The IT industry has suffered losses due to the change in format of cyber problems
Amit Mahajan, VP Technical, VIBS INFOSOL
Important factors for cyber security readiness
Most of the organizations still in puzzled mode on Cybersecurity readiness, either they spend on wrong products or they keep on thinking which way to choose. According to the NIST Cybersecurity framework, an organization must have five functions: Identify, Protect, Detect, Respond, and Recover, to be eligible for Cybersecurity readiness. To intricate, identify the available assets in the network, the vulnerabilities, protect those assets and remediate the vulnerabilities using tools or devices like Firewalls, patch management solutions etc.
Similarly, detection of known-unknown threats, may be zero day attacks, using behavioural analysis and respond effectively by recovering the data or stopping the malware to act further. Many solutions are present in the market now.
Problems faced by the CIOs/CISOs
We all know the kind of problems we faced in Covid Times, most of us suffered with some or kind of losses. Similarly the IT industry has suffered losses due to the change in format of cyber problems. Few points which were the worry factor in those days, in fact they are still challenges for some organizations, like Inability to monitor user in WFH/flexible work hours, Increased number of phishing attacks, More number of Ransomware attacks on end user systems, Absence of solutions with Threat Intelligence and Analytical capabilities, Lack of Internet bandwidth for individuals and many other. Initially it took time for the organizations to reach the right product, hence we helped them to conclude.
Commonly adopted technologies
It was really a challenge for customers to choose the product with a restricted budget. Solutions like Data Leak Prevention, Behaviour based detection, Bandwidth hungry Patch Management Solution, Proxy in Hybrid environment, Limiting access to corporate data for Work from Home users were in demand.
Some of the organizations also went for a Data Encryption solution to prevent data theft. Many organizations adopted the new solutions to address their concerns.
To face the challenges
Initially in post-covid days it was a difficult time for us also. Changing focus of Customers towards end user products, remote infrastructure management solutions, behaviour based detection tools, forced us to keep the on-premise solutions in briefcase. And then we started working on those solutions.
Right now, we are well equipped with the list of technologies to address their concerns and also continuously spending on the technical team training with required level of hands-on. Vendor certifications are also a part of the training progra
Zoom expands Zoom IQ with a host of new capabilities
Zoom Video Communications has announced the expansion of Zoom IQ, a smart companion that e...
Tata Communications brings integrated, simplified cloud-based calling solution JAMVEE
Tata Communications brings JAMVEE, a cloud-based application with an integrated...
Zendesk inks Strategic Collaboration with AWS
Zendesk has announced a five-year strategic collaboration agreement (SCA) with Amazon Web...
Cisco aiming to build a trusted and resilient future for the nation
Daisy Chittilapilly, President, Cisco India & SAARC The US-based te...
Providing multilingual internet crucial to bridge digital divide in India: MeitY Addl Secy
Calling India the right place for Universal Acceptance Day celebrations, Bhuvnesh Kumar, I...
The new wave of start-ups in the country is a testimony to the entrepreneurial temperament of the youth
PHDCCI conducted “Bharat Startup Summit, 2023” The conclave through discussion...
Team Computers hosts an Experiential CXO Meet with Google Cloud in Goa
Team Computers has held an experiential event in collaboration with Google Cloud, bringing...