India's Leading Cyber Security Companies

Page 1

www.insightssuccess.in

The way of business solutions India's Leading

VOL 02 ISSUE 03 2022

yber

security Companies

TECH-DRIVE THE EVOLUTION OF CYBERSECURITY SOLUTIONS

Mr Anil Raj

VITAL CONNECTION

Director, Cybervault

THE RELATIONSHIP BETWEEN SOCIAL NETWORKING AND DIGITAL SAFETY

Endlessly Alert

Securities Solutions




Editor’s Note MAKING INDIA CYBERSECURITY’S FUTURE GLOBAL HUB

A

s we advance into the digital future, there is an immediate need to focus on India’s evolving cybersecurity industry landscape. It is imperative to take a 360-degree overview of the current strengths, capabilities, weaknesses, opportunities, achievements, innovations, and threats that the leading Indian cybersecurity companies are witnessing. The two significant aspects of the cybersecurity industry are cybersecurity product landscape 2.0 and the cybersecurity service landscape. The new reality of cyberspace is changing rapidly, with the quickening pace of digital transformation, remote work environments, erased local and global boundaries and increasing cyber-criminality and threat scenarios. In response, the Indian cybersecurity product landscape is rising to the occasion by securely facilitating the global cyber ecosystem in maintaining local business resiliency. According to DSCI, the Indian cybersecurity product industry is growing six times higher than the IT product industry.


Abhishek Joshi Deputy Editor

abhishek.joshi@insightssuccess.com

In short, the cybersecurity product landscape is growing with leaps and bounds. The growth is seen in technology integration, regular innovations, global technology management, international presence, and futuristic product offerings. Similarly, the talent ecosystem also expands with companies looking for digitally skilled professionals. The second aspect of the cybersecurity service landscape is showcasing the prowess of the Indian cybersecurity industry. Indian cybersecurity companies are showing tremendous growth in professional people, ever-improving processes, technology, innovative offerings, strategic management, and evolving future market perspectives. In statistical numbers, the high-quality FMI report shows that currently, in terms of value Indian cybersecurity market stands at US$ 20.7 Billion, which will reach up to US$ 43.5 Billion by 2032, with a projected CAGR of 7.7%. Interestingly, the Indian cybersecurity industry’s future growth story is full of promises. And Global digital giants

vying for local strategic partnerships will further develop the ecosystem. Furthermore, with the Indian digital ecosystem development with a 360⁰ growth filled with the strong presence of India's Leading Cyber Security Companies, the country is poised to become a global cybersecurity hub. The current edition of Insights Success celebrates this growth story by showcasing the exhilarating achievements of the Leaders in this space. Read on to feel digitally safe and secure!


C

O

V

E

R

S

T

O

R

Y

Endlessly Alert

Securities Solutions

08


24

T

Cyber Security Hive

Data Resolve

28 E

Solving Business problems through Technological Solutions

N

The Game Changers in Cyber Security

36

T

SysTools Software

N

The Expert Cyberworld Protectors

t

VITAL CONNECTION THE RELATIONSHIP BETWEEN SOCIAL NETWORKING AND DIGITAL SAFETY

i

c

l

e TECH-DRIVE

THE EVOLUTION OF CYBERSECURITY SOLUTIONS

s 32

O

20

r

C

A


Editor-in-Chief Pooja M. Bansal Deputy Editor Abhishek Joshi Managing Editor Gaurav PR Wankhade

sales@insightssuccess.com

FEBRUARY, 2022 Corporate Offices: Art and Design Head Sandeep Tikode Associate Designer Rashmi Singh

Sr. Vice President Megha Mishra Sr. Sales Manager Tejaswini Whaval Business Development Lead Neha Bhilare Sr. Business Development Executive Kiran Pawar

Technical Head Prachi Mokashi Technical Specialist Amar Sawant

Insights Success Media and Technology Pvt. Ltd. Off. No. 22 & 510, Rainbow Plaza, Shivar Chowk, Pimple Saudagar, Pune, Maharashtra 411017 Phone - India: +91 7410079881/ 82/ 83/ 84/ 85 Email: info@insightssuccess.in For Subscription: www.insightssuccess.in Insights Success Media Tech LLC 555 Metro Place North, Suite 100, Dublin, OH 43017, United States Phone - (614)-602-1754 Email: info@insightssuccess.com For Subscription: www.insightssuccess.com

Digital Marketing Manager Renuka Kulkarni SME-SMO Executive Nikita Khadalkar Circulation Manager Tanaji

Cover Price : RS. 200/Follow us on :

www.facebook.com/insightssuccess/

https://twitter.com/insightssuccess

We are also available on Copyright © 2021 Insights Success Media and Technology Pvt. Ltd., All rights reserved. The content and images used in this magazine should not be reproduced or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior permission from Insights Success Media and Technology Pvt. Ltd. Reprint rights remain solely with Insights Success. Printed and Published by Insights Success Media and Technology Pvt. Ltd. RNI NUMBER: MAHENG/2018/75953


India's Leading

yber

security Companies

Management

Brief

CyberVault Securities Solutions

Anil Raj, Director

Cybervault Securities Solutions Pvt. Ltd. is an Information Security Company providing various IT Security services to its clients based in India and overseas

Cyber Security Hive

Akram Khan, CEO and Co-founder

Cyber Security Hive provides end to end cyber security services specialized in vulnerability assessment and penetration testing.

Dataresolve

Mr Dhruv Khanna, Co-founder and CEO

Data Resolve Technologies is Asia’s fastest-growing Data Security Company, an emerging player in Cyber Security and intelligence for Enterprises.

SysTools Software

Anuraag Singh, Founder Director

SysTools is delivering prime, robust and cost-effective solutions and services across the world.

Company Name



Mr Anil Raj Director, Cybervault


Journey of Mr Anil Raj


India's Leading Cyber Security Companies

When I graduated with BTech 14 years back, cyber security was a relatively new field. Very few ventured into this field due to the nascent stage it was in at that time. Even during that time, I had a keen interest in computer networking subjects that forms the core backbone of information security. I started my first job in the IT world in the Computer Networking domain and slowly graduated to cyber security out of pure interest and the vast area of interests it offered. I have always loved to find vulnerabilities in the Network and Applications. Research, Analysis, and Development were my Forte, and cyber security gave me the perfect platform to implement it. I started to develop a keen interest in my cyber security findings and took up initiatives of conducting workshops in colleges in Aurangabad where I was doing my first job. I received a massive response to this workshop which catapulted my confidence in my capabilities and projected me as a great orator with exceptional expertise over the fundamentals of the topics. My name and article were featured in the newspaper the next day, and my popularity grew manifold. I started my journey in this domain as a trainer and moved on to become a corporate trainer in a short time. My concepts reached such a level of professionalism that my organization put me up on performing corporate cyber security audits and assessments. My strong training fundaments helped me grow manifold, and my career in this domain was cemented. I always attribute my success to all the students who showed their confidence in me and my seniors in the initial days who stood for me. Risk, compliance, and forensics are other areas that have been of keen interest to me.

I

n today's digital era, almost every business has automated its organizational structure and is shifting towards digital operations. Although this does provide an array of different benefits, it also paves the way for cyber-attacks. If you think about it, all the business' data is stored on servers, including confidential information regarding the company, its operations, and its clients. If a hacker manages to gain access to such information, they can seriously deter the organization's functioning in every aspect. One successful hack can lead to the foreclosure of a business, especially if the hack is made public or is targeted towards client data. Put yourself in your client's shoes. Would you ever invest in a business that does not effectively employ cyber security? Would you share any personal information with a company if you know that they cannot protect your information? Even if your business has the best computers, top servers, or cloud service solutions, one attack can make all this meaningless. If a hacker manages to infiltrate a system, they will gain access to the entire network, and your business will be at their disposal. The answer is quite simple! Instilling reliable IT security has now become a prerequisite in today's digital era. And when it comes to implementing these solutions, Cybervault Securities Solutions Pvt. Ltd. shines out in the cyber security niche as a leading provider of IT security and services to all levels of corporations.

Cybervault helps its clients and customers to protect their critical data from attackers/ malicious users by identifying vulnerabilities in their network and applications. Moreover, the company provides detailed reports suggesting recommended fix that helps the application owner understand the root cause of the problem to fix it quickly. The Commencement Cybervault was founded by the visionary leader Mr Anil Raj after extensive experience in Information Security spanning many years with various multi-nationals. Cybervault was founded as a core IT Security Service Company.


A company becomes a brand when people recognize its achievements at a global level


Expressing his goals behind establishing Cybervault, Mr Anil expressed, "The main idea behind starting the company was to bridge the gap between the industry and requirements and smart technological solutions." "We started promoting the company by contacting various companies and agencies for promoting our services. Brick by brick, the company started taking shape. The company soon moved to a bigger premise in 2015," he added. To diversify its operations, Cybervault started a separate training division by being an Accredited Training partner to EC-Council USA, which has a global presence in 142 countries. Cybervault was always focused and consistent in delivering outstanding quality. In 2017, the company moved to a bigger premise. The client base kept increasing - from IT companies to manufacturing companies, designing companies to production companies, financial companies, and cooperative banks. Cybervault had a diverse client base with an increased client base in PAN India locations. The core competence was always on delivering the best service. Highlighting the key issues and securing its client's data or applications, thereby saving their money and reputation, led to the success of Cybervault. Hard work and efforts were combined and directed in a productive way to highlight the findings, analyze the results, and give apt recommendations to the clients. With such a rapidly increasing market presence in the field of Security, Cybervault is emerging as a brand to bank upon. Mr Anil believes in - "Strong foundations are the key to huge success.” Hence step by step and client by client, the company grew and continues to grow, establishing bigger benchmarks in the cyber security space.

All above audits are mandatory under ISO 27000/HIPPA/FISMA/SOX norms hence done as a mandatory IT security compliance. VAPT helps identify vulnerabilities in the IT network of the organization. This is done using specialized software tools in both manual and automated approaches. The results are analysed, and suitable patches are suggested to secure the network from attacks. Patching ensures smooth working of IT Network. Cybervault has a team of experienced and certified professionals. Web App testing finds vulnerabilities in software applications deployed over the internet. Web Applications testing is critical where payment gateway, exchange of confidential data, or access to critical confidential data are involved. Similarly, mobile application testing is also performed over iOS, Android, and Windows applications using the mobile platform. Information security audit provides recommendations consistent with compliance and industry practices. Cybervault has a cyber forensics investigation team for Cybercrime and recovery cases. Cybervault is also one of the best institutes in Pune, providing CEH, Ethical Hacking, and other information security certifications training with a high success rate and 100% placement. Cybervault is an authorized training center for EC-Council Certifications, which is an international certification body in the field of cyber security. The company helps its customers with integrated services for their core business operations by offloading their IT infrastructure management. Cybervault not only delivers service to its client, but also establishes a long-term relationship. The list of national and international clients represents the legacy of Cybervault's Quality and success. A Visionary Leader

The Legacy Cybervault provides various IT security services: Vulnerability Assessment and Penetration Testing (VAPT), Web application Testing, Wi-Fi Testing, Mobile Application Testing, Cyber Forensics Audit, and Information Security Audits.

Mr Anil Raj, Director, Cybervault, is a leader, a creative thinker, a modernizer, and a tech-savvy person who has founded Cybervault Securities Solutions Pvt. Ltd. after getting an extensive technical experience from top MNCs. He has a diverse background that includes network and web application Security, Penetration Testing, Forensics, training, and regulatory compliance methodologies.


Having performed a number of penetration tests assessing well over 10,000 hosts in the Industry, Mr Anil has had considerable hands-on IT Security experience of consulting and lecturing, whether for Government Agencies, Telecom Companies, or Financial and international companies. Mr Anil is imminently qualified in his field. He holds a string of professional qualifications in Networking, to name a few [MCSE, CCNA, Network+) and IT Security (Security, Diploma in Information Security), CEH (Certified Ethical Hacker), LPT (Licensed Penetration Tester)] besides an Engineering degree in Computer Science. He has featured in various newspapers like The Times of India, Pune Mirror, Mid-Day, Sakal, DNA, and many more. Mr Anil has a specialized domain expertise workforce working for various clients globally. He envisioned Cybervault as a platform to merge innovation and creativity. Passion for technology and dedication has helped him create a gem in the field.

everyone maintains, the main USP of Cybervault is the customization of service to suit the need of the hour and scenario. Team Cybervault does not believe in offering generalist or standardized solutions which are generated by automated tools. They analyze the customer issues and provide them with a set of relevant solutions to eliminate or reduce their threats. No system is 100% secure as threats and attackers are constantly evolving newer and newer ways to gain unauthorized access. Correct and directed solutions by a team of professionals with an in-depth understanding of the problem do eliminate the risk, though. Another key aspect is its cost-quality balance. Team Cybervault never overcharges its customer for its expertise but, at the same time, they do not compromise the quality of deliverables.

Mr Anil firmly believes, "Dedication coupled with inspiration leads to Innovation." He strongly believes that every dream can be lived with firm determination and dedication. He has always been an ardent leader, whether during his academic days or his professional career. Setting A Benchmark of Professionalism Over the years, Cybervault has evolved as a brand. A company becomes a brand when people recognize its achievements at a global level. Cybervault has a long journey of nine years where its team catered to multiple clients from diverse backgrounds and locations – in India and abroad. Team Cybervault did some prestigious Information Security Audits where the clients were banks and multi-national IT companies. Some audits involved clients from manufacturing and production sectors where cyber security awareness is lower than in the IT domain. Mr Anil felt that if he could make this sector aware of the need for cyber security audits, then he could truly excel in his work. Apart from a certified and experienced task force, which

Cybervault has always delivered the best quality and skilled staff to its esteemed customers



The cost-effective services of Cybervault with a focus on quality and transparency backed by solid projects make it a force to reckon with in the industry. Also, the transparency of these services ensures that its customers get the very best. Cybervault has always delivered the best quality and skilled staff to its esteemed customers. The company has always emphasized the quality of deliverables and never conducted business based on low pricing. Quality has been the focus always. Moreover, Cybervault keeps total transparency with its clients, which has built their trust with the company. This has translated to the growth in client list year after year – be it in terms of new clients or existing ones. Cybervault's team of professionals from all walks of IT security brings along a wide scale of experience and expertise. All this coupled under one roof replenishes the customers with the best of everything. It leaves no reason to go anywhere else, as the customer can simply offload their complete IT security requirement.

Pearls of Wisdom Sharing his opinions on how cyber security is crucial today and what advancements we can expect in the future, Mr Anil said, "Security measures are of prime importance to ensure safety and reliability of organizations." "Security breaches have become a common problem for organizations globally. The losses because of these are severe and huge, and hence organizations are becoming more and more aware and taking all the possible measures to curb these issues." "The attacks such as the recent ransomware attacks - Petya and WannaCry are a testimony to the fact of rising cyber security issues globally. Lack of awareness is the cause of these attacks; hence organizations need to make their employees more and more aware.”

Cybervault has always worked on customer feedback with its prompt technical assistance. These two critical factors have helped to re-invent the relationship between client and vendor every time with a renewed sense of work enthusiasm and commitment. Cybervault also provides customized and personalized service which suits the customer requirement perfectly in harmony with his needs Cybervault has always believed in offering 'Quality' to its customers. This quality has been followed in the quality of its services, quality of the deliverables, professionalism of its staff, and numerous other factors. Along with quality, Cybervault management has always emphasized flexibility in customer service. They have followed a customer-centric approach where the customer and his needs were always the priority. Affability was and is always a prime factor that helped Cybervault stay as close to its customers as possible. Transparency is always maintained, which helps the client to trust Cybervault easily. All these factors have always helped Cybervault be near its customers and establish a healthy business relationship with them.

Cybervault not only delivers service to its client but also establishes a longterm relationship


"Most medium-level to large-level organizations have started following the global norms of IT infrastructure like ISO 27001, HIPPA for the health care industry. These are all globally acclaimed bodies issuing strict guidelines for IT infrastructure, from implementation to security perspective," he added.

"Keeping transparency with your customers makes a huge difference. Customers appreciate honesty and transparency, as this inspires their confidence in you and your brand. Nourishing the brand is more important than creating the brand as it makes your business model a sustainable one. Ultimately this leads to business success."

Mr Anil also expressed, "The organizations going for these audits are increasing day-by-day. Earlier organizations were skeptical on spending for IT security.”

"New aspirants and entrants should be focused on skillset and certifications to back their skillset. All this clubbed along with industry experience make their entrepreneurial journey a potent success."

"But the trend is slowing changing now. Most of the organizations are going for IT Security Audits on a quarterly basis - a much-needed audit for any organization," he added. Sharing the facts and shedding light on the industry scenario, Mr Anil stated, "Organizations are spending more on Intrusion Detection devices. The need and necessity for firewalls are increasing day-by-day and organizations do not look back to spend on them. Emphasis is on increasing stricter security policies, right from better passwords to more secure networks and security policies.” "Since the user is the weakest link in the technical chain, technical audits and measures alone are not sufficient. It is being observed that more and more companies are going for employees who are certified and aware of cyber security and regulated for smooth network activity," he added. Sharing his advice for the aspirants who are willing to venture into the field of cyber security, Mr Anil mentioned, "New entrants need to be highly motivated and focus only on the quality of their services. They should never compromise work deliverables as the responsibility for the security posture of client lies with them." "Any lacking or discrepancy in their work is directly going to reflect the work quality they offer and thus compromise the client's security at a larger perspective.”

"Cyber security has a vast scope. A strong skillset is the essence of a successful venture which will yield a name for new entrants willing to make it big in this domain," said Mr Anil. Aiming for a Limit-less Future Currently, many organizations are catering to various clients, including multi-national companies and companies in India. At the same time, Cybervault is also doing a lot of projects for cooperative banks and other financial institutions where information security audits hold key significance as per ISO and other compliance. Mr Anil wishes to diversify his organization to public sector projects where certain statutory and regulatory compliances are essential. Hence fulfilling those compliances is his current goal, and he envisions to cater to a larger sector of the industry by boosting his skills and expertise to that level. "In cyber security, every day is a learning experience, and we need to add value to our brand by making ourselves more and more competitive. This adds a unique dimension to our organization and gives the best to our customers,," expressed Mr Anil.


Subscribe Today Stay in touch.

Subscribe to Insightssuccess Get Insightssuccess Magazine in print, & digital on www.insightssuccess.in

www.insightssuccess.in

Cheque should be drawn in favour of : INSIGHTS SUCCESS MEDIA AND TECH PVT. LTD.

CORPORATE OFFICE Insights Success Media and Technology Pvt. Ltd. Off No. 22 & 510, Rainbow Plaza, Shivar Chowk, Pimple Saudagar, Pune, Maharashtra 411017. Phone - India: 020- 7410079881/ 82/ 83/ 84/ 85 USA: 302-319-9947 Email: info@insightssuccess.in For Subscription : www.insightssuccess.in



Vital Connection

The Relationship

between Social Networking and Digital Safety

T

he time of physical social networks is a passe now. Welcome to the era of digital social networking. The boon and popularity of social networking websites keep increasing among youngsters, teenagers, young and even old adults. On the one hand, these are the perfect platforms for connecting with friends, disconnected family, relatives, peers, colleagues, and even personal and professional strangers. However, on the other side, it exposes your personal, professional, and confidential info to the unscrupulous elements increasingly active on such websites. This is where digital safety and security risks arise abound. There has always been a dark side to each and every human endeavour from the dawn of the discovery of fire.

The same is with any new technology, including recent social and digital media developments. Thus, blaming technological advancements or scientific developments for the deteriorating social morale in the digital space is like treating a stomachache by rubbing a balm on it and then blaming the balm for its ineffectiveness. Whether the relationship between homo sapiens and its most distant ancestral reptilians or social networking and digital safety, both cyber-criminals and their victims were and are always humans. Nature of The Social Networking Threats Social networking websites (digital platforms) or apps differ in their purpose. Some have a purely social purpose, letting you connect with people of similar interests, likes, tastes, and lifestyles.

20 | February 2022 | www.insightssuccess.in


21 | February 2022 | www.insightssuccess.in


Other allows for more personal and romantic or professional connections and networking. However, one common thing in each of them is that they all ask for your personal information in detail, including your financial data. Now many of them have advanced security features and systems in place to safeguard your data and information, but many other simply does not have enough dough or even intent to ensure that your data is safe or not once you give it to them. There are also the third kinds of these social networking entities, whose sole innate intention is of skimming and scamming you. And many a time, they do it using third party connections and contacts so that you never come to know that they are behind the entire trap. The most common threats such websites, apps, and platforms pose are data, info, and identity theft, financial skimming and scamming, blackmail, extortion, kidnapping, child trafficking, child and women molestations, social shaming and blaming for the crimes you have not committed, human trafficking etc. Although these all come under the extensive category of cybercrimes, and there are laws, rules and regulations to approach in any and every case, it might be wise to follow the age-old wise philosophy that prevention is better than cure. Tips for Your Protection Conservative Approach – It is better to post less personal info on any and all social networking websites. And before putting your info blindly, it would be wise to check for the credentials and legality of those websites, apps, and platforms in the first place. Avoid putting such info like address, contact number, or your schedules, routines and financial details. Be mindful of the internet as a public place – Do not treat your personal info (photos, profiles, blogs, articles, opinions) as trash so that you will put it on every corner of the web. More than it is a public place, the world wide web has a dark side called the darknet.

And now, the darknet has its own niche called the social darknet. It is a dangerous place out of the reach and purview of legal authorities, where all the antisocial elements wander with complete anonymity and control. Be wary of it. Careful of strangers - The web is the best place for people to hide or misrepresent their identities, intent and motives. For example, during instant messaging, chat rooms, and even VC sessions, try to limit what you say and how you say it. Similarly, you should restrict the access of people who can contact you or not. And in the case of communicating with strangers, be extremely cautious about what you discuss with them digitally or agree to meet physically. Do not be Naive – Being Naïve is another thing than being ignorant. Social media is littered with fake news, fake events, and all kind of fake or even false information. Thus, it is better to cross-check and verify before trusting whatever you read online. There are armies of hackers and anti-social people whose sole purpose (often it is their paying job) is to post false or misleading info about every topic. Safeguard your settings – Social networking sites' privacy settings comes in handy when you want to safeguard yourself. Thus, it is better to put only such info you wish the public to see. The Last Word It is always best to have updated, secure and safest OS, Browsers, and IT Systems in place so that you and your info remain digitally safe, keeping you socially active and relaxed. Also, restricting yourself while surfing social networking sites will keep you out of harm's way. Be safe, stay safe, digitally. - Gaurav PR Wankhade

22 | February 2022 | www.insightssuccess.in



The Game Changers in Cyber Security

A

s the digital world expands, threats of cyber-attacks are increasing in density. There are over two-thousand attacks daily. The most common industries targeted by the attackers (hackers) are small and medium enterprises, healthcare, government agencies, energy companies, and higher educational institutes. It is always a big issue for industries, big or small, that who will provide them with professional cyber security solutions and penetration testing services in the area of specialised web application penetration testing, network penetration testing, and mobile application penetration testing. This is where Cyber Security Hive had entered the game to change the playing field for all the most vulnerable industries from India and the USA, UAE, and the rest of the world.

Akram Khan

CEO and Co-founder

Cyber Security Hive was started by two cyber security experts, Akram and Maaz; both are school friends and have been in the cyber security industry for more than ten years and collectively carry twenty years of experience in different areas of cyber security.


India's Leading Cyber Security Companies

In an interview with Insights Success for ‘India's Leading Cyber Security Companies-2022’, the marshalling Leader, CEO and Co-founder, Akram Khan, of this cyber protector organisation from Bengaluru, India, is speaking in detail about his company’s gameplan. During his ten-year tenure, Akram Khan worked with Amazon, Deloitte, and other startups. Since Akram has worked for the biggest organisations, he understands the complete cyber security ecosystem. He and Maaz and their team of cyber security experts can successfully provide customised solutions and personalised services to clients depending on the size and scale of organisations. Major tactics of their gameplan are produced below for your business. Please describe Cyber Security Hive in detail. Cyber Security Hive is a five-year-old company based out of Bangalore. We provide end to end cyber security services specialising in vulnerability assessment and penetration testing. We provide cyber security services ranging from VAPT, Security operations centre, phishing simulation and awareness training, endpoint security, etc. Cyber Security Hive has a vast client base from enterprise customers, SMB, start-ups and has helped them solve multiple cyber security problems they have been facing in their organisations. Cyber Security Hive is also becoming a product-centric company by

launching its very own fully managed vulnerability management platform(threatscan.io). A client can request an on-demand penetration testing with Ai based support technology, zero false positives, online and offline reports, and threat score of your application. It currently supports only web applications, and we will soon add support for network and mobile applications. What are the USPs that highlight CSH as a leading name in Cyber Security Industry? There are hundreds of companies in India providing cyber security services. Cyber Security Hive specialises in penetration testing and managed security services. The approach we take to perform penetration testing is quite different from the standard approach. Our senior pen testers develop a standard checklist

‘‘

Cyber Security Hive specialises in penetration testing and managed security services

‘‘

When both met and realised, they had a common goal and vision in the cyber security industry, they decided to form the Cyber Security Hive to make the digital world a more secure and safer place.

along with the latest vulnerabilities and then perform checks based on the checklist that covers the latest attacks and OWASP top 10 vulnerabilities. We also run our cost-effective security operations centre as well where we help small to large enterprises in deploying a cost-effective SIEM solution. What are the immersive benefits of the services/solutions you provide to your clients? Our specialisation is VAPT, where we deliver the testing with multiple OSCP certified resources along with a detailed report of all the vulnerabilities identified; we also deliver a checklist of over 140 manual checks that we would be performing on your application along with all the technical documentation we will also provide a certificate that can be shown to the companies that a valid penetration testing has been performed and all the vulnerabilities identified during the testing are now closed. For our security operations centre, we do provide cost-effective open source SIEM solutions with integrations with JIRA and multiple and other ticket solutions with shared and dedicated SOC analysts, both L1 and L2. For enterprise clients, we also deploy enterprise SIEM solutions such as Splunk, IBM Qradar, Logrythm, etc. We also have made in India costeffective solutions that we can provide to SMB organisations who would want to stay on top of security. What were the initial challenges after venturing into Cyber Security, and what are the challenges now? Initially, when we ventured into the field of cyber security, it was not easy to gain clients’ trust with their confidential information. After working with many enterprise customers such

25 | February 2022 | www.insightssuccess.in


as Tata Technologies, Landmark group, and Fairtrade, gaining trust became easier as our portfolio increased. Currently, we are constantly having a problem of build management and tracking their vulnerabilities with some of our customers, and to solve this, we are launching our own product called threatscan.io, which can help clients manage their vulnerabilities with complete life cycle management of vulnerabilities along with on-demand pen-test, retest, interactive dashboards, and human-AI based support. Being an experienced leader, share your opinion on how Cyber Security is crucial today and what advancements we expect in the future? With everything becoming digital these days, I cannot emphasise how important cyber security is currently and how important it is going to be in the near future. According to the statistics from security magazine, there is a cyber-

attack every 39 seconds, which means 2200 attacks every day. Hackers are developing new techniques to perform phishing. Viruses are getting more intrusive; DDoS attacks are bringing hundreds of websites down. From a future standpoint, I think that AI will definitely play an important role in cyber security. For example, a new signature of a virus could be detected easily by AI before an antivirus company marks the signature as a virus and flags it. I also see a lot of revolutionary AI-based VA tools which can reduce human intervention in the industry. What would be your advice to the aspirants who are willing to venture into the field of Cyber Security services? Cyber security is a competitive market. Unless and until you provide fabulous services at a cheap rate in the Indian territory, it would be tough to crack the Indian market. From my perspective, cyber security is a saturated market.

Although if you would want to enter into the cyber security industry, it would be wise to develop a cyber security product that would help solve a problem. What is the future roadmap for Cyber Security Hive and what innovations can we expect in the future? I would be happy to announce that we are coming up with our very own nextgen AI-based vulnerability management platform. We would be providing managed vulnerability management services or pen-test as a service. You would easily manage your pentest, track vulnerabilities, generate online and offline dashboards and have a human-based approach towards penetration tests. Our team manages all of this and much more at the Cyber Security Hive. For more information, visit threatscan.io

26 | February 2022 | www.insightssuccess.in



Co-founder and CEO


29 | February 2022 | www.insightssuccess.in


30 | February 2022 | www.insightssuccess.in



32 | February 2022 | www.insightssuccess.in


Te Drive

The Evolution of

Cyber Security Solutions hat began as a harmless joke in 1970 soon became the world's first cyber-attack. It gave crime-world its new niche, cyber-criminality. Since then, cyber-attacks have evolved by using threats such as phishing attacks, malware, ransomware etc.

W

The Origin and Brief History of Cyber-Criminality In early 1970, a BBN Technology's engineer, Bob Thomas, created Creeper Code, a software program that moved across the computers while displaying the message 'I am the creeper: catch me if you can!'

Or according to a security magazine, hackers (cybercriminals) attack every thirty-nine seconds on an average. In short, cyber-crime is outnumbering other crimes in this regard.

It was a joke countered humorously by Bob's colleague Ray Tomlinson who created Reaper Code, a program that would duplicate itself while travelling from one computer to another. Soon Reaper Code eliminated Creeper Code, and the joke and its counter joke began the annoying history of cybercrimes.

Thus, the world, too, learned that the greater cyberconnectivity needs the greatest cybersecurity. And the cybersecurity industry had been evolved alongside the cybercrime industry. Now, it is essential to understand their origin and history together as they race into the future, to outpace each other.

Nineteen years later, in 1989, Robert Morris created Morris Worm to gauge the internet's dimension. The worm, the first of its kind of DoS (Denial-of-Service) attack, slowed down each computer it infected by attacking it as many times as required to make it crash.

33 | February 2022 | www.insightssuccess.in


Morris Worm nearly closed down the internet but was saved by Computer Emergency Response Teams (CERTs) developed in response. Robert was convicted under the already created Computer Fraud and Abuse Act of 1986. Mainly concentrated on strategic cyber-warfare and financial skullduggery, the post-1990s virus era saw the I Love You and Melissa viruses that infected over ten million PCs globally, crashed email systems, and cost millions of dollars to the world. The Birth and Rise of Cyberworld Protectors The foundation for cyberworld security was laid down by the originator of the internet or the ARPANET (Advanced Research Projects Agency Network), combining its forces with the U.S. Airforce and other institutions and developing an advanced operating system. Expanded from the Honeywell Multics Computer System's security kernel, the new OS could detect, secure, protect, and automate tools and techniques which would thwart the possible security breaches and attacks. With increasing cyber threats across the globe, the race to develop cyber-security solutions known as Antiviruses began. Thus, 1987 saw the coming of Ultimate Virus Killer (UVK), antivirus NOD Version 1.0, and VirusScan. These antivirus programs were simple scanners that detected the sequence of the viruses' codes by executing context searches. Many of these antivirus scanners contained immunisers that would modify their code to make believe viruses that the host they are going to attack is already compromised. However, as the army of viruses increased in their numbers and number of attacks, the immunisers solution soon became ineffective. In 1988, alongside the antivirus, a firewall began to take shape. It was termed packet filter firewalls, and it could inspect the packets of data transferred across the internet. The packets it found matching its rules will be rejected or dropped.

Race to the Safe Mountain And as cybercriminals kept advancing in their techniques, outsmarting the infantile antivirus solutions and firewall weaknesses, the world felt the need for more advanced security, detection and prevention solutions. Businesses soon found out that recruiting IRTs (incident response teams) was costly, and they needed better longterm solutions which could safeguard their ever-increasing mountain of data. It paved the way for enhanced cybersecurity solutions. As a strategy, cybersecurity's continuous monitoring helps as a threat detection technique to maintain, comply with, and support business norms and growth. Adopting this strategy will allow greater threat identification and detection of weaknesses within a system, network, devices and software. IDS or intrusion detection system is a highly effective way. It is a software application designed to monitor networks, constantly searching for threats, breaches, malicious activities and policy violations. It collects all these incidences and reports them using event management and information security systems. Managed cybersecurity solutions extend a company's IT reach to non-IT departments using network security processes. Frequent security threat assessment and audits, IT protocol trainings, and strategic solution adoption are some of the critical features of this service. A Cyber-Secured Future Cybersecurity frameworks are also being developed, evolved, adapted, and implemented to identify, detect, protect, respond, and recover the information or data lost. The cyber-security expert should also leverage emerging technologies like artificial intelligence, machine learning, and blockchain to expose the cybercriminals' playbooks and outmatch them. This way, we can safeguard the corporate and industry future from future cyber-attacks and cyber-warfares. · Gaurav PR Wankhade

Though the packets unmatching were termed viruses and blocked. This simple yet effective solution soon became the first security and defence line with highly technological features. It has been extended since to the millions of networks around the globe.

34 | February 2022 | www.insightssuccess.in



SysTools Software The Expert Cyberworld Protectors

I

n the digital universe, you are all vulnerable to constant cyberattacks. And since the cyberworld is a connected hyperspace, yet highly unorganised, if you, your business, and your precious data are not protected by the cyber-security experts, you are the easiest target for every kind of cyber-criminals. But do not worry, as SysTools Software, the expert cyberworld protectors are here to safeguard you against any and every kind of cyberattack. Whizzed by Mr Anuraag Singh (Cyber Expert), Founder Director, SysTools Software is amongst ‘India's Leading Cyber Security Companies.’

have downloaded and appreciated the products developed in SysTools resource hub.” Sir, please describe SysTools Software in detail. SysTools is a digital technology company providing professional data recovery, email/server data management and cloud migration solutions to global users. To date, we have released 250+ software applications for a range of technical issues related to data, and most of them are termed as the much demanded IT solutions over the internet.

cloud backup solutions. SysTools has been in the IT industry for a decade, working to simplify technology for overcoming eDiscovery challenges. SysTools is one of the IT companies in the country to represent India on a global front in data recovery, digital forensics, cyber security and cloud migration. The digital forensics team under SysTools actively provides digital forensics training and services to the cyber cell under CBI, Income Tax Departments in Delhi, Haryana, Mumbai, Jaipur, Ahmadabad, Bengaluru, Chennai, Goa, etc. Delhi Police, NCRB, Noida Police and other law enforcement agencies of the country.

Anuraag Singh has been serving the nation for years with his cyber security and digital forensics expertise. He is the master brain behind many software applications developed for analysing the different types of data. His expertise is in data, cloud, message, and email forensics. MailXaminer – The world-class email forensics software is his brainchild.

Our operational units are spread across the country, with headquarters in New Delhi and Pune. Our workforce is available in India at Bengaluru, Tamilnadu, Mumbai, UP, Haryana, Rajasthan and Kerala. Our global operations are handled by the international team at Springville, Utah, USA. Users from around one-seventy countries have downloaded and used our software solutions and have returned with satisfactory results.

We at SysTools provide innovative software applications that enhance efficiency and add a sense of security to the lives of millions of IT admins and computer users around the globe. The smart tools developed here facilitate data recovery both onpremise and, on the cloud, even in the most intense and adverse environment.

In an interview with Insights Success, when we asked him how he is magicking solutions after solutions for each type of such diverse problem, Anuraag said, “I feel that it is my duty. And because of the trust, more than two million users around the world

Being the pioneer in the data recovery and email server management domain, SysTools has been at the forefront of data migration and recovery technology. The company has been offering services across a diverse range of data recovery, digital forensics, and

Our objective always has been to deliver foolproof DR plans. SysTools aims at business compliance and provides risk management solutions in the most proficient and user-friendly way. SysTools understands the user and is, therefore, able to offer the right

36 | February 2022 | www.insightssuccess.in


Mr Anuraag Singh (Cyber Expert), Founder Director

solution for their needs. After making strong strides in the digital recovery sphere, we have conquered the domain of digital forensics also. We also develop innovative tools that assist in digital forensics. We at SysTools focus on providing solutions that enable email investigations and mobile forensics investigations to be completely perfect.

‘‘

Over time, I realised that being a cyber warrior is equally dutiful and patriotic, like being a Soldier in the Indian armed forces. By my association with

‘‘

What was your inspiration behind venturing into the Cyber Security niche? My father was an Air Force officer. Being a member of the Indian Air force family since childhood, my passion was to serve the country as a Soldier at the border. While growing up, I got my new passion, love for technology, and I found it extremely satisfying to resolve any computer-related issues. I developed user-friendly solutions and techniques to be cyber safe by decoding complex IT issues. With my eternal passion for computer technology and data being my new friend, I discovered colours of success in my journey as a Technopreneur.

Being the pioneer in the data recovery and email server management domain, SysTools has been at the forefront of data migration and recovery technology

various departments, I understand how people are fooled to be prey to cybercrime online. My life’s mission then turned to spread awareness among the public on how to be safe on the digital platform, educate our police officers in dealing with cybercrimes effectively and provide career-oriented IT training to the youth of our country.

What are the USPs that highlight SysTools Software as a leading name in Cyber Security/Digital Forensics Industry? “SysTools is the only ‘Make in India company’ to develop a digital forensics evidence examination software application. We represent India on the global platform as experts in the digital evidence examination process with the help of indigenous software programs developed in-house. SysTools MailXaminer is the signature tool, successfully being used by many national and international investigation agencies to perform the email forensics process.” Our team of subject matter experts with years of experience in the digital evidence examination process is trusted by the decision-making authority of the Indian administration service under various departments. Having 250+ software programs designed to handle any type of data, SysTools is the only name that gives 360-degree support for investigating officers in carving evidence from any storage device or platform. We are data people; thus, our USP is in providing the exact solution for end-

37 | February 2022 | www.insightssuccess.in


India's Leading Cyber Security Companies

users for about 99.9% data related issues they face and report. SysTools Software is one trusted name by global users when it comes to handling types of data, let it be various databases, email, messages or any data stored in digital media/cloud. What are the immersive benefits of the services/solutions you provide to your clients? Benefits of the software user base: user-friendly UI and easy to follow steps makes our solutions much appreciated among the users. There are multiple programs provided in our resource hub to choose from so that the user can get the apt solution to resolve their trouble with data. A 24x7 customer service system is available to get in touch with our clients, which makes the resolution much easier for the users. Benefits of the service user base: our expert brains work together to dig out the evidence from the digital source. Being a Make in India company, our clients benefit from data security, minimal cost and maximum output. Dealing with confidential case files, to get the extensive data analysis done, team SysTools can perform it all. We are one complete package of the digital forensics service provider. What were the initial challenges after venturing into Cyber Security/Digital Forensics, and what are the challenges now? The initial challenge was a lack of awareness even among the officers about preserving electronic digital evidence. Data acquisition without hampering its integrity was a challenge in the initial days. Still, later on, the condition has changed. The people inside the system are taking care to retain data integrity and involve experts from the beginning to acquire digital evidence while working on cases.

The cost of the commercial tools, lack of skilled workforce, etc., are the primary challenges that the cyber forensics process face at any point in time. The major challenge that we face now is the pressure of little time and a lot of data. For accurate results, focused examination and data analysis is required, which most of the time, the pressure of fast submission of report hampers the success rate to a great extent. Data encryption is another challenge faced by digital forensics experts. The methods used by the cybercriminals to hamper, alter and remove traces of evidence makes the investigation process complicated. Along with the technical challenges, there are legal challenges also like the absence of proper guidelines and the limitation of the Indian Evidence Act 1872, which collectively makes it really tough to prove a point using digital evidence in the court of law. Being an experienced leader, share your opinion on how Cyber Security is crucial today and what advancements can we expect in the future? Cyber security is critical because it safeguards all types of data against theft and loss. Due to the digitalisation move, every transaction is done, including financial data, sensitive data, personally identifiable information, personal information, intellectual property, data, and governmental and industry information systems all fall under the category of sensitive data and need to be secured.

detection. Hackers are becoming more skilled at finding holes and cracks in corporate security systems and gaining access to protected files and data as technology advances, posing a significant cyber security threat. While hackers are getting skilled, we, the cyber warriors, need to be more vigilant, knowledgeable and proactive to defend any new cyberwarfare they formulate. Most universities and educational institutions offer cybersecurity-related courses and training programs along with their regular syllabus. This can make an army of young minds equipped with accurate digital techniques that can make our cyberspace a safe one soon. What would be your advice to the aspirants who are willing to venture into the field of Cyber Security services? Cyber security and digital forensics are the most exciting and promising career options of the time. If you are trained under a knowledgeable mentor and are passionate enough to practice rigorously, you can succeed in this domain as a resource. Hands-on experiments with data and finding new solutions for existing IT challenges will definitely open new doors of opportunity for you. Invest your time in polishing your skill sets, utilising your technical talent for the betterment of your country. Contribute your efforts to making India a safe cyberspace.

AI and machine learning have made significant contributions to the advancement of cyber security. Machine learning is being used to identify malicious behaviour from hackers by modelling network behaviour and improving overall threat

38 | February 2022 | www.insightssuccess.in






Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.