securitylinkindia

Bolstering Channel Partner Program in India To Meet Increased Customer Demand for Privileged Account Security

New distribution partners Inflow Technologies and M.Tech to expand customer access to CyberArk security solution CyberArk, the company that protects organisations from cyber attacks has recently announced new CyberArk Channel Partner Program offerings to enhance partners’ privileged account security expertise and ability to drive new business opportunities in India. In addition, newly-announced distribution partners Inflow Technologies and M.Tech will bolster channel support. The channel plays a critical role in delivering CyberArk’s best-in-class privileged account security solutions to joint customers, for raising awareness and triggering new business across the region, including key vertical industries such as financial services, energy and healthcare. “As one of the largest, fastest growing markets in the world, and with high technology adoption, India is a country with tremendous potential for CyberArk,” said Rohan Vaidya, regional director, India, CyberArk, “The scale and scope of attacks on the most valuable data within organisations means cyber security is an increasingly important board-level issue. CyberArk’s ability to break the cycle of cyber attacks by delivering a critical layer of security will enable businesses across India to implement proactive security strategies.” CyberArk enables access to new training and certification programs  New CyberArk Channel Partner Program offerings include: CyberArk University – New technical certification, expanded course offerings: CyberArk is expanding its Global Certification Program for sales and technical learning, recently adding a new CyberArk Certified Delivery Engineer (CDE) option. CyberArk DNA – Data-driven insight to increase deal impact: Partners using the CyberArk discovery and audit (DNA) tool can generate comprehensive reports for customers and prospects identifying privileged accounts on the network as well as privileged passwords – including hard-coded passwords in applications and scripts – and their status in terms of policy compliance. Partner Portal: All CyberArk partners can register for user access to the CyberArk partner portal. With a wealth of resources and training to support partners in selling CyberArk solutions, the Partner Portal also incorporates competitive financial rewards such as deal registration, for the CyberArk partner community. New distribution partners announced CyberArk also welcomes two additional distribution partners, bolstering coverage and support for channel partners and their customers in India. Inflow Technologies and M.Tech join iValue to enhance CyberArk’s distribution structure in India. “CyberArk’s approach to helping secure the network allows customers to get ahead of attacks and prevent escalation before real damage is done, instead of wasting cycles constantly reacting to cyber threats,” said Rajesh Kumar, business head, Inflow Technologies, “With this relationship, our channel partners will now be able to offer CyberArk solutions to their customers. We are optimistic about the opportunities that this partnership brings in and we shall focus on partner’s enablement and reach, ensuring that the benefits of the CyberArk privileged account security solution are accessible to customers across key regions.” “M.Tech is excited to be a distribution partner of CyberArk in India. CyberArk’s technology has significant demand in India across all industries, primarily in the financial services, energy, retail and healthcare markets,” said Bhavin Bhatt, Regional Director, M.Tech, “Partnering with CyberArk means M.Tech is one step closer to completing the entire IT security stack. With the cutting-edge technology of CyberArk and the expertise and reach of M.Tech, this partnership will solve key security pain points for our joint customers.” CyberArk partner program momentum CyberArk works with more than 300 channel partners around the world and continues to make investments in deepening partner relationships. The company is increasing collaboration with advisory firms, systems integrators and value added resellers around the world and across key vertical markets such as healthcare and government. Additionally, the C3 Alliance, CyberArk’s global technology partner program is a strong differentiator that provides the channel with greater access to integrated technology solutions. The C3 Alliance delivers certified technology integrations between CyberArk and alliance member products that make it easier for channel partners and customers to extend the power of privileged account security across their organisation and enhance their overall security posture.

Read More

Netmagic Partners with Nutanix Offering Managed Enterprise Cloud Services

Nutanix, a leading enterprise cloud computing company has recently announced its partnership with Netmagic, a subsidiary of NTT Communications and a leading managed service provider in India. This partnership will enable Netmagic to offer private cloud services built upon the Nutanix enterprise cloud platform to customers who either run their own datacenters or using Netmagic’s dedicated datacenters based in India. Along with other recent partnerships, Nuatnix has extended its reach exponentially across India, and is now placed to support the extensive digital transformation currently underway in the country. The Nutanix enterprise cloud platform goes beyond hyper-converged infrastructure and offers lower total cost of ownership (TCO), near limitless scalability, faster time to value and small footprint. It allows customers to deploy applications faster and scale rapidly as they grow. In addition, this partnership will enhance the security, scalability, reliability and flexibility for enterprises and provide them a tailor-made solution without compromising on the control of their IT infrastructure. The entire private hosted cloud service by Netmagic will be built on the Nutanix Enterprise Cloud Platform. Netmagic provides a well-structured approach to private cloud design and development. It takes into consideration the immediate as well as future business needs to scale-up through hybrid IT or virtual private cloud environments. Once on the Nutanix Enterprise Platform, Netmagic will be able to deliver higher return on investment (ROI) within the existing infrastructure. “Netmagic’s deep understanding of the local market, supreme reach and strong client base combined with our technological backbone offers a robust and secure private cloud solution to enterprises,” said Sunil Mahale, VP and MD of Nutanix India, “We are confident that this partnership will enable both companies to continue to grow within the FSI and e-commerce verticals in India, and to expand into more untapped markets.” “We are pleased to partner with Nutanix to further leverage our infrastructure and domain expertise with their leading Enterprise cloud platform. This business alliance enables us with our continued efforts in maintaining our delivery excellence and value proposition,” added Sharad Sanghi, Managing Director and CEO at Netmagic, “This enhanced service offering consolidates our leadership position in the Cloud industry.”

Read More

G4S Supports the Constitution Day of Denmark Celebration

Danish Embassy Celebrated the Constitution Day of Denmark in association with G4S The Ambassador of the Kingdom of Denmark, Peter Taksoe-Jensen has recently hosted an evening of festivity to celebrate the Constitution day of Denmark in New Delhi, supported by G4S. The event was attended by the British High Commissioner to India, Sir Dominic Asquith; Swedish Ambassador, Harald Sandberg; European Union Ambassador, Tomasz Kozlowski, and CEOs of Danish companies. Rajeev Sharma, MD, G4S said, “We at G4S take a great pride in connecting with the Constitution Day celebration of Denmark. I would like to take this opportunity on behalf of G4S to wish the Ambassador of the Kingdom of Denmark a long and meaningful association with India.” “Our Group, G4S, has its origin in Denmark. In fact, G4S has a secondary stock exchange listing in Copenhagen. We have had a long and meaningful association with the country and we look forward for a more mutual and beneficial association between the two countries,” said Rupan Sidhu, Director, Corporate Affairs, G4S Peter Taksoe-Jensen, the Danish Ambassador to India and host of the evening said in his welcomed note, “It’s a great pleasure to be in India. It has a great potential to grow due to its’ dynamic culture.” The Ambassador also thanked G4S for its support. The day is observed to honor the anniversary of the signing of the Danish constitution of 1849 by Frederik IV. Known to Danes as ‘Grundlovsdag’, or Independence Day, it marks the establishment of Denmark as a constitutional power.       (L to R) Peter Taksoe-Jensen and Rajeev Sharma  

Read More

‘5 City SME Connect’ Schneider Electric IT Division Kicks it off from Ahmedabad

Special emphasis was on trusting oneself and adopting modular approach while pursuing the journey of transformation Schneider Electric 5 City SME Connect kicked off from Ahmedabad.  The other four cities include Mumbai, Chennai, Bangalore and Delhi that will be covered in the next two months. The highlight of the event is to interpret SMEs’ technology challenges and mitigate those challenges with a systematic approach. Everyone knows that SMEs are handicapped owing to a limited set of resources and skill sets; therefore there must be right architectural strategy and practice to mitigate those challenges. Power, cooling, racking and stacking that are never taken seriously in an IT discussion are very important for the SMEs. Amod Ranade, General Manager, Datacentre Business Development, IT Division, Schneider Electric emphasized on micro-datacentres and said that Edge networks are going to stay while the transition happens from the datacentre centric approach to the cloud-centric approach. He also said that the IT Managers and CIOs should create self-belief within themselves to create any strategy for the company. Rahil Patel, General Manager & CIO of Kalupur Commercial Co-operative Bank Ltd., Paresh Goswami, IT Head, Chiripal Poly Films Ltd., and B. Praveen Kumar, Head, Information Systems & Security, Ascendum KPS Private Limited enumerated their own experiences in the transformation process and advised the audience to take steps quickly because the time and technology are disruptive. Amit Dave,  Director, Microlink Solutions Pvt. Ltd., expressed his happiness about the positive attitude of the small and medium organizations and said that these organizations are quite receptive to new ideas, therefore they are not small and medium organizations rather ‘smart and motivated enterprises.’ Sanjay Mohapatra, Editor, SME Channels said that the SMEs are becoming the lifeline for any country and for India, it is no exception. With ‘make in India’ in place, SMEs’ role is becoming very important. Besides, the government has already said that 20% of government and PSU’s procurement would happen from the SME sector. Therefore, it is important for small and mid-size organizations to adopt new technologies so that they can remain more relevant to the market. APC by Schneider Electric, the leading global brand for integrated IT physical infrastructure and software, provides reliable power and availability solutions for IT and communications technologies. With the largest community of partners tailoring solutions for home and business networks, APC products enable individuals and businesses to anticipate the unexpected, protecting critical information and data. It’s certainly in a connected world. APC is a brand of Schneider Electric, the global specialist in energy management and industrial automation.

Read More

India’s Budding Cyber Policies

India is at a nascent stage in deploying cyber intelligence related policies, and measures to curb targeted attacks While India is ushering in a new era in the digital segment, with an aggressive promotion of cashless payments, digitized documents, M-wallets, smart cities etc., the country may still be significantly lacking in cyber security policies and techniques to tackle any major targeted attack. The recent attacks of WannaCry Ransomware are just one of the many that is a clear indication of how vulnerable the globe is when it comes to cyber intrusions. “While India is spearheading the growth in the digital segment across the globe, an absence of strong policies and a clear vision to curb the forthcoming attacks may prove to be a ticking time bomb,” says Marc Kahlberg, CEO and MD, Vital Intelligence Group. The situation could become alarming if central and state governments deploy technologies and encourage many of their mission critical departments to go online with no significant cyber security measures in place. Regulating cyberspace would prove to be a knee jerk reaction in tackling cybercrimes and terrorism, making it further difficult for intelligence agencies to maintain a constant vigil across the depths of cyber space and take proactive action where required. “’By regulating cyber space, freedoms of speech will cease to exist, available information will become less and much harder to obtain, and quite possibly, the advancements of certain technology would be either forced underground or would slowly disappear. There are also elements of information that can be attained by allowing the social media platforms to operate, and hence give law enforcement and intelligence agencies actionable intelligence as to what is really happening and in real time. This, however, would require investment, training and indeed acceptance of the fact that the best form of defense in this sphere is a proactive investigative approach,” added Kahlberg. The Vital Intelligence Group platform of technologies incorporates a host of different cyber intelligence solutions including a possible world first FUSION-KEY intelligence software that collects, fuses, manages and supports intelligence mission-enabling command, control, communications, surveillance, intelligence collection and location capabilities, all via advanced engineering and processes of the highest levels. The Vital Intelligence Group is focused on empowering their clients with vital intelligence. They assist in making significantly better cyber risk and security related decisions by providing the most insightful, actionable cyber intelligence available. Vital Intelligence Group is the leading global provider of cyber Intelligence solutions, headquartered in Israel. “While the country has witnessed an exponential growth in digitization in recent years, a major lag in the formulation of new age cyber intelligence and security policies, as well as an adoption of pro-active self-defensive capabilities may be proving to be a ticking time bomb for the country.” – Marc Kahlberg, CEO and MD, Vital Intelligence Group  

Read More

Centralized Video Surveillance

Centralized video surveillance is always a better option for multi-location enterprises. They often encounter snags with scattered video surveillance products. These scattered products do not provide an integrated solution offering much needed visibility and control for multi-location organizations. Unlike traditional CCTV products, Matrix SATATYA is a professional video surveillance solution specifically designed for serious deployments. It offers live viewing, real-time alerts and instant switching between live and stored video streams from remote locations eliminating distance and time barriers. Many progressive organizations including Schneider, Tata Motors, Dnata, Samsung, General Electronics (GE), Airport Authority, Indian Railways, and many more rely on Matrix SATATYA for their video surveillance needs. Features 10 to 100,000 IP cameras. Modular and distributed architecture. Threat identification with intrusion, trip wire, foreign object, loitering etc. Instant notification with SMS, e-mail, calling and video pop-up. Edge recording without need for public IP. Smart investigation using intelligent video analytics. Parking management with ANPR. Integration with access control, fire alarm, POS, weighbridge etc.

Read More

Securens Forays into Warehousing

The E-surveillance service provider having its market leadership in ATM and banking security, spreads its footprints in Warehousing and Logistics industry Securens System has expanded its services in logistics and warehousing with its specially designed solutions. With its award winning state-of-the-art central monitoring station, Securens monitors premises of the leading banks, top retail stores, and popular QSRs. Securens have now spread its reach in warehousing with it’s specially designed products ACTIHEALTH, ACTICARE, & ACTIDETER. Warehouses by their very nature are located in remote areas and are ever prone to burglary and shrinkages. Man guarding is an unreliable, inefficient and expensive solution to secure premises. Securens 5th generation e-Surveillance solutions with active deterrence monitors the premises 24/7 that not only improves efficiency considerably but also reduces the cost substantially. ACTIHEALTH aids in the supply, installation and commissioning of all surveillance equipment on a PAN India basis and provides comprehensive AMC along with ACTICARE service on a SaaS (Surveillance as a Service) based model. ACTICARE takes preventive measures through regular health-checks, which ensure that your surveillance equipment works exceptionally well so that they prove to be of great help during the time of forensic analysis of a crime. ACTIDETER is a time proven system that guarantees results. It not only detects attempted crime, but proactively prevents it from happening, by using video verification and 2-way audio. Sunil Udupa, Chairman and Managing Director of Securens Systems, said, “Warehousing plays a vital role as far as the supply chain is concerned. It acts as the backbone of the supply chain. Our aim is to provide value added 360-degree surveillance solution to our customers on a SaaS model to help them not only efficiently detect shrinkages but also help them reduce costs in this competitive market space.” Securens has the largest network of surveillance systems spread across the country. Popularly known as the Central Alarm Monitoring Station (CAMS), the technologically advanced control room is built on highly redundant and fail-safe architecture known for preventing crime before it happen. The CAMS monitors more than 21,000 sites 24/7across India and houses over 100 monitoring personnel.

Read More

How to know Access Control in The Cloud is Secure?

Access Control as a Service (ACaaS) has grown into a mainstream product offering from many access control manufacturers, and it is gaining significant growth in the market. With the adoption of this technology, end users and integrators need to ask several pertinent questions. It is extremely important to understand the security of the communications, the quality of service, who the provider of the cloud service is, the redundancy of the servers, disaster recovery, scalability of the platform, and finally the stability and availability of the service. With this information end users and system integrators can make a sound decision on which product to select and if the provider can be trusted to deliver the critical action of physically opening and closing doors successfully. At ISONAS we take each of these issues very seriously and have worked tirelessly to provide the most transparent service to a customer while leading the industry in security and scalability. When selecting an Access Control as a Service provider, we recommend looking for the following best practices to ensure clarity in the decision making process. 1. Overall structure Where is the platform hosted? Amazon Web Services has created a business solely around hosting services. ISONAS Pure Access Cloud is hosted on a complex structure within Amazon Web Services. We chose AWS because of their best in class cyber security infrastructure and their extensive global flexibility in hosting and deployment of Pure Access. 2. Perimeter security Does the platform have perimeter security? Typical first line of defense is through the firewall that can deny or allow traffic. Networks should be surrounded by firewalls and reverse proxy units, which protect the systems within. Intrusion detection and prevention measures should be set up to alert and mitigate potential risks before they can get into the network. All perimeter security logs should be reviewed daily as well as alerting on key terms for a rapid response to threats. At ISONAS, we measure and monitor 430 individual metrics 24/7 with real time alerting to our technical team and we use an industry leading service to provide this comprehensive level of IT infrastructure. 3. Internal security How the cloud provider manages their internal systems is a good reflection on how they manage additional systems and will prevent another avenue for an attack. Systems should be under a network access control layer as well as local firewalls limiting only the required ports for operation to be active, and only responsive to specified networks. As a second layer of protection, host intrusion detection and prevention act as a threat reduction as well as Antivirus and Malware mitigation. Internal team access to systems should be group based and only granted on an as needed basis via a secure password manager portal where access can be granted and revoked at any time. 4. Encryption One of the most basic pieces of security is ensuring the web application has an SSL (Secure Sockets Layer). An SSL establishes an encrypted link between a web server and a browser. This link ensures that all data passed between the web server and browsers remain private. Pure Access Cloud utilizes SSL encryption governed by the reverse proxy. Even the passwords used by the web servers to access the database are encrypted to mitigate against data leakage. Automated file watchers keep a close eye on configuration details in the servers to ensure no access is granted without administration approval. All information on ISONAS hardware is encrypted using AES-256 bit algorithms. Communication between Pure Access Cloud and each connected access point can also be AES 256 bit encrypted. 5. Data protection The worst time to find out backups didn’t work is when you need them the most so employing backups and snap shots of the database is vital. This will ensure that data cannot be lost due to failure or even accidental deletion. All recovery methods should also be tested on a regular basis to ensure that restore and recovery is fast and accurate if required. 6. Testing All products should undergo thorough and rigorous automated and manual testing to ensure that the product that is placed in front of customers is stable without issue. ISONAS utilizes 3rd party penetration testing on a regular basis to subject our systems and configurations to the highest level of cyber security standards. 7. Monitoring All systems should be monitored heavily. A good practice here at ISONAS is that each server has up to 30 points monitored from services to configuration files to up/ down time. Ports are monitored as well as web services. Our services are monitored by Selenium style scripts that not only see if the web services are up but actually log in and click links and log out measuring the performance of the services. These checks are done every 5 minutes from locations in the US and internationally as well as internal network monitors. 8. Redundancy and load balancing As systems scale and grow, there is risk that traffic to the platform could create performance issues, therefore the ability to load balance information is critical to preventing an overload. Systems should be redundantly load balanced using affinity in the virtual IP configuration to ensure a seamless customer experience. In addition, applications should be stateless and share cache information so if a system stops responding the customer will not be affected and it can be repaired without downtime being a factor. 9. Support philosophy Is there a support program and team in place to assist if there are issues? Here at ISONAS we don’t believe in traditional tech departments where there are separate network, server, security, cloud and support teams. We fundamentally believe that a rapidly scaling business and application needs a team that can manage all systems, anytime and anywhere. Our team is empowered and trained to handle all facets of the support process from the customer to SaaS application. At ISONAS, security is taken seriously. The patented Pure IP hardware products from ISONAS offer a technologically advanced solution that eliminates the…

Read More

Change Approach to Vulnerability Management

Skybox™ Security has announced the availability of threat-centric vulnerability management (TCVM) for the Skybox™ Security Suite, signalling a fundamental shift in the approach to managing and prioritizing vulnerabilities. TCVM changes vulnerability management from an exercise of trying to patch ‘everything all the time’ to focused, intelligent action that considers real-world threats. TCVM does this by correlating multiple factors to determine vulnerability risk, including: The context of an organization’s environment such as potential attack paths and security controls in place, each asset’s exposure and importance to the business, and details of existing vulnerabilities. Intelligence on vulnerabilities being exploited in the wild. With the prioritization center in Skybox™ vulnerability control, security leaders can automatically analyze the thousands, even millions of vulnerabilities in their environment (including cloud and virtual) to pinpoint those that are truly putting their organization at risk. This means narrowing a huge volume of ‘known’ vulnerabilities that are potential threats down to a small, manageable number. They are identified as imminent threats known to be exploited in the wild. In addition, TCVM enables a systematic approach for ongoing, gradual risk reduction of potential threats that could escalate in the future. Skybox TCVM leverages ongoing intelligence of the active threat landscape produced by the Skybox™ research lab. The lab aggregates information from more than 30 security data feeds along with research of exploits available on more than 700,000 dark web sites and validated by Skybox’s security analysts. For example, Skybox analysts have been closely monitoring three major event categories impacting organizations today – the use of a specific, commercialized set of exploit kits, the rise of targeted client-side vulnerabilities, and the continued popularity of Internet of Things (IoT) botnets. A small, targeted number of exploit kits are dominating the dark web. In the first part of this year, five major exploits kits dominated chatter on the dark web, targeting nearly 70 vulnerabilities in Firefox, Adobe Flash, Microsoft Internet Explorer and Edge, Java, Microsoft XML Services and more. These vulnerabilities are known to distribute different malware as payload – for example, popular ransom ware and banking trojans. Threat actors continue to target specific vulnerabilities included in exploit dumps by hacker groups such as The Shadow Brokers. The group, notorious for allegedly leaking the National Security Agency (NSA)’s hacking tools, continues to pepper the dark web with exploit dumps like the major one on April 14 that contained many OS and server-side exploits. These dumps and targeted vulnerabilities impact web apps built with Apache Struts plus VMware, Cisco, Oracle and Microsoft products, to name just a few. Poor IoT security is still vulnerable. Botnets are exploiting vulnerabilities in network devices, gateways, cameras and other internet-connected devices, delivering distributed denial of service (DDoS) attacks through things like the ‘HTTP Port 81 Botnet’ and the Amnesia botnet which is the next generation of Mirai malware after source code was published and shared online. “Security leaders understand that the threat landscape is always changing. The difference now is that we’re seeing the growth of an increasingly commercialized cybercrime market. This is making it easier than ever for threat actors to attack, adjust and attack again until they accomplish their objective,” said Skybox CEO, Gidi Cohen, “They tend to aim for the easy targets – and the biggest ROI – by exploiting a surprisingly small number of vulnerabilities, many of which current vulnerability management approaches don’t consider as priorities. This has to change. Security leaders have to be smarter and way more targeted in their approach – aligning it to what’s happening in the real world – if they are to stay ahead of cybercriminals.” Skybox TCVM makes focused action possible by combining attack surface visibility, threat-centric vulnerability intelligence, and attack vector analytics to identify and prioritize an organization’s biggest risks according to vulnerabilities known to: Exist and are exposed in the network. Be actively exploited in the wild; or known to be attacked within a specific industry or geography. Have an exploit available, but are not known to be part of an active exploit campaign. Exist but are not exposed in the network. Threat-centric approaches to vulnerability management require the use of multiple technologies using several different types of security analytics.

Read More

Cyber Range Simulation Training Center in Tokyo

The facility, powered by the Cyberbit Range platform, will train cyber defenders in preparation for cyberattacks during the 2020 Olympic Games and beyond Cyberbit, whose cybersecurity solutions protect the world’s most sensitive networks, and Ni Cybersecurity, the Japanese cybersecurity service provider, have recently inaugurated the new Cyber Range training facility in Toranomon, Tokyo. The training center will provide hands-on simulated training for cybersecurity professionals and help address the growing shortage in cybersecurity experts, especially in preparation for the 2020 Tokyo Olympic and Paralympic games, which are expected to bring with them a sharp rise in the intensity of cyber-attacks. Ni Cybersecurity has conducted preliminary training courses, after which 100% of surveyed trainees responded they would recommend the facility to their colleagues. The Cyber Range training and simulation center in Toranomon, Tokyo, is the first fruit of the recent Cybersecurity cooperation agreement signed by the Japanese and Israeli governments on May 3rd, 2017. “We invite Japanese enterprises and government agencies to experience a new way to train cyber security professionals and improve their skills,” said, Takeshi Mitsuishi, President and CEO of Ni Cybersecurity, “This is another milestone in establishing Ni Cybersecurity as an innovative provider of cybersecurity services in our region, bringing the most relevant and up to date technologies to organizations in Japan.” The training facility will be powered by the Cyberbit Range, the most widely deployed cybersecurity training and simulation platform. Cyberbit Range enables trainees to practice responding to attacks in real-life settings including security tools, network architecture and traffic that reflect their actual work environment. The Cyberbit Range provides a rich and up-to-date catalog of simulated attack scenarios, including ransomware, enabling cybersecurity experts trainees to improve their skills and accelerating the on-boarding process for new team members. The Cyberbit Range powers cybersecurity training centers in North America, Asia and Europe. “Japan is expected to train tens of thousands of new cybersecurity experts while improving the skills of existing ones, all within a very short timeframe,” remarked Cyberbit CEO, Adi Dar, “I am confident the initiative led by Ni Cybersecurity and powered by our Range platform, will contribute to Japan’s cyber readiness for the 2020 Olympic Games, and for years to come.”

Read More