The IT industry has suffered losses due to the change in format of cyber problems
Amit Mahajan, VP Technical, VIBS INFOSOL
Important factors for cyber security readiness
Most of the organizations still in puzzled mode on Cybersecurity readiness, either they spend on wrong products or they keep on thinking which way to choose. According to the NIST Cybersecurity framework, an organization must have five functions: Identify, Protect, Detect, Respond, and Recover, to be eligible for Cybersecurity readiness. To intricate, identify the available assets in the network, the vulnerabilities, protect those assets and remediate the vulnerabilities using tools or devices like Firewalls, patch management solutions etc.
Similarly, detection of known-unknown threats, may be zero day attacks, using behavioural analysis and respond effectively by recovering the data or stopping the malware to act further. Many solutions are present in the market now.
Problems faced by the CIOs/CISOs
We all know the kind of problems we faced in Covid Times, most of us suffered with some or kind of losses. Similarly the IT industry has suffered losses due to the change in format of cyber problems. Few points which were the worry factor in those days, in fact they are still challenges for some organizations, like Inability to monitor user in WFH/flexible work hours, Increased number of phishing attacks, More number of Ransomware attacks on end user systems, Absence of solutions with Threat Intelligence and Analytical capabilities, Lack of Internet bandwidth for individuals and many other. Initially it took time for the organizations to reach the right product, hence we helped them to conclude.
Commonly adopted technologies
It was really a challenge for customers to choose the product with a restricted budget. Solutions like Data Leak Prevention, Behaviour based detection, Bandwidth hungry Patch Management Solution, Proxy in Hybrid environment, Limiting access to corporate data for Work from Home users were in demand.
Some of the organizations also went for a Data Encryption solution to prevent data theft. Many organizations adopted the new solutions to address their concerns.
To face the challenges
Initially in post-covid days it was a difficult time for us also. Changing focus of Customers towards end user products, remote infrastructure management solutions, behaviour based detection tools, forced us to keep the on-premise solutions in briefcase. And then we started working on those solutions.
Right now, we are well equipped with the list of technologies to address their concerns and also continuously spending on the technical team training with required level of hands-on. Vendor certifications are also a part of the training progra
Aerospike boosts Community Leadership and Enterprise Support for Spring Framework
Aerospike has released expanded functionality and engineering support for the Spring Frame...
VMware announces Limitless Possibilities for Partners
VMware has announced the next evolution of the company’s flagship VMware Partner Con...
SAP’s Datasphere simplifies customers’ data landscape
SAP India announced key data innovations and partnerships that give customers access to mi...
The new wave of start-ups in the country is a testimony to the entrepreneurial temperament of the youth
PHDCCI conducted “Bharat Startup Summit, 2023” The conclave through discussion...
Team Computers hosts an Experiential CXO Meet with Google Cloud in Goa
Team Computers has held an experiential event in collaboration with Google Cloud, bringing...
BPE showcases Energy Storage Solutions at ELECRAMA
Best Power Equipments (BPE) has presented Energy Storage Solutions (ESS) at ELECRAMA. The...
Synersoft Technologies organizes a Webinar on the problems faced by SMEs
Synersoft Technologies has organized a Webinar on “Solution to problems faced by SME...