We are delighted to expand our partnership with SUSE. As one of the leading global cloud service providers, Alibaba Cloud has extensive experience in the public cloud sector.
MOVEMENT Thomas Kurian takes over as new Google Cloud Chief
Ezetap’s Sanjeeb Kalita joins Innoviti as Chief Revenue Officer
Networking and Security veteran Vinod Pisharody joins Array as CTO
10 ENTERPRISE IT WORLD NOVEMBER 2018
Ashok Pamidi names new NASSCOM Foundation CEO
Max Life Insurance appoints Navendu Pandey as EVP- Quality, Service Excellence and Innovation Subex upgrades Shankar Roddam as COO in executive reshuffle
Parag Khurana of F5 Quits
Rajesh Verma of Blackberrys joins Marks and Spencer as Head of IT
Syed Kadam Murshed of Medica Hospitals joins Future Oncology Hospital
NEWS BRIEF // IT WORLD
BOOK
GLOBAL UPDATE
SHELF
Enterprise Mobility Strategy & Solutions
APAC ahead of USA and EMEA in Security Policy Automation
According to the results of a global survey conducted by Osterman Research, Understanding Security Processes and the Need to Automate; APAC is ahead of the U.S. and EMEA in terms of automation for processes involved in the management of firewall rules and security policy. The survey, which includes responses from 465 senior security leaders at large enterprises in the
U.S., EMEA and APAC, reveals trends in the use of security automation, as well as artificial intelligence (AI) and machine learning (ML). Survey questions focused on workflows in firewall and security policy management and vulnerability management. APAC is substantially ahead in using AI/ML in production as compared to USA and EMEA where the rate of adoption is still in early days, with few organizations using AI/ML in production — just four percent of respondents in EMEA, nine percent in the U.S.“Many organizations have significant deficiencies with regard to their firewall and security management,” said Michael Osterman, Principal Analyst of Osterman Research. “Most realize that they need to improve the way they manage security and policy, and they also realize that automating workflows and processes is key to these improvements.” While the journey to understand the key drivers for Security Automation continues, the good news is that security leaders have started on their automation journey.
BY
RAKESH PATEL
PRICE
RS. 1,049.00 (HARDCOVER)) WHERE:
AMAZON.IN
About The Book Book shares some of the practical cases related with enterprise mobility, which will be relevant and resourceful for enterprises seeking to get through their own obstacles and setbacks.
Key Feature Explore and understand key aspects like MDM, BYOD, and mobile security with a handbook for CIOs, CTOs, and organizations who want to enable enterprise mobility effectively.
Hitachi and SBI Enter into Joint Venture Hitachi Payment Services and SBI have signed a definitive agreement to enter into a joint venture for the establishment of a state-of-the-art card acceptance and future ready digital payments platform for India. It is planned that Hitachi Payments will invest to SBI Payment Services., a wholly-owned subsidiary of SBI, and through this investment, SBI Payment will be a JV between both parties. Rajnish Kumar, Chairman of State Bank of India, said, “At 2,500 PoS per million people, the penetration of payment acceptance infrastruc-
ture is still low. With this JV, we aim to grow the payment landscape by providing a frictionless modern digital payment platform to our customers. In Hitachi Payments, we see a longterm business and technology partner that has the ability, capability and willingness to develop the broad vision of SBI which is tied into the success of the digital payment imperatives of the country. SBI also believes that the future of the payment services lies in the capability of the JV to develop new digital acquiring strategies for the benefit of its consumers.” NOVEMBER 2018 ENTERPRISE IT WORLD
11
ITWORLD // NEWS BRIEF
Cloudera unveils Vision for Industrialization of AI
Cloudera has unveiled its strategic vision to accelerate the industrialization of enterprise ML and AI at Gartner Symposium ITxpo. Cloudera customers will now be able to automate decisions at enterprise scale. Building, deploying and scaling ML/AI applications will become repeatable with what Cloudera calls an ‘AI Factory’ for turning data into decisions, at any scale, anywhere.
The modern enterprise will be a network of intelligent applications powered by ML and AI. Right now the effort that goes into building ML and AI solutions is heavily skewed towards allocating and maintaining underlying infrastructure, instead of building a compounding set of capabilities that can deliver increased business value.s. AI deployments should be boring, meaning the process for deploying and scaling these types of applications should be routine. We should be paying attention to the value generated, not to the technology. This is why Cloudera is evolving its products and platform to industrialize the process of delivering AI solutions at enterprise scale.
BHEL deploys Trend Micro for endpoint security across 35 locations Trend Micro provides endpoint security solutions to state-run BHEL, securing nearly 23,000 endpoints of theirs’ across 35 locations. Partnering with CMS IT Services, BHEL implemented the Trend Micro Endpoint Security solution in phases, helping protect them against advanced threats and attacks. With Trend Micro’s state-of-the-art anti-malware techniques, BHEL further gained multiple layers of threat protection and data security for their endpoints and servers. BHEL, having multiple units across several geographical locations in India and worldwide required a unified security posture for its endpoints and management servers.
KPIT, Udacity to upskill talent in autonomous vehicle engineering KPIT Technologies and Udacity, the Silicon Valleybased lifelong learning platform, are partnering to upskill and build the engineering talent ecosystem for autonomous technology, including self-driving cars and autonomous flight. The autonomous driving space is witnessing rapid growth with adoption of new technologies and demands new skills. Artificial Intelligence (AI), Machine Learning, deep learning and Big Data are some of the key skills required. KPIT and Udacity partnership accelerates the scalability required in these areas by providing training and competency in AI, Self-Driving Car Engineering, Data Engineering.
12 ENTERPRISE IT WORLD NOVEMBER 2018
DIGEST IIM LUCKNOW TO OFFER ADVANCE BLOCKCHAIN CERTIFICATION COURSE IIM, Lucknow and L Incubator, IIM Lucknow in association with Blockchain Lab India, a unit of Auxesis Group is initiating Advance Blockchain Certification Course for Executives and Entrepreneurs scheduled from 17th December to 22nd December, 2018 at IIM Lucknow, Noida Campus. Blockchain Lab India is an authoritative group of subject experts and enthusiasts who are carrying progressive research and development in the Blockchain space, analyzing potential use cases and providing education resources to enable worldwide adoption of blockchain technology. GEMALTO APOLOGIZES FOR MISINFORMATION RELATED TO UIDAI IN H1 2018 BREACH LEVEL INDEX Gemalto profusely regrets on its Breach Level Index Report 2018 and the subsequent press release issued in India on 15th October where it has by mistake taken into account an unverified news article about alleged Aadhaar data breach. Gemalto has updated its Breach Level Index Report 2018 and wants to make it clear that it was an error in the above said report which has been corrected and all concerned should take note of it that we have not been able to track any verified or substantiated data breach of Aadhaar database of UIDAI. As a result, Gemalto has withdrawn this alleged data from the Breach Level Index. HUAWEI UNVEILS ITS OPENLAB IN INDIA Huawei unveiled its OpenLab in India to provide a one-stop ICT infrastructure support for smart city and enterprises digitisation transformation. A testimony to Huawei’s commitment to Government of India’s Digital India agenda, the OpenLab Delhi aims to establish an industry ecosystem and serve as a co-innovation platform for Huawei, its customers and partners, both in India and global, for incubating industry solutions to address the challenges of digital transformation. COCA-COLA TEAMS UP WITH VODAFONE IDEA & EBEST IOT TO INTRO CONNECTED COOLERS Coca-Cola India has collaborated with Vodafone Idea Business Services, the enterprise arm of Vodafone Idea Limited, the largest telecommunications service provider in India and eBest IoT, to introduce stateof-the-art Connected Coolers across the country. The IoT enabled fleet of Connected Coolers will enable Coca-Cola to understand consumer behavior and use the insights to enhance consumer experience
NEWS BRIEF // IT WORLD
MANAGEMENT
MANTRA
“Not taking risks one doesn’t understand is often the best form of risk management.” – Raghuram Rajan, renowned Economist and
MERGERS & ACQUISITIONS
Former Governor, Reserve Bank of India
HITACHI VANTARA COMPLETES REAN CLOUD ACQUISITION. Deal strengthens ability to accelerate Customers’ Digital Transformation journeys..
HPE Above-the-Cloud Supercomputing helps Astronauts advance Space Exploration
FORTINET ACQUIRES CLOUD-BASED THREAT ANALYTICS FIRM ZONEFOX , to add Machine Learning-based Threat Detection and Response Capabilities. CHECK POINT SOFTWARE TO ACQUIRE DOME9, Acquisition enhances Check Point’s fully consolidated Infinity architecture and its Cloud Security offering. CITRIX SYSTEMS ACQUIRES SAPHO , to enhance the guided work capabilities within Citrix Workspace SITA ACQUIRES MEXIA INTERACTIVE, to boost airport offerings and enhance SITA’s passenger flow and queue management capabilities
Hewlett Packard Enterprise is opening high performance computing (HPC) capabilities to astronauts on the International Space Station (ISS) as part of its continued experiments on the Spaceborne Computer project. Spaceborne Computer is the first commercial off-the-shelf (COTS) supercomputer that HPE and NASA launched into space for a one-year experiment to test resil-
iency and performance, achieving one teraFLOP (a trillion floating point operations per second) and successfully operating on the International Space Station (ISS).¹ After completing its one-year mission, proving it can withstand harsh conditions of space – such as zero gravity, unscheduled power outages, and unpredictable levels of radiation – Spaceborne Computer will now, for the first time ever,
open its supercomputing capabilities for use aboard the ISS. These “above-the-cloud” services will allow space explorers and experimenters to run analyses directly in space instead of transmitting data to and from Earth for insight. “Our mission is to bring innovative technologies to fuel the next frontier, whether on Earth or in space, and make breakthrough discoveries we have never
imagined before,” said Dr. Eng Lim Goh, chief technology officer and vice president, HPC and AI, HPE. “After gaining significant learnings from our first successful experiment with Spaceborne Computer, we are continuing to test its potential by opening up above-the-cloud HPC capabilities to ISS researchers, empowering them to take space exploration to a new level.”
Infosys Finacle, R3 to bring Blockchain Solutions on Corda for Banks Infosys Finacle, part of EdgeVerve Systems Limited, a fully owned product subsidiary of Infosys and R3, one of the fastest growing enterprise blockchain software companies in the world, announced their partnership to collaborate on blockchain solutions. This partnership will enable banks to easily access and deploy Finacle’s blockchain solutions on Corda, R3’s open-source blockchain platform. Finacle will initially have two solutions
available on the Corda platform – Finacle Trade Connect and Finacle Payments Connect. Finacle Trade Connect is a blockchainbased trade finance solution that connects banks, trade partners and corporates on a unified distributed network. It supports a full suite of trade and supply chain finance products such as Open Account, Letter of Credit, Invoice Financing, Bills Collection, PO Financing, Bank Guarantees and Packing Credit. NOVEMBER 2018 ENTERPRISE IT WORLD
13
COVER STORY
INDIAN CIOS READY TO MAKE MOBILITY MAINSTAY 14 ENTERPRISE IT WORLD NOVEMBER 2018
COVER STORY
Today, Enterprise mobility perches at the top of most CIO priority lists. Enterprises across sectors are realizing that EMM is a necessity today and have set out to chart their strategies. But are the solutions available in the market good enough and what does the CIO expect out of a good Mobility Partner?
S
BY CHITRESH SEHGAL CSEHGAL@ACCENTINFOMEDIA.COM
martphones and mobile devices have virtually transformed the way we function on a number of aspects today. Both organizations and consumers are now equipped with the agility, flexibility and capabilities of computing on a handheld device. With increasing proliferation of NOVEMBER 2018 ENTERPRISE IT WORLD
15
COVER STORY
ZAKIR HUSSAIN, DIRECTOR, BD SOFTWARE (COUNTRY PARTNER FOR BITDEFENDER)
MAKARAND JOSHI, AREA VP AND COUNTRY HEAD, INDIA SUBCONTINENT, CITRIX
“Enterprise mobility management has climbed up the ranks in the Enterprise IT landscape in terms of business priority. Organizations are always looking for ways to offer flexibility to their
“Today, mobility is playing track role for Business transformation With boost to mobile coverage and quality, it has become a useful tool in business, starting
with business mails and transferring to many more important benefits of Mobility.”
employees while ensuring productivity.”
smartphones and high speed wireless internet, applications today are reaching every human pain point, improving productivity, efficiency and experience both across homes and businesses. Businesses are undergoing digital transformation across every sector and are looking to embrace the productivity and flexibility offered by enterprise mobility. As per recent reports, the India enterprise mobility market is projected to grow with a CAGR of around 25% through 2022. This growth can be attributed to growing internet and smart phone penetration, emerging mobility trends such as BYOD, CYOD, BYOA, and surging data telecommuting needs. This is supported by demand for increasing workforce productivity and cloud workspace along with consumerization of IT is poised to propel enterprise mobility management among Indian organizations. Today, Enterprise mobility perches at the top of most CIO priority lists. Businesses across sectors are realizing that enterprise mobility is a necessity today. As per the IDC’s analysis, over 50% of enterprises today rate enterprise mobility as a high priority area. From a business, not enabling the field force with decisive data and information would eventually mean losing out to a rival who 16 ENTERPRISE IT WORLD NOVEMBER 2018
has done so. While the adoption of enterprise mobility in India has been slow among the major economies, it is picking up of late. IDC’s deep analysis on the Asia Pacific Region for 2017 establishes that enterprise mobility in Asia Pacific represents one of the fastest-growing markets across the region. Mobility is taking the top spot as a technology priority for enterprises. The report also identified that 37 per cent of the Indian organizations have rated enterprise mobility as high priority.
HOW MOBILITY IS CHANGING THE ENTERPRISE LANDSCAPE Indian businesses are on a constant look out for ways to bring in efficiency and integrate digital solutions in processes. As Makrand Joshi of Citrix explains, “Enterprise mobility management in particular has climbed up the ranks in terms of business priority. Organizations are always looking for ways to offer flexibility to their employees while ensuring productivity.” As digital enables smarter and more connected processes, today’s workforce can no longer be limited to a static work station. With smart devices, multi-tasking, working remotely
and working on-the-go are not a difficult task and equally productive. “Enterprise mobility continues to sit at the top of a CIO’s priority list. Along with being a major growth contributor, it also represents a change in the way work is typically viewed.” Makarand continues, “Today, work has moved beyond the cubicle and is a seamless process irrespective of location, network or time. Owing to this pace at which organizations have been evolving with work patterns, the onus falls on the CIO to ensure that a secure environment is created for the mobility function.” Saravanan Thambusamy, VP IT, Allsec Technologies explains how mobility is a big part of enterprise operations today, “Mobile devices host most transactions that happen on the ground especially with the employee-on-the-go and his/ her workflow approvals with Direct Manager. It helps Time and attendance regularizations – which if not attended to on time would result in pay cuts. The anytime-anywhere-any device helps employees and managers attend to cut-offs and deadlines far more effectively than the traditional desktops would allow.” Zakir Hussain, Director, BD Software which is the country partner for Bitdefender says, “Today,
COVER STORY
SOURABH TIWARI, CHIEF INFORMATION OFFICER, OIA
VIVEK DHARIA, CHIEF INFORMATION OFFICER, KNP SECURITIES
“Most importantly, a clear plan and awareness is required and it has to start with how the mobile application is going to meet our
business objectives and be an asset to the function it is being deployed for.”
mobility is playing track role for Business transformation. With the boost to mobile coverage and quality, it has become a useful tool in business which has started with business mails and many more following are some of the important benefits of Mobility.” Key benefits of EMM for businesses include Improved Communication, Availability, Trackability, Sales force Management, Mobile workforce, Logistics, inventory and stock control, Auditing and compliance. Business processes that can be mobilized with enterprise solutions today include Sales force automation, Field service automation, HR management system, Lead management system, Dealer management system, Consumer applications; Location based services, Business intelligence & Analytics etc. Today, enterprises need productivity to increase rapidly. Enterprise mobility helps businesses build their work in a progressive way. In India EMM is becoming important tool for manageability. As Mobility is becoming part of business tools, CIOs’ priorities are changing. Business houses are investing in EMM solutions as infrastructure is being exposed to outside world. As per Parveen Kumar Sharma, CTO, ICAI,
“Mobility gives a new life to the business by simplifying the operational process and improving employee productivity. The way employees do tasks transforms when mobility is included in the business processes. Mobile Apps have simplified the way customers shop for products and services.” KNP Securities CIO Vivek Dharia opines that with collaboration of the power of mobile and cloud applications, businesses like KNP can empower business in rural and remote areas. Balvinder Banga, CIO for Sonata Finance explains how crucial an aspect is mobility to the business. “We are into Microfinance (NBFC) registered under RBI NBFC, lending money to rural areas. Our customers are not in position to visit the branches. Our Business Representative Officers need to visit to them and entire lending process has to be conducted over the mobile application. Microfinance cannot survive without Mobility.” Mobility helps customers of organizations like Sonata Finance for fast customer on boarding, proposal process and approval process. From a decade ago when it would take weeks in disbursements due to offline processes, with mobility, disbursement can be in a less than a
“We adhere to and ensure that our strategies are in place from BYOD Implementation, Dedicated Help Desk for Mobile Users, Access to Critical Legacy System, Incentives and
Programs/ Reviews for User Adoption and On-demand Training for Contractual Employees”
day. Thus Mobility helps in improving customer satisfaction too. With business function not just limited to office HRS, the extension is due to availability of enterprise mobility applications like mobile ERP app to raise or approve requests, access data, provide on the go analysis and reporting etc. “It opened a whole new dimension to enable us to operate in timeless and place less business operations,” remarks Arvind Kumar, Director IT & Innovation at Elior India. Why mobility is a constant CIO headache Initially focusing on Mobile Device Management (MDM) and subsequently broadened to encompass Enterprise Mobility Management (EMM), CIOs have grown to address issues that arise with a mobile workforce. But security breaches continue to make the news almost daily, and the mobile enterprise continues to evolve with wearables and other IoT devices plugging into enterprise networks, and ever more workloads and data being deployed in the cloud. India is amongst the most price sensitive markets. A mobility initiative does not entail trivial cost. From procuring hardware, cloud based infrastructure, adapting the enterprise backend NOVEMBER 2018 ENTERPRISE IT WORLD
17
COVER STORY
SARAVANAN THAMBUSAMY, VP IT, ALLSEC TECHNOLOGIES
BALVINDER SINGH BANGA, CHIEF INFORMATION OFFICER, SONATA FINANCE
“No single awareness program is complete and adequate Security is not just a technical problem, it’s a people problem. We encourage sour management and board to address security concerns in their regular meeting with employees.”
systems, upfront cost of mobile application development, systems integration, licensing etc. Unlike most on premise models most enterprises are used to deal with, enterprise mobility has an equally large fixed and recurring cost. While the hardware procurement, development of enterprise grade mobile apps, service cost for systems integration contribute towards the fixed cost. Hosting and licensing are major contributors to the overall recurring cost. Large upfront fixed cost is a major hurdle for SMEs with a small number of end users. The recurring cost is a major hurdle for large enterprises where the recurring cost is directly multiplied by the total number of users. Enterprises operating on the on premise model, are not very convinced about the cloud based mobility solutions. Reliability and accountability is also a major concern that is stopping from enterprises adopting mobility. Some of the critical challenges with mobility management include mobile security, Providing real-Time access to data and availability 24 x 7 x 365 basis. Mobile devices are inherently vunerable and provide attackers with direct access to corporate network, passwords, personal information and 18 ENTERPRISE IT WORLD NOVEMBER 2018
other sensitive data. As Vivek Dharia explains, “Security of information and awareness of company enterprise policy is main challenge before going for developing and implementing a mobile application.” Enterprises today cannot ignore mobility because it acts as unmatched catalysts for the growth of business. With the increase of changes in the mobile gadgets and OS supporting mobile, there is always a chance of failure in user experience. CIOs need to work on latest dynamics very fast along as changes comes in a way to hardware. Balancing the user experience and user adoption is very critical factor where the ROI depends. As Arvind Kumar explains, managing mobility is not difficult till you are working for single geography and single business vertical operations. But it become issue while you need to manage different business verticals win different geographies due to different work policies to every business vertical. “Due to increasing demand of mobility, organizations allow BYODs and it become more challenging to manage hybrid environment for same set of mobile policies as you need to manage organizational fully controlled devices along with container based environment without
“CIOs need a solution that offers the security required at an organizational level,and also at individual level (the CFO versus an intern, for example). At the same time, they need
to make sure that security doesn’t get in the way of productivity and collaboration.”
compromising organization data security policies and user access control.” Citrix’ Makarand Joshi understands that security is probably the biggest issue in EMM, “However, while these devices offer to be interactive systems for employees, they can also prove to be a security nuisance. CIOs are most concerned about employees bypassing security protocols. Further, every device differs from the other. While some can handle the data traffic, it can be a major hurdle for others. This calls for an IT gatekeeper or a CIO to organize the chaos and make sure that employees are trained and educated about the security policies and accepted practices.” As per Zakir Hussain, “Enterprise mobility management is the collection of technologies and services that safeguard enterprise data accessed and used by employees’ mobile devices. Some of the Core components of EMM are Implementing Mobile device management, Mobile security, Mobile User experience, Mobile applications. The Challenges of adapting EMM are Understanding Organizations need, IT budgets, Complexities and Implementation of the solution, Laying Most suitable enterprise mobility policies.”
COVER STORY
Challenges attached to EMM • Data Protection and Security • Lack of Industry and Business Process Expertise • Distraction from or Disruption to Core Business • Implementation Cost • Lack of Infrastructure/Platforms • No Enterprise-level Mobility Strategy/ Undefined Proposition
HOW INDIAN CIOS AND CISOS ARE TACKLING THE ISSUE The need to have an ably managed mobility strategy is crucial to ensure that there are not major breaches. The first component in this regard for a CIO is employee awareness and management. Internal attacks are among the top threats. It’s incredibly easy for people who already have access to sensitive data to abuse it or lose it. The second component is to ensure there are no unsecured mobile devices in the enterprise network. CIOs constantly grapple with the need to maintain a high level of security in the business with increasing number of mobile devices in use. Cloud Storage Applications are the next component, and integral due to its place in enabling Mobility. CIOs should be extremely careful and diligent in their approach of choosing a reputable
cloud storage company that encrypts data and reduces the risk of data leakage. A major gap that results in mobile breaches are Third-Party Service Providers using low- security methods, such as a default password for all client accounts resulting in the risk of stolen security credentials and a number of other threats. Lastly, CIOs need to equip enterprise devices and endpoints with anti-virus and security software. That way, if an employee accidentally clicks on a suspicious file, the endpoint software will provide another layer of security to offer another opportunity to prevent the breach. Indian CIOs have been tackling the issue of secure and efficient EMM through different approaches. With security being a shared responsibility, awareness programs are growing across businesses. As Parveen Kumar Sharma of ICAI opines, “Security is everyone’s responsibility in an organization. We conduct security awareness training programs on regular intervals to ensure that the entire employee force is well informed about the hazards related to the irresponsible use of their mobile devices linked to the enterprise network.” KNP Securities CIO Vivek Dharia believes there has to be a well thought out strategy behind implementing EMM and it has to start with the applications. “Most importantly, a clear plan and awareness is required on how the mobile
application is going to meet our business objectives and be an asset to the function it is being deployed for.” Sourabh Tiwari, CIO, Overseas Infrastructure Alliance believes EMM has a number of key parameters that need to be addressed to ensure a smooth operational environment. “We adhere to and ensure that a number of strategies are in place from BYOD Implementation, Dedicated Help Desk for Mobile Users and Mobile Access to Critical Legacy System, to Incentives and Programs/ Reviews for User Adoption and Ondemand Training for Contractual Employees” Balvinder Banga thinks that no campaign can be adequate if the onus doesn’t come from the organization’s workforce. “The answer to this question is Yes but No because no single awareness program is complete and adequate. I read somewhere that Security is not just a technical problem, it’s a people problem. I think this statement is true and correct,” he continues “In our organization, we plan Security Awareness Camps and Programs quite often. We regularly send mailers, presentation to our employees. Security is no longer luxury need. I believe this is necessity now for an enterprise. It has to initiate from top to bottom rather bottom to top. We encourage our management and board to address security concerns in their regular meeting with employees.” NOVEMBER 2018 ENTERPRISE IT WORLD
19
COVER STORY
ARVIND KUMAR, DIRECTOR IT AND INNOVATION, ELIOR INDIA
PARVEEN KUMAR SHARMA, CTO AND CONSULTANT IT, ICAI
“We conduct security awareness training programs on regular intervals to ensure that the entire employee force is well informed about the hazards related to the irresponsible
“EMM partners should provide holistic security cum management, asolutions rather than just MDM. Since enterprise data that resides on mobile devices and containers is vulnerable and may cause harm to enterprise.”
use of their mobile devices linked to the enterprise network.”
Arvind Kumar of Elior is of a similar opinion and believes mobility users in the enterprise need to be made fully aware of the nuance of security. He states, “User are not fully aware of mobile security but it’s time we make them understand the today’s smart phone is just like a PC. So the need to secure it is the same way as we do for Desktop or laptops. We do communicate time to time about securing the mobile devices and things to take care in this regards.”
THE SOLUTIONS ON THE MARKET TODAY Strategic trends in the B2B space like mobile applications, mobile enterprise security management, consumerization of IT and machine-tomachine solutions are influencing the market big time. CIOs are evaluation actionable insight into the capabilities of enterprise mobility solution providers. CIOs are thus looking to build critical mobile applications that can help them leverage mobility in the most efficient way. In CIO conversations, vendors always find a few issues that are constant and high on the action list: Data Security, Digitalization of Business Processes and Cloud adoption. The main apprehension among CIOs when choosing the right EMM vendor or solution is 20 ENTERPRISE IT WORLD NOVEMBER 2018
mobile security. The breaches can have a diverse range of reasons like lost or stolen employee devices which need legitimate forensic recovery tools to safeguard sensitive information. A good EMM solution needs to be efficient in checking application vulnerabilities as malicious mobile app due to insufficient security testing can allow access to critical or sensitive content. Last but not the least, EMM solutions need to offer good security against insecure web services where hackers can attack the underlying web services of apps, if secure design principles are not followed across layers. As per the CIO community, the common sentiment is that EMM solutions valuable on the market today are fairly good but need a number of improvements. As Arvind Kumar points out, “All EMMs today are just to manage or control devices functionality in terms of application and features, but none provide security of device along with management. You need to install other applications to protect the mobile device e.g. AVs, cleaners etc.” This is reiterated by Balvinder Banga who believes EMM solutions should unify services to ensure the CIO gets most out of the deployment, keeping the solution as simple as possible. He opines, “I don’t think, EMM needs to improve at Scalability Challenges. If you have
multiple products in your organization with different sets of security requirements, it makes it difficult to manage on a single device. Need of unified solution is necessary.” Deciding on an EMM solution isn’t easy. CIOs need to satisfy many requirements, from all parts of the business function. As Saravanan Thambusamy of Allsec Technologies points out, “They need a solution that offers the security CIOs require at an organizational level, and also at the individual level (the CFO versus an intern, for example). At the same time, CIOs need to make sure that security doesn’t get in the way of productivity and collaboration. They need to find a balance between price and performance.” CIOs must carefully consider the path to a new solution– the services and support they need to make the migration, and the ability to leverage, where possible, any EMM tools already in place. Lastly, CIOs need to make sense of the deluge of information they receive throughout your decision-making process.
ROLE OF A GOOD EMM TECHNOLOGY PARTNER Not every organization today has the required expertise to build an effective mobile strategy from the ground up. CIOs from smaller or lesser
COVER STORY
quipped organizations require the assistance of enterprise mobility solutions providers who can gauge their specific requirements and help them develop effective enterprise apps. The role of the EMM vendor as not just a solution provider but a technology partner is becoming ever more crucial in the enterprise function. Indian CIOs today are looking for a holistic approach from EMM solution providers wherein the partner covers all the aspects of mobility management rather than just MDM or security or one or the other. As Arvind Kumar of Elior explains, “EMM partners should provide holistic security cum management solutions rather than just MDM. Since enterprise data resides on mobile devices or in containers is vulnerable and may cause harm to enterprise.” Ajay Yadav of ARIL reiterates the sentiment, “The job of a good EMM partner is to provide security, management and monitoring of mobile apps content and email on mobile devices and protect against advanced mobile security threats and malicious apps. They should enable organizations to implement granular browsing policies across the devices and locations.” Balvinder Banga mentions core parameters related to mobile security he believe EMM partners should ensure, “EMM Solution provider needs to support on parameters related to security like User Privacy Protection, Methodology of Development/Shipping a new changes on application and striving to build a Unified Solution for different devices and their OS version.” Sourabh Tiwari of OIA supports this expectation and believes, “Ensure delivery of security measures like Access policy management, Network and application firewall and SSL encryption should be norm for an EMM vendor.” CIOs want the EMM partners to be fellow strategists, who sit down with them and help them chart out the course of mobility deployment and an efficient operational plan. As Vivek Dharia states, “EMM partners should give a clear foolproof security plan, highlighting things like where loss or theft of device data is happening, location accuracy of device plus security of network and usage permission mentioned.” EMM solution providers should help in understanding mobility needs of the organization, the needs and limitations of the CIOs IT resources and then work on it to accordingly suggest the appropriate solution.
APPROACH OF INDIAN ORGANIZATIONS MOVING FORWARD For Indian organizations and their CIOs, planning a good EMM strategy should revolve around three core pillars: Prioritize, Strategize and Secure. When looking to expand mobility capabilities
AJAY YADAV, HEAD IT (NORTH), ARIL
“The job of a good EMM partner is to provide security, management and monitoring of mobile apps content and email on mobile devices.
They should enable organizations to implement granular browsing policies across devices and locations.” of their organization, CIOs should prioritize the mobility initiatives based on target audience (customers or employees). This is paramount before a CIO sets about focusing on efforts in preparing the business plan and estimating the infrastructure requirements. In today’s cloud enabled enterprise IT space, small and medium enterprises are implementing mobile technologies with increased efficiency due to Cloud enablement. CIOs should evaluate whether they have the required skills to implement in-house or outsource it to third party vendors. Focus areas that drive internal efficiency include Management and Security, Judicious and Selective Outsourcing of Support Functions and Driving Compliance for Mobility Devices to existing Enterprise IT standards. The final step in their EMM approach for a CIO is to ensure complete security across all aspects of the solution. For a dynamic EMM solution, the security needs to be equally dynamic. With increasing mobile users, today businesses have more data at the edge of the network. This increases the chances of data security and privacy breaches. One of the top priorities for CIOs is to manage these risks. This can be done by expanding existing security solutions across several mobile sub segments to a) Effectively address concerns related to devices that are lost/stolen; b) Access corporate data from unsecured external networks and, c) Misuse of corporate data stored on personal devices. To ensure a secure EMM plan, CIOs should themselves focus on adding new layers of security artillery to their arsenal. As Makarand from Citrix suggests, “Along with ensuring the efficient com-
munication of security policies of the company, CIOs must also make use of technologies like analytics to keep a close watch on suspicious patterns, that may indicate malicious activity within their systems.” From Saravanan Thambusamy’s point of view, establishing a secure a secure mobile environment within an organization has multiple tenets to it. “It probably starts with a first step like having a MDM/EMM in place. Other aspects include full visibility in terms of malware protection, alert mechanism on problem traffic, setting up security standards for a BYOD setup and finally, having a holistic view using a bigger system, such as a security information and event management tool.” BitDefender’s Zakir Hussain points out that to “ensure a secure and efficient Mobility Environment; CIO should have a fool proof strategy for the Solution. Some of the Key areas CIOs should keep in mind are: understanding Organizations need; keeping in line with IT budgets; comprehending the complexities and implementation of the solution, charting out and laying most suitable enterprise mobility policies and choosing best suitable solutions available in the market. This basically transcends to implementing mobile device management, mobile security, mobile User experience, and mobile applications as per the need of the Organization.” NOVEMBER 2018 ENTERPRISE IT WORLD
21
INDUSTRY ADVICE
RAMU M R,
GENERAL MANAGER & HEAD OF WEB TECHNOLOGIES & MOBILITY (DBS – DIGITAL BUSINESS SERVICES), HAPPIEST MINDS TECHNOLOGIES
“Mobility offers a powerful channel to push insights and information to the right people,influencing them with the benefits of artificial intelligence and enabling them to make the right decisions.”
MOBILITY AS A CATALYST FOR DIGITAL TRANSFORMATION New trends like IoT, AI, Digital Reality, Digital Twin, Machine Learning and Analytics are making information easier to aggregate, and Mobility is becoming the most powerful medium to deliver that information, leading to either business efficiency or customer delight.
T
echnological advances have led to a digital revolution where we are quite comfortable with experiencing today’s world through multiple layers of information and data-led insights at our fingertips. We have to admit that access to mobile devices and their ease of use has been the key force accelerating this change. The enterprise mobility arena is undergoing rapid transformation. While the enterprise mobility landscape stands tall, it would be unfair to not talk about its two key pillars, IoT and Analytics, which are attributing to its evergrowing significance. In the IoT world, people, machines and systems are all effortlessly connected to each other to facilitate smoother operations and a richer user experience. This isn’t surprising as IoT adoption is already on the rise and working conjointly with other progressive technologies like ML and AI is adding to its power. Meaningful insights—derived
by processing trillions of megabytes of data transmitted by IoT devices—are delivered on the end user’s mobile device. Another groundbreaking technology that employs mobility as its favorite channel for delivery of layers of information is AR, VR and Mixed Reality (MR), and at Happiest Minds, we call it “Digital Reality” (DR). With DR making huge advances, we are quickly progressing towards a world where it is hard to tell imagination from reality. Digital reality offers an interactive experience by adding digital elements to a user’s view of the real world, or a complete immersive experience that shuts out the physical world, or a mix of both. Multiple use cases across industries prove the massive business potential of DR. Let’s talk about the newest entrant creating a buzz in the enterprise arena: Digital Twin. The fourth industrial revolution conceived on automation, data exchange and manufacturing technologies is the future of the manufacturing
world, and it is at the core of this revolution, introducing unlimited possibilities. It’s interesting to see how a “digital” replica of a machine, machine part or location represents itself in the real world on one’s mobile or wearable device, as one of the key channels of interaction. The digital twin reacts based on immensely large volumes of data sent by IoT devices present in real machine parts, enabling concerned people to understand the functioning of even inaccessible segments of the machine. Digital Twin was named amongst Gartner’s Top 10 Strategic Tech Trends last year, predicts that by 2021, half of large industrial companies will use digital twins, helping them improve effectiveness by 10%. IoT, AI, Digital Reality, Digital Twin, Machine Learning and Analytics are making information easier to aggregate, and Mobility is becoming the most powerful medium to deliver that information, leading to either business efficiency or customer delight. It is important for organizations to embark on a journey of digital revitalization and understand how a mobile-first approach will improve sales, enable better control over operational costs, enhance customer experience and offer them the competition edge! NOVEMBER 2018 ENTERPRISE IT WORLD 22
ORACLE // INTERVIEW
A STRONG CLOUD FOUNDATION KEY TO LEVERAGING ML As ML becomes more pervasive in the enterprise, Oracle is working on a holistic strategy with AI/ML capabilities embedded in cloud portfolio, helping customers realize value with a increased focus on improve their agility, customercentricity and innovation cycles.
“We’re empowering Indian CIOs to upgrade to the technology of tomorrow, today - so that they can singularly focus on delivering faster better innovations to their end consumers.” PREMALAKSHMI R,
HEAD - CLOUD PLATFORM BUSINESS, ORACLE INDIA
Why do enterprises need a cloud foundation to leverage ML better? In the pre-cloud days, deploying advanced machine learning for real-time insights and decision making was a challenge because of the lack of two things: abundant compute power to process the sheer volume of data, and auto scaling IT infrastructure, including provisioning for real-time data capture and analytics to make accurate decisions. With cloud, these and many other challenges are a thing of the past. In the digital economy, the power of a strong cloud foundation, coupled with advanced machine learning, can lead to unprecedented productivity improvements and faster innovation at scale. How can ML fuel innovation and enable smarter decisions? Today, size of a company doesn’t matter as much as before, because cloud is a great equalizer. A large enterprise, an SME and a startup all have access to the same modern, enterprise-grade technology. Speed of technology deployment has become a key factor for businesses to retain or grow their customer base and that’s where AI and ML come in. Businesses can automate most mundane or
complicated tasks to achieve a level of accuracy and efficiency beyond the capabilities of human workers. And by doing this, they can free up the IT workforce from doing mundane tasks, thereby empowering them to become knowledge workers in true sense allowing them with more time for creative innovation and higher value work for the business. What’s the AI and ML landscape in Indian businesses today? Indian businesses are embracing faster than most of their APAC peers. As ML becomes more pervasive in the enterprise, businesses are trying to improve their agility, customer-centricity and innovation cycles. AI enabled chatbots and advanced analytics for real-time decision making are two key areas where Indian businesses are deploying extensively. A concerted push thanks to and by NITI Aayog to advance AI/ML adoption in India is expected to increase uptake among Indian businesses in the coming months. What’s Oracle’s AI play? At Oracle, we have a holistic strategy making it easier for enterprises to realize value.
Unlike most companies that offer capabilities as add-ons, we have embedded AI/ML in our entire cloud portfolio. We’re empowering Indian organizations to upgrade to the technology of tomorrow, today so that our customers can now singularly focus on delivering faster, better innovations to their end consumers. CIOs can help drive better business outcomes using our AI-powered cloud applications and leveraging the pre-built intelligent features. For data scientists and application developers, our ready-to-build AI platform offers a range of cloud services to easily build, train, deploy as well as manage AI-powered solutions. What are Indian CIOs doing to advance AI/ML adoption? AI/ML is one of the key things in every customer discussion I have participated in with Indian CIOs of late. Most of our customers are crafting holistic strategies fully aligned to their organization’s business priorities. This is extremely important because piece-meal approaches to AI often lead to failure in the long-term and disillusioned teams. The first step to AI-enabling an enterprise is to get more data-driven, and understanding that it is an ongoing journey. NOVEMBER 2018 ENTERPRISE IT WORLD 23
INTERVIEW // CK BIRLA GROUP
EMBRACE DIGITAL
“The longer any organization or an individual takes to digitally transform themselves, the harder it becomes to excel
OR BE LEFT BEHIND
or even survive in the industry”
With the onset of digital transformation of everything around, Puneesh Lamba, Group CIO explains how the CK Birla Group of companies decided to disrupt themselves & others and accept and adapt to the change, rather than waiting for others to disrupt them.
Entire world seems to be undergoing a digital transformation. Digital Transformation is the buzzword across boardrooms. Across CK Birla groups of companies are you undergoing a digital transformation as well? See, Digital Transformation is inevitable. These days, with the consumer expectation and the advent of connected devices and platforms, there is a continuous digitization of manufacturing & other processes and the industry is continuously evolving in response to the challenge of ensuring the delivery of right products at the right time and to the right person. So, the customers now expect that the products are intuitive and easy to interact with. On the production side, no longer companies have to sacrifice quality for efficiency, because the AI algorithms help them understand the factors that are impacting the quality and efficiency and those can then be fixed very fast. So, Going Digital is the theme for us. We started our digital journey around 2 years back in an organized manner and it has till now been a very successful endeavor for us. Since the group is very diversified in terms of industries we are present in, we did not follow a cookie cutter approach for all companies and engaged niche partners who together with our teams helped us design the digital journey and the digital transformation 24 ENTERPRISE IT WORLD NOVEMBER 2018
roadmap for companies. One thing we were clear from the start that there cannot be a separate digital strategy and the only strategy we will follow is Business Strategy where we will use digital means to further it. So, the nextgen digital technologies have helped us achieve our business strategy more effectively. Can you tell us how far you have reached along this digital transformation journey? This is a journey, there are milestones, but I cannot say that we have completed our journey. As I said, we started with two companies and then we expanded to four companies and now we are looking at more companies this year. The companies that started two years back, they are now more mature in the journey and have started reaping the fruits wherein the companies who have just joined have started realizing that this will have definite and quantifiable benefits, though it will take some time. For example, in one of the companies we were able to reduce the rejection rate by 75% using a combination of IoT and AI technologies. The beauty of that solution was that nobody at the shop-floor was getting to know that there was an action being taken by technology, because AI was making decisions based on the data collected by IoT sensors. There
is another company wherein we sell mining and construction equipment, these equipments work in a very tough areas and just a few hours downtime can bring a loss in lakhs for the customers. We deployed IoT sensors in the machines to measure certain parameters, started analyzing them and report back to the customers. Also, we had a control room wherein we could see all the machines working and could figure out what the probable problems can be. These services help us get an EXTRA annual amount that is contributing to our topline and bottomline. Further, we are using augmented reality in couple of ways. One is in training; this is the assisted production as we say. We have the cameras on top, guiding the people in the assembly line to take the next step. The pictures are beamed on the table and people can see what the next action is, it also watches whether they are taking the right action or not. If the action is wrong, it will beep and ask you to do it again and tell you how it has to be done. So that is helping us reduce our quality issues and improve our speed and productivity. There are many more examples like this. You have spoken about greater efficiencies and reduction of downtime, could you put a number on the cost you saved, or the efficiency you’ve
es o
CK BIRLA GROUP // INTERVIEW
increased because of Digital strategies you’ve adopted? On some projects we can put a number, but not on all. We don’t calculate numbers based on entire set of projects, we do it for a single project. Before we start a project, we define which metrices will be measured after what period to ascertain the realized benefits and to match them with expected benefits. The framework, that we have developed help us to find out how successful was the technology project. To give you examples, like I talked earlier, we could reduce the rejection rate for a certain mid product in one company by 75%, it is huge for any company. Then we have seen improvement in productivity by 20% with augmented reality training. In any organization, the new ask is to do more with less; you need to reduce resources and increase output and that happens only by deploying technology. So yes, numbers can be attached but not every time, like whenever you use technology to aid customer experience, it is very difficult to quantify improvement because there may be a host of factors that will impact it or a digital initiative covering organizational risk can be difficult to be quantified. What are the challenges that you’ve faced when you’re rolling out these digital strategies? Did you face any resistance from your employees who are worried about becoming obsolete? Fortunately, the leadership in the group is very encouraging, everybody wants digital transformation and they are well aware that if we have to excel, we have to go through this sooner than later. We face three major challenges, one is the skill that is required for any technology, your team needs to have people who can consolidate the technologies, who can design the enterprise architecture etc. Second is, especially in case of IoT, we have seen there are a very few vendors who provide end to end services. So in an IoT project what happens is, we will have one vendor who will give you IoT sensors, other will provide you with cloud platform to collect or data, yet another partner will do analytics on it and an AI partner will say let me make sense out of it and provide actionable insights and so on. For this then you will have to have an effective & technologically aware program manager who can manage all of these. Third challenge is of prioritization, every company is working on some projects or initiatives and not all of them are necessarily technology based. Business is always important and digital transformation is also for business only. Every organization have
limited bandwidth and it becomes challenging to prioritize which initiatives comes first and which comes later. Though, we use some scientific frameworks also to prioritize but still it takes good amount of time to decide on what to work on first because there is so much to do in this space. What factors would you say are the reason for the success of your projects? The most critical thing is, as I have said before, the longer any organization or an individual takes to digitally transform themselves, the harder it becomes to excel or even survive in the industry. We know and understand this, so whether it is driven by the customers or internal, digital transformation is necessary and inevitable. So, the core theme behind this is that we cannot wait for other companies to come disrupt us, we must disrupt ourselves, we need to challenge the orthodoxies within us and come out with newer business models, innovative and more effective ways to handle processes and our partners – be it a supplier or a customer. The urge & commitment to remain ahead of others in digital front is the main reason of our success till now. Another reason for our success is our unique start-up program called STRIDE. As part of this program, CXOS from each group company meet identified start-ups on one day each quarter to identify which start-ups are relevant for us to partner and then we start engaging with them on innovative digital initiatives. This is a win-win program for the participating start-ups as well as our companies. Are you using Blockchain or BI technology? What is your social media strategy? I will talk about BI first, it is a foundational project for us, we have BI tools, that give us reports, in most of the companies. We started with descriptive analytics, using BI tools and then we moved to diagnostic analytics and then targeting predictive analytics followed by prescriptive analytics. There are areas where we have already started using predictive analytics, but the way we really measure our success in analytics, is measuring outcomes of our decisions taken based on data. So, analytics is one of our focus areas. Blockchain, we are still studying. The first step was to make everybody understand what blockchain is and how it is different from Bitcoin. Having done that, we have recently started working on a proof of concept for an identified process. We know that
a network is a primary need for a blockchain to work effectively, so we are taking baby steps in this area. About Social Media strategy, we have a few B2C companies, for whom social media is more important than others. We do have our social media handles and we have guidelines for the employees on how to behave in social media. Further, for our B2C companies we ensure that are no customer complaints that are there in social media that are not addressed. Our corporate communications team lead this area. Do you think at you have an advantage because of Birlasoft, a company which is already doing a lot of innovations in recent technologies? Ohh Yes. It is an advantage; they are a successful and leading technology company with a lot of thought leadership and that helps a lot. The synergy and collaboration within group companies have improved a lot in last 3 years and not only Birlasoft but all companies help each other because they bring their niche value adds to the table. We get to know each other’s experience and stories, what they are doing in their company and that inspires other companies. The digital collaboration portal that we are using to bring regular synergy is helping us a lot in taking benefits from other company’s experience. Where do you think you stand amongst the competition with respect to Digital Transformation? See, that is a tough question. To me I don’t think anything we do will be enough because it’s a dynamic world. If you take up a year-long project, by the time you are done with it, it is likely that the solution is already obsolete. But yes, if we talk about competition, if we do 100 projects in a year then though 90% projects will be foundational in nature but 9% are distinctive and 1% disruptive, which takes us ahead of the competition. Distinctive projects are based on thoughts which are new in the industry and none of the competitors have deployed those technologies or tried those methods in our industry whereas disruptive projects are based on completely disruptive ideas not tried by anyone globally. We have a budget for innovation and fail fast that helps to keep trying newer ideas. We will of course keep on using and going along with the technology that exists, automating our sales, improve productivity, engage customers in better ways etc., but that 10% is what will keep us ahead of the competition and ahead of the curve. NOVEMBER 2018 ENTERPRISE IT WORLD 25
INTERVIEW // CIO TALK
TECHNOLOGY AT EVERY TOUCH POINT OF PATIENT INTERACTION The IT Team at Fortis Healthcare, one of India’s largest hospital chain has been bringing a big time change in how the healthcare provider is administering its services, with the MyFortis App, Intelligent Queue Management, Patient Experience management, robotic surgery and soon to be implemented OneFortis HIS helping improve experience and efficiency across the ecosystem.
AJAY VIJ,
CHIEF INFORMATION OFFICER, FORTIS HEALTHCARE
“We are working to provide a similar experience to patients as they have for service availability in the rest of the world today and at the same time provide an efficient, secure and control balanced working environment for our employees. This is very much part of the design of our IT systems.”
26 ENTERPRISE IT WORLD NOVEMBER 2018
CIO TALK //  INTERVIEW
We have heard of MyFortis app which makes it easier for patients to book appointments and get information about doctors. Beyond this where has Fortis Healthcare reached in its digital transformation journey? We have heard of MyFortis app which makes it easier for patients to book appointments and get information about doctors. Beyond this where has Fortis Healthcare reached in its digital transformation journey? You have successfully used robotic surgery in your Urology and Oncology departments. What has been your experience? We use Robotics for multiple specialties including the ones listed above. Use of this technology has helped enhance the quality of surgeries with reduced tissue injury, lower blood loss and faster healing. The problem of limited accessibility especially in some of the complex surgeries which involve difficult to reach areas of the body has been overcome to a large extent. Are patients warming up to being operated upon by doctors assisted by robots? Yes, increasingly patients are becoming aware of such technology aided innovations. Today, more and more patients, especially millennials are ready for the use of robot-aided techniques to improve their experience of surgery and hospital stay. Is the cost of robotic intervention very high for patients? Since Robotics is not covered by Insurance till now, the added cost is borne by the patient himself which is a deterrent for many. What success have you had with deploying technologies like Hospital Information Systems (HIS), enterprise resource planning (ERP) and Electronic Medical Record (EMR) solutions? We have had successful ERP Implementation at Fortis for Finance, SCM and HR functions. We had implemented Oracle E-Business Suite on Microsoft Cloud. The
organization is constantly working to derive more and more in the form data and reporting as well as developing superior controls and checks from a governance point of view. We have also recently started the implementation of OneFortis HIS with one major Unit and have also upgraded HIS in multiple Large Units in the last one year. This will be followed by an implementation of EMR for entire Fortis Network of Hospitals. How much headway have you made in telemedicine, and could cloud computing help amplify your efforts here? The telemedicine concept was tried in some of our units and has not had much success yet, although we enable remote monitoring of patient vitals through our Super Specialty Heart Command Centers at a couple of units. Cloud Computing holds a lot of potential for us and we are currently evaluating ideas for such a venture. Is Fortis Healthcare using AI and data analytics in a big way? We have started business data analytics journey in the six months and the efforts are yielding good results, however we are yet to start the same in Clinical Parlance. We do not have any AI related projects in the current financial year as off now. What are you doing when it comes to data protection? Patient data with hospitals is extremely sensitive. We have managed end-point protection of the LAN and WAN networks; critical patient-oriented data is fully protected, and all policies are in place to prevent any kind of leakage due to technology or human error. We have planned the next level of security for data leak prevention and project is proposed for kick off in the last quarter of the financial year. What is the motivation for Fortis Healthcare to adopt new technologies, is it a need from customers? Is it to bring more efficiency? Is it to ensure you are not left behind your competitors??
We are working to provide a similar experience to the patients and his or her attendants as they have for service availability in the rest of the world today. We are at the same time working to provide an efficient, secure and control balanced working environment for our employees in the enterprise. This is very much part of the design of our IT systems. Which are the companies/ vendors you have partnered with in your digital transformation journey and what has been your experience with them? We have worked with all IT Majors in Software, Cloud and Managed Services space. We have a smooth working relationship with them. The working is governed by well laid out operations and project management principles and we have lesser surprises and smoother operations. Any projects which are underway now that will have an impact on service delivery for patients? The rollout of the new OneFortis HIS and Implementation of TrakCare will be 2 large foundation exercises. We are also looking at adopting cloud in a far more efficient manner then we have currently. The patient-oriented services are led by our Marketing and Operational teams is also one of the large enterprise initiatives. What are the future projects that Fortis Healthcare wants to embark upon in the next 2 years? It will be a unified EMR and more of business system upgrades which will be the cornerstone. We are also planning a more focused initiative towards Data Analytics from both Business and Clinical point of view. What is your advice to fellow CIOs on approaching any new technology and bringing business value through a deploymenttients? When approaching any new technology, draw out the large picture and execute piece by piece in a more agile manner. Review rollout and strategy every year and perform course corrections. NOVEMBER 2018    ENTERPRISE IT WORLD 27
FEATURE STORY
TIME FOR INDIAN BFSI TO WAKE UP TO HARSH CYBER REALITIES
28 ENTERPRISE IT WORLD NOVEMBER 2018
FEATURE STORY
CIOs in BFSI sector are under constant pressure to live up to technology expectations, but with new deployments come new vulnerabilities. With over 130000 reported cases of cyber fraud involving an estimated Rs. 700 Crore faced by banks in India in the last decade, the sector is still far from a concrete framework and in need of a rapid security transformation. BY CHITRESH SEHGAL CSEHGAL@ACCENTINFOMEDIA.COM
F
aster transactions, bigger ATM networks, online banking services and global collaboration in the banking sector through IT has seen services reach out to a never before number of people all around the world. In India today, there have been massive drives to open bank accounts and push to online banking and mobile banking has been on an all time high. Although IT and digital transformation has enabled banking and financial services organizations to reach out to a large customer base with improved efficiency and a greater umbrella of services, the enhanced experience comes at a cost. Brick and mortar Bank robberies are quickly becoming a thing of the past, and in today’s heavily digitized sector, the threat comes from the cyber attackers sitting in unknown locations, breaching networks and siphoning money anonymously without leaving a trace or in some cases without even alerting the victim organization. Such is the precision of banking fraud in the cyber landscape that most breaches are not reported or even discovered for a long after they have occurred. The BFSI sector is vital for a growing economy and more or less is synonymous with the growth trajectory of the country. Frauds and breaches in BFSI organizations have devastating effects and these spread across sectors to the account holders as well as organizations connected with the bank financially. The growing cyber threat landscape in BFSI has been an ongoing headache for security teams in such organizations. A History of Breach in Indian BFSI To understand the severity of the threat landscape in Indian BFSI segment, one doesn’t have to go back far in time. One of the most significant breaches in Indian BFSI history occurred in October 2016 when an estimated 3.2 million debit cards were compromised with major Indian banks like SBI, HDFC NOVEMBER 2018 ENTERPRISE IT WORLD 29
FEATURE STORY
Bank, ICICI, YES Bank and Axis Bank were among the worst hit. A number of users reported unauthorized use of their cards in locations in China. This resulted in one of the India’s biggest card replacement drive in banking history. A malware-related security breach was reportedly detected in the non-SBI ATM network, following which the public sector lender blocked around six lakh debit cards. An audit performed by SISA Information Security reports that the breach was due to malware injected into the payment gateway network of Hitachi Payment Systems. Another major breach occurred at City Union Bank which came under attack after cyber criminals transferred nearly $2 million through three unauthorized remittances to lenders overseas via the SWIFT financial platform. This was followed by the much publicized Cosmos Cooperative Bank breach where hackers siphoned off a whopping Rs 94.42 Crore from the Puneheadquartered second biggest cooperative bank in India to foreign and domestic bank accounts. RBI data shows that during 2008-17, banks in India faced 130000 reported cases of cyber fraud involving an estimated Rs. 700 Crore. This is equivalent to just 0.006% of the outstanding deposits of Indian banks. By contrast, a severe cyber attack can result in bank failure even when no money is lost directly. A total of 50 incidents of cyber attacks affecting 19 financial organizations have been reported from 2016 till June, 2017, as per the government. As examples of major global banks including the Bank of America, Citi, JP Morgan Chase, PNC, USB or Wells Fargo suggest, irrespective of the cyber investment, preparedness and management, cyber breach is a near certainty for banks. Quick breach detection and appropriate corrective actions decide the impact of such incidents on banks. Furthermore, data breaches globally at Equifax, WannaCry and Petya Cyber Attacks and many more have affected the global market, and are proof enough for the current digital vulnerabilities in the world of finance. It is high time that Indian banks wake up to harsh cyber realities. This is a big challenge for banks, where it is no longer sufficient to protect just data centers and headquarters, rather banks today have to protect ATMs and branch offices in addition to securing incoming data even from affiliated organizations. In spite of the growing awareness to regularly update an organization’s cyber preparedness and defense mechanisms, a large number of BFSI institutions wake up to this reality only post an incident which often leads to a loss of reputation and/or financial misappropriation. In retrospect, Indian banks do not have much 30 ENTERPRISE IT WORLD NOVEMBER 2018
RIPU BAJWA,
DIRECTOR AND GENERAL MANAGER – DATA PROTECTION SOLUTIONS, INDIA, DELL EMC
“CIOs need to reassess their data protection applications and need innovative new approaches to address protection and recovery challenges
as traditional approaches aren’t equipped to handle the digital disruptions of today.”
choice concerning a major revamp of cyber security. Cyber attacks are global in nature and with better cyber-risk preparedness in OECD countries; hackers are increasingly focusing on vulnerabilities in emerging-market countries. This is like an existential problem for Indian banks. The Gaps exploited traditionally The main threats that a bank faces from cyber attacks are namely breach of customer data privacy, loss of reputation, business discontinuity, loss of assets/business information, post-breach information security revamping cost, third-party claims and penal actions from regulators. The sensitivity of banks to cyber attacks and investments for cyber risk management have gone up sharply only in recent times. For a large part of this period, Indian banks, especially those in the public sector, were faced with serious asset quality deterioration, restricting their capacity to invest in cyber security. Over the last couple of years, Indian BFSI organizations have made efforts to put in place solutions that could help
them with their Cyber Security challenges. But banks have quickly recognized that cyber security requirements change often and it is important to have continuous engagement on that front. As per Anshuman Singh, Senior Director Product Management at Barracuda Networks, “Any organization is only as secure as its weakest link and thus organizations need to look at all aspects of their system to evaluate where the vulnerabilities could lie and then take appropriate measures.” In BFSI attacks, the aim is to steal money and customer information, and for this traditional vulnerabilities exploited are malware, zero day attacks or direct attacks against web front ends. In an increasingly digital marketplace, consumers today demand better and faster access to data and transactions, while an exponentially growing number of connected devices are generating data at an unprecedented rate. As a result, information volumes are exploding and limited IT resources are struggling to keep up. At the same time, however, lines of business are under increasing pressure to process transactions, manage workflows, and store content in the most efficient way possible. As per Rajesh Maurya of Fortinet, this results in an unplanned return to technology and information silos. “You can’t protect what you can’t see or control, which are the exact problems that a siloed network creates. Given the growth and severity of targeted attacks, and the potential impact of any disruption to your digital business model, it is critical that you get out ahead of this challenge.” Rajesh continues, “Network silos are the enemy of effective security. Unfortunately, having confronted that problem nearly two decades ago, we are now on the verge of having to fight that same battle once again in the cloud. Ironically, the root of the problem is almost identical to the first time -- unstructured and unplanned network development and the creeping growth of an accidental network and security architecture. Only this time, cybercriminals are armed with more sophisticated tools designed to take better advantage of the gaps this approach creates, and to cause more damage than ever before. At the same time, with the growth of the new digital economy, more is at stake.” An important aspect is that BFSI organizations need to look at their partner eco system and see if they are interacting with the organization in a secure manner. A partner system that is compromised could be used to infiltrate into the BFSI’s infrastructure. The challenge here is that most organizations have deployed many different solutions from different providers that do not natively communicate, share threat information or even digest threat intelligence and convert it into actionable protections.
FEATURE STORY
“Financial organizations usually fail to identify or classify their organizational data based on sensitivity and criticality. This information can be both - structured and unstructured. These organizations are so focused on the deployment of these multivendor solutions that they lose track of maintaining an organization-wide, integrated approach that would adequately protect the company’s data from risk,” opines Priya Kanduri, Vice President, Head of Innovation and Security Services, Happiest Minds. Growing Compliance and Governance Landscape Addressing the larger cause of ensuring a secure BFSI infrastructure, the role of the Government has two major components: Policy making and facilitation. The Indian Data Privacy Regulation is a step in the right direction in terms of policy. On the facilitation front, the Government can facilitate information sharing between the organizations and creation of best practices that organizations can use. The Indian government has realized its important position in ensuring a standard cybersecurity framework in public and private organizations. Few steps have already been taken in this regard. CERT-In, the Indian Cyber Security Emergency Response Team has issued 21 advisories for security safeguards covering Point of Sale, Micro ATMs, electronic wallets, online banking, smartphones, unified payment interface, unstructured supplementary service data, RuPay, SIM cards, wireless access points/routers, mobile banking, cloud, Aadhar Enabled Payment Systems etc. A separate research and development fund for cyber security worth Rs. 1,000 Crore has been created, to be spent over a period of five years for upgrading technological capacity. The government can learn from European counterparts. Strong customer data privacy protection norms and stringent penalties for infringement have been the main drivers of robust cyber security arrangements by banks in most OECD countries. The General Data Protection Regulations (GDPR) in the EU imposes a penalty of up to €20 million, or up to 4% of the annual worldwide turnover, for violation of norms. The extent of data privacy norms in India is far less stringent versus those of the GDPR. The predominance of public-sector banks creates the impression of an implicit sovereign guarantee against the failure of such banks which reduces the threat of reputation loss of public-sector banks due to cyber attacks. Ripu Bajwa, Director and General Manager – Data Protection Solutions, India, Dell EMC understands, “Now that India is closer to having its own data protection law, it has led most BFSI companies to rethink on
PRIYA KANDURI,
VICE PRESIDENT, HEAD OF INNOVATION AND SECURITY SERVICES, HAPPIEST MINDS
“Businesses are so focused on deployment of multivendor solutions that they lose track of maintaining an organization-wide, integrated approach that would adequately protect the company’s data from risk,”
their data protection and data privacy strategy. Companies need to reassess their data protection applications and need innovative new approaches to address their protection and recovery challenges because the traditional approaches aren’t equipped to handle the digital disruptions of today. They need systems that can quickly take decisive action as well as protect their data against any breach. CIOs need to focus on how data is being stored and accessed and most importantly they need to rethink the security element.” The severe implications of a cyber breach seem to be lost on a large number of bank managements creating a relaxed attitude among banks to cyber-risk management. The Indian DPR is expected to address this issue. As per Anshuman Singh, Barracuda Networks, “The Indian Data Privacy Regulation is a welcome step as the regulation lays down in detail how personal data has to be handled. This would require BFSI organizations to categorize the type of data that flows through their systems and how it is logged and managed. It is a big effort and would require concerted efforts by organizations to put compli-
ance in place.” Although India Data Protection Bill is mandating specific security requirements to protect consumer data and to strengthen cybersecurity, many organizations are doing only the bare minimum required to achieve compliance, with little consideration of the potential advantages that going above and beyond might provide. As Rajesh Maurya, Fortinet explains, “The truth is, organizations that go beyond compliance to offer robust data-security controls deliver greater value to consumers and build their level of trust, resulting in a distinct competitive edge. Highprofile and high-impact breaches have caught the attention of companies and consumers alike. As a result, users are looking at organizations that store and analyze their personal data with increased scrutiny — and holding them accountable for security slip-ups that result in breaches.” Machine Learning and Analytics, a game changer As per Priya of Happiest Minds, “The landscape gets rockier with the need to keep up with the ever-growing customers’ expectation, and their technological capabilities coupled with increasingly sophisticated cybercriminal tactics have bolstered the demand for Cyber Security in the BFSI sector.” A recent report observed that the cybersecurity market size is expected to grow by 12% CAGR over the year 2017-2022 and would reach USD 125 billion by 2025. Out of which, financial sector services revenue contribution is also expected to grow by 9.8%, which is a growth from USD 24.08 billion in 2017 to USD 38.81 billion in 2022. As mobile payments become more wide spread, cybercriminals are aggressively targeting the process with increasingly sophisticated attacks. Criminals are already adding automation to attacks, such as smart botnets and polymorphic malware. To protect against these attacks and keep consumers, fintech companies and financial services firms from compromise, they must incorporate integrated and automated defenses and threat intelligence. In an effort to prevent and detect such attacks, new solutions are arising to protect financial service providers. “One tactic is to use machine learning to stop cybercrime,” suggests Rajesh Maurya, “An automated threat detection system, for instance, would use machine learning to analyze threats at machine speed. This ensures that as new threats are developed to target mobile payments, security defenses are aware of them and can work in real time to detect and mitigate them. Another recent entrant into the security armory is behavior analytics, which leverages machine learning to recognize regular user habits and behavior, such as common times of use and location.” NOVEMBER 2018 ENTERPRISE IT WORLD
31
FEATURE STORY
ANSHUMAN SINGH,
RAJESH MAURYA,
SENIOR DIRECTOR PRODUCT MANAGEMENT, BARRACUDA NETWORKS
REGIONAL VICE PRESIDENT, INDIA & SAARC, FORTINET
“Usage of data science capabilities to mine information for fraud detection and prevention augmented with newer security tools that rely on AI to
“Irrespective of which risk management strategy or security control is implemented, the key is to use integrated and automated security architecture with
New generations of network incursions must be detected and dealt with quickly, before they can do damage and before their trail fades away. An integrated system with orchestrated security solutions enables organizations to fight automation with automation, using cybercriminals’ own tactics to turn the tables on them and shorten the time to detection so that forensic analysis can begin immediately and the security lifecycle can be strengthened. As per Rajesh, base lining these sorts of activities are integral to detecting anomalous behavior that may be indicative of malicious activity or a breach. BFSI CISOs need to integrate artificial intelligence, machine learning with security fabrics that facilitate deep visibility and control at speed and scale. “This is critical as security needs to operate at the same accelerated machine speed of financial transactions,” Rajesh Maurya sums up. Anshuman Singh, Barracuda Networks adds, “Usage of data science capabilities to mine
information for fraud detection and prevention is gaining traction the world over. This augmented with newer security tools that rely on Artificial Intelligence to figure out complex threats like phishing attacks are security elements that CIOs should evaluate.” The approach of a CISO moving forward In today’s growing security landscape, the first task for CISOs is to ramp up their security framework with new investments into latest tools. While bigger and sophisticated banks spend about 4 per cent of their total IT budget on cybersecurity and information, smaller banks, cooperatives and other smaller financial institutions are not spending much. This can be attributed to breaches like the one at Cosmos Bank. But even the larger Indian banks still fall short of the investments being made by the banks in North America and Europe which are spending about 6-10 per cent of their IT budget to thwart rising incidents of financial crime involving hackers.
figure out complex threats like phishing attacks are security elements that CIOs should evaluate.”
32 ENTERPRISE IT WORLD NOVEMBER 2018
deep visibility and control that can also operate at speed and scale.”
As per Anshuman Singh, Barracuda Networks, “Tools are only as good as the person using them. Organizations need to invest in both sides of security field - the Blue and Red teams. The blue teams defend and Red teams attack. Building great capabilities for both Blue and Red teams which appropriate type of personnel suited for that type of jobs will help the CIOs secure their organizations in a better manner.” “Irrespective of which risk management strategy or security control is implemented, the key is to use integrated and automated security architecture with deep visibility and control that can also operate at speed and scale. Current network ecosystems stretching from the IoT edge, across enterprise networks, and out to multiple cloud service providers are far too distributed for traditional manual prevention, detection, and response solutions,” says Rajesh of Fortinet, “It’s increasingly clear that the velocity, variety, and complexity of cyber attacks requires organizations to implement integrated and interactive security fabrics that can adapt to rapid network change, keep pace with today’s threat actors, and also demonstrate compliance with industry and legal requirements. Security fabrics designed around integrated devices that collect and share data in conjunction with best-in-class intelligence to enable automated detection and response is a practical approach for today’s most challenging cyber threats.” As per Priya Kanduri of Happiest Minds, “CIOs have the keep the following aspects of cybersecurity and threat prevention as top priorities for 2019 IT planning to refresh their Cyber Security & Cyber Risk management strategies. The focus areas for BFSI CIOs for 2019 are Adherence to the new RBI cybersecurity compliance and Personal Data Protection Bill 2018; API, IOT, and Mobile security enhancements and building next-gen security operations with predictive analytics, improved incident analysis capabilities, and automated incident response capabilities.” Compliance and Regulations are a step in the right direction; but CIOs and CISOs must think beyond compliance by taking a proactive approach to security to effectively protect consumer data and earn customers’ long term trust. The must leverage proactive solutions and look at ways to create interoperability between different security systems so that information on an event identified on one device is automatically shared across the entire distributed security architecture. Fincos should strive to reduce that complexity by further integrating solutions, focusing on interoperability as devices are purchased or replaced and consolidating existing security devices so that they can leverage a common operating system or management interface.
SECURITY INSIGHT
SURJIT DAS, PRINCIPAL CONSULTANT, FRAUD & CYBER INTELLIGENCE, SAS
“Any next-gen analytics solution should be able to identify high-risk security threats such as data exfiltration, adversary reconnaissance and adversary lateral
movement.”
TAKING CYBER SECURITY TO THE NEXT LEVEL
Organizations today rely on IoCs (Indications of Compromise) which focus on specific tactics, techniques and procedures (TTPs) that are ever-changing, instead they must analyze behavioral activity across multiple data dimensions to find the sequences of IoAs (Indication of Attacks) mapping to the steps of the Cyber Kill Chain.
W
hat’s driving the Sophistication of Cyber Security? Analyst firm, Gartner says that By 2018, at least 60% of major cloud access security broker vendors and 25% of major SIEM and DLP vendors will incorporate advanced analytics and UEBA (User Entity Behavior Analytics) functionality into their products, either through acquisitions, partnerships or natively. By 2018, deep learning will be incorporated into at least one UEBA product, and, by 2019, this number will rise to at least 20 UEBA products. Most security operations today are reactively focused on IoCs. By that time, the damage is done even if adversaries haven’t reached their goals. Security teams aren’t able to operate as efficiently
as they can and it’s a perpetual struggle to keep up with the changing landscape. Since IoCs focus on TTPs that are ever-changing, organizations must analyze behavioral activity across multiple data dimensions to find the sequences of IoAs mapping to the steps of the Cyber Kill Chain. These sequences can be used to identify risky activity and to calculate security risk. Unfortunately, helping organizations move towards a more proactive security, detection and analysis of IoAs is a universal goal that the industry hasn’t delivered on well to date. Rules are based on what a human knows about the data. When rules are not tuned properly, they generate too much noise and alerts that are not correctly prioritized. This is a common scenario among many large clients that use rule-based
security monitoring systems that end up generating hundreds of thousands of alerts or more per day. Most importantly, humans cannot predict, what future attacks will look like. Statistical analysis and machine learning can find anomalies in data that humans wouldn’t otherwise know about. Around 2010, Big Data became popular referring to the realization of massive amount of data, the pace at which it was being generated, and its many different types and formats. The term implied that Big Data initiatives included analytics to discover and apply new insights from this data. And as we’ve learned, many companies have struggled to realize sustained value from their big data initiatives. Many vendors (including open source) sprung up and were super active in this space. We believe we are again at an inflection point that will drive some standardization. Organizations are now realizing, that to successfully manage Big Data, what they need to do is adopt a consistent and full featured Analytics Platform that can operate at SCALE. Now SCALE isn’t just about handling Big Data. There are many aspects to it! Quantity of analytics - Imagine handling thousands of models easily. Imagine creating those models, auto-tuning them, deploying them, monitoring them. Complexity of the analytics - This allows all users to leverage much more complex algorithms, with more variables and segmentations of predictive models. Streamlined deployment of those models so they can be deployed in operation in minutes instead of weeks or months! And you can scale your security operations with existing resources. Read the Complete Article at: www.enterpriseitworld.com NOVEMBER 2018 ENTERPRISE IT WORLD 33
CASE STUDY
KAWASAKI TRUSTS MATRIX FOR CENTRALIZED VIDEO MONITORING Kawasaki deployed Matrix’s video surveillance solutions across franchise stores in India to ensure consistency in branding and customer service across these stores by enabling them to view the stores from a central location.
J
apan-based Kawasaki is working towards the formation of a technology corporate group. The company’s technologically advanced products include a diverse range for land, sea, air and even space. The company offers a range of environmental and recycling plants, industrial plants to automobile and infrastructure equipment. And at every step, Kawasaki pays the utmost attention to humankind and the environment. The century old company has been able to establish a firm foundation as a leading technologically.
BUSINESS CHALLENGE: The company’s automobile division, which makes it one of the leading automobile companies, is spread on a global scale. The company, having franchise stores operated by respective owners in India was concerned about the consistency in branding and customer service across these
stores. They wanted a solution that could enable them to view the stores from a central location, specially the front end where their premium vehicles were displayed. They also wanted to monitor how the employees interacted with customers, cleanliness of the premises, whether the products were displayed in the right order, branding in the store and other process compliances. But at the same time, they did not want to invest in recorders as the numbers of cameras at individual locations were very limited.
on the requirement and connected to a network switch with the help of CAT6 cables. Since there was a private connectivity between all the geographically separated locations of the company, all cameras at various locations were configured locally with VPN functionality (same class of IP address), and were viewed at a central location without port forwarding. A Matrix NVR was placed at the central location, and all the cameras from different locations were connected to it. This allowed streams from all twelve locations to be viewed on a single screen. In this way, Matrix helped the automobile giant maintain process compliance in its stores throughout the country.
BENEFITS OF THE DEPLOYMENT l l l l l
Centralized Control Better Brand Management Elimination of Compliance Check Costs Enhanced Security Employee Discipline
PROJECT HIGHLIGHT:
SOLUTION:
Number of Locations: 12 Major Use: Centralized Monitoring Why Matrix: Pan India Presence and Service Support
Matrix installed high resolution IP cameras at each store. These cameras provided crystal clear images of every corner of the store. This enabled the company to monitor every aspect of brand management such as order of vehicles, customer service, cleanliness, behavior of employees among other things. Cameras were installed at each location based
Satatya CIBR13FL40CW: 1.3MP IP Bullet Camera Satatya CIDR13FL40CW: 1.3MP IP Dome Camera Satatya NVR24P: 24-Channel Network Video Recorder with 6TB Storage Support
PRODUCTS LEVERAGED
NOVEMBER 2018 ENTERPRISE IT WORLD 34
AUJAS // INTERVIEW
CYBERSECURITY TRANSFORMATION: AGILE, USER-CENTRIC AND AUTOMATED Adoption of cloud technology, mobility and IOT are among the biggest concerns for enterprise CIOs and CISOs with ransomware, phishing, smishing representing huge risks for enterprises and demand Cybersecurity transformation using layered security approach with AI, ML, analytics, and proactive threat hunting and monitoring.
“CIOs need to maintain constant vigilance to watch out for vulnerabilities in the network, with a solid patch management process to ward off zero-day exploits and
SAMEER SHELKE,
CO-FOUNDER AND COO, AUJAS
ransomware.”
Shed some light on the Cybersecurity Landscape in Indian enterprises? India is experiencing a major digital revolution, as it exposes itself to new digital ecosystems and technologies; it needs to be aware of the risks involved as well. Digital transformation demands cybersecurity transformation, which needs to be agile, user-centric and automated. As India is a major off-shoring destination for back office and other high-value business functions, cybersecurity orientation of Indian businesses has been an issue of pressing concern. BFSI and IT/ ITeS sectors drive the Indian cyber security market. Fintech innovation in conjunction with digital business has disrupted the traditional security approach for the financial sector. Are Indian CIOs/ CISOs well equipped to handle significant breaches? The adoption of cloud technology and IOT are among the biggest concerns for enterprise CIOs/ CISOs. As cost of data storage drops, the amount of data stored and vulnerable to breaches drasti-
cally increases. Another avenue to monitor is the BYOD market. As technology enables employees to be more mobile; ransomware, phishing, smishing, etc., represent huge risks for enterprises. Another point to note is, given the proliferation of cyber attacks over the last decades, there has been a further spate of compliance measures to be followed. Failure to do so leads to high monetary costs and loss of trust and reputation. CIOs are pressured to be at the forefront of cutting edge technology, however with the adoption of new tech comes new avenues vulnerable to cyber assaults. Can you tell us a little about the new Endpoint protection offering from Aujas? Aujas’ Managed Endpoint Detection, Response, and Prevention Service (MEDR) combines Endgame’s fully converged endpoint protection platform and Aujas’s managed security services expertise to enable threat hunting, prevention, detection, and response. Traditional cyber security measures such as firewalls and antivirus cannot protect against advanced persistent attacks. The Aujas MEDR is equipped with
advanced analytics for investigation and AI/ automation for rapid response and protection against similar future attacks. What is your message to Indian CIOs? What improvements can they expect from this new offering from Aujas? Cybersecurity transformation is the top priority for technology and risk management leaders. Organizations cannot outsource risk management; a component of the strategy should be to partner with technology and service providers for specific areas. At Aujas we have focused our efforts into putting together an automated incident response platform to improve overall efficiency from time-to-detect to time-to-respond for security monitoring and operations. Offerings such as Aujas’s MEDR could be a right fit for enterprises, with the focus on outcomes as opposed to getting embroiled in technology, integration and service challenges. Privacy by design also helps to ensure that innovation and disruptive technologies in various fields mature safely, at least from data privacy perspective. NOVEMBER 2018 ENTERPRISE IT WORLD 35
INDUSTRY ADVICE
VED PRAKASH, Senior Business Development Manager, Banking Identity & Data Protection Enterprise & Cybersecurity, Gemalto
“The common denominator between data breaches at all organizations is that they focused only on their front line defenses (perimeter security) while ignoring their last line of defense – data encryption.”
FROM GOOD-TO-HAVE TO MUSTHAVE: DATA ENCRYPTION TODAY Whether it is an attack on startup with rudimentary perimeter defenses or conglomerates deploying top-notch front line defense systems, with rising cyber-attacks organizations can no longer live under the illusion that once they deploy robust perimeter defense systems, they are safe.
W
henever the news of any new data breach surfaces, the first action of most organizations is to take an immediate stock of their IT perimeter defenses and update them to avoid getting breached themselves. While it is definitely a good strategy to ensure that perimeter defense systems are always kept updated, focusing only on these defense mechanisms is no longer sufficient in today’s perilous times.As per the H1 results of Gemalto’s Breach Level Index, more than 3.3 billion data files were breached across the globe in the first six months of 2018 alone, a whopping 72% increase over H1 2017! Unsurprisingly, more than 96% of these breaches occurred on data that was not encrypted. The latest victim of data theft in India is Pune-based digital lending startup EarlySalary, as personal details, employment status and mobile numbers of its 20,000 potential customers were stolen. The company discovered the breach
only after they received a ransom demand from the hackers, following which they plugged the vulnerability. Whether it is an attack on startups like EarlySalary that may have rudimentary perimeter defenses or conglomerates like Facebook, Sing Health and Equifax that most likely had deployed top-notch front line defense systems, the common denominator between the data breaches is that they focused only on front line defenses (perimeter security) while ignoring their last line of defense – data encryption. While perimeter security mechanisms act as a strong deterrent, they are rendered completely useless once inside access is gained in an organization’s data files. Encrypting it is the surest way of safeguarding it against malicious attacks since it makes it virtually impossible to decipher data without corresponding decryption key, hackers have zero incentive in breaching such organizations. To ensure zero-compromise of your data’s encryption keys, it is important that the keys
are stored securely and separately from your encrypted data. Use of Hardware Security Modules (HSMs) is perhaps the surest way of ensuring optimal key security. When choosing a HSM solution, make sure that the solution also facilitates key management to manage the crypto keys at each stage of their lifecycle - like generation, storage, distribution, backup, rotation, and destruction. With cyber-attacks on the rise, the landscape has witnessed a tectonic shift. First line of defense mechanisms like perimeter security are no longer sufficient to prevent data breaches, since after an intrusion, there is hardly anything that can be done to protect the data that is not encrypted. Realizing this, Governments across the globe are introducing stringent regulations like the General Data Protection Regulation (GDPR), RBI’s Data Localization, PCIDSS and the upcoming Personal Data Protection Law, 2018 in India to ensure that organizations make adequate security provisions to protect their users’ confidential data. It’s time for a new data security mindset. NOVEMBER 2018 ENTERPRISE IT WORLD 36
STARTUP SHELF // INTERVIEW
BRINGING SMART PARKING TO INDIAN CITIES Indian startup GetMyParking is an end to end digital platform that enables plug-and-play systems to digitize any type of parking space and aims to make cities economically productive and less polluting ina country where the parking industry is unorganized and suffering from huge revenue leakage and lack of transparency.
“Smart parking combines digitization of parking operations, sensor-based tracking, and data analytics to create efficient parking systems.” POOJA APUGOL,
SENIOR PRODUCT MANAGER, GETMYPARKING
Can you shed some light on the concept of Smart Parking? Which countries are major markets today? In recent years, there has been an increased global thrust on building ‘cities of the future’ or Smart Cities. These are smart in the sense of utilizing cutting-edge technologies to optimize asset use, build capacity, and employ their technology-enabled capabilities to become greener, safer, and more efficient. Smart parking combines digitization of parking operations, sensor-based tracking, and data analytics to create efficient parking systems. Today, major markets include USA, Japan, Canada, UK, Germany, France, China, Singapore, India, Austria, etc. What are the core technologies at the heart of the concept? How far is it from maturity? Our suite of solutions integrates a complete smart parking ecosystem, which serves all the stakeholders involved, to organize the fragmented chaotic industry with data and execution. GMP is an end to end digital platform that enables us to plug-and-play systems to handle specific requirements. Our objective towards building this platform is to have a flexible, robust and integrated solution for all parking use cases.
Technologies at the core of our systems include IOT, AWS Cloud, JAVA, MYSQL, Angular JS, Android, IOS etc. Where do you see an opportunity for Smart parking industry in India? In India, the industry itself is unorganized and suffering from huge revenue leakage and lack of transparency. City Government being the largest owner of parking real estate also does not get its fair share of revenue. Most of the existing solutions are not flexible enough to succeed in emerging markets. Over $300 million investment was done in last few years in smart parking companies globally.There are dozens of international players like Streetline, JustPark, Parkopedia, Appyparking, SpotHero, etc. but they were born in developed markets and hence work only if the assumed infrastructure is in place but come short when brought to emerging markets. The differentiator for us is our innovation allows us to digitize any unorganized parking at a fraction of the cost of any other alternative. What are some of your successful deployments internationally? We have partnered with Europe’s Largest Parking Operator APCOA to Revolutionize Parking in
13 Countries, to customize and deploy an open IoT platform that provides a seamless mobility experience across all parking touch points. This digital platform will be scaled to all 13 countries in which APCOA operates more than 1.4 million car spaces at over 9000 locations. We have also had some pilots and projects in South East Asia. We believe this market will have more opportunities in the future. In India, we are present in Delhi and have an extensive B2B product run by an extensive operations team. Where do you see the smart parking industry in the next three to five years? Smart parking solutions can make cities economically productive, less polluting and wasteful of resources. It is not just about managing the parking spaces. It is about making transportation simplified. The market opportunity for parking is estimated to be over $100 billion and most of the existing solutions are not flexible enough to succeed in emerging markets. Smart parking will enable the parking experience to be seamless, like the advent of smart cars we will see the entire vehicle driving, parking and owning industry have great shifts. We as a company are extremely excited with what the future holds for all of us. NOVEMBER 2018 ENTERPRISE IT WORLD 37
THE STUFF // PRODUCTS & SERVICES
CIO TOYS ACER’S OJO 500 WINDOWS MIXED REALITY HEADSET Acer India’s new Acer Windows Mixed Reality headset, the Acer OJO 500, features a one-ofa-kind detachable design that offers superior flexibility, comfort, and hygiene for consumers and businesses. The Acer OJO 500’s unique design enables the lens and head strap to be individually removed, making the headset easy to store and clean. For maximum clarity, the Acer OJO 500 includes a built-in interpupillary distance (IPD) wheel and a patented smart phone app to measure IPD distance. The software-assisted IPD measurement app, Acer IPD Meter, along with Acer IPD Indicator software lets the wearer modify this distance for sharper, clearer images and a more enjoyable experience. In a first for VR headsets, the integrated audio system uses a patented sound pipe design that directs sound from the built-in speakers
toward the wearer’s ears. The unique design means users can hear audio without wearing earphones, enabling them to remain aware of the surroundings while still enjoying an immersive experience. This is ideal for use in public spaces where users may not want to be totally cut off from their surroundings. Customers that require more privacy and deeper immersion can use the built-in earphones that or an earphone of their own choice with the soft head strap. Featuring inside-out tracking, the camera is on the headset so there is no need to drill holes in a wall or set up extraneous hardware. As soon as the headset connects to a Windows Mixed Reality-ready PC, it installs the required software. The headset comes with a 4-meter (13 feet) cable allowing a wide range of movement, and connects to a PC via HDMI 2.0, while a USB 3.0 connector downloads data
ABBYY’S FINEREADER 14 ABBYY FineReader 14 is the next generation of the flagship desktop software that combines awardwinning optical character recognition (OCR) with advanced capabilities for working with PDFs and document comparison. Abbyy FineReader 14 comes in three different versions i.e. Standard, Corporate & Enterprise. With this powerful tool, business professionals can easily manage and accomplish all kinds of daily tasks related to documents – editing, converting, commenting and comparing documents – using one, intuitive application. It comes with the main functionality required to work with any paper-based document and PDFs, whether scanned or digitally created. Highly accurate conversion of PDFs and scans into editable and searchable formats, Built-in advanced PDF editing and collaboration tools, cross-format document comparison feature detects and highlights any relevant textual changes.
NETGEAR’S TRI-BAND WI-FI SYSTEM ORBI RBK20 NETGEAR’s Orbi RBK20 Wi-Fi Router and Satellite delivers unparalleled Wi-Fi coverage. It covers homes up to 4,000 square feet with strong WiFi signals and the Innovative Tri-band Wi-Fi helps maximize the Internet speeds available in your home. Orbi RBK20 has a unique, industry-first Tri-band architecture with a dedicated 5GHz wireless connection between the router and satellite, which provides both reliable WiFi coverage and maximum internet speed throughout your home with a single network name. The new Orbi Systems all deliver industry-leading 802.11ac AC2200 WiFi speeds up to 2.2Gbps, so you can enjoy seamless WiFi everywhere in your home and around
38 ENTERPRISE IT WORLD NOVEMBER 2018
your property, without any dead zones. Key Features: l 2.2Gbps with up to 555 square meters of coverage l FastLane3 Technology - The dedicated WiFi backhaul creates better 4K HD streaming & gaming, even as you connect more devices. l Single Wi-Fi network l Smart parental controls l Guest Wi-Fi network that allows access with sharing the main network password l 2 Gigabit Ethernet ports l Works with Amazon Alexa and Google Assistant
Licensed to Post without pre-payment U(SW)/19/2017-18
Date of Posting: 15 & 16 of Every Month
RNI NO: DEL ENG/ 2017/ 69906 Postal Reg. No.: DL-SW-01 / 4200 / 17-19
Date of Publication: 28 of Every Month Date of Posting: 1 & 2 of Every Month
Everything you need to know to stop ransomware.
67% of Indian organizations were hit by ransomware in the last year.*
91% were running up-to-
date endpoint security at the time of the attack.*
Protect against Ransomware with CryptoGuard The proven CryptoGuard capabilities in Sophos Intercept X block ransomware as soon as it starts trying to encrypt your files, returning data to its original state.
“Intercept X stopped all ransomware attacks we tested against it in seconds.” - ®ESG Labs “Since deploying Intercept X we’ve had zero ransomware infections.” - ®Flexible Business Systems For more details visit www.sophos.com/intercept-x Tel: +91 79 66216838 Email: indiamarketing@sophos.com *The State of Endpoint Security Today survey was conducted by Vanson Bourne, an independent specialist in market research. This survey interviewed 2,700 IT decision makers in 10 countries out of which, 300 respondents were from India, based in Delhi, Mumbai, Hyderabad, Bangalore, Kolkata and Chennai.