SEO Blogspot,SEO Freelancer,Website Design and development Blogspot,SEO Blogger,Digital Marketing Blogspot,SEO Bloggers Bangalore India.
alt =""
Showing posts with label security solutions. Show all posts
Showing posts with label security solutions. Show all posts

Tuesday 29 March 2016

Happiest Minds’ ThreatVigil Wins GOLD at the Infosecurity Product Guide’s Global Excellence Award 2016

Happiest Minds Technologies, a next generation digital transformation, infrastructure, security and product engineering services company, today, announced that ThreatVigil, its cloud-based threat management solution, won top honours in the Infosecurity Product Guide’s Global Excellence Awards. The solution was recognized in the ‘GOLD’ category for Vulnerability Assessment, Remediation and Management.

ThreatVigil is an on-Demand cloud-based threat management solution that comprises of vulnerability assessments and penetration testing of all the system components that include business applications, databases, secure network perimeters, systems and network infrastructure, mobility solutions and virtualized cloud environments. Developed with a combination of industry proven automated tools and in-depth manual assessment techniques, it is highly scalable and offers faster and simpler deployment options with no dependencies.

"We are honoured to be recognized as an industry leader yet again by the Info Security Products Guide Global Excellence Awards. We are seeing increasing global demand for our cloud-based security solutions and these recognitions from industry forums reinforce the impact we are making with our IP based solution accelerators. This award reinforces our commitment to provide an innovative and pragmatic approach for enterprises to help them protect themselves against the dynamic and emerging threat landscape,” said Prasenjit Saha, President, Infrastructure Management Services and Security Business, Happiest Minds Technologies.

The security industry celebrated its 12th Annual Global Excellence Awards in San Francisco by honouring excellence in every facet of the industry including products, industry leaders and best companies. There was participation from many well-recognized companies under 45 categories, and more than 50 judges from a broad spectrum of industry voices around the world analyzed these nominations. An average of their score determined the finalists and winners that were announced during the awards dinner and presentation attended by the finalists, judges and industry peers.

About Happiest Minds Technologies:

Happiest Minds enables Digital Transformation for enterprises and technology providers by delivering seamless customer experience, business efficiency and actionable insights through an integrated set of disruptive technologies: big data analytics, internet of things, mobility, cloud, security, unified communications, etc. Happiest Minds offers domain centric solutions applying skills, IPs and functional expertise in IT Services, Product Engineering, Infrastructure Management and Security. These services have applicability across industry sectors such as retail, consumer packaged goods, e-commerce, banking, insurance, hi-tech, engineering R&D, manufacturing, automotive and travel/transportation/hospitality.

Headquartered in Bangalore, India, Happiest Minds has operations in the US, UK, Singapore, Australia and has secured US $52.5 million Series-A funding. Its investors are JPMorgan Private Equity Group, Intel Capital and Ashok Soota.

About Info Security Products Guide:

Info Security Products Guide plays a vital role in keeping end-users informed of the choices they can make when it comes to protecting their digital resources. It is written expressly for those who are adamant on staying informed of security threats and the preventive measure they can take. You will discover a wealth of information in this guide including tomorrow's technology today, best deployment scenarios, people and technologies shaping info security and market research reports that facilitate in making the most pertinent security decisions. The Info Security Products Guide Global Excellence Awards recognize and honour excellence in all areas of information security. To learn more, visit www.infosecurityproductsguide.com and stay secured.

Media Contact:

Tuesday 3 November 2015

Key Security Tactics to Help Protect Your Business from a TalkTalk hack

Isaac George, SVP & regional head of digital transformation company Happiest Minds UK, discusses the increased number of security threats UK organisations are exposed to following the TalkTalk hack.
Cyber crimes are not only occurring with mounting frequency in today’s wireless world, but they are also becoming increasingly sophisticated and widespread.
Just this month, major UK telecommunications, internet access and mobile network services company TalkTalk was the latest in a long line of brands to face media scrutiny after its website was breached by a significant and sustained cyber-attack.
The company said it was “too early to say” how many of its customers had been affected by the attack but credit card, bank account details, names, addresses, dates of birth, email addresses and telephone numbers could all have been accessed.
With a criminal investigation now underway, it is not yet known what the nature of the attack was, although early insight suggests that it may have been a distributed denial of service (DDoS) attack, where a website is hit by waves of traffic so intense that it cannot cope.
However, a second school of thought believes that the DDoS attack may have been a smokescreen to distract the organisation’s defence team whilst the cyber criminals set in practice their real objective of stealing data.
Should the second school of thought be accurate, this may even have been an Advanced Persistent Threat (APT).
What sets Advanced Persistent Threats (APTs) apart is the nature and scope of the attack as they stealthily exploit vulnerabilities over a period of time.
Gartner puts it simply:
‘Advanced’ means it gets through your existing defences.
‘Persistent’ means it succeeds in hiding from your existing level of detection.
‘Threat’ means it causes you harm.
Once inside the network, APTs move around surreptitiously, seeking out sensitive data rather than disrupting systems and raising red flags.
These attacks are well coordinated and have very specific objectives that target key users within the organisation to gain access to high-value information – be it top-secret military or government documents, trade secrets, blueprints, intellectual properties, source codes and other confidential information.
Security, Mobile network services company, disrupting systems, cyber security systems, cloud services.

The worst part is that no organisation, irrespective of size or type, is immune to these attacks.
What is clear, whether it turns out to be DDoS, APT or another means of cyber-attack, the bottom line is that many of today’s businesses are relying on basic security defences like firewalls, anti-viruses and spyware that are dealing with APTs, and other means of attack, conceived years ago.
Which means it is only a matter of time before our traditional cyber security systems will be faced with the next generation of attacks and it is unlikely that they will succeed.
It is now imperative to develop a layered security approach that will amp up the security arsenal with a 360 degree visibility into all corners of the network.
Forewarned is forearmed – Key elements to APT defence
Unfortunately, there is no magic wand to combat APTs. The stealthy and random nature of APTs makes it a daunting task to predict attacks. Daunting, but not impossible.
The time has come for organisations to move beyond a perimeter-based ideology to a more comprehensive and multi-layer security approach that ensures continual protection even in the case of a breach. The critical elements to a successful APT defence lies in an intelligent combination of defence, analytics and a proactive incident response plan.
1. Know what to protect


The first step in any APT defence strategy is knowing what assets to protect. Once this data is sorted and classified, it provides a bird’s eye-view of pieces of your infrastructure across storage, security and accessibility across devices and endpoints.
2. Assess your security loopholes


The next step is to identify and categorise the most-at-risk information systems and high liability assets that link back to critical data. Assessing these systems enable us to prioritise protection and remedial plans against potential vulnerabilities. It is especially important that risk assessment is an on-going process to keep abreast with the ever-evolving threat landscape.
3. Shore up monitoring and detecting capabilities


Comprehensive monitoring off all inbound, outbound and internal traffic network is imperative to contain the scope and impact of a potential attack. Additionally, advance detection and real-time analytic tools in conjunction with traditional security solutions enable organisations to identify malicious activities as and when they occur.
A truly effective solution lies in the ability to differentiate normal and anomalous traffic patterns or activities generated by any IP-based device that connects to the network. By applying threat intelligence through analytics, these real-time insights allow for immediate isolation and remediation to stop the attack in the early stages.
4. An informed user is a safe user


The fact that APTs are often employed in the form of phishing emails, employees are the most susceptible targets. It does not take much to trigger a malicious code through an enticing link or attached file.
Security education and training makes employees aware of the potential security pitfalls of BYOD and cloud services. It also places some level of responsibility on the employees themselves to ensure that sensitive data remains secure.
5. Put an APT incident response plan in place


It is absolutely vital for an organisation to have a carefully crafted and up-to-date incident response plan in place.
It helps guides the organisation in quick identification and response in controlling a potential breach. This is what ultimately determines the effectiveness of the organisation’s response to an attack.
Staying ahead of the APT curve


The complex nature of APTs pose huge challenges to our standard security defence systems. On the flip side, they provide a much-needed impetus to reassessing frameworks and utilising solutions that are scalable to protect the entire organisation.
This latest attack against TalkTalk’s website is a huge wakeup call to the business community at large around the perils of delaying taking positive action against cybercrime. Is it not easy to secure your business against every type of attack, but the fact remains that a multi-pronged and layered approach to security is no longer an option but a must-have.
If you need convincing, you only have to look at the huge financial and reputational losses that will ensue for TalkTalk.

Isaac George is the SVP and regional head at infrastructure, security and product engineering services company Happiest Minds UK