www.insightssuccess.in
THE 10 MOST TRUSTED
Cyber Security C O M P A N I E S
I N 2 0 1 7
NOVEMBER 2017
Technology Innovation Put your Dry Cleaning Business on Auto-Pilot! Security Outlook A Comprehensive Outlook of CYBER SECURITY
Ashish Kumar Saxena Founder & MD
AKS INFORMATION TECHNOLOGY SERVICES - A Mogul, Providing World Class Security Services
Editorial
I
n the current scenario, the population depends on novel ways of communication and this is just stating the obvious. In this techsavvy population, only a few percentages of people have the knowledge to handle any assault conferred by cyber impostors. With the demand for cloud technology, it is imminent to consider that the future business systems would be more valuable than ever before, and hence would require being even more secured. It is widely observed that emergence of a comprehensive portfolio of cyber security and solution in system and application-oriented services throughout the entire structure of security strategies helps resolving prominent problems associated with planning and design of operation and digitalization industries. The offered integrated and intelligent services by solution providers are perfectly tuned in to the solutions and considered the entire security process in an integrated manner.
Cyber Security: Transforming the Cyber Security Future with Comprehensive Layered Solutions
We can see that, Solution providers can make cyber protection easier by connecting the real and the virtual world that surge productivity. They are overlooking the entire system chain and ensuring a seamless integration of information, communication, and IT industry in all operating process. This provides benefits to customers’ that improves all around development in all the entire product expansion and production process, making them more productive, trustable, and flexible. With improved innovations comes varied budgets, but that doesn’t seem to be the norm in the networking and security vertical. This credit goes to the much-evolved cloud technology and security providing organizations which are adding each and every aspect of networking solutions. Whether it is a closed circuit or an open circuit, cloud technology has proved to be agile enough to blend in with any kind of network architecture and this has only expanded the probability for a more erudite and reliable network. Keeping the above vision in mind, government has introduced some policies which can help the youth to understand the consciousness of cyber security. The policy is mainly aimed to protect cyberspace information and infrastructure, build capabilities prevent and respond to cyber-attacks, and minimize damages through coordinated efforts of institutional structures, people, processes, and technology. Experts have suggested that some agencies, which have addressed cyber security issues and improved implementation at a national level. Moreover, they believe such initiatives or advantages can make the country cyber-attack free.
Poulami Das
Editor-in-Chief Pooja M. Bansal Senior Editor Ariana Lawrence Managing Editor Poulami Das Co-Editors Sachin Bhandare Pooja Jain Abhinav Chandrayan Stephanie Andrews Art & Design Director Amol Kamble Co-designer Vanshika Mittal Picture Editor Alex Noel Art Editor Mayur Koli Visualiser Shweta Ambilwade Business Development Manager Akansha Garewal Marketing Manager Dhruv Apte Business Development Executive Anshika, Shikha, Tarun Research Analyst David Circulation Manager Vivek Database Management Sharad Technology Consultant Swapnil Patil sales@insightssuccess.com
November, 2017 Corporate Ofď€ ces: Insights Success Media and Technology Pvt. Ltd. Off. No. 513 & 510, 5th Flr., Rainbow Plaza, Shivar Chowk, Pimple Saudagar, Pune, Maharashtra 411017 Phone - India: 020-69400110, 111, 112 Email: info@insightssuccess.in For Subscription: www.insightssuccess.in
Insights Success Media Tech LLC 555 Metro Place North, Suite 100, Dublin, OH 43017, United States Phone - (614)-602-1754 Email: info@insightssuccess.com For Subscription: www.insightssuccess.com
Copyright Š 2017 Insights Success, All rights reserved. The content and images used in this magazine should not be reproduced or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior permission from Insights Success. Reprint rights remain solely with Insights Success. Printed and Published by Insights Success Media and Technology Pvt. Ltd.
Cover Story
08
AKS INFORMATION TECHNOLOGY SERVICES
A Mogul, Providing World Class Security Services
SECURITY OUTLOOK A Comprehensive Outlook of CYBER SECURITY
IT SCENARIO
Most Challenging Role of CIO’s in today’s IT Scenario – By Rajeev Batra
TECHNOLOGY INNOVATION Put your Dry Cleaning Business on Auto-Pilot!
CONTENTS
24 32
40
16 22
ONE STOP SOLUTION
SECURITY CONCERN
Raise your Voice Against Cyber Bullying
Annalyzing Enterprise Mobility Security
Articles HIGHLIGHTS Immense Exigency to Focus on IT Security
EDITOR’S OUTLOOK Cyber Security – The Most Pioneering and Stimulating Industry in India
AAA TECHNOLOGIES P. LTD Pioneering Next Generation Security Services
AGC NETWORKS Representing Cyber Security Awareness Globally with Ingenuity and Relevance
V4WEB CYBER SECURITY Creating a Benchmark in Cyber Security and Data Protection
34 42 20 28 38
Make your Business Cyber-Attack Free with Best Cyber Security Providers
T
he reason people have grown used to cyber-threats is the continual media hype that occurs whenever a company is hacked and their customer data is scattered to the dark web wind for all to see. Cyber-attacks have now become the norm in our society and businesses are anxiously waiting to be the next victim, with the public expecting IT folks to fix the problem then and there and for us all to be safe once again. As we all are aware of the truth that all companies depend on the digital media. The new inventions always come with complication and here the problematic area is cyber threat. Cyber-attack is like a headache for all business organizations but some renewed companies are now introducing innovative solutions which promise their clients to provide revolutionary solutions in the area of cyber security. Considering the importance of cyber security we are introducing some innovative companies, which are offering secured solutions and safety from cyber threat, in our issue of “ The 10 Most Trusted Cyber Security Companies in 2017” In this issue we have ornamented some of the notable establishments, who have accomplished as a trademark by providing ultimate cyber security solution and are well equipped for preceding the cyber security sectors’ future. These establishments have subsidized the diverse businesses in transforming their approach to business work with superb strategy implementation and client satisfaction as the first priority. Our magazine’s journey starts with a Cover story, AKS Information Technology Services- AKS deals with the Cyber Security domain and provides Consultancy, Compliance, Network Security, Application Security, Cyber Forensic, Corporate IT Security Training, and Software Development. Apart from our cover story, we have V4WEB CYBER SECURITY, providing rock-solid services and solutions to mitigate and counter cyber-attacks and protect data from being misused. AAA Technologies P. Ltd promises to deliver accurate, reliable and innovative services at a reasonable cost to their clients. AGC Networks, a leading solutions integrator company to offer outcome-based managed security services across the globe. Alqimi Group, a total provider of custom technology solutions and services that solve a myriad of challenges. Lucideus Technologies Pvt. Ltd, is an IT Risk Assessment and Digital Security Services provider. It is a trusted standard for companies that need to protect their brands, businesses, and dignity from debilitating cyber-attacks. Ernst & Young LLP, a global leader in assurance, tax, transaction and advisory services. CYBER COPS India, delivering safer and secure security services in the digital world by providing Comprehensive Online Proactive Security by introducing unique, innovative and revolutionary research-oriented ideas, technologies, solutions etc. RMAR Technologies Pvt.Ltd, which is continuously serving IT Security industry with their quality services like reporting vulnerabilities, providing business solutions & quality training to students, IT Security Professionals, etc. Cyfuture, a leading provider of data center, cloud, and outsourced support services to clients in e-commerce, retail, information technology, software services, education, banking, and finance sector and government bodies. We have encompassed, Cyber Security – “The Most Pioneering and Stimulating Industry in India” and “Raise your Voice Against Cyber Bullying” scripted by our in-house editors in the wonderful pages of this magazine.
We have also covered CXO’s on, “A Comprehensive Outlook of Cyber Security” by Kshitij Adhlakha, Director of Secugenius and “Put your Dry Cleaning Business on Auto-Pilot!” by Rachit Ahuja, Founder & Director (Business Development) Quick Dry Cleaning Software. Hope this issue will give you comprehensive knowledge about Cyber Security and its Solutions.
www.sandisk.in
TELLING LIFE’S STORIES FROM MEMORY
1800 102 2055
AKS INFORMATION TECHNOLOGY SERVICES A Mogul, Providing World Class Security Services
“
“
Available on haltDos Cloud and Appliances, our comprehensive DDoS Protection and Web Application Firewall is a state-of-art indigenous solution that uses advanced machine learning to provide protection from cyber attacks and ensure 24x7x365 security of your critical internet facing assets.
Cover Story Ashish Kumar Saxena Founder & MD
“
AKS Services has indigenously developed a high-end lab forensic workstation keeping in mind today’s forensic investigation requirements
“
T
he landscape of cyber security is always changing. With the advancement of technology, and increase in popularity of cloud-based services, security threats are becoming more and more complex and are impacting businesses heavily. The year 2017 was littered with major data breaches, bank heists, account hijacking, hacktivism, website defacements, DDoS attacks and other social engineering attacks. A lot of havoc has been caused by cyber-criminals as they are more sophisticated and more effective with highly capable automation and a wide range of attack tools in their arsenal. To counter the adversaries, the enterprises should always stay one step ahead by enforcing precautionary steps and consult the specialist to fill the security gaps. One of the most protuberant cybersecurity companies is AKS Information Technology Services. It is a part of AKS Group, which is an ISO 9001:2015 & ISO 27001:2013 complaint mid-sized Indian Company. It is the premier ‘Innovation Hub’ in Cyber Security segment in India which is spearheading the best in-class technological products for Domestic & Global markets, the company has been at the forefront of delivering excellence in the domain of Information Security products and services ever since it was established in 2006. AKS is an all-in-one Managed Security Service which covers all the aspects of enterprise security including mobile apps and website audits, network audit, cyber forensics, setting up and managing security operations center (SoC) for providing real-time monitoring and management, emergency response and round-the-clock protection against any cyber-attack. Backed by its comprehensive cyber security training program, AKS IT educates its customers while also implementing and enforcing security and auditing IT infrastructure for its customers.
Backed by its innovation & R&D efforts, AKS is building a strong portfolio of indigenous security products such as DDoS mitigation, Application Firewall and Cyber Forensic Workstation. The company’s customers span across industry sector from IT, BFSI, Telecom, Transport, Manufacturing and the Government both in India and abroad. Meet the Pioneer of AKS IT Services Ashish Kumar Saxena, a veteran and an alumnus of IIT Delhi is the Founder and MD of AKS IT Services. Recipient of premier training in Sweden, France and USA, his unparalleled experience and discerning approach is reflected by the company’s remarkable success. He is a proud recipient of Vishisht Seva Medal (VSM) for the technological innovation in the Indian Air Force, resulting in saving sizeable foreign exchange for the Government exchequer. Ashish also has the distinction of being the first Operations Manager of CERT-In (Indian Computer Emergency Response Team). The tenets of strategies incorporated by the founder are Uncompromised Quality of service, Innovation, Good Ethical values and healthy culture. Anshul Saxena, an alumnus of Georgia Tech, USA is the CTO of AKS IT Services. Having previously worked in organizations such as Microsoft and Amazon, he is leading the technical innovation in developing innovative cyber security products such as DDoS mitigation and Application firewall solutions. Proffering Exclusive Services & Solutions AKS provides its Consultancy, Compliance, Network Security, Application Security, Cyber Forensic, Corporate IT Security Training and Software Development. Their two products, Distributed Denial of Service (DDoS) mitigation solution named HaltDos and AKS Forensic Workstation are some of the best solutions in industries. AKS have innovated DDoS mitigation solution with an integrated Web Application Firewall (WAF) named HaltDos. It is state of the art, patent pending DDoS mitigation solution that uses advanced machine learning model to automatically detect and mitigate DDoS attacks in real time without requiring any human intervention. HaltDos a leading solution of AKS has the recipient of DSCI, and is honored with many awards like Nasscom Excellence Awards Dec 2016, Cisco Launchpad Winner in Jan 2017 and “BEST INNOVATION” the year 2015 Minister of Communication & IT, Govt. of India. “This innovation is from our AKS Group start-up
Company Haltdos.com.” HaltDos is a high throughput, high-performance solution available as a Cloud-based solution as well as an On-premise appliance. With its multi-layered and multi-vector approach, it can defend against a wide range of DDoS attacks within seconds to ensure high uptime of websites / web services. In addition, the organization has advanced AKS Forensic Workstation – a cyber-forensic lab in a box. It is a specially crafted machine dedicated to performing all cyber forensic activities. The solution is currently being used by various cyber forensic labs of Tamil Nadu, Orissa Police, Enforcement Directorate, etc. AKS Services has indigenously developed a high-end lab forensic workstation keeping in mind today’s forensic investigation requirements. The workstation can be used to recover deleted/corrupted data from media drives and recover data from password protected or partially destroyed media drives. The workstation can be used to crack password from password protected files and media drives. GPU can greatly enhance the capability of analyzing data at a fast rate. The workstation can be used to analyze data from large media devices with capacity ranging in Terabytes.
“
We mitigate cybersecurity risk by providing consultancy, auditing, forensics, and training services to our clients
Key Points for the Customers Looking at the threats of cyber-attacks, DDoS and Ransomware have become the two largest vectors of attacks. Even before these attacks became mainstream, AKS had predicted and started working on building solutions (HaltDos for DDoS and AKS Forensic Workstation for ransomware using cyber forensic) to tackle them. AKS continues to invest in research & indigenous development of Cyber Security Products for their customers. Backed by their services, the company wants to become the one-stop security partner for their customers. Some Effectual Words for Budding Entrepreneurs As Mr. Saxena asserts, “Cyber Security is a serious business. Knowledge in the Cybersecurity domain and quality of service/ product are paramount for the success. There are no shortcuts in ensuring cybersecurity; minor slippage may lead to a disaster. In security, no one recognizes you for the 99/100 attacks you mitigate. They only blame you for 1/100 attack you couldn’t mitigate. That is why one has to give his 200% to hit 100/100 every single time.” Future Panorama AKS has completed their 11 years long rock-strewn voyage through their innovative cybersecurity services & products which help people all over the India to save their significant Data. Now the company mostly focuses on their customers’ needs, which is all about safety and security. Ashish expresses, “We are to be a most trusted & innovative cyber Security Company in the world.” They will definitely invent new solutions which can make revolution towards cyber security era. On the other hand, the company’s clearly mapped strategy is the ideal starting point for a stable system. The company will build their system from the ground up exploiting technologies that can deliver benefits to their client’s business.
“
Our clearly mapped strategy is the ideal starting point for a stable system. We will build your system from the ground up, exploiting technologies that can deliver benefits to your business
“
Incredible Journey towards Victory The cybersecurity demands a high degree of trust from its service providers. AKS has achieved the utmost loyalty from their clients by providing Quality Service and ensuring secrecy of client’s data. The company has successfully undertaken application security audits of more than 6000 applications and ensured closure of all the discovered vulnerabilities. Their customer-centric approach and focus on quality have helped them to beat the competition.
SUBSCRIBE
READ IT FIRST
TODAY Never Miss an
Issue
Yes I would like to subscribe to Insights Success Magazine.
Global Subscription 1 Year.......... (12 Issues) .... Rs. 2500
6 Months ..... (06 Issues) .... Rs. 1300
3 Months .... (03 Issues) ....
1 Month ...... (01 Issue) .....
Rs. 700
Rs. 250
Date :
Name : Address :
Telephone : Email :
City :
State :
Zip :
Country :
Cheque should be drawn in favour of : INSIGHTS SUCCESS MEDIA AND TECH PVT. LTD.
CORPORATE OFFICE Insights Success Media and Technology Pvt. Ltd. Off No. 513 & 510, 5th Flr, Rainbow Plaza, Shivar Chowk, Pimple Saudagar, Pune, Maharashtra 411017. Phone - India: 020-69400110 | USA: 302-319-9947 Email: info@insightssuccess.in For Subscription : www.insightssuccess.in
Company Name
Management
Brief
AKS Information Technology Services aksitservices.co.in
Ashish Kumar Saxena Founder & MD
AKS deals with the Cyber Security domain and provides Consultancy, Compliance, Network Security, Application Security, Cyber Forensic, Corporate IT Security Training, and Software Development.
V4WEB Cyber Security v4web.com
Ritesh Bhatia Founder & Director
V4WEB CYBER SECURITY provides rock-solid services and solutions to mitigate and counter cyber-attacks and protect data from being misused.
AAA Technologies P. Ltd aaatechnologies.co.in
Anjay Agarwal Chairman & MD
AAA Technologies promises Accurate, Reliable and Innovative services at a reasonable cost towards their clients.
AGC Networks Limited agcnetworks.com
Sanjeev Verma CEO & Whole Time Director, Atul Khatavkar President & Global Head
AGC Networks is a leading solutions integrator company to offer outcome-based managed security services across the globe.
Alqimi Group alqimi.com
Rajeev Sharma Chairman & CEO
Alqimi Group is a total provider of custom technology solutions and services that solvea myriad of challenges.
CYBER COPS India cybercops.in
Neelabh Rai Founder
Cyber Cops India delivers safer and secure security services in the digital world by providing Comprehensive Online Proactive Security by introducing unique, innovative and revolutionary research-oriented ideas, technologies, solutions etc.
Cyfuture India Pvt. Ltd cyfuture.com
Anuj Bairathi Founder & CEO
Cyfuture is a leading provider of data center, cloud, and outsourced support services to clients in e-commerce, retail, information technology, software services, education, banking, and finance sector and government bodies.
Ernst & Young LLP ey.com
Vidur Gupta Partner, Advisory Services
EY is a global leader in assurance, tax, transaction and advisory services. The insights and quality services they deliver help build trust and confidence in the capital markets and in economies the world over.
Lucideus Technologies Pvt. Ltd. lucideus.com
Srivathsan Sridharan Senior Vice President
Lucideus is an IT Risk Assessment and Digital Security Services provider.
RMAR Technologies Pvt. Ltd rmar.in
Rahul Singh Founder
RMAR Technologies is continuously serving IT Security industry with their quality services like reporting vulnerabilities, providing business solutions & quality training to students, IT Security Professionals, etc.
One Stop Solution
RAISE YOUR VOICE AGAINST
A
lbert Einstein said, “The world is a dangerous place, not because of those who do evil, but because of those who look on and do nothing.” Cyber-bullying is a poison infiltrating the life of youths worldwide and pushing them towards the danger of self-harm. People have a misconception about cyber-bullying, but when we come forward and ascend our voice, it will definitely save someone’s life another can give one reason to live life happily. We need the help of NGO’s, campaigning and the leaders who can increase the awareness of cyber harassment or can highlight the way to overcome the annoyance. Given the nature of social sites, all contents are going viral quickly, and creating a large impact in the blink of an eye. The all-pervasive nature of cyber-bullying, as well as the amount of time it takes to trace cyber bullies, makes the growth of cyber-bullying an alarming trend across the globe. Now our Government is taking initiatives to fight against cyber bullying. Following are some measures taken to prevent and cure the ailment that is cyber-bullying. Distinguishing the Ways to Combat Cyber-bullying: Avoiding to Respond or Retaliate An aggressor wants your reaction because it gives him the power over you, thus, you should refuse to empower the bully and avoid engaging in a conversation with them. If you really want to protest then the best option is to consult with the police about the matter. On the other hand, if you feel unsafe you can also contact law enforcement agencies. Keeping your Data Secret In the case of cyber-bullying, the criminal usually uses photographs and personal information for blackmail. You can contact with the service provider to inform them about the incident of bullying. For example, if you are being bullied in any chat or messenger section then you can contact the authorities. On the other hand, if you are getting threatening call
16
NOVEMBER 2017 |
and messages, you can contact your cell phone company or your network provider. Reach Out for Help First thing is to save all messages, calls, and photos sent by the aggressor, you can use them to protect yourself. You can show this to a trustfule person and maybe he /she can help you solve the issue. Use Technology and Tools to cut off the Bully You can also report the problem to the service providers. This probably won’t end it, but you don’t need the harassment in your face, and you’ll be less tempted to respond. If you’re getting threats of physical harm, you should call your local police and report it. Moreover, now many women safety applications are available to take help from in such conditions. Legal Rights Against Cyber Bullying People have confusion about the legal rights, regarding bullying; stalking and blackmailing etc, and don’t understand that all these are very serious crimes and the Indian constitution have strict punishments for them. The Information Technology Act, 2000 (IT Act) was enacted to deal with e-commerce and electronic records, and also to punish e-commerce offenses. Offences such as intimidation, insult, annoying, harassment, defamation, etc. in cyber-space continued to be punishable only under the IPC till the 2008 amendment to the IT Act. Even though people are aware of the issues, they engage in this risky behavior online. The solution is to make cyber laws
| NOVEMBER 2017
17
stringent as the current law under the IT Act, 2000 is a bail-able offense with three years’ imprisonment and a fine. The IT Act, 2000 should be re-amended to specific provisions pertaining to cyber-bullying. Further, cyber-bullying needs to be made a serious offense with minimum five years imprisonment and a fine of Rs. 10 lakh. Unless you have deterrence in law, it will continue to be a prevalent offence. Government and civil society were more aggressive in raising awareness and triggering changes in behavior. The ‘section 66A’ in the amended IT Act, 2008 deals with these crimes. Sending any message (through a computer or a communication device) which is totally offensive or has a menacing character; any communication which he/she knows to be false, but for the purpose of causing insult, annoyance and criminal intimidation come under this section. This crime, under the current IT/Cyber/Criminal laws in India is punishable up to three years with a fine. The 2008 amendment also introduce section 69 which gives officers the power to intercept, monitor or decrypt any information generated, transmitted, received or stored in any computer resource, authorized by the Central Government or State Government. Fortunately, until today, we have many options to handle bullying or any cyber harassment. In digitalization, we have many helping apps which can provide awareness and give motivations. The first thing we have to understand is that bullying is a crime but the victim can overcome it with those easy steps mentioned above. Most importantly, social sites and government are very active so we need not be afraid of such situations; we only need to be more attentive while using social sites.
18
NOVEMBER 2017 |
AAA Technologies P. Ltd Pioneering Next Generation Security Services
F
rom phishing to malware, there are a number of ways hackers are breaking into our online data. And for entrepreneurs, not only is their personal data in danger, so is their businesses. Half of all cyber-attacks happen to small businesses. That’s why it’s important than ever to take extra steps to secure your online privacy and ward off any criminals. We can predict the dream of a Digital India where cyber security becomes an integral part of our National Security. A premier independent company AAA Technologies has taken the initiative to fulfill the dream of Prime Minister BY providing Accurate, Reliable and Innovative services to their clients at a reasonable cost and thus makes security affordable too. AAA Technologies, an ISO 9001:2015 and ISO 27001:2013 Certified Company is a leading sovereign company specializing in IS Audit, Information Security, Cyber Security and IT Governance for as long as 17 years. AAA Technologies is a CERT-IN and RBI impaneled auditing organization. The top team of their organization is professionals who are members of international bodies such as ISACA, ISC2, IEEE, ACFE, ICAI, CSI, CSA, etc. with person-year experiences ranging between 20 and 35 years individually. The mission of the company is to speed up the awareness of cyber security towards industry, organization and individual. Creative Mind behind the Company The erudite leader, Anjay Agarwal, Chairman and Managing Director of AAA Technologies, is an imminent security maverick serving both the National and International security community since 20 years. He holds prestigious 25 certifications in several domains, from various countries with specialization in Information Security. He is the 55th person in the World to get COBIT Certified Assessor Designation. Anjay was the 1st person from Asia to be the Chairman of
20
Governmental and Regulatory Agencies Board (GRA Board) of ISACA, International. Currently, he has been associated with ISACA, International since 2002. Anjay was previously a co-opted member in Information Technology Committee for the year 2003-2004 and he was also the co-opted member in the WIRC of The Institute of Chartered Accountants of India in the year 2002 and 2008. Anjay has been a Jury Member for the Maharashtra IT Awards conferred by the State of Maharashtra for several years. Till date, he has been involved with 10,000 assignments in Information Security Area. Unique Services and Solutions can Eradicate the Cyber Threat Many organizations implement best of their technology, but to be really effective, it has to be configured properly to meet the business needs of the organization. AAA Technologies provides the assured services to ensure that the cyber security solutions are secured, effective and meet the business objectives of the organizations. AAA Technologies provides a whole range of independent services in the area of IS Audit, Information Security and Cyber Security, IT Assurance and IT Governance. Some of the services provided by the company are: IS Audit – AAA Technologies covered Operating Systems Audit, Database Audit, Networking Audit, Firewall Audit, IDS Audit, Web Application Audit, Data Center Audit, ATM Audit, ERP Audit, Internet Banking Audit, Core Banking Audit, Performance Auditing, Forensic Auditing, Application systems – Functional review, Compliance with IS policies and procedures and Data Migration Audit. Information Security and Cyber Security In this area the company providing is innovative services like Penetration Testing, Application systems – Security review, Review of IS Controls, BS 7799/ ISO 27001 NOVEMBER 2017 |
‘ ‘
AAA Technologies provides the assurance services to ensure that the cyber security solutions are secured, effective and meet the business objectives of the organizations
Anjay Agarwal Chairman, & Managing Director Implementation, Formation of IS Security Policy, Compliance with IS policies and procedures.
changing technologies. Anjay added, “To secure the Cyber Assets of the Country is their only future aspect.”
IT Assurance –AAA Technologies gives one-stop solution for Business Continuity Planning, Computer Crime Investigations, Training in Information Technology Compliance with IS policies and procedures.
Cyber Security Industry with Anjay Now cyber security leaders accept that lot of opportunity in the area of cyber security is available in India. Actually, the Government Regulations and Ransom-ware attacks forced people to understand the importance of cyber threat and have greater awareness about it. Organizations are looking to safeguard themselves against Cyber Attacks. Hence, cyber security is not a trend it is a need of the hour for all organizations.
IT Governance – The Company offers COBIT, ValIT, Balanced Scorecard, IT & Business Maturity Models. Competition helps them to Upgrade their knowledge Anjay acclaims, “All professionals in cyber security fields are my friends. The more we share knowledge, the more we would gain. Actually, we believe that sharing knowledge and spreading the awareness of cyber security is more important.” Technologies Innovation Can Make the Better Future AAA Technologies believes, change is part and parcel of life and people have to accept it. Changes come with some risk and challenges and challenges always come with shades of opportunity. Their experts contribute at both National and International level in the field of Cyber Security and are involved in future technology. A combination of all these helps them to adapt to the ever| NOVEMBER 2017
Clients Benefit – Priority of the Company Anjay expresses, “Clients are able to secure their Information Assets and have a Peaceful Sleep. They also come to know of the risk that they are facing, including their criticality which helps them to reduce or mitigate the risk at the earliest”.
21
HIGHLIGHTS
IMMENSE EXIGENCY TO FOCUS ON
IT security A
s per a recent survey, it has been exhibited that more highproďŹ le targeted attacks with motivations of stealing information, making a statement and permanently destroying company data assets. An increase in large cloud-based attacks has created a need to immensely focus on IT security.
Retail attacks Retailers are using EMV technology, Google Wallet and Apple pay to prevent retail related attacks, still the rate of attacks is increasing in size and number as well. The reason behind is the implementation of EMV is not completely adopted by enterprises in the current year, there are still older and newer credit card processing technologies in use. Most of the credit cards are used by the older technologies and continuing with the same, even merchants continue to store
22
credit card details on their systems, which has resulted a large scale breaches in recent years. There has been a increase in the number of smaller breaches, where IT security is weak for stealing data to hackers. Cyber security Cyber executives and security experts are the biggest protectors. There is an immense need to look on the issues of cyber security, and if required increase the budget to protect themselves. Now, we need to see how the current market resolved this situation in a concern of cyber security breaches, and how responsible the Board of Directors and senior management, including the CEO. It may be possible that board members and the CEO as well as the industries may face class-action lawsuits from shareholders, customers and partners whose data has been compromised in a security breach, as
NOVEMBER 2017 |
Supply chain We can say that large companies will require and demand that small vendors and suppliers do business with attest to implementing security best practices as well as engage in regular review of their supplier and vendor’s security posture. Cyber insurance providers will not only audit large companies buying cyber insurance but also go downstream to audit their suppliers/vendors. Government’s Role in cyber attacks We expect state attorneys general and the federal government to become more active advocates of consumer protection. They will take steps to hold companies, executives, and board members accountable. Companies will no longer be able to get away with lax security practices just by providing a year of free credit monitoring services. Consumers will become more vocal and initiate class-action lawsuits holding companies accountable for damage to consumers’ credit history traced to a breach. As a result, companies of all sizes, including small and large, will begin to look for help in addressing security around the clock. Since no companies can state they are secure with 100 percent confidence, companies will begin to change their approach to security and start implementing both proactive and reactive security strategies.
demonstrated in the Target breach. Addition, the employment of the CEO, as well as other senior management will be at risk for the lack of comprehensive security oversight. We have mentally accepted that we will see more of these Target-style scenarios where the CEO and senior management will be held accountable for their companies lax security posture. There will be calls from shareholders and investors to change the board or management team in high-profile breaches. From the committee members point of view, it will be interesting to see how board members will be implementing new plans and procedures to secure themselves from responsibility in the event of a data breach. It is likely, given the types of attacks that have appeared that a regular security review will become a common practice for senior executives and board members across all size companies.
| NOVEMBER 2017
Increased ‘copy cats’ It has been seen that the Sony breach has proven to be a very successful endeavor for the hackers; we can guess that we will see additional copycat Sony-like breaches in the coming years. We will see significant business disruptions. This will be the result of intruders removing highly sensitive data, making networks and systems inaccessible, as well as creating fear in employees by threatening to leak personal data. Companies that do not have well thought out security plans as well as disaster recovery strategies will become headline news in current year. These industries will face debilitating business interruptions, intellectual property losses, loss of employee morale and will cost a significant price to recover from attacks. Security professional shortage Finally, we will continue to see a shortage of trained security staff to meet the changing threat landscape. As a result, organizations of small and large sizes will look outside for help and partner with security service providers. According to the reports from Burning Glass Technologies, which creates technologies designed to match people with jobs, observed that the demand for people with cyber security skills has grown 3.5 times more than the demand for professionals in other computer oriented jobs. There is a need for cyber security professionals in both the private sector and in government. According to the need and the jobs, experienced people are difficult to find. This is a global problem, where another solution is importing cyber security professionals.
23
Security Outlook
A Comprehensive Outlook of
CYBER SECURITY I
“
n this digital age, we have an opportunity to transform lives of people in ways that were hard to imagine just a couple of decades ago” Sh. Narendra Modi Hon’ble Prime Minister of India. The internet has become an integral part of today’s generation of people; from communicating through instant messages and emails to banking, traveling, studying and shopping, the internet has touched every aspect of life. With the growing use of the internet by people, protecting important information has become a necessity. A computer that is not having appropriate security controls can be infected with malicious logic and thus any type of information can be accessed in moments. Here enters Cyber security, a domain created not by nature but by human beings, has emerged to provide tremendous benefits. What is Cyber Security? In simple language, Cyber Security or Information technology security means protecting data, networks, programs and other information from unauthorized or unintended access, destruction or change. It encompasses all the mechanisms and processes that protect digital equipment, information and records from illegal or unintended access, manipulation or destruction. Increased Cyber Threats The internet has provided a wide array of learning opportunities,
24
but there are risks too. Therefore, it is important for individuals to understand how to protect against cyber threats, and must also comprehend the difference between virtual and real world. One should learn how to protect computers and personal information from being hacked and should engage in appropriate online behavior in order to eliminate changes in cyber threats and thereby creating a safer online environment. We live in an increasingly networked world, from personal banking to government infrastructure. Protecting those networks is no longer optional. Global cyber-attacks are spreading across the world every second day, holding companies to pay a ransom. Thousands of firms have fallen victim to a massive cyber-attack over the past few months, attacks like WannaCry and Petya crippled systems and hit computers in more than 150 countries. These global cyber-attacks were caused by ransomware which holds computers ransom in exchange for a specific amount of money – in this case, Bitcoin. Social networking sites have become the most popular medium for sharing information and connecting with other people. But these sites have created varied opportunities for cybercrimes, compromised personal identities and information leakage. Stealing credentials is only the first step of an attacker to launch a full-blown attack. Once an attacker gains a user’s credentials, the attacker will look to steal any personal and financial information associated with the compromised account. With each passing day, attackers devise new tricks and circulate new types of attacks to steal personal and financial information. Unlike seasoned criminals, hackers are far less splashy, and far more difficult to trace. But, when armed with a little technical advice and common sense, you can prevent online frauds and attacks. Prevention from Cyber Attacks Mitigate the risk of cyber-attacks at your firm through these four best practices that we at Secugenius live by:
NOVEMBER 2017 |
About The Author Kshitij Adhlakha, Director of Secugenius, is an Entrepreneur, Author & Cyber Expert. He has more than six years’ work experience of handling projects in Information Security. Under his guidance the organization has been ranked as one of the top five Cyber Security Companies of India by silicon India. He is a solution and result oriented professional and is aspecialist with notable success in planning, directing and supporting execution of abroad range of corporate IT initiatives in Strategic IT outsourcing, Information Security etc. Kshitij and his team has trained over 2.2 Million students and professionals and are working with different law enforcement agencies and helping different state Cyber Cells in solving Cyber Crime Cases. He has authored a book “SECURITY BREACHED Security Beyond Hacking” and has also written books for Seculabs .He has also published research papers on “Email hacking” & “Steganography” at the national level and has also written articles for many national newspapers .
| NOVEMBER 2017
Kshitij Adhlakha Director
25
1. Risk Assessment Risk assessment should be an on-going process as opposed to a single point in time. Firms should gather and evaluate indicators of potential risks on a monthly, quarterly and annual basis. I’m a huge advocate of risk assessment. In fact, risk assessment has been helpful in securing client’s infrastructure at every step of the way. We suggest assessing your network security frequently and effectively for threat intelligence on what’s going around in cyber-security. 2. Cyber security Training Employees are the biggest risk for firms according to our recent security assessment of leading Indian companies. Based on what we have encountered over these past years, companies live by 3P’s which are ‘Process, Policy, and People’. Companies spend millions of dollars on Process and policy but they often rely heavily on people. “It’s the people who are using process”. Thus, training needs to be conducted regularly, not just once a year. It also needs to be varied, both in method and with different topics to engage your employees. 3. Financial Fraud Risk Management Manual systems and personnel supervisions are no longer adequate to manage enterprise fraud. An integrated technological solution can only keep pace with the rapidly-flowing millions of banking transactions and still detect fraudulent transaction. Therefore, a holistic Fraud Risk Management solution is the need of the hour. 4. Incident Response A quick and efficient response to an attack on your network can save an untold amount of time, money and staff hours. Determine the source, cause, and extent of a computer security breach quickly with Secugenius incident response services. Or learn how to recognize the indicators of a compromise and respond appropriately on your own with our incident readiness services. Secugenius also stays true to the saying “Moving with the tide” We have thus incorporated a wide range of new technologies that we offer companies to avert these new and increased cyber-attacks. 1. User behavior analytics The way in which users interact with their systems and devices (pressures exerted on a keyboard, swipe patterns on a touchscreen, applications typically opened, habitual spelling errors, etc.) can be identifiers as unique and personal as physical biometrics – and user behavior analytics or UBA technology takes advantage of this. 2. Cloud Computing Recent years have seen a move away from on-premises deployments of information technology and telecommunications, with enterprises increasingly reliant on web-based resources and hosted cloud solutions for the provision of infrastructure, applications, and services. 3. Machine Learning “Deep learning” has been used as a blanket term to cover a group of technologies that operate by observing their working environments (including internal processes, external communications, and interactions with external actors) and creating a knowledge base of what they “see” and experience. Using this archive, they can set up a baseline condition for normal operations, against which they compare activities and processes that they continue to observe in real time. Cyber security breaches will only increase in the future as these networks expand, but there are sensible precautions that organizations can take to minimize losses from those who seek to do harm. With the right level of preparation and specialist external assistance, it is possible to control damages and recover from a cyberbreach and its consequences.
26
NOVEMBER 2017 |
AGC Networks Representing Cyber Security Awareness Globally with Ingenuity and Relevance
P
roviding Cyber Security as a service is the single most impactful enterprise activity today. Cyberattacks are evolving every day with increasing inventiveness from attackers, so it is paramount for an organization to effectively implement the Cyber Security measures and identify what constitutes a good cyber security framework. Organization such as AGC Networks, a Global Solution Provider and Integrator represent the world’s best brands in Unified Communications, Data Center and Edge IT, Cyber Security (CYBER-i) and Digital Transformation & Applications to match and deliver the client’s mounting digital landscape needs. AGC’s ability to provide tailored solutions across quadrants is strengthened by seamless services. CYBER-i, the Cyber Security business division of AGC Networks has over 10 years of experience. They have a promising team of highly skilled and certified security resources to serve client's needs. CYBER-i deploys Advanced Monitoring and Threat Defense Solutions across Cloud, On-Premise, and Hybrid networks and is also equipped to deliver vertical specific requirements. Besides, the 24*7 Global Security Operations Center (GSoC) services, CYBER-i also specializes in end-to-end cyber security solutions such as high-end consulting, advisory, certification, audit and compliance, certification acquisition, and processes management. Through CYBER-i, AGC Networks is serving over 3000 customers and has a significant presence in the Middle East, Africa, America, Australia, New Zealand, Singapore, Philippines, and the UK. Erudite Leaders of the Company Neelam Kapoor, Vice President and Marketing Head at AGC Networks, has more than 21 years of experience in domains like Technology, IT / ITes & BPO, BFSI and Media across the functions of Marketing & Communications, Brand Management, New Business Development and Business Operations across B2B and B2C domains. Neelam is currently heading the corporate marketing team of AGC.
28
Neelam states “We believe in continuing to deliver and safeguard the customer’s IT landscape and providing them with next-generation digital transformation platforms.” Sanjeev Verma, CEO & Whole Time Director of AGC Networks is a technology veteran and has more than 21 years of diverse global experience in the ICT domain. He has an extremely effective track record in the varied set of management and leadership roles in the areas of business operations, sales & marketing, consulting, M&A and startup operations globally. Atul Khatavkar, President & Global Head of CYBER-i is an industry veteran and a domain expert in Security. Atul specializes in Cloud-based Managed Security services, large-scale IT transformation projects, IT Governance, Risk & Compliance Consulting. He is a significant protagonist in setting up the ISMS and QMS frameworks and in achieving ISO 27001 & ISO 9001 certifications at AGC Networks. He is a Certified Data Centre Professional (CDCP) with an extensive experience of building TIA compliant data center. Atul states, “Our Security Experts can protect your organization from botnets, distributed denial-of-service (DDoS) attacks, command and control activity and advanced persistent threats to safeguard your organization.” CYBER-i, a leading Security Solution Provider Many organizations implement their domain expertise, but to be truly effective, they have to be comprehensive and aligned to meet the commercial asks of the customers. AGC delivers security solution and services that are tenable, effective and meet the business objectives of the organizations and the society at large. CYBER-i solution comprises of: Application Security Management (ASM) through Application Lifecycle – This advanced technology covers Web Server Vulnerabilities and Database Access Management. Data Security – CYBER-i offers Advanced Protection of
NOVEMBER 2017 |
‘ ‘
We believe in continuing to deliver and safeguard the customer’s IT landscape and
providing them with next-generation digital transformation platforms
Sanjeev Verma CEO & Whole Time Director
Atul Khatavkar
President and Global Head CYBER-i
Threats, Encryption, Fraud Management, and Information Rights & Mobile Device Management. Such services give guidance to an organization to protect their data security.
controls to protect applications against any web-based attacks by building an effective AST (Applications Security Test) plan.
Identity & Access – CYBER-i covers Identity management, Two-Factor Authorization, Private Identity Management, and Single Sign-On.
AGC is working towards building an organization based on technical capability and valuing the customer. Throughout the customer journey AGC Networks supports the customer through its certified and technical teams focused on providing services tailored to the customer’s needs. Most importantly the organization believes in delivering solution and services on the 3 R’s principle - building strong ‘Relationships’ with their Partners and Customers; being ‘Relevant’ in the markets that they operate in and delivering objective ‘Results’ thereby creating value for customers.
End Point Security – Handling security areas like AntiVirus End-Point Protection, Data Leakage Protection and Network Access Control. Network Security – Keeping the cyber security scenario in mind, the company delivers Firewall, NG Firewall, IPS/IDS, HIDS/HIPS, and UTM. Security Monitoring – Lastly, AGC Networks is also provides Security Incident and Event Management related services for its clients. Unique Intends of AGC Networks The Cyber Security domain currently has multi specialists in the space and most organizations provide more or less similar solution repetitively. The difference for AGC is in its unique intentions and purpose. According to Gartner, there would be around 7 Million attacks on web applications in India alone this year. AGC believes in practicing applications security throughout applications life cycle. This can be done by leveraging external security | NOVEMBER 2017
Positive Vision can lead to a better Future AGC’s relentless focus on the Networking and Security space is evident in the increasing customer confidence displayed across markets. They believe that the market is moving to Cloud and Software Defined Networks (SDN) and AGC is geared to help customers stay ahead of the curve through their close working relationship with leading Global OEMs in the space. AGC believes in not just creating an IT Network and Infrastructure solution but also securing and protecting it to deliver business outcomes.
www.agcnetworks.com www.cyber-i.in
29
IT Scenario
Most Challenging Role of CIO’s in today’s IT Scenario – BY RAJEEV BATRA
I
T applications and infrastructure oftentimes used areas In the current IT scenario, IT applications and infrastructure are frequently using two main areas – Customer Facing Systems and Retailer facing. Under Customer Facing Systems it includes, eCommerce website, Social interfaces, Payment Channels, IVR interface, contact centers, short-code, mobile and web applications for Self-care and, Retailer facing includes Retailer CRM, Lead Management Systems (LMS), Products/Services information modules, retailer performance management, eRecharge and payment channels It includes, Marketing & Sales: Big Data and Business Intelligence based Analytics, Collaboration tools, Digital Advertising, GIS, mobile applications for FoS (feet on the street) resource information and data capturing to/from retail outlets, LMS, material tracking from primary till tertiary levels, branded web applications e.g. landing page, product portfolio management. CSD: Billing, CRM, Social CRM, CEM (customer experience management), Credit Control, Knowledge portal, Contact Centre Technology, GIS, back
32
office applications, KYC, data de-dupe, trouble ticketing and workflow manage-ment apps. Finance: ERP – Financials, Risk Management, inventory management, distribution network billing, revenue assurance, fraud management, treasury, interconnect billing, on-line banking transaction applications, MIS HR: HRMS (HR Management Systems) for all employee lifecycle management, SIP (sales incentive planning), PMS (performance management systems), R&R (rewards & recognition), internal communications. IT: Ensuring operational support for all business processes automation and support systems, Information Security, Data Centre operations (Tier3), VAS applications (value added services), Infrastructure related IT including servers, storage, collaboration systems, statutory and regulatory compliances related applications Applications may be developed through organic build or sourced through Cloud; nevertheless SMAC (social mobility analytics and cloud) based applications are slowly and steadily becoming the essential aspects in a service sector, regulatory compliance notwithstanding.
The role of the CIO is evolving based on the sector and organization size and maturity In Sectors where technology plays a very business centric role like telecoms, IT becomes core to business operations. Given that CIO is armed with intricate business process and critical info-rmation he can play a very constructive role of partnering with business teams and providing direction that can plug any revenue leakages, improve business processes or unlock any new revenue stream. Hence it is not an enigma that we are seeing more and more CIOs expanding their roles to shoulder the digital, innovation, customer care related accountability as well besides the traditional role they manage. If CIOs does not show business value in their domain/organization, it does not seem distant that we may start seeing small and medium enterprises start sourcing CIO like services in a share model from “CIO on Cloud”. However, in case of technology centric and large enterprise business CIOs who have sharp business acumen will remain relevant and contribute to business and revenue growth. Hence CIO should remain a ‘business partner’, who is helping business to evangelize critical technologies for enhanced business outcomes. Challenges faced by CIOs of today: Given the advancement in the available
NOVEMBER 2017 |
Rajeev Batra CIO
technologies, information proliferation and maturing software packages the challenges in todays world are of a different kind. Most of the workforce is digital native and wants to use their own devices and employ open source and freeware software/ application to execute their work; this poses a big challenge despite availability of BYOD and MDM type of official and private containers, when the regulatory compliances are strict and penalties are punitive in nature – hence, there is a very fine balance which CIOs have to maintain to be business and work-force friendly, ensure compliances and still not appear regressive. Another challenge is free and half baked information about buzzwords like SMAC and BigData available in the public domain, which promises a utopian business environment, but in reality a full implementation is quite complex, time consuming and needs special technical skills besides dedicating business involvement – an
| NOVEMBER 2017
aspect, which most of the business leaders take a lot to comprehend in distinguishing technology hype from reality. Taming vagabond applications in an enterprise and ensuring proper lifecycle management for applications is another challenge for which CIOs have to appear a villain in the whole scheme of things, but it’s necessary to ensure sane enterprise architecture which performs to its fullest for business benefit 24X7 without fail. Internal challenge comprises of managing skills of IT team up to mark and keeping attrition manageable in a highly competitive environment. Last but not the least managing business expectations within constraints of dwindling budgets and fewer resources in the name of leaner and low cost business models.
very viable proposition for an idea that positively impacts human life. Aspects that the startup may have to critically review their business model for success is high probability of social networking, simple and intuitive interface for customers, enhanced reach, scalability, service quality and a unique nuance that may take a finite time to replicate but gives a first mover advantage. Given availability of low cost IT solutions offered through Cloud the productivity enhancing tools should be harnessed from the word Go so as not be handicapped in a world that rewards the agile, innovative and merit but perishes the one who is not!
Startup today have an expanded opportunity in an era where mobility has become omnipresent Coupled with digital native population percentage on the rise, it presents a
33
Annalyzing
W
hen it comes to Enterprise Mobility, the top concern of any business today is security. Enterprise Mobility is changing the landscape of IT security for the companies who are toiling hard to protect their sensitive information. High escalation of the BYOD and CYOD, simultaneously the bad factors are highly aecting the mobile operating systems, mainly targeting iOS devices. Now, making the devices secure enough is the real challenge. The threat of security arrives only because of the always “onâ€? tendency of the mobile phones, which makes them an ideally designed surveillance tool. Other features like, microphones, high resolution cameras, embedded GPS and multiple network types like Wi-Fi, cellular and Bluetooth,
34
on top of that, the ability to hold gigabytes of data, which are direct threats to security. Unfortunately, these treats are totally unaware to the company until a data breach happens. Many of these security breaches are the outcome of the poor security discipline and human error. While it comes to the network controlling, things have become worst concerning security issues. Though, the productivity has come away far ahead in the recent times, with it comes the security issues, which is hard to handle. The concern is just because of the way workers are accessing the corporate data. Employees of a company are accessing corporate data on smartphones, tablets and
NOVEMBER 2017 |
wearables from a variety of locations, creating security challenges. The condition is like, users can, without any efforts find ways to get around IT and use unsanctioned personal devices, apps and networks to get their work done. There are some issues which will become a main security concern in the coming year. BYOD, on top of list Though, today BYOD is the phenomenon in most of the companies, because of the ease of use and cost savings, it will no longer be the same. The extra bandwidth that these devices consume and the security issues that occur from an individual’s device hygiene – download behavior, system updates, and antivirus, the IT and security professionals have to be very conscious about it. Companies have to consider mobile device management (MDM) to be ahead in the matter of security concern. Concern Over Mobile Malware There is a vast problem of mobile malware and in the coming time it will be on the verge, specifically for the Android users. It is really getting difficult to spot the malware in the Android devices. The devices are being used on the business setting specifically confronting this threat of malware. There is one more thing which is on the verge, and that is mobile payments which are becoming a matter of ease for the hackers to target the audience. By the way of targeting the Android devices, the hackers can implement a specific malware and so can target the national or global environment directly. Preference to Internet of Things (IoT), leading to Security Threat The security attacks are most of the time a threat to the IoT devices. IP cameras, SOHO routers, smart TV’s, and other connected devices are always under a strong threat of security. If any vulnerability gets detected in any device the others will be automatically get affected and come under the dire of security attack. Once a vulnerability is discovered in one device, it opens the door for others with that device to attack as well. A problem with IoT is that device manufacturers have either not figured out or are ignoring the importance of software/firmware patches. So far, companies are being reactive and not proactive. A user should not have to log in to his/her router or device software to discover that a patch has been released. Patching should be handled in the same manner as Microsoft does it. When new vulnerabilities have been discovered, new patches are released, delivered, and installed on reboot. Given the number of devices that will soon be online, the responsibility to provide patches should fall on manufacturers who sell equipment – not the end-users. In addition, all IoT devices are gathering information about users. Since laws are far behind today’s reality, gaining access to the data stored by these devices may not be as hard to obtain as accessing other devices. Security Concern over Mobile Payment Services There is a lot of security concern surrounded by leading mobile payment platforms such as Apple Pay or Samsung Pay. The threat is not through outright breaking of their payment processing algorithms but via analysis of the entire system to identify bypassed measures and vulnerabilities, leading to credit card information fraud, extortion, and unauthorized use. There are examples before us of the stolen credit card info
| NOVEMBER 2017
35
has been successfully added to online payment accounts without bank verification, allowing fraudsters to use the stolen card information at some stores. Mobile Web Browser-Based Hacking The mobile Web Browsers are also getting hacked, stating the possibilities of the mobile versions of Chrome, Firefox, Safari, and related kernels on Android and iPhone to be hacked frequently in the coming days. These types of hacking allows the hacker to bypass its many system-level security measures. This webkit-based exploits enables hackers to bypass a browser’s sandbox, or the security measures built into modern browsers. Eavesdropping The emphasis is more on the smartphone now, just because of the explosive growth of Android devices. These types of handsets come with preloaded applications that are generally not analyzed or validated by Google’s security team, the result is the exposure to the remote device hijacking. This threat will increase with the open, customizable nature of Android smartphones by OEMs, which will continue and worsen this threat. DDoS Attacks The most important one is, a Distributed Denial of Service (DDoS) attacks which have been an infrequent and shortlived annoyance, one that most businesses online are relatively well-equipped to deal with. The immense growth of mobile and other Internet-connected devices is allowing the DDoS to expand. So, keeping all of these security concerns in mind, businesses have to be ready to fight against data breach during 2016.
36
NOVEMBER 2017 |
V4WEB CYBER SECURITY Creating a Benchmark in Cyber Security and Data Protection
T
he protuberant company V4WEB CYBER SECURITY is a one-stop cyber solution company. It is a division of V4WEB TECHNOLOGIES PVT LTD which is an eighteen-year-old company specializing in Website Designing, Web Applications, Digital Marketing and Cyber Security. This division V4WEB CYBER SECURITY provides core services such as Cyber Security Implementation, Cybercrime Investigations, Data Privacy & Protection, Security Awareness and Training. V4WEB proudly delivers advisory services to their treasured clients to defend them from cyber frauds, cyber attacks and data theft. They provide suggestions about the actions that the companies must take against cyber-attacks as per the IT laws in the country and also as per Global best practices. The strength of the company lies in cyber crime investigations and prevention. Their services provide granular visibility into how users access data and applications, and uses sophisticated user tracking software and classification to detect and block cyber-attacks, botnets, unauthorized users and malicious insiders. Additionally, V4WEB audits the client’s security parameters and suggests the installation of required measures to prevent cyber attacks. The company is an expert in Cyber security, protecting sensitive personal data and conducts tough audits of the entire organization and infrastructure right from the user machine to the cloud. V4WEB understands that security, compliance, reliability and general network health are essential to their client’s organization. They are committed to supporting and working with their customers over the long run and helping them to keep up with security and compliance challenges and stay ahead of cyber attacks. V4WEB’s mission since its inception remains the same – to protect what matters the most – their client’s infrastructure and data.
well-known face in the media houses; he frequently appears in newspapers, magazines and on national as well as international televisions which pursues his opinions on the current scenario of the threats in cyber industry. Having more than 16 years of rich work experience, Ritesh was recently conferred with the award for ‘The Best Individual in Creating Cyber Security Awareness’ by the Computer Society of India. Ritesh is serving in many companies as a Cyber Security Consultant and a Data Privacy Consultant and has been highly successful in securing systems and critical business information from cyber-attacks. Ritesh has been a very sought after speaker when it comes to creating awareness on cyber-crimes, data privacy, cyber security and dark net. He has been a distinguished guest at many organisations such as RBI, Defense Organisations, Anti-Narcotics Cell, Economic Offences Wing, Corporate Associations, Educational Institutions and many others. He was a special invitee at Interpol’s Conference on Cyber security held in Singapore. Proffering Exclusive Services of the Company V4WEB CYBER SECURITY is provides some groundbreaking services which is helping them as well as their customers to stay safe and stay forward. The Core Services of V4WEB CYBER SECURITY:
About the Pioneer behind the Organization
· Cybercrime Investigations & Forensics · Cyber Security Implementation & ISMS Audits · Data Privacy & Protection · Secured Websites and WebApps Development · Web App & Mobile Security Assessment · Vulnerability Assessment & Penetration Testing · Business Continuity and Disaster Recovery · Cyber Security Awareness & Trainings
An engineering graduate from MIT Pune, Ritesh Bhatia, Founder and Director of V4WEB CYBER SECURITY is a well-known personality in the field of cyber security and cyber-crime investigations. He is a very
V4WEB CYBER SECURITY is a part of V4WEB, which is focusing on Website Designing, Web Applications, Digital Marketing and Custom GUI. They provide comprehensive and inclusive cyber security services to
38
NOVEMBER 2017 |
‘ ‘
V4WEB CYBER SECURITY is a small but perfectly-skilled
team of dedicated and experienced professionals in Cybercrime Investigations, Cyber security Implementation, Data Privacy, Secured Websites and Web Applications Development
Ritesh Bhatia Founder & Director protect businesses from cyber-attacks. In addition to the above, V4WEB primarily offers their services in the following areas: · Customized Responsive Websites · Secured Web & Mobile Applications · Intranets & Extranets · Digital Marketing · Rich Graphic User Interfaces · Usability Analysis Words of Wisdom Ritesh added, “Cyber security is not an afterthought and hence make it the agenda before it becomes the agenda. We focus on doing our best to secure organizations as well as individuals. Everyone in this field is doing their bit to secure the nation from cyber-attacks. Hence we do not feel that these are our competitors rather we all are working together to make this world a safer place” Future Aspects V4WEB CYBER SECURITY’s vision is to protect not just organisation’s but also the individuals who are a part of the cyber space. After all, 1.25 billion individuals make India, and not just the organizations.
| NOVEMBER 2017
39
Technology Innovation
PUT YOUR DRY CLEANING BUSINESS ON AUTO-PILOT! T
echnology has become a Global revolution and is fast moving to inconceivable proportions where almost everything is determined to be automated. The dry cleaning industry has not tested the formula and dawdles when it comes to automation and technology, not empowering small businesses in thinking big. Turn-around time in dry cleaning business or the manual tagging or be it the whole business process of any acclaimed dry cleaning service has often left the customer disgruntled. There has been a perpetual demand for setting up a process in dry cleaning business that is both process dependent and satisfies customers with the services offered. In dry cleaning business however, the processes are laborious and analogous to an extent that it generally irks the customer with the comprehensive experience and moreover, it is arduous. The system is not empowering. The industry requires to manouvre to a platform which is automated in terms of customer interaction, servicing and manages onboard customers and keep adding new ones. It also should eliminate all entry barriers for owner of the business. The answer is automated cloud based business management software to take the dry cleaning business to the next level. With the evolving of industry process maps, it is viable and efficient to shift to cloud based POS. The technology constitutes a plethora of benefits and can be accessed remotely on any device. This process makes it easier and the tech support better than ever. All the updates are made on cloud directly.
40
The benefits of moving to Cloud based POS are numerous: Eliminating entry barriers and moving to digital SMART is in, Manual is out! Access a world full of possibilities on the click of a button. Eliminating the need to learn > develop > implement > improvise and > implement again, Cloud POS software makes it easier for even a novice to take on the so-called elaborate processes of the industry with ease. Adopt the practices developed and followed by the existing champions of the industry. Bar code enabled garment tagging and more Nevermore lose another garment with garment tracking feature. This means you never have to deal with dissatisfied customers and financial loss due to compensations paid for the lost garments. Efficient customer communication and delivery Cloud based POS is set to revolutionize customer communication which in terms of dry cleaning is highly substantial. Maintain efficient communication with your customer through in-App notifications, text SMS and Emails. Offer your customers options to make online payments and offer a comprehensive experience. Automatic accounting and business analytics Purchase that heavy duty machine only if you need! Cloud based POS offers business analytics that help you in deciding your next move. With multiple analyses of data,
NOVEMBER 2017 |
ABOUT THE AUTHOR Rachit Ahuja is the Founder and Director of Business Development at Quick Dry Cleaning Software. A Strong entrepreneurial professional graduated from real life experiences and ably guided by his mentors. He has demonstrated a history of solving real life problems with the help of technology. Rachit has an experience in the domains such as Requirements Analysis, Sales, Customer Relationship Management (CRM), Quality Assurance, and Management.
Rachit Ahuja Founder & Director - Business Development, Quick Dry Cleaning Software Cloud based POS can considerably improve your business decision making process. It offers automatic accounting so, you don’t have to spend your late evening counting cash or calculating your daily earning. Everything is at the tap of a button! Cloud based POS offered by Quick Dry Cleaning Software (QDC) came into existence 8 years ago with a clear intent of helping you manage your business in a competent and profitable course. Quick Dry cleaning is the brain child of Rachit Ahuja, a third generation dry cleaner and Vivek Saini, who are technically tuned in with the process of the industry. Their technology acumen combined with industry prowess has led them to develop a competent cloud based solution that not only caters to entry problems in the business but offers effective management in every vertical of business processes. QDC offers a comprehensive suite of software module that helps manage different aspects of dry cleaning business: 1. 2.
Store Module: A cloud based software to manage store/ collection center operations. Workshop Module: A cloud based software to
| NOVEMBER 2017
manage workshop/processing unit operations. Mobile POS: Mobile application for pick up boys for pick-up & drop. 4. Customer App: A white labeled mobile app for customers to connect seamlessly with dry cleaner. 5. Business Dashboard App- For remote management of business. QDC operations are spread across 35 countries including Canada, Dubai, South Africa, Australia and many more. QDC’s ambition to help laundry business owners maintain a healthy work life balance was a communal effort. 3.
With invariable industry specifics it has become critical to adapt to novel and transforming business ideas of which on-demand cloud based POS is one recourse. While the dry cleaning business has a multitude of opportunities to offer, it is also crumbling under person dependent business processes which can be transformed by adapting to such new initiatives to simply change the way dry cleaning is done. Cloud based POS offers you to make time for every other process than just maintaining tiring records. Weigh in these options and you will consider moving to cloud based POS because it is not just easy but tremendously effective!
41
T
he upsurge of internet enthralled the world in the 1990s and was something understood but unbelievable. The idea that one could use a machine to do something that always had to be done manually left many puzzled. The Internet has improved and gratified digital information which benefits many aspects of life. But all developments occur with some kind of proviso and the Internet is no exception. Cyber-attacks have left every internet user vulnerable. Cyber security has become one of greatest threats in the present time.
As we all know about the efficiency of the credit card, it has enlarged the power of traction around the world. In the beginning, there was no such thing as credit card fraud, but now enormous amounts of people have started using credit cards and this has resulted in an increase of credit card frauds.
Digitalization with Technology What was previously done manually is now being automated with the help of innovative technologies. The impressive automated technologies have a complex network of codes
Sensitive Data is Stored in the Cloud There was a time, when an individual would respond if a website queried about their credit card or personal information. Now-a-days it is
42
which helps the system to function in a way the user wants. With every new piece of technology created by code, there is an equal opportunity created for a cyber-hacker to misuse the same technology.
uncommon for a website to give you access to their content without requiring you to sign up for an account and provide your personal information. With the increasing number of data stored in the cloud-based systems, it is crucial to protect that data from computer hackers who try to infiltrate the data bank of large businesses or personal users. Losing the personal data of customers can be very costly for businesses, for that reason, companies are paying a lot of money to ensure the security of their customer’s information. If consumers could not trust that by entering their information into a website without it getting leaked to an outside party, then e-commerce would ultimately fail. Thus, as
NOVEMBER 2017 |
e-commerce grows so will cyber security. Innovation of Technology With the advancement of technology, demand for cyber security has grown by leaps and bounds. There are many limitations in technological innovations because the security of data needed is uncertain. As businesses ďŹ nd better ways to secure data, there will certainly be technology that is involved at a very personal level to protect data from misuse. In the next decade, we might even see smartphones that can protect metadata including phone calls, text messages, ďŹ le attachments etc. There is no doubt that as the reliance on technology increases, it will hold information and data that has previously not been used.
| NOVEMBER 2017
Hackable Products When one thinks about hacking, they naturally associate it with technologies. In a computer or a website, coding is used in so many technologies, thus hackers easily use their coding skills. There have been examples of alarm systems, cars, pacemakers, plane systems and power grids getting hacked. Keeping these products safe for the customer and protecting them from hackers will be a responsibility of the business that will often get hired out by an expert in the cyber security ďŹ eld. With the way that our society is adapting to technological innovations, it is no surprise that the cyber security industry is growing each year immensely. We can expect
to see an increase in this workforce as the current generation continues to automate and do things that have never been done before. Cyber security is one of the most pressing issues of the day. Virtual networks have always been the target of cyber felons, and it is likely that the hazard of cyber security breaches will only increase in the near future as these networks expand. But there are some utilitarian precautions that organizations can take to minimize losses from those who seek to do harm. With the accurate way of research and expert external assistance, it can be possible to control the cyber damages, and recuperate from a cyber-breach and its consequences.
43
WEB AND MOBILE EXPERTS
Custom Web Development A professionally created website and a remarkable design go a long way in creating that impression about your business and thus help in converting a visitor into a customer.
CUSTOM WEB DEVELOPMENT
Mobile Application Development Develop powerful, highly usable apps that solve business problems, attract users, and reinforce your brand.
UI/ UX Our role is to oer the expertise and determination to deliver each site to the utmost standards.
User Engagement MOBILE APPLICATION
We do it by using artiďŹ cial intelligence to provide true end to end personalization and continue to engage shoppers across unlimited segments to deliver experiences that convert.
UI / UX
USER ENGAGEMENT
Email id: contact@ascratech.com | Contact No.: +91-9769162289 | www.ascratech.com