Category: National
IDEMIA Launches VisionPass in India, an Unrivalled Facial Recognition Access Control Device to Meet the Need of the Hour for a Hygienic, Contactless and Frictionless Experience
VisionPass joins IDEMIA’s MorphoWave™ Compact fingerprint device as the market’s most efficient and hygienic range of contactless biometric devices for access control IDEMIA, the leading global provider of Augmented Identity, is launching its advanced contactless facial recognition access control device VisionPass for the Indian market. Their way of living has been drastically impacted during the last few months, creating completely new requirements for a contactless approach when it comes to accessing public or private spaces. IDEMIA’s contactless devices for access control answer these new requirements by offering a hygienic, contactless and frictionless experience. VisionPass, the ultimate face recognition device for physical access and time & attendance control, extends IDEMIA’s range of contactless devices for access control. Designed as per the needs and requirements of end-users, VisionPass offers a unique experience – being identified on-the-move in less than 1 second thanks to its powerful algorithms. For more user comfort, VisionPass works in all light conditions from complete darkness to bright sunlight, with all face types and with various vertical and horizontal angles to cope with users of different heights (1.20-2.00 meters/ 3ft 11”-6ft 6”). As VisionPass is designed for access control and security, it can also counter spoofing attempts by image, video or 3D masks. Peeyush Jain, Vice President Terminals business, IDEMIA said, “In the last few months, daily lives have been drastically impacted apprising us with new challenges, and with it there has surfaced a need for a contactless approach especially while accessing public or private spaces. Our contactless devices for access control address such new requirements by offering hygienic and frictionless experiences to end users. With VisionPass & MorphoWave solutions at hand, we now have the most powerful contactless biometric terminals available in India for organizations to ensure a ‘zero human contact’ access experience. Secured access through these robust, reliable, and cutting-edge terminals is unparalleled, be it with facial recognition, or a touchless 3D fingerprint scan.” IDEMIA recently won the Security Industry Association (SIA) New Product Showcase Award in the Biometric category for VisionPass facial recognition device. IDEMIA already received a similar Award in 2018 for MorphoWave Compact, a biometric device that can scan and verify four fingerprints in less than a second. This new Award, this time for a facial recognition device, confirms IDEMIA’s ironclad technology in the field of contactless biometrics for security applications. They have all become hyperaware of the criticality of hygiene in these challenging times. With superlative biometric terminals like VisionPass and MorphoWave Compact and their touchless sensor technology in the Indian market, establishments now have the choice to ensure a fully contactless experience for access control everywhere for authorized users, through these robust, reliable, and powerful devices. With VisionPass (facial recognition) and MorphoWave™ Compact (fingerprints), IDEMIA confirms its leadership in contactless biometrics for secure, convenient and hygienic access control. IDEMIA provides a trusted environment enabling citizens and consumers alike to perform their daily critical activities (such as pay, connect and travel), in the physical as well as digital space.
Array AG Series SSL VPN Appliances Gets ICSA Labs Certified
Array Networks, the network functions platform company, recently announced that the AG Series SSL VPN Appliances (vxAG on AVX7800) has earned the ICSA Labs SSL-TLS VPN 4.0 certification. The vxAG virtual secure access gateway runs on Array’s Network Functions Platform as well as virtualized servers and industry-standard hypervisors to flexibly enable on-demand, full-featured secure access for users whenever and wherever needed. ICSA Labs that began with the mission to increase awareness of the need for computer security and to provide education about various security products and technologies is today one of most respected security technology testing organizations that offers independent validation of SSL-TLS conformance and efficacy. Enterprises worldwide rely on ICSA Labs to set and apply objective testing and certification criteria for measuring product compliance and performance. While the testing for the SSL-TLS VPN 4.0 certification was performed only on the vxAG (on AVX7800), the certification extends beyond to include the other members of the Array AG series SSL VPN appliances and Array AVX series network functions platform family. ICSA Labs’ clients benefit by working closely with technical analysts, leveraging criteria for product development, accessing research and participating in consortia, all with the objective of contributing to improved products that benefit customers and the security ecosystem ICSA Labs SSL-TLS VPN testing confirms that AG Series SSL VPN appliances properly implement TLS with strong cipher suite support while providing certificate management and validation. Additionally, they include proper authentication and authorization, session control and secure operation in either a Reverse Web Proxy or Layer 3 VPN mode. ICSA Labs, an independent division of Verizon, develops and performs comprehensive, unbiased, third-party security certification testing. ICSA Labs tested the vxAG virtual appliance running on Array Networks’ AVX7800 hardware. vxAG indicates that the virtual appliance runs on other hypervisors. The SSL-TLS certification criteria, version 4.0 is certification criteria for products that implement SSL-TLS for data confidentiality, authentication and integrity assurance for internetwork transactions. ICSA Labs tests SSL-TLS products against a standard yet evolving set of criteria. The SSL-TLS certification criteria is composed of both functional and assurance requirements. The criteria requirements define an industry-accepted standard that all products claiming to have SSL-TLS capabilities must attain. ICSA Labs certification helps enterprises, service providers and government agencies identify and evaluate security solutions with confidence. Array’s scalable secure access gateway centralizes control over access to applications, desktops, files, networks and websites from a broad range of remote and mobile devices providing secure connectivity, end-point and server-side security and application-level AAA policies on a per-user basis. AG series physical and virtual appliances are deployed at the network perimeter or in front of business-critical resources to provide secure remote and mobile access for employees, guests, partners and other communities of interest. Array’s secure access gateways are ideal for consolidating remote and mobile access on a single robust platform to provide end-users with a consistent login experience ensuring consistent access policies and minimize potential attack vectors. Each Array SSL VPN shares a comprehensive secure access feature set, right-sized seat license packs and an option for low-cost business continuity contingency licenses. The AG series SSL VPN appliances are ideal for enterprises that need to support multiple communities of interest as well as service providers that need to provide remote access to globally dispersed data centers.
Anil Puri Speaks on Union Budget 2021
Union budget 2021 presented by Nirmala Sitharaman, the Union Finance Minister of India on 01 February 2021 was a turning point and a landmark budget which is appreciated by all sections of industry acknowledging the bold initiatives, intent and paradigm shift in strategic planning to propel the growth of Indian economy on the vision of ‘Atmanirbhar Bharat’,‘Self Reliant India’ and ‘Digital India.’ Muted criticism in a democracy like India proves the degree of acceptance. To me, it gave a feeling of ‘1991 moment’ when India took unprecedented acceleration in reforms. The major structural shift in policy reflects Central Govt’s resoluteness and strong conviction to achieve strategic independence by reduction in imports; unlike in past most of the Govt’s drafted the budget with an eye on the vote bank. Likely impact on the Private Security Industry (PSI) The private security industry does not fall into the bracket of manufacturing segment; it is grossly a service industry. This union budget is likely to have a significant impact on the private security industry in the following ways: Huge investment in infrastructure development like highways, metro rail, air ports, SEZ and sea ports etc., is going to increase business opportunity for providing security and allied services like toll tax management. Disallowing delayed deposit of PF as expenses will compel us to ensure its timely deposit. Reduced time limit for reopening of tax assessments to 3 years and establishment of faceless Income Tax Tribunals would reduce harassment. Announcement of voluntary scrapping policy to phase out polluting vehicles is likely to impact all PSIs but more so those providing CIT services. Impact of increase in custom duty on electronic items on PSI PSAs use a large number of electronic items like mobile phones, surveillance equipment, PCs, servers and related equipment. The increase in import duty on these therefore is likely to increase the cost to the private security agencies. These cost increment would be mostly applicable to the procurement of new equipment. Existing electronic equipment already being held will have the impact only in their repairs or upgrading. Rationale of Govt’s imposition of additional custom duty The government proposed to impose import duty on components of mobile phones and chargers as a part of review of 400 exemptions in customs duty including those applicable on the mobile devices segment. Govt cited following rationale for its action: To enhance local value addition. To align the thrust on easy access to raw materials and exports of value addition. To ensure twin objectives of promoting domestic manufacturing and helping India get on to global value chain and exports. Conclusion The Central Govt’s move to make India a manufacturing hub by boosting domestic manufacturing and to transform it as part of global supply chain as an intent and strategy not only sounds good but appears to be viable. Domestic manufacturing is getting a leg up in allocation of funds and recent procurement orders for instance are TEJAS from HAL with LCH in pipeline and latest version of ARJUN from DRDO, ATAG gun from Bharat Forge, drones from a startup and ship building. Domestic manufacturers of mobile phones like DIXON Technology and household electrical appliances by Amber Enterprises are likely to scale up manufacturing and reduce share of imports. Even during COVID 19 pandemic Indian domestic manufacturers played vital and major role in manufacturing of PPEs, medical devices, ventilators and ICU beds to reduce dependence on imports. In my view, the rhetoric of ICEA which is umbrella body for the mobile manufacturers should be taken with a pinch of salt. India must be able to gain a position of strength in manufacturing to counter the coercive protectionist trade policies of China and other nations to safeguard its national interests.
Videonetics Announces Technology Integration with RBH Access
Videonetics, world’s leading AI & DL powered Unified Video Computing Platform™ development company, has recently announced technology integration with RBH Access, a leading manufacturer of access control and security management systems. Built on the powerful integration framework between Videonetics Intelligent Video Management Software (VMS) and RBH ‘AxiomX’ Alarm Management Suite, the users are empowered to gain end-to-end control over the physical access points through one centralized interface. The ‘truly’ seamless integration allows visual verification of the person, captures events as they happen and the ability to respond immediately, from the user-friendly GUI of Intelligent VMS. Coupling greater visibility, improved security, forensics at reduced TCO At the time of incident, the operators will be notified with an alert and they can leverage full power of both RBH AxiomX and Videonetics IVMS to quickly lock/ unlock doors, control cameras, retrieve live video and much more. Henceforth, they are equipped to make decisions, after conducting investigations of specific access points using video evidence, analyse patterns and generate reports. The user can manage access rights with live videos and real-time notifications using Intelligent VMS desktop, web, and mobile clients. Best suited for all sizes of installations with scalability, the integrated solution simplifies security operations and enhances safety measures of the businesses. Moreover, customers will also benefit with reducing total cost of ownership due to only upgrading the surveillance system, rather than adding multiple hardware components. Videonetics Unified Video Computing Platform™ helps users make sense of surveillance, by providing them with an end-to-end solution for a wide range of applications. The platform is powered by Videonetics artificial intelligence and deep learning engine, which is trained on humongous data sets, making their solutions incredibly robust and smart. All products and solutions are integrated yet modular, ONVIF compliant, OS and hardware agnostic, scalable and interoperable. Videonetics has been ranked #1 video management software provider in India, and among the top 5 in Asia (IHS/ Informa Tech Research). They remain driven by innovation, and committed to making the world a safer, smarter, happier place. RBH is a Canada based manufacturers of integrated security systems with in-house R&D for hardware and software. With 25 years of experience RBH systems are deployed in almost all type of customers ranging from Defence headquarters, SEA port, Airports, Metro, Universities, manufacturing units globally. RBH have some largest deployment of integrated access control globally to its credit. RBH have a comprehensive alarm management suit and their solutions are industrial grade with best of industry certifications. RBH solutions are available under make in India program for Indian customers.
iValue and SecurityAdvisor Technologies Join Hands to Strengthen Last Mile Security
iValue InfoSolutions, India’s premium technology aggregator, announced recently of their collaboration with SecurityAdvisor Technologies. A partnership focusing on providing security solutions, reporting of security outcomes, and targeting personalized, contextual, real time security awareness coaching to end users. iValue manages and optimizes digital assets and provides security checkups, vulnerability assessment and threat intel services to protect digital assets. The partnership of these two companies is not only meant to enhance the security features of their customer base, but also to aid in creating security awareness for the most at risk end-users and closing the human gateway for threat actors to go after sensitive data. “People, process and technology have been the core and consistent pillars of cyber security since its inception back in late 1980s. While huge investments have been made on the technology front, followed by process improvisation from time to time, focus and investment on people has not been in-line with the threat associated with them. Inline with the quote, ‘Amateurs hack systems and professionals hack people,’ iValue is delighted to partner ‘SecurityAdvisor,’ to introduce versatile, comprehensive and scalable platform to evaluate, access, train and continuously measure readiness of people in the enterprises to effectively fight and win against potential cyber threats and attacks,” said Harsh Marwah, Chief Growth Officer at iValue InfoSolutions. For more than a decade now, iValue InfoSolutions has been focusing on diverse aspects of security. iValue’s broad range of services also includes security audits and forensic assessments, and security infrastructure assessment, architecture, design and engineering. This multidisciplinary approach across verticals with technical expertise across 100+ brands in DNA area for design, sizing, POC, deployment, integration and optimization allows iValue to not just understand the security needs of the organization, but also help them in finding the right solution helping them adapt to the changing cyber milieu. Sai Venkataraman, Co-Founder & CEO at SecurityAdvisor said, “SecurityAdvisor focuses on detecting teachable moments for specific users and provides personalized security awareness education for each user, department and organization. Just as importantly we deliver measurable results like a 30-50% reduction in malware or a 90% drop in users clicking on phishing emails.” SecuityAdvisor Technologies believes that developing an effective group or cultural cybersecurity model, organizations must leverage an individual cybersecurity behavior model. Knowing hackers leverage human cognitive biases to get users to make cybersecurity errors such as clicking on fraudulent links or falling victim to malicious emails, it’s imperative that end-users learn to combat these biases. Various factors influence the cybersecurity behavior of an individual employee, but when fortified, the collective cybersecurity behavior of all employees can build an organization’s cybersecurity culture. Jagannathan K, Head – Services Business at iValue InfoSolutions said, “People are the soft and easy target for hackers, and they have become the primary threat vector. They can be first line of defence and reduce security incident provided they are given customized, personalized, engaging, easy to consume training at the right time. This will change the behaviour of people and help organizations build a cyber immune culture. We have partnered with SecurityAdvisor, which has vast training catalogue, integration with security and IT tools and AI based behavioural management platform to enable organizations to build cyber immune culture with a measurable outcome. I am excited about the partnership and the benefits it can bring to the partners and customers.” By analyzing a sea of data from various verticals, SecuityAdvisor offers four solutions/ services that help in protecting the organizations and its employees from cyber threats. Employee risk assessment: SecurityAdvisor has a proprietary analytics engine that leverages the data organizations already have. With the data collected by the existing security products they identify and visualize the top 5 human risks and recommend tailored security awareness programs for the organization and its employees. Phishing simulation: SecurityAdvisor has a novel phishing simulation solution that allows organizations to simulate and attack end users. Contextual coaching for employees: Every organization has 5% of users who account for over 90% of the security risk. SecurityAdvisor identifies the high risk users and targets them with personalized messages. It has a proprietary and patented AI engine that identifies unique teachable moments for each employee and delivers bite-sized tips for each of these moments. Security outcomes reporting and visualization: SecurityAdvisor provides the customers with a complete understanding of their organization’s security posture, through result driven reports that focus on real world outcomes, not a fake phishing click rate. The analytics based approach focuses on leading real-world outcomes that impact organizations the most.
New Fortinet Survey Points to Optimism on 5G Promise while Highlighting Role of Security
Fortinet, a leading global provider of broad, integrated and automated cybersecurity solutions, recently announced that a commissioned survey conducted by TelecomTV in association with HardenStance and ETSI found broad-based optimism for 5G revenue opportunities among Telecom sector respondents, but only if the new 5G services were both more secure and better tailored to key enterprise use cases. 5G has the potential to boost consumer and enterprise market bringing a series of benefits such as high speeds, lower latency and more bandwidth. The fifth generation of mobile standards also pave the way to enhance domains such as healthcare, transport with autonomous vehicles or smart cities offering new usages and improving daily lives. On the other hand, 5G increases considerably the number of connected devices which provide a new profitable field for cyber adversaries. Considering this, mobile network operators and enterprises must have a strong cybersecurity strategy that can protect their entire infrastructure, from the mobile core to the edge. A prominent business opportunity Overall, almost 90% of respondents anticipate growth in average revenue per user (ARPU) from their investments. This growth is expected to be split evenly between public and private 5G networks, but since at least half of all private networks are likely to be built and managed by the operators, such companies could potentially capture as much as 75% of the overall 5G business. Critical to achieving these gains however, according to 64% of respondents, will be the augmentation of existing security – as much in terms of architecture as in operations – as well as the tailoring of solutions to specific business use cases which are either critical or very important for nearly three quarters of respondents – especially within the key vertical markets of transport, logistics, automation, manufacturing and healthcare. The overarching implication of this is that the old business model of providing undifferentiated mobile connectivity services will no longer suffice. To succeed, most will need to create shared-responsibility partnerships with other providers as well as with their enterprise customers. The need to partner with other ecosystem providers – even those recognized as competitors – was clear among the survey’s respondents with 44% seeing cloud providers as partners, or at least mainly partners, and only 11% viewing them as pure competitors. These findings map well to the existing division of responsibility between cloud providers and their enterprise customers, where the maintenance and security of the infrastructure falls to the provider, while the enterprise is left to secure its own data and applications. The importance of a strong security value proposition Fortunately, cybersecurity is a top of mind consideration. More than 80% of survey respondents consider that the inherent security features of 5G 3rd generation partnership project (3GPP)’s specifications as nothing more than a baseline for the 5G market; and 62% of all respondents asserted that some, or most, 5G use cases will require additional security features. In addition, providing a value proposition that extends beyond connectivity – as 61% of respondents consider unlikely business growth in ARPU if they confine themselves mainly or entirely to the connectivity layer of the 5G value chain – and adequately addresses the increased security requirements of 5G and the use cases it will deliver, was regarded as either critical, or very important by almost 90% of respondents. Rajesh Maurya, Regional Vice President, India & SAARC at Fortinet said, “From an infrastructure perspective, the migration of today’s mobile networks to 5G – especially standalone (SA) implementations – creates new security imperatives that extend well beyond inherent 5G capabilities as defined by 3GPP. The virtualized, distributed and dynamic nature of the 5G core combined with massive increases in scalability, the growing utilization of multi-access edge computing (MEC), and overall critical use cases, requires strong security for the underlying infrastructure and the business use cases. This is where Fortinet’s proven success at delivering 4G and 5G carrier-grade user and control planes visibility and protection, scalability and price-performance demonstrates a clear advantage to those looking to capitalize on these new 5G opportunities.” From Fortinet’s standpoint, the advent of 5G and the expansion of the cyber threat landscape will impel mobile networks and enterprises to adopt a holistic security approach to cope with this evolving environment. Methodology The TelecomTV survey for Fortinet asked telecom sector respondents around the world for their perspective on the evolution of the 5G market in enterprise services as well as the security requirements and security business models needed to support those enterprise services. Among the respondents, more than one third comes from the network operator/ service provider community, including major global tier one mobile network operators and a further quarter from the hardware/software systems vendor sector.
Micro Focus Announces Industry-First CISO Resource to Accelerate Enterprise Resilience During Unprecedented Global Challenges
Micro Focus recently launched CyberResilient.com, a new digital resource designed to support CISOs and board members as they navigate the shifting demands of the digital economy, and attempt to continue to drive business growth during times of uncertainty. In the face of unprecedented global challenges and the rise of cybercrime, organizations are seizing the opportunity to transform into a resilient enterprise designed to have the agility, structure, and growth-centric focus to not only weather adverse conditions but also drive sustained business performance. Knowing how to successfully adapt to an evolving business and threat landscape can be a challenge and as such, CyberResilient. com provides leaders with a trusted resource to help them build their roadmap to cyber resilience, and ultimately business resilience. Like any journey, understanding where a person is, and where he wants to be allows him to understand the steps to take to deliver on his end goal and the gaps to fill as he moves forward. CyberResilient.com provides the ‘360º cyber resilience assessment tool’ as a means by which CISOs and cybersecurity leaders can holistically assess their current status and identify strategy gaps so that they can take the necessary actions to protect their business, detect the changing risk surface, and evolve their competencies in line with changing threats. Each of the core pillars of cyber resilience (protect, detect and evolve) is covered as part of the assessment and are considered critical elements in enabling teams to continually and intelligently deliver an intended outcome in the face of a potential threat a reality. “Internal and external adversity are always the forces that impact business continuity and performance, and those organizations that have the frameworks in place to assess, pivot and adapt will be in a better position to successfully navigate those challenges,” said John Delk, Senior Vice President and General Manager, Security, Micro Focus, “The launch of this trusted new resource and ‘360º assessment tool’ provides security leaders and senior stakeholders with knowledge and means to not only better understand financial, operational, and information risk, but how to evaluate and elevate their posture in a manner that ultimately drives business growth, profitability and sustained organizational modernization.” Underpinning the core pillars of cyber resilience is the ability of the organization to strategize, communicate, plan, implement and integrate technologies designed to allow an organization to ‘pivot at scale,’ secure the business value chain and enable resilient operational excellence and digital transformation. To do this, it is critical that organizations use a business outcome centric approach leveraging artificial intelligence (AI), machine learning (ML) and automation to streamline and reduce the cost of becoming more resilient. The proper implementation of AI and ML technologies at each stage of protect, detect and evolve is a foundational element and is essential for a resilient organization to follow guidelines to maximize effectiveness in their deployment. Visitors to CyberResilient.com can expect to discover resources and strategic knowledge to better equip their businesses for the new security landscape. Micro Focus delivers enterprise software to empower our 40,000 customers worldwide to digitally transform. With a broad portfolio, underpinned by a robust analytics ecosystem, the company enables customers to address the four core pillars of digital transformation: Enterprise DevOps, Hybrid IT Management, Predictive Analytics and Security, Risk & Governance. By design, these tools bridge the gap between existing and emerging technologies so customers can run and transform at the same time.
SIS Group Migrates to IceWarp for its E2E Encrypted Email Communication Solution
Security management is a challenging task of protecting sensitive information. The SIS Group, renowned for its security services both in India and Australia with diverse solutions across the security spectrum has tied up with IceWarp for its email collaboration solution. With more than 2,40,000 employees, and a huge database of customers; its backend processes and operations are both complex and huge. For a security services management company like SIS Group, it becomes a challenge to protect its sensitive information for its operations. The association with IceWarp would aid the organization to function more efficiently and effectively without security concerns. Today, data is the most vital aspect of any business, loss of a fraction of data can jeopardize day-to-day business operations. It is extremely important to ensure that all data is secured during software migration, or can be restored whenever necessary. Prior to its collaboration with IceWarp, SIS was facing major spamming issues, phishing attacks, cyber-security threats with no administrative centralized control over incoming and outgoing mails. Attempting to manage outgoing traffic of such a large magnitude from the organization’s single server was a major problem. In addition to frequent crashes, the system lacked any kind of resilience. It represented a single point of failure and was extremely difficult to pinpoint problems, and monitor delivery performance. Thus, IceWarp backed by Cisco came with an email security solution that was most trusted and highly recommended. It revamped the operations and created a fool-proof technology for an error-free and secured management of the system. With IceWarp 99.9% of transactional emails to team members and guests are now being delivered securely without any risk of breaches, ensuring the delivery of important and sensitive information reliably. Furthermore, the management information dashboard provides on-going performance monitoring and eliminating the single point of failure. IceWarp has offered the strategy and solution that is effective and acts as a barrier against phishing, business email compromise, and ransomware. It offers threat intelligence while providing updates every three to five minutes through the most up-to-date protection. Speaking on the deployment, Pramod Sharda – CEO, IceWarp India & Middle East quoted, “We are delighted to expand our engagement with SIS. The cumulative growth of our clientele acts as a constant reminder of us moving closer to our vision. A secure solution for every communication process is the need of the hour. We at IceWarp offer our customers ease of use, security, and efficiency through our complete solution for all their office works in a single window, without the requirement of a third-party application.” With IceWarp, SIS gets an undeterred protection against stealthy malware in attachments and industry-leading URL intelligence that helps combat malicious links. Moreover, email security enhances Office 365 email security. It has robust data loss prevention and content-encryption capabilities to safeguard sensitive information which has helped SIS to comply with government and industry regulations. “Today when data hacks are increasing by every passing day, one needs to be more careful while migrating to new collaborative software. Similarly, we had been searching for an efficient email collaboration solution for our company which is easy to use as well as secure. Our search ended with IceWarp, the company’s solutions are completely safe and provide seamless collaboration in real time. With IceWarp, our team and processes would continuously be in an optimal condition, ensuring greater productivity at a faster pace,” stated Hemant Singh, Manager IT, SIS India Ltd.
iValue and EfficientIP Team Up to Stimulate Business Continuity
iValue InfoSolutions, India’s premium technology enabler, recently announced their relationship with EfficientIP, a network automation and security company, to promote business continuity in India by making organizations’ IP infrastructure foundations more reliable, agile and secure. EfficientIP’s mission is to enable secure and dynamic IP communication between users, applications and services for more than a decade. iValue has been aiding organizations in their business continuity plan by helping them with automation and network security solutions. With more than 145 professionals around the world, EfficientIP serves over 1,000 clients in all verticals, from telecommunication companies and internet service providers to the retail, finance, government and higher education sectors. Their solutions help simplify lifecycle management of DDI resources via smart automation, cross-platform visibility and policy control from a single pane of glass. Patented technology secures DNS services to safeguard data and ensure intelligent application traffic routing to improve user experience and service continuity. EfficientIP helps organizations enable key IT initiatives such as cloud applications, virtualization, mobility, and SDN. They recently announced a growth of +38% in billings for the first half of 2020. “Today’s Digital enterprises have inducted technologies like Virtualization, IOT, Cloud, BYOD and Mobility in their IT estates, enabling them to serve their customers better and build competitive advantage. The evolved IP networks are far more complex, and way beyond the operational capability of traditional fragmented and manual solutions. iValue brings yet again a much needed and compelling partnership with EfficientIP, a leader in the DDI (DNS, DHCP and IP Address Management) space, to enable secured, simplified, automated, agile, and integrated management of core IP infrastructure to ensure business continuity,” said Harsh Marwah, Chief Growth Officer at iValue InfoSolutions. iValue has always aimed at optimizing, protecting and transforming digital assets of organizations. To bring in modernization, iValue helps organizations craft and develop infrastructure solutions spanning the entire gamut of enterprise IT infrastructure needs. With iValue’s help, many organizations have re-imaged their IT infrastructure smartly, efficiently and effectively. They help in managing, monitoring and analysing performance in data recovery and business continuity management. Now more than ever, organizations need assistance and guidance in getting upgraded securely for the operations to continue. Nick Itta, VP Sales APAC at EfficientIP added, “DDI is the core network foundation for digital transformation. It is great to see that it is becoming top of mind, especially in these challenging times, for optimizing costs, increasing network operational efficiency and accelerating deployment of new apps and services. We are looking forward to expanding our reach in India with iValue and creating new opportunities to help companies improve control and security of their networks.” Nagendra Bhaskar, Business Manager at iValue InfoSolutions added, “Continuing its effort to bring the best of breed solutions for customers and partners iValue’ s partnership with EfficientIP brings forth an integrated solution for DDI, enabling network administrators to get visibility and control of their network from a single pane of glass.” EfficientIP’s products include DNS, DHCP & IPAM, DNS security and application traffic management with the world’s first edge DNS GSLB. Open APIs offer easy integration to ecosystem players for enabling end-to-end network and security management. Organizations deploying EfficientIP DDI can save up to 80% of their time by being able to automate maintenance tasks, and gain better visibility of IP resources across the network while improving network security.
Array Networks is Recognized as the Top Three ADC Players in India, Reports IDC
Array Networks has recently secured third position in the application delivery controller (ADC) market as per IDC Ethernet Switch Tracker for Q2 2020. The Covid-19 pandemic disrupted the world sending markets into an unforeseen turbulence when compared to the situation during Q1 2020. Despite these factors Array Networks has emerged as one of the leaders in the Indian ADC Market with its market share at 17.7%. “Array Networks has constantly maintained its position in the top three slots of the Indian ADC Market. The second quarter saw a huge change in dynamics where application delivery controller (ADC) took a back seat and focus was mainly placed on the security solutions and products to help organizations with remote working conditions. Despite this radical shift in the ADC market Array Networks has turned the disadvantage into an advantage and pushed in achieving the third position. This ranking by IDC is reinforcing the trust our customers have on our ADC products which are secure, scalable, agile, flexible and high performing,” said Shibu Paul, Vice President – International Sales at Array Networks. Array Networks has constantly maintained its position in the top three slots of the Indian ADC Market. The second quarter saw a huge change in dynamics where application delivery controller (ADC) took a back seat and focus was mainly placed on the security solutions and products to help organizations with remote working conditions. Despite this radical shift in the ADC market Array Networks has turned the disadvantage into an advantage and pushed in achieving the third position. This ranking by IDC is reinforcing the trust our customers have on our ADC products which are secure, scalable, agile, flexible and high performing Array’s ADC network infrastructure is not only affordable, but the consolidation of load balancing and server offloading capabilities make them more cost-effective and efficient. Array’s APV series solutions are enterprise-class application delivery controllers with the proven abil ity to load balance, accelerate, secure and optimize enterprise applications and servers. The APV series is available as physical/ dedicated appliances and as virtual APV appliances. Array’s ADCs are designed to meet or exceed technical requirements while remaining simple to manage, scalable to accommodate future growth, and cost effective for almost any business or other organization. APV series application delivery controllers can provide link load balancing, which helps ensure availability across multiple WAN connections. This year, Array had broached the subject of the ‘Make In India’ initiative where they would be producing networking and security products in their product manufacturing unit set up in Bengaluru. The company successfully maintained its dominance in BFSI, PSU and Government sectors. With the customers ranging from universities to the biggest manufacturing powerhouses to telcos to the largest bank, the company’s India unit is presently one of the fastest-growing units.