Marel Q1 2024 Investor Presentation from May 8, 2024
Global leading cyber security providers Market in India
1. Swift the solution, lift the business
www.swiftnlift.com
JULY 2021
Why is Cyber
Security
important in
2021?
A look at
the emerging
cyber-threats
Adaptive
Security
Vs
Passwordless
Solutions
Mangesh Amale
Founder and
Managing Director
Most Leading
Cyber Security
Providers In India
4. Swift the solution, lift the business
www.swiftnlift.com
JULY 2021
Why is Cyber
Security
important in
2021?
A look at
the emerging
cyber-threats
Adaptive
Security
Vs
Passwordless
Solutions
Mangesh Amale
Founder and
Managing Director
Most Leading
Cyber Security
Providers In India
Swiftnlift Media And Tech
SwiftNLift is the Best Business Magazine across the
globe for enterprises
5. Nilesh Sabe
Chief Editor
- Nilesh Sabe
Iwanted to be there not just because I was the editor, but also because
I had something to say, something that may, in the lovely way that
words can bring us together for a while.
Positive feedback from readers and institutions associated with our
publication has given me a lot of hope.
My team, I appreciate all of your efforts. I’m overjoyed to be able to
provide this magazine to all of you.
Some print articles also include additional material, advertisements,
and still photography. Editors’ columns with thoughtful articles are
released every month to give readers a perspective on the global
economy and market.
The cover story has featured Mangesh Amale an Entrepreneur,
Philanthropist, Speaker, the Founder and Managing Director of
Velox Solutions Pvt. Ltd. Within Cyber Security Velox has end to end
spectrum of solutions covering endpoints, databases, applications, web
servers, DLP, SIEM Solutions, SOC services, and Cloud monitoring &
Security etc. In IP Ops, Velox covers a very broad range of products
including IT Service Management.
From the Editor...
6. SUBSCRIBE
NOW
READ IT FIRST
Yes I would like to subscribe to SwiftNLift Magazine.
Subscription Charges
Cheque should be drawn in favour of : SWIFTNLIFT MEDIA AND TECH LLP
Name :
Address :
City :
State :
Zip :
Date :
Telephone :
Email :
Country :
Corporate Office
Swiftnlift Media And Tech LLP
Headquarter: PUNE INDIA- 411058
Branch Office: DUBLIN OHIO, USA
Phone - +1 6143567742
Email - support@swiftnlift.com
For Subscription - www.swiftnlift.com
1 Year . . . . . . . . . (12 Issues) . . . . $ 120
Months . . . . . . . (03 Issues) . . . . $ 30
6 Months . . . . . . (06 Issues) . . . . $ 60
1 Month . . . . . . . (01 Issues) . . . . $ 10
11. To be reliable & the most
progressive Cyber Security
solution provider, relentless in
pursuit of excellence for our
clients and employees.
To be reliable & the most
progressive Cyber Security
solution provider, relentless in
pursuit of excellence for our
clients and employees.
Most Leading
Cyber Security
Providers In India
12. This is an ingenious story about a common man
who attended a government Marathi medium
school, graduated from Pune University, and
went on to do post-graduate work in computer
technology. A small-town child who was born in
Junnar, a small village about 92 kilometers from
Pune, and grew up in a modest household; his
parents owned just 27,000 square feet of non-
irrigated land, so they worked as labourers to meet
the family’s basic needs.
He chose to work as a labourer while studying
because he was the family’s eldest son, and he
continued to work part-time while earning his
degree and the rest is history...
He earned multiple technological certificates, as
well as an MBA, Diploma in Management, Cyber
Law, and a PGDBT from the IIBF. Currently
pursuing MBA from IIT Bombay and Washington
University.
With over two decades of quality experience in the
Information Technology and Banking Sectors, he is
a pioneer in the Indian Cyber Security Industry. He
had an opportunity to work in senior management
roles in various premier organizations like Oracle,
HDFC bank, Zenith InfoTech before the inception
of Velox.
His father, Mr. Mahadeo Amale, was an inspiration
to him since, despite being an agronomist, he had a
flair for repairing diesel engines used for irrigation.
Some displaying some glittering glimpses of the
amazing interview here…
Tell us about Velox. Its vision and mission.
Vision - To be a reliable & most progressive
technology solution provider, relentless in pursuit
of client and employee excellence.
Mission - To capitalize on the efficiency of the
Information and Cyber Security Technology
Industry to serve clients. We strive constantly
to make Velox a winning competitor both today
and in the future. We embrace bold strategies that
will lead to our success in the marketplace. We
aggressively leverage our unique set of assets to
provide exceptional value for our stakeholders and
clients.
What were the constraints you faced at the time
of inception?
During the start-up phase, we faced a variety of
challenges.
The most difficult task was mobilizing resources
andstrikingabalancebetweenmyfull-timejoband
developing resources for my new project. Despite
numerous hardships, I was able to overcome many
Develops Opportunities For Enterprises
We are glad to share this interview with an amazing personality Mr.Mangesh Amale who is an
Entrepreneur, Philanthropist, Speaker, the Founder and Managing Director of Velox Solutions
Pvt. Ltd., Velox Virtual World Pvt. Ltd., Mumbai India and Velox Inc, Chicago USA, Velox
was recognized by many awards under the guidance and vision of Mangesh.
13. obstacles and maintain a good approach. Raising
cash and developing a solid business plan were big
challenges that were eventually overcome.
What services do you provide to the customers?
Why should one prefer you?
Velox offers a very comprehensive stack of products
on two main platforms -1. Cyber Security and 2. IT
Operations Management. Within Cyber Security
Velox has end to end spectrum of solutions
covering endpoints, databases, applications, web
servers, DLP, SIEM Solutions, SOC services, and
Cloud monitoring & Security etc. In IP Ops, Velox
covers a very broad range of products including
IT Service Management with Help Desk and
KnowledgeBase, IT Asset Management, Patch
Management, Manager of Manager, and many
more. Velox also has a virtual platform for video
calling MyFastMeet.
Allourproductshavenativedeepmachinelearning
and artificial intelligence capabilities built in. Our
solutions can be deployed via cloud platform as
well as on-premises deployment depending on
client choices.
Velox is an Indian MNC OSD (Original Software
Developer) offering a very comprehensive stack
of tools as mentioned above on one common
platform. Our solutions are platform-independent
viz. Operating systems or databases and our
feature loaded solutions are designed to consume
less bandwidth and enable our clients to optimise
on hardware sizing.
What personality traits, skills, and education do
you think is necessary to enhance and promote
the use of technology-driven industries?
A leader should be passionate, respect ethics, and
be adaptable and innovative. He should manage
his team in a unique style, continually focusing
on results, evaluating performances, and guiding
others to better and bring out their best traits.
Mangesh Amale
Founder and Managing Director
Our innovative and next-
generation products offer
clients a comprehensive
high-level management
console offering them
complete granular level
visibility into their entire
IT environment. Our highly
responsive 24X 7 support
team ensures that our
applications run efficiently
and uninterruptedly.
“
“
14. How do you manage the promotion of your
project through social media outreach and
email campaigns?
We have a digital marketing, social media
marketing, and content writing team on staff.
This group is always coming up with fresh
ideas and strategies to promote the Velox
brand across various social media channels.
The team also analyses and updates the
performance of our initiatives on a regular
basis, making necessary changes in succeeding
promotional efforts.
What do you think about the expansion of
Velox worldwide? What will be the plan?
Velox Inc., Chicago, USA, is already well-
known in the United States. We were invited
by the US government to present our products
at the World Cyber Security Summit. In
addition to the United States, Velox has offices
Best Visionary Entrepreneur of
the year – 2021 by FTIEA Fame
Times International Excellence
Awards
Cyber Security Icon – 2021 by
GR Foundation
Asian – African Chambers of
Commerce Award – Excellence in
Innovation & Technology – 2020
10 Most Promising Cyber
Security Solutions Provider
– 2020
20 Most Promising Cyber
Security Solutions Provider –
2019
Under his leadership, Velox has
emerged as Brand of the Year
2018
India’s Top 20 Most Promising
Business Intelligence Solution
Provider – 2017
Mangesh has many accolades
to his name, like Udhyogshree
Awards, Shiv Janbhumi Gaurav
Award, and CEO of the Year.
15. in Mexico, Dubai, South Africa, Nepal, and Sri
Lanka.
By 2025, Velox wants to have a presence in over
100 countries.
What steps do you take to handle last-minute
or unexpected setbacks before and during any
project?
It’s not uncommon to experience unexpected
situations or setbacks in today’s dynamic and
fast-changing environment. In all of our business
operations, we strive to instill a flexible and
adaptable mindset.
We aim to create multiple scenarios during the
planning stage, such as Plan A and Plan B, to
allow for any last-minute modifications.
Our deep domain knowledge and analytical
attitude enable us to devise new approaches to
dealing with such shifts.
Can you describe emerging trends you’ve noticed
in the IT sector?
■ Use of Automation, Artificial Intelligence, &
Machine Learning capabilities
■ Deployment of Big Data Analytics and Business
Intelligence Applications
■ The emerging need for Smart city projects
■
Preference of organisations for Cloud
Computing and adopting various cloud-centric
models like SaaS, Paas, Iaas.
How you are differing from your competitors?
■ Velox is an Indian MNC OSD (Original Software
Delivery) offering a very comprehensive stack
of tools covering a very wide range of enterprise
market & Cyber Security solutions
■ Our solutions are designed and delivered for
IT Infrastructure Controlling, Monitoring, and
Cyber Security, and it is a well-known name
16. in the enterprise IT Infra Monitoring & Cyber
Security industry.
■ All of our products and procedures are ISO
9001-2015, 20000, 27001, and PA-DSS certified,
and we’ve received numerous accolades and
recognition around the world.
■ Velox is recognised by GEN – A government of
India initiative.
■ All our products are reviewed and evaluated by
GARTNER. More than 300 clients are served
globally, including organisations, corporations,
and banks. Velox is a member of major
international organisations such as ATMIA,
CATMI, and the Indo-American Chamber of
Commerce and Industries.
■ We are one of the most reliable names in the
ATM & Cyber Security industry serving more
than 100 banks in India with more than 40,000
ATMs being deployed with our solution.
■ Our clientele includes some of the most reputed
industry names like NCR, Kotak Bank, Fincare
Small Finance Bank, Indian Overseas Bank,
Canara Bank, and many more.
■ We are an Indian OSD (Original Software
Delivery) with a subsidiary in Chicago in the
USA and have in Mexico, Dubai, South Africa,
Sri Lanka, and Nepal.
What are your upcoming projects?
■ New 5th & 1st floor office -300 seat capacity –
State of Art Managed Security Services (MSSP)
■ New upcoming CoE facilities in Mysuru in
partnership with Karnataka Govt& STPI
■ Purchase of office premises of 53,000 sq feet,
with 1500 seat capacity facilities in Navi Mumbai
■ Plan for IPO in next 3 year
Year of Founding: 2012
Office Locations:
Headquartered in Mumbai,
R & D Centre in Pune &
global innovation centre in
Chicago, USA
Company Strength: 165+
Website:www.Velox.co.in
18. Network Techlab
Your IT And Power
Consultant
Set up in the year 1996, Network Techlab India Private
Limited is broadly considered among the best in the
business for giving, arrangements and benefits and
are occupied with offering top of the line IT Solutions
administrations for Network Designing, Security and
Maintenance, among others. We value offering the types
of assistance most productively and furthermore for the
convenient execution and customization establishment.
What do we do?
Organization Techlab India Pvt. Ltd. is a main IT and
Power Consultant giving modified business answers for
little, medium and enormous associations for 25+ years
with solid arrangement of customers from each area.
With our solid presence in excess of 13 urban areas in
India and workplaces in Singapore and UAE we intend
to comprehend the requirements of our customers
and give them customized innovation driven business
answers for meet key targets. At Network Techlab, we
have confidence in understanding our clients and their
remarkable necessities, further furnishing them with
master arrangements and surpassing assumptions. It
has been our undertaking to keep our responsibilities
and accomplishing greatness in consumer loyalty. For
More Details Please Visit us on www.netlabindia.com
Area Expertise
With our gigantic involvement with this space, we have
had the option to effectively cook the prerequisites of
our enormous customer base. Our wide range of IT
Solutions for Network Designing, UPS frameworks,
server farm arrangements, Security and Maintenance
administrations is performed by a group of master
experts, which has huge involvement with this circle
of business. Engaged with cutting edge innovation and
offices, we have had the option to achieve our doled out
task inside specified time span. Our mastery in this area
empower us to provide food the requests of customers
occupied with SMB’s just as huge ventures.
We specialize in following services:
■ Network Security
■ Network Infrastructure
■ Data Storage / Back-up
Atul Gosar
Co-Founder And Director
18 JULY 2021 SwiftNLift
Most Leading
Cyber Security
Providers In India
19. ■ Uninterrupted Power Supply / Power
■ Precision AC
■ Data Center solutions
■ Rental
■ Annual Maintenance
■ Facility Management
■ Solar energy
Our Services
■ Fire Alarm System
NTIPL provides a full line of fire alarm, fire detection
andcontrolandfiresuppressionsolutionstokeeppeople
and valuable assets safe. From environmentally friendly
clean agent and inert gas fire suppression systems to
technologically advanced intelligent fire alarm systems,
video image and early warning detection, NTIPL has
the fire protection solution to fit your application.
■ Physical Network Audit
NTIPL boosts of highly trained, skilled and
technologically advanced auditors which can help you
in going through each and every step of the physical
Network Audit.
■ Power Quality Analysis
Poor power quality results in extra costs due to excessive
energy use, unscheduled stops, increased maintenance,
and replacement of components that have aged too
quickly. End use equipment, such as automation
systems or computers, have become more sensitive to
disturbances in the power quality that arise both on
the supplying power system and within the electrical
system.
■ Structured Cabling System
Structured cabling installations typically include:
entrance facilities; vertical and horizontal backbone
pathways; vertical and horizontal backbone cables;
horizontal pathways; horizontal cables; work area
outlets; equipment rooms; telecommunications closets;
cross-connect facilities; multi-user telecommunications
outlet assemblies (MUTOA); transition points; and
consolidation points.
■ Video Conferencing
A video conference is a live, visual connection between
two or more people residing in separate locations for
the purpose of communication. At its simplest, video
conferencing provides transmission of static images and
text between two locations. At its most sophisticated, it
provides transmission of full-motion video images and
high-quality audio between multiple locations.
■ Scanning Services
Digitizationistheprocessofconvertinginformationinto
a digital format. Scanning paper documents into digital
image format is the first step of document digitization
process. Digitizing important paper documents creates
a layer of security, and often convenience.
■ Energy Audit
Accordingtothedefinitionanenergyauditisasystematic
analysis of energy use and energy consumption within a
defined energy audit scope, in order to identify, quantify
and report on the opportunities for improved energy
performance.
■ Root Cause Analysis
The Root Cause Analysis identifies the key elements
necessary to make the meaningful changes required to
consistently deliver projects within cost and schedule
performance parameters; disciplined upfront planning;
realistic estimates of cost and schedule; and straight
forward communication between the project director
and senior management.
■ Project Consultancy Services
We at NTIPL provide a vivid range of Consultancy
services. Our technicians are well versed and certified
from various organizations and thus possess a keen,
observant and a sharp eyed view about the issues at
hand.
Website: http://www.netlabindia.com
Industry: Information Technology & Services
Company size: 501-1,000 employees
Headquarters: Mumbai, Maharashtra
Type: Privately Held
Founded: 1996
Sources and references:
http://www.netlabindia.com
19
JULY 2021 SwiftNLift
20. We live in a digital age, let’s face it.
Our professional, personal, and financial lives have
all begun to gravitate toward the internet, mobile
computers, and electronic media.
Unfortunately, as a result of these ubiquitous
phenomena, we are now more vulnerable than ever
before to harmful assaults, invasions of privacy, fraud,
and other such annoyances.
That is why cybersecurity is such an important
component of a safe and well-organized digital
environment.
Hackers, cyber crooks, and other fraudsters are kept at
bay by cybersecurity.
But how well do you know cybersecurity?
But it isn’t just large corporations and organisations that
are affected.
Phishing scams, ransomware assaults, identity theft,
data breaches, and financial losses are all common
occurrences for everyday consumers.
According to a Netscout report, hacking an internet-
connected gadget, such as your smartphone, wristwatch,
on-board automotive computer, smart television, and
home management systems, takes just five minutes.
Malware Spyware, ransomware, worms, and viruses are
examples of this type of attack.
This assault is frequently delivered via email or
downloads from questionable websites.
Why Is Cybersecurity
Important In 2021?
20 JULY 2021 SwiftNLift
21. Attack on SQL Injection
Hackers typically use a weak website search box to inject
malicious code onto a SQL-using server.
Once carried out successfully, the hacker gains access to
information that would otherwise be restricted.
Attack on Passwords
It’s exactly what it says on the tin. Hackers attempt to get
network access by cracking a password, which is usually
a badly chosen one.
Digital dangers to a control framework allude to people
who endeavor unapproved admittance to a control
framework gadget and additionally network utilizing an
information interchanges pathway. This entrance can be
coordinated from inside an association by confided in
clients or from distant areas by obscure people utilizing
the Internet. Dangers to control frameworks can
emerge out of various sources, including antagonistic
governments, psychological oppressor gatherings,
displeased representatives, and pernicious gatecrashers.
To ensure against these dangers, it is important to make
a protected digital hindrance around the Industrial
Control System (ICS). Despite the fact that different
dangers exist, including cataclysmic events, natural,
mechanical disappointment, and incidental activities of
an approved client, this conversation will zero in on the
conscious dangers referenced previously.
■ Public Governments
■ Psychological militants
■ Mechanical Spies and Organized Crime Groups
■ Hacktivists
■ Programmers
■ GAO Threat Table
With the end goal of this conversation, purposeful
dangers will be arranged reliable with the comments
in the Statement for the Record to the Joint Economic
Committee by Lawrence K. Gershwin, the Central
Intelligence Agency’s National Intelligence Officer
for Science and Technology, 21 June 2001. These
include: public governments, psychological militants,
mechanical covert operatives, coordinated wrongdoing
gatherings, hacktivists, and programmers. Exercises
could incorporate undercover work, hacking, data
fraud, wrongdoing, and psychological warfare.
Sources and references: https://us-cert.cisa.gov
21
JULY 2021 SwiftNLift
22. Cybernx
Leading Cyber Security Company Known
For Quality And Value Creation For
Customers And Employees
CyberNX is an Indian cyber security firm based in
Mumbai.
Our objective is to provide highly skilled and
experienced personnel to deliver specialised Cloud
Security and Cyber Security services.
Who We Are
We are a new Cyber Security company founded
by a group of seasoned professionals. Our goal is
to provide cutting-edge Cyber Security products
and services to consumers at a reasonable price.
We collaborate with our clients to ensure that a
digital transformation project is launched safely.
We believe that information security should not be
viewed as a difficult task, but rather as an essential
component of a company’s DNA.
Our Vision
Our vision is to become a leading Cyber Security
company known for quality and value creation for
customers and employees.
Cyber Security Training
■ Security training is critical in preparing an
organization’s personnel to protect against
today’s threats.
■ OurCyberSecurityeLearningsystemisdesigned
to deliver standard or customised Cyber
Security training modules to clients’ workers,
consultants, and third parties who work in their
environment.
■ The eLMS-based online security training is
meant to provide quick instruction to a wide
group of people.
■
Customisable training content for Cyber
Security domains
■ Delivered through personal computer or mobile
■ Ability to deliver specific content based on ad-
hoc requirements
■
Ready made content for Cyber Security
Awareness, Privacy, Business Continuity
■ Ability to sign-off the internal cybersecurity
policies & processes
Krishnakant Mathuria
Co-Founder & COO
Most Leading
Cyber Security
Providers In India
22 JULY 2021 SwiftNLift
23. ■
Options for training third-party staff or
consultants
■ Maintainsrecordsasperregulatoryrequirements
■ Re-certification option when certification or 1
year of training is completed
■ Policy acceptance module helps in getting the
policy accepted by employees
■ Built-in Quiz maintains the scoring
■ Online Policy Acceptance
Organizations adopt policies such as an Acceptable
Usage Policy, a Business Continuity Plan, and
a Code of Conduct, but how can we verify that
employees read the policies and understand the
statements?
The Policy Acceptance module assists organisations
in creating policy acceptance campaigns and
distributing them to internal and external
consultants for acceptance.
Helps the organisations to release the policy
documents to employees quickly
Helps to publish new policies and revisions to the
entire organisation or a specific audience
Get the policies accepted by a third party,
consultants or contract employees
Maintain the records of policy acceptance digitally.
Krishnakant Mathuria - Co-Founder &
Chief Operation Officer
Founder & Director at Know All Edge Networks
Pvt. Ltd. & Co-Founder at CyberNX Technologies
Pvt. Ltd., I have built and driven both growth and
performance culture across organisations, have
been at the forefront of delivering world class
technology solutions for customers with outcome
driven and measurable approaches aligned with
their businesses.
■ Services - Cloud Security, FinTech Security, and
Cyber Security products and services are among
the services we offer.
■ Experts-SecureCloudAdoption,CloudSecurity
Architecture, Compliance, and Monitoring
■ Best Practices - Our unique Cloud Security
framework “CCSM” can help fast accelerate
security implementation
Sources and references:
http://www.cybernx.com
23
JULY 2021 SwiftNLift
Website: http://www.cybernx.com
Industry: Information Technology &
Services
Company size:11-50 employees
Headquarters:Mumbai,Maharashtra
Type: Privately Held
Founded: 2018
24. Stottack
Technologies
High Quality And Best
Service
Stottack Technologies is an unadulterated Cyber
security organization from Pune. Our group
has over 20 years of aggregate encounters in the
network safety business.
Stottack Technologies is Cyber Security Company
from Pune. Organizations:- Cyber Security
Consulting Vulnerability Assessment Penetration
Testing Network Security Cyber Forensics
Compliance Webapp Pentesting Virtual CISO
Why us?
We have spent an extraordinary number of hours
securing the absolute most touchy information and
frameworks in the India and now we are prepared
to apply that equivalent experience and ability in
safeguarding your Data.
■ Vulnerability Assessment
A shortcoming assessment measure is required to
recognize threats and the perils they present. They
typically incorporate the use of robotized testing
devices, for instance, network security scanners,
whose results are recorded in a shortcoming
evaluation report.
Relationship of any size, or even individuals who
face an extended peril of cyber attacks, can benefit
by some kind of shortcoming assessment, anyway
tremendous endeavors and various kinds of
affiliations that are reliant upon consistent attacks
will benefit most from shortcoming assessment.
■ Penetration Testing
Entrance Testing is tending to a direct request:
“How should a cybercriminal manage hurt
my affiliation’s PC systems, applications, and
association?”. It is the demonstration of testing a
PC structure, association or web application to
find shortcomings that an attacker could abuse,
reenacting an attack against an affiliation’s IT
assets.
Shortcomings could be a direct result of different
reasons, barely any key ones being:
■ Flaws in the arrangement of hardware and
programming
Abhijeet Arun Deuskar
Director
Most Leading
Cyber Security
Providers In India
24 JULY 2021 SwiftNLift
25. ■ Utilization of shaky association
■ Complex plan of PC structures
■ Possible human bungles
■ Organization Security
Association security covers various advances,
contraptions, and cycles. It’s anything but a lot
of rules and plans planned to guarantee the
trustworthiness, security, and accessibility of PC
associations and data.
Sound association security controls are endorsed
for relationship to decrease the peril of an attack
or data enter. These activities moreover enable the
ensured movement of IT structures. Association
security contains gear and programming
progressions and are clearly made out of layers
that consolidate applications, antivirus, access
the board, laborers, firewalls, genuine access, and
courses of action.
■ Consistence Service
Inside the circle of information assurance and
protection comes a scene of network safety
consistence laws, guidelines and norms. And
keeping in mind that numerous associations
may have a consistence program, it might risk
having holes in the framework. This regularly
opens them to the superfluous danger of review
disappointment, successfully putting their whole
association in danger.
■ Criminological Investigation
The way toward get-together and archiving
confirmation from a PC or a figuring gadget in
a structure satisfactory to the court by applying
the strategies of examination and investigation is
called Cyber Forensics. Digital Forensics is likewise
called Computer Forensics. The point of digital
criminology is to figure out who is liable for what
precisely occurred on the PC while archiving the
proof and playing out a legitimate examination.
■ Web Application Security
Web application security (otherwise called Web
AppSec) is building sites to work true to form, in
any event, when they are enduring an onslaught.
The idea includes an assortment of safety controls
designed into a Web application to shield its
resources from possibly vindictive specialists.
Web applications, similar to all products,
unavoidably contain abandons. A portion of
these deformities comprise real weaknesses
that can be abused, acquainting hazards with
associations. Web application security guards
against such deformities. It includes utilizing
secure improvement rehearses and executing
safety efforts all through the product advancement
life cycle (SDLC), guaranteeing that plan level
blemishes and execution level bugs are tended to.
■ Virtual CISO
A virtual boss data security official, or vCISO, is
an expert who works regularly with associations to
give the entirety of the fundamental network safety
support one would anticipate from an in-house
senior chief inside a more effective and reasonable
help model. Gain everyday network protection
backing and guidance
vCISOs lead a complete evaluation of an
organization’s security stance to pinpoint
shortcomingsandimprovethiersecurityremaining
over the long haul. Acting either as a long standing
asset for your group or interval CISO, a vCISO will
step in to build up security standards,implement
controls, and react quickly to episodes persistently
refining your way to deal with address the powerful
danger scene alongside industry best practices and
guidelines.
Sources and references: http://stottack.com
Website: http://stottack.com
Industry: Security & Investigations
Company size: 2-10 employees
Location - Pune,Maharashtra,India
Type: Sole Proprietorship
Specialties: cyber security consulting
25
JULY 2021 SwiftNLift
26. Why are cyber-attacks on the rise?
It’s because cyber attacks are less expensive, more
convenient, and less dangerous than physical ones.
Aside from a computer and an Internet connection,
cybercriminals just require a few expenses.
Theyaren’tboundbyterritoryordistance.
Because of the anonymous nature of the Internet,
they are difficult to identify and prosecute.
Given how appealing attacks against information
technology systems are, it’s likely that the quantity
and sophistication of cyber-attacks will continue to
rise. Understanding the issues surrounding various
cyber threats and implementing defense tactics (i.e.,
countermeasures) that preserve the confidentiality,
integrity,andavailabilityofanydigitalandinformation
technology are all part of cyber security .
■
Confidentiality refers to the protection of
information from being disclosed to unauthorized
people or systems.
■ Integrity refers to the ability to avoid unwanted
changes or deletions.
■ Availability refers to the ability of systems
responsible for transmitting, storing, and
processing data to be accessed when and by people
who require them.
A Look At The
emerging Cyber-Threats
26 JULY 2021 SwiftNLift
27. Malware attacks have traditionally occurred at a
single point of entry among hardware, software, or
network components, exploiting existing design and
implementation weaknesses at each layer.
Rather than defending each asset, the perimeter
defense technique has primarily been employed
to construct a wall around all internal resources to
secure everything within from outside intrusion.
Firewall and anti-virus software placed within
intrusion prevention/detection systems are used by
the majority of perimeter defense mechanisms.
Any traffic coming in from the outside is captured
and inspected to ensure that no virus has infiltrated
the internal network. Phishing is a technique for
obtaining sensitive information such as usernames,
passwords, and credit card numbers by impersonating
a trustworthy institution.
The majority of phishing scams work by tricking a
userintoaccessingamaliciouswebsitethatpretends
to be from a reputable company or agency.
An unsuspecting user provides personal information
on a fraudulent website, which is then used by
malicious criminals. Once the malware has been
installed on a victim’s system, cybercriminals can
exploit a variety of existing vulnerabilities in the
victim’s system to enhance their illegal activities.
We look at the most widely exploited security flaws in
hardware, software, and network systems. Following
that, there will be a discussion of present and
proposed attempts to ameliorate the negative effects
of the exploitations.
Cyber attacks against cyberspace evolve with
time, taking advantage of new techniques. Most
of the time, cyber thieves would change existing
malware signatures to take advantage of holes in
new technology. In other circumstances, they just
investigate the specific qualities of new technology to
uncover gaps via which malware might be injected.
Cyber thieves take advantage of new Internet
technologies that have millions or billions of active
users to reach out to a large number of victims fast
and efficiently.
Sources and references:
https://searchsecurity.techtarget.com/
27
JULY 2021 SwiftNLift
28. Marlabs Inc.
Next-Gen Technologies
& Solutions.
To help businesses create value and cause positive
impact with the power of digital
For our clients, the digital world opens up a whole
new universe of possibilities. Possibilities to do things
better and to do things better. To make better use of
time and resources. To provide clients with products
and services that are unique and valuable. To create
a work environment that employees are proud to be
a part of. To create something valuable that will last a
long time. This isn’t about making money. It’s all about
establishing a mission-driven company that adds value
to the economy, society, and environment.
And at Marlabs, our focus is to help each of our clients
find and capture their unique opportunities and
empower them with digital technologies so that they
can run a purposeful business.
What we’re solving for
Over the past 15+ years, we’ve worked with many
customers in catching advanced freedoms.
What’s more, we have been essential for their excursion
as the business and innovation proceeded to change and
advance, giving us important learning encounters and
the capacity to perceive these ceaselessly developing
necessities molding our contributions.
■ Today we perceive these necessities as the
“computerized problems” that requires settling for:
■ The requirement for arrangements that react to
consistently advancing client needs, needs, and
practices
■ The need to test quicker and show up on an exact
result.
■ The need to dispatch and hit the market quicker
■ End client practices are changing and developing due
to being all the more carefully associated and affected
by distinction, economy, versatility, wellbeing and
prosperity and climate.
Withthis,howtofigureoutwhattheyneed,
impact and interface with their feelings
and fulfill them in a customized way?
Our answer: Design drove ‘experience-first’ cooperation
We start by profoundly understanding the client
Siby Vadakekkara
Chairman And CEO
Most Leading
Cyber Security
Providers In India
28 JULY 2021 SwiftNLift
29. experience venture. Then, at that point, we inventively
consolidate our plan drove development approach
with computerized advances to give ‘experience-first’
computerized arrangements
Our Approach
■ Reimagination
■ Technology
■ Practical Execution
We move clients into a rewarding digital future through
thepowerofourDigitalCollective™.TheMarlabsDigital
Collective™ combines our design-led digital innovation
process with human experience, cutting edge modular
digital platforms and an ecosystem of best-in-class
technology partners and innovators.
Our strengths
■ Rich Capabilities Mix
Our technologists are real world practitioners who
combine their advanced technology expertise and their
understanding of your domain nuances together with
our award-winning solutions & platforms to seamlessly
infuse digital into your business
■ Speed and Nimbleness
We quickly move your projects forward and deliver
as promised. We’re agile, collaborative, and efficient—
providing a fast-track startup-style experience filled
with continual innovation and improvement.
■ Empathy-fueled Drive
We adopt our clients’ interests, concerns, and
opportunities as our own, and commit to solve them by
bringing our utmost creativity, passion, expertise, and
global mindset to work every day.
■ Powerful Ecosystem
In the digital world, no one company can know it all or
do it all. That’s why we work with an extensive network
of cutting-edge partners, startups, and academics
who collaborate with us to deliver complete, high-
performing solutions at speed and scale.
Our Values
■ Celebrate Innovation
■ Interact with Empathy and Respect
■ Be Transparent and Open
■ Act Responsibly
■ Seek Purpose Beyond Profits
We trust each other and our clients. We act with
humility and actively seek out and consider new ideas
and viewpoints. We prize honesty in ourselves and
others.
Siby Vadakekkara Chairman and CEO
As fellow benefactor, Chairman and CEO of Marlabs,
Siby has initiated the organization’s development from
three individuals in 2007 to more than 2,500 today and
it’s anything but a full-administration computerized
arrangements and innovation organization. A designer
via preparing, Siby has more than 30 years’ involvement
with changing organizations through the essential
infusion of computerized capacities. He is likewise
a guide and computerized counsel to Columbia
University Executive Master’s Program in Technology
Management.
Sources and references: https://www.marlabs.com/
Website: https://www.marlabs.com/
Industry: Information Technology & Services
Company size:1,001-5,000 employees
Headquarters: Piscataway, NJ
Type: Privately Held
Founded: 1996
29
JULY 2021 SwiftNLift
30. The greatest dangers are those you are
unaware of
Usability is sometimes overlooked in security strategies,
yet we now know that improving user experience is a
critical driver of enterprise security upgrades.
There’s just one minor snag.
Despite their effectiveness, most password less systems
can be problematic in practice.
When a user takes an additional action during the
authentication process, the danger of a data breach
skyrockets. This is because several passwordless systems
have several well-known flaws: OTP codes, SMS codes,
sim cards, and email links are all easy to obtain.
■ one-time password authorization codes (OTP)
■ push-based authentication tools
■ confirmation links
■ hardware tokens
■ biometrics
■ digital certificates
■ hybrid fraud detection systems (complex solution)
What is Adaptive Security and how does it
operate in practice?
By gathering device and software data and exchanging it
Adaptive Security Vs.
Passwordless Solutions
30 JULY 2021 SwiftNLift
31. with the AI engine through cryptographic channel, each
module produces a security score for a user’s behavior.
This strategy ensures that risk is always estimated using
contextual information.
Actual and historical data are regularly analyzed in
order to spot any irregularities.
The operation is prohibited or requires additional
confirmation procedures, such as 2FA permission,
if the security score is low and critical attributes are
below the threshold
What’s more, each time a user tries to gain access to
the company’s resources, the engine receives the final
operation outcome, which helps to reduce false positive
scores in the future.
What is Adaptive Security and how does it
operate in practice?
By gathering device and software data and exchanging it
with the AI engine through cryptographic channel, each
module produces a security score for a user’s behavior.
This strategy ensures that risk is always estimated using
contextual information.
Actual and historical data are regularly analyzed in
order to spot any irregularities.
The operation is prohibited or requires additional
confirmation procedures, such as 2FA permission, if the
security score is low and critical attributes are below the
threshold.
What’s more, if a user attempts to gain access to the
company’s resources, Usability is sometimes overlooked
in security strategies, yet we now know that improving
user experience is a critical driver of enterprise security
upgrades.
There’s just one minor snag
Despite their effectiveness, most password less systems
can be problematic in practice. When a user takes an
additional action during the authentication process, the
danger of a data breach skyrockets.
That’s because several password less techniques have
several well-known flaws: OTP tokens, SMS codes,
sim cards, and email links are all easy to obtain (many
attacks start from an email takeover).
Sources and references: https://www.cshub.com
31
JULY 2021 SwiftNLift