"We ensure all your data, software and servers are protected"
In a chat with VARINDIA, Purshottam Purswani, Chief Technology Officer (CTO) – Atos India discusses about the product portfolio, cyber security protocols, channel structure, and acquisition -
What is the product portfolio of Atos in India like?
From a cyber-security perspective, we have a wide portfolio. For example, the IoT devices for which we ensure that whether your data is at rest or on move, it is secure. For that, we have two modes – one is the software mode and the other is security for channel movements which is taken care of through the hardware security module (which is called the SSN). The hardware security module is installed in the IoT devices so that whether your data is at rest or it is in traffic, it is protected. Once the data moves to the cloud, we have our own security modules. From a data center perspective, we are presently operating 14 SOCs – Security Operation Centers which operate 24*7 worldwide providing cyber-security service for national and global clients across all the sectors. We ensure that all your data, software and servers are protected. When it comes to networks, we ensure that we have security modules that provide you with protection. On the data center side, we have controls in place for security, for servers and for end user devices we have agents installed that will prevent intrusion by malware.
Today, Big Data analytics is everywhere and we use SIEM – Security Incident Event Management. When the data flows to the data centre or to the cloud, the SIEM runs the algorithm that prevents malware infiltration. If it is not a critical operation, we operate on the normal servers. If the data bank is huge or involves a considerable amount of compliance, then we ensure that data which is transferred onto the server or stored in the cloud is protected all the time.
For end user customers and for employees, we have a solution called ‘mobile home’ and ‘mobile inscription’ services. For example, for end customers we have customized Andriod phones. We ensure protection of your data and data flow. We also look at user and user activity ensuring that the data which the user shares is not leaked, and that the user device is protected from all kinds of malicious activities. We have an Identity and Access Management solution. This solution safeguards the identity information and it has an automation which determines which user is authorized to access which kind of systems, which kind of applications and what kind of data within the system.
The third thing that comes into the picture is applications. Whether on the IoT, the smartphones or the laptops, applications play with a huge amount of data. When the application is storing the critical data, we have a solution that categorizes data into zones that can be accessed by employees or external partners or that can be allowed to be viewed by the public. These zones we refer to as ARZ (Application Resource Zones). The fourth area is the IT infrastructure where the focus is on the security logs which capture data coming from workstations, from laptops, from smartphones, from WIFI’s, or access control which is a physical access control. These all pass through the SIEM which ensures that the cyber-security protocols prescribed by the National Cyber-Security Centre has prescribed. This in a nutshell is what we do from a cyber-security perspective.
What is your cyber-security strategy?
We have a 360-degree view of cyber-security. For example, we have a Red Team – a term borrowed from the military. The organization is subjected to a real-life attack and tests its ability to survive a serious compromise to its cyber agents. For each customer we do an assessment in terms of what is their reach, the end devices, the direction of the data flow, whether the enterprise is using a public cloud provider, etc. That is where SIEM comes into the picture because it studies the data logs. The SIEM is a tool that collates and analyses the logs data coming from a multitude of sources to manage the security thrust.
How do you integrate cyber-security offerings for a particular vertical?
When it comes to verticals, Atos provides the cyber-security services for the Olympic Games which is a key focus area. We have associated with the Olympic Games for many years and the contract has again been extended for multiple years. Atos manages the IT for the Olympics and by default, security comes into the picture. One can imagine the number of malicious attacks that would be launched and the kind of damage that would be inflicted by a successful malware attack.
From a vertical perspective we deal with the public sector including the military and government departments. And at Atos we also have BDS – Bit, Data and Security where we are working with a lot of manufacturing companies. Typically, manufacturing companies are full of patents and designs that should not be leaked. That is a market with which we are increasingly engaged. For this market we have our HPC (High Performance Computers) deployed. We take care that critical data such as Product Life Management software (where designs are stored), etc, are not leaked. And, we are also involved in Managed Services. It is about managing your end devices such as your servers, your laptops, your desktops, your smartphones, etc.
What is your Channel structure?
We are into government departments, BFSI, manufacturing and telecom. Atos offers services like systems integration and managed services. We reach customers through our systems integrators and managed services divisions. We also have a Big Data and Security Division which has its own server. For operations on the high-end servers we work with our partners and we define the roles and responsibilities in terms of who does what.
Could you brief about your recent acquisition of Syntel?
Syntel is predominantly a systems integration company where cyber security is one of the portfolios. The portfolio has become richer and the reach of Atos has expanded and can offer more services to our customers.
In global terms how big a company is Atos?
Before Syntel we were around 95,000 people worldwide. With the Syntel acquisition, we are more than 100,000 people now. The business profile of the company is typically Artificial Intelligence (AI), cyber-security, conversion, data center application and transformation, enterprise servers, HPC, quantum computer, systems integration and managed services. In India we are engaged in a lot of system integration projects for IOC and HPCL, managed services for automotive companies like Bajaj, and BDS services for a PSU (a defence department). Atos business in India is Fmore than USD 100 million.
See What’s Next in Tech With the Fast Forward Newsletter
Tweets From @varindiamag
Nothing to see here - yet
When they Tweet, their Tweets will show up here.