Progressive Times - May 2012


Published on

Newsletter - Progressive Times - May 2012

  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Progressive Times - May 2012

  1. 1. Times May 2012 News KEY WINS NEC HCL STGreetings to everyone!! Collaboration RedefinedWelcome to yet another interesting edition of Progressive NEC HCL ST, NoidaTimes which we are restarting after a break of few months.Perhaps the timing is great as we begin the financial year Progressive has bagged an imperative project from NECunveiling our new go to market strategy around HCL for Network Reengineering. As part of the project,Consulting, Solutions and Outsourcing. The entire play has Progressive will design & implement the complete Networkto be around engaging and adding value and not "selling". Infrastructure based on CISCO Products.To begin with we have our focus will on following fourirreversible trends that includes Cloud, Mobility,Information Management and Outsourcing which stressthe importance for IT to leverage technology andautomation. Its clear weve only scratched the surface Ericsson, Gurgaonwhen it comes to the ability of technology to drive better Progressive has bagged an imperative projects Fromtop-and bottom-line growth. However, it will take a high Ericsson for Bharti Airtel :discipline and perseverance to get it right. 1. EIR (Equipment Identity Registry). As part of the project,Today, technology advances so fast that the potential for Progressive will implement & support HP Server & storageimprovement is tremendous and ultimately what matters is across eight locations of Bharti Airtel in India.only Excellence. We must always remain impatient to do 2. ADC (Advance Device Configuration). As part of thebetter for our customers. And to keep this I have project, Progressive will implement &support HP Server forreorganized the management team around our core Bharti Airtel in India.products to improve responsibility and accountabilityacross Progressive. Hence emphasis would be more to KEY ANNOUNCEMENTSincrease our velocity, improve our execution and focus onthe big bets that will makes a difference. As technology continues to drive business productivity andWe are delighted to have two experienced campaigners to competitiveness, the role of theour Progressive family-Anil Zuitshi (Director Sales- geek becomes increasinglyEnterprise) and Sheeba Hasnain (Business Development critical. Organization thatManager-Middle East). I admire the capabilities of my team attracts and retains theand have the confidence that we will reach to the pinnacle best geeks wins in thisby remaining focused on what we deliver. environment. From this quarter, we are delighted toLast but not least, I would like to give this message to the announce an award to increase the motivation andentire Progressive family in these changing economic enthusiasm of the intricate technological knowledge worklandscape remember two things-Focus on customer that geeks perform.experience and execute with financial discipline.Wishing you a great FY 2012-13!Prateek Garg
  2. 2. TimesSOLUTIONSNetwork Security Fig. 2 depicts the financial impact on organizations over last 12 months.In todays dynamic environment, network security becomesa priority for any organization. Network Security is all about Cannot determine 16%protecting all the valuable assets to maintain the More than $10,000,000 1%intellectual property of the company and ensure smooth $5,000,001 to $10,000,000 0%operation. Hence it becomes a mandate for any $2,500,001 to $5,000,000 3%organization to have a sound network security strategy $1,000,001 to $2,500,000 15%which will uncover threats and find ways to combat them. $500,001 to 1,000,000 22% $250,001 to $500,000 23%The most reliable way to ensure the safety of a companys $250,001 to $250,000 16%computers is to refrain from putting them on a network $10,000 to $100,000 3%and to keep them behind locked doors. Less than $ 10,000 1%Why Do We Need Network Security? 0% 5% 10% 15% 20% 25%We definitely need secured network in order to protect our Fig. 2 - Source: Ponemon Institute Research Reportinformation and data. Security flaw can cause hugefinancial impact on the businesses as well. Securing your network 35% One can secure the network by implementing robust 32% network appliances including firewalls, routers, switches 30% and other network security equipments. Security is not only 25% putting firewall and it does not end there, much larger part 21% 20% 18% of network security is creating policies and using network security tools that ensure your network is secured by 15% 10% 9% 10% allowing the access to authorized persons only and 10% eliminating any threat to network. 5% Network security is based on 3 pillars 0% Prevention, Detection & Response. This trinity should None 1 time 2-3 4-5 More than Cannot be the foundation for all security policies and measures times times 5 times Determine that organization develops and deploys. Fig 1 - Source: Ponemon Institute Research ReportIn the recent survey conducted by Computer SecurityInstitute (CSI), 70% percent of organizations stated thattheir network security defenses had been breached. Detection ResponseThe chart below shows the successful network securitybreaches over past 12 months.As per the survey report, 59 % of respondents say that their SECURITYnetwork security is breached at least twice a year, 10 % donot even know if they are victim of breach or not? Itpredicts that at least 80% of organizations have had atleast one breach even if we dont consider organization Preventionwho cannot determine it.
  3. 3. TimesSecurity is all about layers, it depends how many layers youare using to configure your security.The layers can be defined in the following manner GOOD TO READ• Properly configuring the firewall 12 very profound lessons relevant for our lives• Configuring antivirus with up to date signatures• Strong password, which are changed regularly• Proper use of access lists• Logging and log analysis of security devices• Following good security practices defined by local ITApart from the best practices there are a few other tools toassist with network security and most of them are shippingwith Linux distribution• Packet Sniffers• System Services & tcp_wrappers• DNS Information• Identd• Network Scanners to detect port scans• Denial of Service Attacks• Firewalls• VPNsIt takes all of these elements collectively to constitute good 1. The more we know about ourselves, the more power wesecurity practices. The above mentioned tools are few to have to behave better- Humility is underrated. We each havename which help us to secure the network. Using these an infinite capacity for self-deception-countless unconsciouspractices, manageability of network becomes much easier ways we protect ourselves from pain, uncertainty, andwith security in place. responsibility-often at the expense of others and of ourselves. Endless introspection can turn into self-Benefits indulgence, but deepening self-awareness is essential toUsing network monitoring tools one can record all the freeing ourselves from our reactive, habitual behaviour.traffic and analyze the suspicious behavior & patterns sothat proactive steps can be taken to prevent it. 2. Notice the good- We each carry an evolutionarySecurity protects your network and assets by blocking predisposition to dwell on whats wrong in our lives. Thesuspicious behaviors on real-time basis and alerting the antidote is to deliberately take time out each day to noticeadministrators when high security filters are violated. It also whats going right, and to feel grateful for what youve got. Itshelps in increasing user productivity by blocking unwanted probably a lot.and inappropriate web contents and program usage. 3. Let go of certainty- The opposite isnt uncertainty. ItsAlso, one can save a lot of time and money as well by openness, curiosity and a willingness to embrace paradox,keeping users on task and productive, by securing assets rather than choose up sides. The ultimate challenge is to acceptand preventing data theft on you network. ourselves exactly as we are, but never stop trying to learn andIt also removes the need of exhaustive investigations for grow.possible troublesome employees as you can monitor every 4. Never seek your value at the expense of someonebit of you network and can trace the culprit. elses- When were feeling devalued, our reactive instinct is to do anything to restore what weve lost. Devaluing the person who made you feel bad will only prompt more of the same in return. 5. Do the most important thing first in the morning and youll never have an unproductive day- Most of us have the highest energy early in the day, and the fewest distractions. By focusing for a designated period of time, without interruption, on the highest value task for no more than 90 minutes, its possible to get an extraordinary amount of work accomplished in a short time.
  4. 4. GOOD TO READ Times 6. Its possible to be excellent at anything, but nothing valuable comes easy and discomfort is part of growth Getting better at something depends far less on inborn talent than it does the willingness to practice the activity over and over, and to seek out regular feedback, the more precise the better. 7. The more behaviors you intentionally make automatic in your life, the more youll get done- If you have to think about doing something each time you do it, you probably wont do it for very long. The trick is to get more things done using less energy and conscious self-control. How often do you forget to brush your teeth? 8. Slow down- Speed is the enemy of nearly everything in life that really matters. Its addictive and it undermines quality, compassion, depth, creativity, appreciation and real relationship. 9. The feeling of having enough is magical- It rarely Progressives Rewards & Recognitions depends on how much youve got. More is rarely better. Progressive has announced Rewards & Recognition winners Too much of anything eventually becomes toxic. for the fourth quarter (JFM) in different categories as mentioned 10. Do the right thing because its the right thing to do, Star Award and dont expect anything in return- Your values are one Nilesh Shivaji Jadhav (Mumbai) & Kislay Kumar (Noida) of the only possessions you have that no one can take away from you. Doing the right thing may not always Team Player Sumant Pandey, Yogesh Dubey & get you what you think you want in the moment, but it Sumit Bhattacharya (Noida) will almost always leave you feeling better about yourself in the long run. When in doubt, default to calm Client Satisfaction Anil B. Lavate (Mumbai), Mukund Narayan, Jitandra Kumar, and kind. Sameer Dayal & Anju Singh (Noida) 11. Add more value in the world than youre using up- Team of the Quarter We spend down the earths resources every day. Lifes RPC South IT Support Team-South primary challenge is to put more back into the world EVENTS than we take out. 12. Savour every moment- Even the difficult ones. It all goes so fast.