• CERTIFICATE
    • Eminent VARs of India
    • Best OEM 2023
  • SYNDICATION
    • AMD
    • DELL TECHNOLOGIES
    • HITACHI
    • LOGMEIN
    • MICROSOFT
    • RIVERBED
    • STORAGECRAFT
    • THALES
  • EVENTS
  • GO DIGITAL
  • INFOGRAPHICS
  • PRESS
    • Press Release PR News Wire
    • Press Release Business Wire
    • GlobeNewsWire
  • SPECIAL
    • WHITE PAPER
    • TECHNOMANIA
    • SME
    • SMART CITY
    • SERVICES
    • EDITOR SPEAK
    • CSR INITIATIVES
    • CHANNEL GURU
    • CHANNEL CHIEF
    • CASE STUDY
  • TECHTREND
    • VAR PANCHAYAT
    • TELECOM
    • SOFTWARE
    • POWER
    • PERIPHERALS
    • NETWORKING
    • LTE
    • CHANNEL BUZZ
    • ASK AN EXPERT
  • SUBSCRIBE
  • Apps
  • Gaming
  • KDS
  • Security
  • Telecom
  • WFH
  • Subscriber to Newsletter
  • April Issue
  • Blogs
  • Vlogs
  • Faceoff AI
    

HOME
NEWS

"We ensure all your data, software and servers are protected"


By VARINDIA - 2018-10-22
"We ensure all your data, software and servers are protected"

In a chat with VARINDIA, Purshottam Purswani, Chief Technology Officer (CTO) – Atos India discusses about the product portfolio, cyber security protocols, channel structure, and acquisition -  

 

 

What is the product portfolio of Atos in India like?


From a cyber-security perspective, we have a wide portfolio. For example, the IoT devices for which we ensure that whether your data is at rest or on move, it is secure. For that, we have two modes – one is the software mode and the other is security for channel movements which is taken care of through the hardware security module (which is called the SSN). The hardware security module is installed in the IoT devices so that whether your data is at rest or it is in traffic, it is protected. Once the data moves to the cloud, we have our own security modules. From a data center perspective, we are presently operating 14 SOCs – Security Operation Centers which operate 24*7 worldwide providing cyber-security service for national and global clients across all the sectors. We ensure that all your data, software and servers are protected. When it comes to networks, we ensure that we have security modules that provide you with protection. On the data center side, we have controls in place for security, for servers and for end user devices we have agents installed that will prevent intrusion by malware. 


Today, Big Data analytics is everywhere and we use SIEM – Security Incident Event Management. When the data flows to the data centre or to the cloud, the SIEM runs the algorithm that prevents malware infiltration. If it is not a critical operation, we operate on the normal servers. If the data bank is huge or involves a considerable amount of compliance, then we ensure that data which is transferred onto the server or stored in the cloud is protected all the time. 


For end user customers and for employees, we have a solution called ‘mobile home’ and ‘mobile inscription’ services. For example, for end customers we have customized Andriod phones. We ensure protection of your data and data flow. We also look at user and user activity ensuring that the data which the user shares is not leaked, and that the user device is protected from all kinds of malicious activities. We have an Identity and Access Management solution. This solution safeguards the identity information and it has an automation which determines which user is authorized to access which kind of systems, which kind of applications and what kind of data within the system. 


The third thing that comes into the picture is applications. Whether on the IoT, the smartphones or the laptops, applications play with a huge amount of data. When the application is storing the critical data, we have a solution that categorizes data into zones that can be accessed by employees or external partners or that can be allowed to be viewed by the public. These zones we refer to as ARZ (Application Resource Zones). The fourth area is the IT infrastructure where the focus is on the security logs which capture data coming from workstations, from laptops, from smartphones, from WIFI’s, or access control which is a physical access control. These all pass through the SIEM which ensures that the cyber-security protocols prescribed by the National Cyber-Security Centre has prescribed. This in a nutshell is what we do from a cyber-security perspective.


What is your cyber-security strategy?


We have a 360-degree view of cyber-security. For example, we have a Red Team – a term borrowed from the military. The organization is subjected to a real-life attack and tests its ability to survive a serious compromise to its cyber agents. For each customer we do an assessment in terms of what is their reach, the end devices, the direction of the data flow, whether the enterprise is using a public cloud provider, etc. That is where SIEM comes into the picture because it studies the data logs. The SIEM is a tool that collates and analyses the logs data coming from a multitude of sources to manage the security thrust. 


How do you integrate cyber-security offerings for a particular vertical?


When it comes to verticals, Atos provides the cyber-security services for the Olympic Games which is a key focus area. We have associated with the Olympic Games for many years and the contract has again been extended for multiple years. Atos manages the IT for the Olympics and by default, security comes into the picture. One can imagine the number of malicious attacks that would be launched and the kind of damage that would be inflicted by a successful malware attack. 


From a vertical perspective we deal with the public sector including the military and government departments.  And at Atos we also have BDS – Bit, Data and Security where we are working with a lot of manufacturing companies. Typically, manufacturing companies are full of patents and designs that should not be leaked. That is a market with which we are increasingly engaged. For this market we have our HPC (High Performance Computers) deployed. We take care that critical data such as Product Life Management software (where designs are stored), etc, are not leaked. And, we are also involved in Managed Services. It is about managing your end devices such as your servers, your laptops, your desktops, your smartphones, etc. 


What is your Channel structure?


We are into government departments, BFSI, manufacturing and telecom. Atos offers services like systems integration and managed services. We reach customers through our systems integrators and managed services divisions. We also have a Big Data and Security Division which has its own server. For operations on the high-end servers we work with our partners and we define the roles and responsibilities in terms of who does what.


Could you brief about your recent acquisition of Syntel?


Syntel is predominantly a systems integration company where cyber security is one of the portfolios.  The portfolio has become richer and the reach of Atos has expanded and can offer more services to our customers.


In global terms how big a company is Atos?


Before Syntel we were around 95,000 people worldwide. With the Syntel acquisition, we are more than 100,000 people now. The business profile of the company is typically Artificial Intelligence (AI), cyber-security, conversion, data center application and transformation, enterprise servers, HPC, quantum computer, systems integration and managed services. In India we are engaged in a lot of system integration projects for IOC and HPCL, managed services for automotive companies like Bajaj, and BDS services for a PSU (a defence department). Atos business in India is Fmore than USD 100 million.

See What’s Next in Tech With the Fast Forward Newsletter

SECURITY
View All
Zscaler announces AI innovations to its Data Protection Platform
Technology

Zscaler announces AI innovations to its Data Protection Platform

by VARINDIA 2024-05-20
SHIELD to enhance Swiggy’s fraud prevention and detection capabilities
Technology

SHIELD to enhance Swiggy’s fraud prevention and detection capabilities

by VARINDIA 2024-05-20
Axis Communications announces its first thermometric camera designed for Zone/Division 2
Technology

Axis Communications announces its first thermometric camera designed for Zone/Division 2

by VARINDIA 2024-05-20
SOFTWARE
View All
Hitachi Vantara and Veeam announce Global Strategic Alliance
Technology

Hitachi Vantara and Veeam announce Global Strategic Alliance

by VARINDIA 2024-05-16
Adobe launches Acrobat AI Assistant for the Enterprise
Technology

Adobe launches Acrobat AI Assistant for the Enterprise

by VARINDIA 2024-05-11
Oracle Database 23ai offers the power of AI to Enterprise Data and Applications
Technology

Oracle Database 23ai offers the power of AI to Enterprise Data and Applications

by VARINDIA 2024-05-10
START - UP
View All
Data Subject Access Request is an integrated module within ID-REDACT®
Technology

Data Subject Access Request is an integrated module within ID-REDACT®

by VARINDIA 2024-04-30
SiMa.ai Secures $70M Funds from Maverick Capital
Technology

SiMa.ai Secures $70M Funds from Maverick Capital

by VARINDIA 2024-04-05
Sarvam AI collaborates with Microsoft to bring its Indic voice LLM to Azure
Technology

Sarvam AI collaborates with Microsoft to bring its Indic voice LLM to Azure

by VARINDIA 2024-02-08

Tweets From @varindiamag

Nothing to see here - yet

When they Tweet, their Tweets will show up here.

CIO - SPEAK
Automation has the potential to greatly improve efficiency and production

Automation has the potential to greatly improve efficiency and production

by VARINDIA
Various approaches are followed to enhance efficiency, productivity, and cost-effectiveness

Various approaches are followed to enhance efficiency, productivity, and cost-effectiveness

by VARINDIA
Technology can be leveraged in several ways to boost efficiency, productivity and reduce cost

Technology can be leveraged in several ways to boost efficiency, productivity and reduce cost

by VARINDIA
Start-Up and Unicorn Ecosystem
GoDaddy harnesses AI power for new domain name recommendations

GoDaddy harnesses AI power for new domain name recommendations

by VARINDIA
UAE’s du Telecom selects STL as a strategic fibre partner

UAE’s du Telecom selects STL as a strategic fibre partner

by VARINDIA
JLR and Dassault Systèmes extend partnership for All Vehicle Programs worldwide

JLR and Dassault Systèmes extend partnership for All Vehicle Programs worldwide

by VARINDIA
Rapyder partners with AWS to accelerate Generative AI led innovation

Rapyder partners with AWS to accelerate Generative AI led innovation

by VARINDIA
ManageEngine integrates its SIEM solution with Constella Intelligence

ManageEngine integrates its SIEM solution with Constella Intelligence

by VARINDIA
Elastic replaces traditional SIEM game with AI-driven security analytics

Elastic replaces traditional SIEM game with AI-driven security analytics

by VARINDIA
Infosys and ServiceNow to transform customer experiences with generative AI-powered solutions

Infosys and ServiceNow to transform customer experiences with generative AI-powered solutions

by VARINDIA
Crayon Software Experts India inaugurates its ISV Incubation Center in Kolkata

Crayon Software Experts India inaugurates its ISV Incubation Center in Kolkata

by VARINDIA
Dassault Systèmes to accelerate EV charging infrastructure development in India

Dassault Systèmes to accelerate EV charging infrastructure development in India

by VARINDIA
Tech Mahindra and Atento to deliver GenAI powered business transformation services

Tech Mahindra and Atento to deliver GenAI powered business transformation services

by VARINDIA
×

Reproduction in whole or in part in any form or medium without express written permission of Kalinga Digital Media Pvt. Ltd. is prohibited.

  • Distributors & VADs
  • Industry Associations
  • Telco's in India
  • Indian Global Leaders
  • Edit Calendar
  • About Us
  • Advertise Us
  • Contact Us
  • Disclaimer
  • Privacy Statement
  • Sitemap

Copyright varindia.com @1999-2024 - All rights reserved.