SlideShare a Scribd company logo
1 of 16
SecloreCorporate Profile
Corporate Background … “Seclore is a high growth software product company. Seclore’s products FileSecure and InfoSource help mitigate the risks arising out of breach of information whilst enhancing collaboration” ,[object Object]
Geographical and customer presence
Australia, Singapore(ASEAN), Malaysia, India, U.A.E., Qatar, Nigeria
Active partnerships
UK, North Africa
Investors
The largest private bank in India (ICICI), one of the foremost R&D institute (IIT, Bombay) & yet-to-be-named corporate investor,[object Object]
Problems we solve … Information security during collaboration – within and outside the enterprise Information security technologies give “perimeteric” protection. They are rendered useless when information leaves the perimeter  To fix the above deficiency organizations make expensive investments in secure remote access technologies Information leakage during outsourcing Organizations find it cumbersome to ensure security policies within outsourcing partners’ operations Results in increase in costs associated with physical and process audits and control of the outsourcing partner. In many cases it prevents organizations from outsourcing processes which require confidential data to be shared Tracking and auditing the flow of information within the value chain With the distributed nature of operations within and outside of enterprises, compliance to digital asset management policies of regulatory frameworks like Sarbanes-Oxley, Graham-Leach-Bliley, PCI and ISO means not only internal compliance but also compliance of the value chain of partners, vendors and customers.
What we offer … Seclore FileSecure is an application for allowing secured document exchange between individuals and enterprises. It allows for control of document usage to specific users & groups(WHO), specific usage (read/edit/print/distribute) (WHAT), specific time (WHEN) & specific computers / networks (WHERE)
What we offer … Seclore InfoSource is an application for allowing enterprises to outsource without compromising data security. It allows companies to control usage of information to trusted computers, trusted users, trusted  applications, specific time period & specific number of use (once/twice..)
7 What customers say about us … “One of the major benefits accrued from deploying Seclore’s technology is the comfort of knowing that the information is safe from end-to-end” "In today’s world, where the boundaries of the organisation’s functionality are disappearing, we are dependent on different business providers to process our customer information. Given that requirement, we still want to control how that information is used and processed by the service providers. Seclore’s technology has allowed us to do that."    -  VishalSalvi, CISO Senior Vice President and CISO, HDFC Bank. “L&T EBG started using Seclore FileSecure on a large scale to secure tender documents in the projects department. Earlier, request for proposals (RFP) documents were physically sealed. Now, with Seclore FileSecure, EBG can send RFPs months in advance, but the documents will open only on a specific date and time”.   -   P V Shrungarkar, Head of IT
What customers say about us … “We chose Seclore FileSecure due to the flexibility provided by Seclore in terms of solution capabilities and customization. Implementation of Seclore FileSecure has reduced the exposure of critical data for potential misuse or frauds. The business benefits are tremendous.”   -  Murli Nambiar, Head of Information Security "Financial services companies like banks, insurance carriers & broking are ‘opening up’ their information systems and processes for participation by customers, partners and vendors. This of course brings in a lot of value chain integration and lowers costs but comes with information security needs which cannot be solved by present day systems. Seclore’s technology for securing documents as they flow within and outside enterprises as well as securing data shared with outsourcing partners is extremely relevant”    -  C N Ram. Ex-CIO HDFC Bank
Awards and recognition …       Massachusetts Institute of Technology (MIT)’s Technology Review award, TR35, is an annual event honoring top young innovators. The TR35 award is for innovators whose inventions and research, MIT finds exciting. The innovations --spanning medicine, computing, communications, electronics, nanotechnology, and more--are changing our world. Technology Review, owned and published by MIT, is the world’s oldest technology magazine. Awarded the “Innovative technology” award for 2010 by MIT’s TR35 Innovations is an annual event honoring researchers and innovators for creative and innovative work of Indian innovators in the sphere of science and technology that has a high degree of practical relevance to change everyday life Awarded the “Innovation in Practice” award by IITB Alumni Association
What industry experts say… Seclore’s approach is different in that they not mandatory rely on such plug-ins but mainly act “below” the application. The client component (which is required to access protected, e.g. encrypted, documents) tries to analyze the activities off the application like access to the file system. One impact of that approach is that a document might be opened with different applications supporting the specific document format. -  Martin Kuppinger, One of the fore-most information security analysts “Information breaches normally result in intellectual property violation which is a serious problem affecting industry today. Seclore’s combination of preventive and corrective methods of handling information breaches is invaluable to any industry” -  Haigreve Khaitan (Managing partner – Khaitan and Co) “Collaboration, security and privacy appear as mutually conflicting goals with most present day technologies. Seclore has resolved this conflict in a very elegant manner with its technology.”   -  Animesh Parihar (Global Delivery Head – SAP)
What media says …

More Related Content

What's hot

BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessDMIMarketing
 
Cybersecurity and Information Assurance - Cloud Computing
Cybersecurity and Information Assurance - Cloud ComputingCybersecurity and Information Assurance - Cloud Computing
Cybersecurity and Information Assurance - Cloud ComputingJoseph Pindar
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity CatalystPacket One
 
ENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONS
ENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONSENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONS
ENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONSIJMIT JOURNAL
 
Legal Point of View
Legal Point of ViewLegal Point of View
Legal Point of ViewLeila Kim
 
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeria
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in NigeriaCyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeria
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeriaijtsrd
 
A security requirement quality
A security requirement qualityA security requirement quality
A security requirement qualityijseajournal
 
IT-AAC Defense IT Reform Report to the Sec 809 Panel
IT-AAC Defense IT Reform Report to the Sec 809 PanelIT-AAC Defense IT Reform Report to the Sec 809 Panel
IT-AAC Defense IT Reform Report to the Sec 809 PanelJohn Weiler
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Chris Pepin
 
Top cited managing information technology articles
Top cited managing information technology articlesTop cited managing information technology articles
Top cited managing information technology articlesIJMIT JOURNAL
 
Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterpriseinfra-si
 
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest MindsWhitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest MindsHappiest Minds Technologies
 
Velocis Presentations
Velocis PresentationsVelocis Presentations
Velocis PresentationsHitesh Patel
 
Intel HIMSS WoHIT mhealth
Intel HIMSS WoHIT mhealthIntel HIMSS WoHIT mhealth
Intel HIMSS WoHIT mhealthrcnossen
 
Assocham conf grc sept 13
Assocham conf  grc  sept 13Assocham conf  grc  sept 13
Assocham conf grc sept 13subramanian K
 

What's hot (20)

BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for Success
 
Cybersecurity and Information Assurance - Cloud Computing
Cybersecurity and Information Assurance - Cloud ComputingCybersecurity and Information Assurance - Cloud Computing
Cybersecurity and Information Assurance - Cloud Computing
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
 
BYOD
BYODBYOD
BYOD
 
ENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONS
ENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONSENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONS
ENGINEERING LIFE CYCLE ENABLES PENETRATION TESTING AND CYBER OPERATIONS
 
Legal Point of View
Legal Point of ViewLegal Point of View
Legal Point of View
 
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeria
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in NigeriaCyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeria
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeria
 
A security requirement quality
A security requirement qualityA security requirement quality
A security requirement quality
 
IT-AAC Defense IT Reform Report to the Sec 809 Panel
IT-AAC Defense IT Reform Report to the Sec 809 PanelIT-AAC Defense IT Reform Report to the Sec 809 Panel
IT-AAC Defense IT Reform Report to the Sec 809 Panel
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
ZS Infotech v1.0
ZS Infotech v1.0ZS Infotech v1.0
ZS Infotech v1.0
 
Top cited managing information technology articles
Top cited managing information technology articlesTop cited managing information technology articles
Top cited managing information technology articles
 
Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterprise
 
Ccs16
Ccs16Ccs16
Ccs16
 
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest MindsWhitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
 
Velocis Presentations
Velocis PresentationsVelocis Presentations
Velocis Presentations
 
Intel HIMSS WoHIT mhealth
Intel HIMSS WoHIT mhealthIntel HIMSS WoHIT mhealth
Intel HIMSS WoHIT mhealth
 
The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019
 
Assocham conf grc sept 13
Assocham conf  grc  sept 13Assocham conf  grc  sept 13
Assocham conf grc sept 13
 
Byod
ByodByod
Byod
 

Similar to Seclore Corporate Profile

The Most Trustworthy Enterprise Security Solution Providers of India.pdf
The Most Trustworthy Enterprise Security Solution Providers of India.pdfThe Most Trustworthy Enterprise Security Solution Providers of India.pdf
The Most Trustworthy Enterprise Security Solution Providers of India.pdfCIO Look Magazine
 
Security for the IoT - Report Summary
Security for the IoT - Report SummarySecurity for the IoT - Report Summary
Security for the IoT - Report SummaryAccenture Technology
 
Our Previous Edition Post event synopsis
Our Previous Edition Post event synopsisOur Previous Edition Post event synopsis
Our Previous Edition Post event synopsisVasuki Kashyap
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011subramanian K
 
8 Experts on Flawless App Delivery
8 Experts on Flawless App Delivery8 Experts on Flawless App Delivery
8 Experts on Flawless App DeliveryMighty Guides, Inc.
 
Trustable Technology Mark: Public Launch
Trustable Technology Mark: Public LaunchTrustable Technology Mark: Public Launch
Trustable Technology Mark: Public LaunchPeter Bihr
 
Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top DownExecutive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Downaccenture
 
Ms think-tank-coffee-table-book
Ms think-tank-coffee-table-bookMs think-tank-coffee-table-book
Ms think-tank-coffee-table-bookMicrosoft India
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-securityskumartarget
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Accenture Technology
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5accenture
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019Ulf Mattsson
 
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...IJNSA Journal
 
Frost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-finalFrost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-finalWendy Murphy
 
Learnings from the IDC South Africa CIO Summit 2023 #IDSACIO (1).pptx
Learnings from the IDC South Africa CIO Summit 2023 #IDSACIO (1).pptxLearnings from the IDC South Africa CIO Summit 2023 #IDSACIO (1).pptx
Learnings from the IDC South Africa CIO Summit 2023 #IDSACIO (1).pptxCompanySeceon
 
The 10 most trusted networking and security solution providers
The 10 most trusted networking and security solution providersThe 10 most trusted networking and security solution providers
The 10 most trusted networking and security solution providersMerry D'souza
 
OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Successaccenture
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportAccenture Technology
 

Similar to Seclore Corporate Profile (20)

The Most Trustworthy Enterprise Security Solution Providers of India.pdf
The Most Trustworthy Enterprise Security Solution Providers of India.pdfThe Most Trustworthy Enterprise Security Solution Providers of India.pdf
The Most Trustworthy Enterprise Security Solution Providers of India.pdf
 
Security for the IoT - Report Summary
Security for the IoT - Report SummarySecurity for the IoT - Report Summary
Security for the IoT - Report Summary
 
Our Previous Edition Post event synopsis
Our Previous Edition Post event synopsisOur Previous Edition Post event synopsis
Our Previous Edition Post event synopsis
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011
 
8 Experts on Flawless App Delivery
8 Experts on Flawless App Delivery8 Experts on Flawless App Delivery
8 Experts on Flawless App Delivery
 
Trustable Technology Mark: Public Launch
Trustable Technology Mark: Public LaunchTrustable Technology Mark: Public Launch
Trustable Technology Mark: Public Launch
 
Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top DownExecutive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Down
 
Essay It
Essay ItEssay It
Essay It
 
Ms think-tank-coffee-table-book
Ms think-tank-coffee-table-bookMs think-tank-coffee-table-book
Ms think-tank-coffee-table-book
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-security
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
 
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...
 
Frost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-finalFrost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-final
 
Learnings from the IDC South Africa CIO Summit 2023 #IDSACIO (1).pptx
Learnings from the IDC South Africa CIO Summit 2023 #IDSACIO (1).pptxLearnings from the IDC South Africa CIO Summit 2023 #IDSACIO (1).pptx
Learnings from the IDC South Africa CIO Summit 2023 #IDSACIO (1).pptx
 
Shadow IT
Shadow ITShadow IT
Shadow IT
 
The 10 most trusted networking and security solution providers
The 10 most trusted networking and security solution providersThe 10 most trusted networking and security solution providers
The 10 most trusted networking and security solution providers
 
OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Success
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive Report
 

Seclore Corporate Profile

  • 2.
  • 4. Australia, Singapore(ASEAN), Malaysia, India, U.A.E., Qatar, Nigeria
  • 8.
  • 9. Problems we solve … Information security during collaboration – within and outside the enterprise Information security technologies give “perimeteric” protection. They are rendered useless when information leaves the perimeter To fix the above deficiency organizations make expensive investments in secure remote access technologies Information leakage during outsourcing Organizations find it cumbersome to ensure security policies within outsourcing partners’ operations Results in increase in costs associated with physical and process audits and control of the outsourcing partner. In many cases it prevents organizations from outsourcing processes which require confidential data to be shared Tracking and auditing the flow of information within the value chain With the distributed nature of operations within and outside of enterprises, compliance to digital asset management policies of regulatory frameworks like Sarbanes-Oxley, Graham-Leach-Bliley, PCI and ISO means not only internal compliance but also compliance of the value chain of partners, vendors and customers.
  • 10. What we offer … Seclore FileSecure is an application for allowing secured document exchange between individuals and enterprises. It allows for control of document usage to specific users & groups(WHO), specific usage (read/edit/print/distribute) (WHAT), specific time (WHEN) & specific computers / networks (WHERE)
  • 11. What we offer … Seclore InfoSource is an application for allowing enterprises to outsource without compromising data security. It allows companies to control usage of information to trusted computers, trusted users, trusted applications, specific time period & specific number of use (once/twice..)
  • 12. 7 What customers say about us … “One of the major benefits accrued from deploying Seclore’s technology is the comfort of knowing that the information is safe from end-to-end” "In today’s world, where the boundaries of the organisation’s functionality are disappearing, we are dependent on different business providers to process our customer information. Given that requirement, we still want to control how that information is used and processed by the service providers. Seclore’s technology has allowed us to do that." - VishalSalvi, CISO Senior Vice President and CISO, HDFC Bank. “L&T EBG started using Seclore FileSecure on a large scale to secure tender documents in the projects department. Earlier, request for proposals (RFP) documents were physically sealed. Now, with Seclore FileSecure, EBG can send RFPs months in advance, but the documents will open only on a specific date and time”. - P V Shrungarkar, Head of IT
  • 13. What customers say about us … “We chose Seclore FileSecure due to the flexibility provided by Seclore in terms of solution capabilities and customization. Implementation of Seclore FileSecure has reduced the exposure of critical data for potential misuse or frauds. The business benefits are tremendous.” - Murli Nambiar, Head of Information Security "Financial services companies like banks, insurance carriers & broking are ‘opening up’ their information systems and processes for participation by customers, partners and vendors. This of course brings in a lot of value chain integration and lowers costs but comes with information security needs which cannot be solved by present day systems. Seclore’s technology for securing documents as they flow within and outside enterprises as well as securing data shared with outsourcing partners is extremely relevant” - C N Ram. Ex-CIO HDFC Bank
  • 14. Awards and recognition … Massachusetts Institute of Technology (MIT)’s Technology Review award, TR35, is an annual event honoring top young innovators. The TR35 award is for innovators whose inventions and research, MIT finds exciting. The innovations --spanning medicine, computing, communications, electronics, nanotechnology, and more--are changing our world. Technology Review, owned and published by MIT, is the world’s oldest technology magazine. Awarded the “Innovative technology” award for 2010 by MIT’s TR35 Innovations is an annual event honoring researchers and innovators for creative and innovative work of Indian innovators in the sphere of science and technology that has a high degree of practical relevance to change everyday life Awarded the “Innovation in Practice” award by IITB Alumni Association
  • 15. What industry experts say… Seclore’s approach is different in that they not mandatory rely on such plug-ins but mainly act “below” the application. The client component (which is required to access protected, e.g. encrypted, documents) tries to analyze the activities off the application like access to the file system. One impact of that approach is that a document might be opened with different applications supporting the specific document format. - Martin Kuppinger, One of the fore-most information security analysts “Information breaches normally result in intellectual property violation which is a serious problem affecting industry today. Seclore’s combination of preventive and corrective methods of handling information breaches is invaluable to any industry” - Haigreve Khaitan (Managing partner – Khaitan and Co) “Collaboration, security and privacy appear as mutually conflicting goals with most present day technologies. Seclore has resolved this conflict in a very elegant manner with its technology.” - Animesh Parihar (Global Delivery Head – SAP)
  • 20. 15 The executive team … Vishal Gupta: Chief Executive Officer (CEO) Mr. Gupta’s experience ranges from front line sales, marketing, business development to product management. As CEO of Herald Logic (2000 - 03), he was responsible for sales and business development during which the company reported a CAGR of 220%. Mr. Gupta has a bachelor's degree in EE from IIT Bombay. Abhijit Tannu: Chief Technology Officer (CTO) Mr. Tannu has an experience of 15 years which is rich and varied. It ranges from managing large turn key projects, design, and development to quality assurance. Mr. Tannu has prior experience with manufacturing and project based organizations like L&T and NCST. He holds a bachelor's degree in chemical engineering from IIT, Kharagpur Rahul Kopikar: Head Business Development Mr. Kopikar’s experience of more than 10 years includes softwarehardware development, operations and marketing. Mr. Kopikar has earlier handled technology development, off shoring and OEM relationship management at companies like Marvell Semiconductor. Rahul holds a bachelor's degree in EE from IIT Bombay and a Masters in EE from Cornell University.
  • 21. 16 Want to know more … Website : www.seclore.com Blog : blog.seclore.com Phone : +91-22-4015-5252