SlideShare a Scribd company logo
1 of 22
Enterprise Security Solutions by
IMPORTANCE OF CYBERSECURITY
IN EDUCATION SECTOR
1
Enterprise Security Solutions by
INTRODUCTION
Internet is one significant element of
many higher educational institutions.
Online services have become key to the
modern learning and teaching
environment.
With plethora of connected devices and
increased utilization of Internet, higher
educational institutions are exposed to
risks that impact their information and
data security: cyber threats.
2
Enterprise Security Solutions by
EDUCATION SECTOR HOLDS HUGE DATABASE AND
PERSONAL INDENTIFIABLE INFORMATION (PII)
The security in the education sector is incredibly important
as the information collected by these institutes can be
misused by hackers. The database comprises of:
• Students' personal data such as email id, home address,
contact number, financial information, etc.
• Students' educational data such as projects, marks, etc.
• Admission details
• Examination details
• Administration details
• Institute's employee details
• Financial data of the Institute
3
Sources: the journal, education dive, smart brief, ico.org.uk, BLI
13% of educational institutions in US faced ransomware attacks
on their networks in the past 12 months (as per examined by
Bitsight Insight report).
According to the US Department of Justice Statistics, 4000 ransomware
attacks occur on a daily basis in US alone.
Education industry is facing increasing number of data breaches and cyber attacks
as it holds large volume of personal and financial data.
As per BLI (Breach Level Index), 1.69% of total records stolen/lost by industry
is captured by education sector with a rise of 1.37% in 2017.
In January 2016, the
official website of the
Indian Institute
Managament-
Ahmedabad (IIM-A) was
hacked where the
hackers released the
result of 2015 CAT
exams of about
2,00,000 students.
19% of data breaches are caused by
human error and 32% of system
glitches. A rise of 20% in data breach
has been observed through emails sent
to wrong recipient.
11% of all data breaches were recorded in education industry alone.
A whooping number of 3,153,818 data records were compromised in
education industry in the year 2016.
According to a new study, a data breach in education sector costs $245
per compromised record.
4
Enterprise Security Solutions by
Cyber Security Incidents in Indian Educational Institutions
5
TYPES OF DATA BREACHES THAT
IMPACT EDUCATION SECTOR
6
Hacking and malware
Uninteded disclosure
Portable device
Stationery device
Physical loss
Insider
Unknown
36%
30%
17%
7%
5%
3%
1%
Source: Advisory
Source: advisroy.ey.com
Enterprise Security Solutions by
TOP 5 SECURITY
THREATS IN EDUCATION
SECTOR
7
Enterprise Security Solutions by
#1
Source: Bitsight Insights, the guardian
RANSOMWARE
In 2016, education
industry suffered a huge
rise in ransomware
attacks. After
healthcare industry,
education sector has
become the biggest
target for cyber
attackers. 13%
13%
of total ransomware
attacks were
experienced by
education sector in
2016
In June 2017,
University College
of London was hit
by a ransomware
attack, which
brought down the
university's shared
drives and student
management
system.
“
8
#2
PHISHING
Phishing attacks occur
when a recipient is
tricked to click on a
suspicious or malicious
link sent through email.
37% of data
breaches occur
due to email sent to
wrong recipient.
Sources:
Forbes, Columbia Missourian 9
In January 2017, the
Westminster College of
Columbia fell victim to the
W-2 Form phishing scam. An
employee accidentally
released other employees'
confidential information to a
third party, compromising
their identities.
Young adults are
among those most at
risk at being the
victim of a phishing
scam that results in
malware or
ransomware
downloads.
37%
“
Enterprise Security Solutions by
#3
Higher educational
institutes store huge
amount of data. The data
generated by the students
in the university
ecosystem is the main
reason they are being
targeted by the hackers.
Source:
id theft center
CLOUD
SECURITY
Educational institutions are
becoming highly dependant
on cloud computing. The
increasing utilization of cloud
computing equally enhances
the risk of security and
protection of sensitive
information.
“
10
Sources:
id theft center, security score card
The US alone has
experienced 11.3%
breaches in the education
sector in the first half 0f
2017.
Enterprise Security Solutions by
#4
Sources: ForbesSource:
BYOD
Higher educational
institutions are
increasingly supporting
BYOD in their campus.
BYOD comes with
multiple security
challenges:
-Protection against
devices which are
infected with viruses
-Downloading
unauthorized content
-Social media and access
to malicious websites
BYOD culture enables
students to access multiple
malicious sites which are
often targeted with viruses
and malware.
Security
Issues
11
PROBLEMS WITH BYOD
Network
Overload
Enhanced
Tech
Support
PASSWORD
Most of the educational
institutes are now offering
open Wi-Fi network along
with BYOD policies.
Students power up their
phones, laptops and
tablets using open and
easily hackable Wi-Fi
network and putting all of
their personal information
on these devices.
PROBLEMS
Not secure
network
Reusing similar
or weak
passwords
Open
access
#5
Educational institues are
considered as a fertile place
for password-related cyber
crimes and it is all because
of the habit of using the
same password and
username/email for
everything. According to a
recent report, millions of
stolen and fake email
credentials are sold on the
dark web.
“
12
Source: help net security
Sources:
help net security, IT governance USA,
Forbes
REASONS FOR
PASSWORD PROBLEMS
ON WIRELESS NETWORK
Enterprise Security Solutions by
Helps mitigate all such security threats in the education sector with its range of
Dynamic, Scalable, and Future Ready solutions:
SEQRITE Endpoint Security
SEQRITE Unified Threat Management Solution (TERMINATOR)
SEQRITE Mobile Device Management
SEQRITE Data Loss Prevention
13
Enterprise Security Solutions by
Endpoint Security FEATURES
PATCH MANAGEMENT
Enables IT administrators to check and
install missing security patches for all
applications installed on enterprise endpoints
from a centrally managed console.
WEB SECURITY
Automatically blocks websites infected with
malware or designed for phishing attacks.
APPLICATION CONTROL
Categories of applications can be authorized or
unauthorized from being executed within the
network.
DATA BACKUP AND RESTORE TOOL
Automatically and periodically (multiple times
a day), takes a backup of all important and
well-known file formats like PDF and Microsoft
Office files that are present on a computer.
RISKS MITIGATED
RANSOMWARE ATTACKS
INSIDER THREATS
CORE PROTECTION (IDS/IPS & FIREWALL)
IDS/IPS blocks threats that exploit software
vulnerabilities and Firewall thwarts malicious
attempts to access the corporate network.
BEHAVIOR DETECTION
Detects and blocks unknown viruses and
malware in real-time.
INFECTED WEBSITES
PHISHING ATTACKSINFECTED EXTERNAL DEVICES
SECURITY VULNERABILITIES
14
Enterprise Security Solutions by
Data Loss Prevention
ADVANCED DEVICE CONTROL
- Configure access policies for more than 25 device
types.
- Blocks unverified devices.
- Prevents autorun infections.
ENHANCED PRIVACY PROTECTION & COMPLIANCE
- Identifies Office documents based on their origin.
- Prevents data leakage propagated by worms, Trojans,
and other malware threats.
- Issues regular notifications to reinforce user behavior
on data security.
LOWER COMPLEXITY & COST OF DEPLOYMENT
- Easy integration with existing Seqrite EPS.
- Defines DLP security polices and reports across multiple
endpoints in scattered locations.
- Centralized management and monitoring of crucial business
data.
CONTENT AWARE PROTECTION
- Monitors all actions on confidential files.
- Instantly notifies admins about unauthorized data leakage.
- Ensures that no confidential data leaves the organization.
- TARGETED ATTACKS
- HUMAN ERROR
- USB DRIVES
- WEB EMAIL
DATA LEAKAGE caused by:
RISKS MITIGATED
FEATURES
15
- BLUETOOTH
- CLOUD STORAGE
Enterprise Security Solutions by
TERMINATOR
GATEWAY ANTIVIRUS
Scans all incoming and outgoing network traffic
at the gateway level. Augments existing virus
solutions by reducing the window of
vulnerability (WoV).
FIREWALL
Admins can permit or block access for traffic
between internal and external networks
based on enterprise compliance policies.
VIRTUAL PRIVATE NETWORK
Provides IT administrators with a means for
secure communications between the
company's remote users and for building site-to-
site connections.
IDS / IPS
Scrutinizes network traffic in real-time and
prevents a broad range of DoS and DDoS
attacks before they penetrate the network.
DoS & DDoS ATTACKS
INTERNET DOWNTIME
GATEWAY MAIL PROTECTION
Scans incoming/outgoing emails or attachments
at the gateway level to block spam and phishing
emails before they enter the network.
CONTENT FILTERING
Allows blocking of non-business related websites
including streaming media sites, downloads,
instant messaging, etc., in order to reduce
unnecessary load on enterprise bandwidth.
MALICIOUS INTERNET TRAFFIC
MALICIOUS EMAILSMAN-in-the-MIDDLE ATTACKS
ADVANCED PERSISTENT THREATS
FEATURES
RISKS MITIGATED
16
Enterprise Security Solutions by
MDM
APPLICATION CONTROL
Apps can be remotely managed/ installed/
blocked in order to maintain policy compliance
and productivity within the network.
VIRTUAL FENCING
Preset virtual boundaries that restrict device
usage and functionality. These boundaries can
be triggered by geolocation-based, time-based
or Wi-Fi network-based data.
UNIFIED MANAGEMENT CONSOLE
Manage and synchronize all connected devices
through a centralized graphical interface.
NETWORK DATA MONITORING
Admins can view details of Internet data used
over mobile networks or Wi-Fi. They can also
monitor all incoming and outgoing calls and
SMSs on enterprise mobile devices.
DATA THEFT FROM LOST/
STOLEN MOBILE PHONES
ANTI-THEFT
Prevents misuse of lost/stolen mobile phones by
remotely tracking and locking them. Also prevents
data breach by remotely erasing the phone’s data.
INTERNET THREATS
JAILBREAKING/ ROOTING
OF MOBILE DEVICES
MALICIOUS MOBILE APPS
SECURITY MANAGEMENT
Features such as browsing protection, web
filtering, anti-theft, and geolocation tracking
ensure the safety of enterprise devices.
MOBILE MALWARE
BAD SECURITY HYGIENE
FEATURES
RISKS MITIGATED
17
Enterprise Security Solutions by 18
COMPANY OVERVIEW
QUICKHEAL Journey
• Company renamed as Quick Heal
Technologies Pvt. Ltd. from CAT
Computer Services Pvt. Ltd.
• Quick Heal sets up Technical Support
Centre at Nashik
2006 - 2007
• Quick Heal starts Radio Campaign
• Quick Heal starts its first branch in Nashik
2002 - 2004
• Private Equity Investment firm Sequoia
Capital, invests in Quick Heal
• Quick Heal recognized by CRN India as No.1
Channel Champion
2009 - 2010
• Quick Heal becomes Microsoft’s certified partner
• Quick Heal hosts AAVAR International Security
Conference in India
2008
• Incorporates Quick Heal in Kenya
• Incorporates Quick Heal in Japan
• Quick Heal acquires SurfCanister Sandbox technology
from Apurva Technologies, India
2011
• Launches Quick Heal Mobile
Security
• Launches Quick Heal Endpoint
Security
• Quick Heal acquires behavior based
technologies from Nova Shield Inc.
UK
• Incorporates Quick Heal in Dubai
• ISO 9000
2012 - 2013
• Launches MDM (Mobile Device
Management)
• Launches Terminator (UTM) gateway
security appliances
• Launches free mobile security for Android
• Quick Heal invests in Wegilant Net
Solutions Pvt. Ltd, India
2014
• Launches Seqrite a brand encompassing security
products for Business Enterprise customers
• Quick Heal invests in ‘Smartalyse Technologies Pvt.
Ltd., India’
• Launches Quick Heal Gadget Securance for Mobile
security + insurance
• Launches Fonetastic for Mobile security
2015
• Incorporation as ‘CAT Computer
Services Pvt. Ltd.’
• Launch of ‘Quick Heal’ DOS version
• Launch of ‘Quick Heal’ Windows
version
1995 - 1998
• Listing on BSE and
NSE exchanges
• ISO 27001
• ISO 20000
• Launches ‘Seqrite
Services’ and ‘Quick
Heal Academy’
20162017
• QH Academy signs
MoU with Pune
University, GFSU
and Chitkara
University, Punjab
• Deploys Dell EMC
XtremoIO Platform
• Collaborates with
CERT-In for ‘Cyber
Swachhta Kendra’
Enterprise Security Solutions by 19
Head Office & R&D Center
Pune
Quick Heal –
63 offices &
warehouses across
35 cities in India
COMPANY OVERVIEW
EXTENSIVE REACH & PRESENCE
INDIA (HO)
Quick Heal Technologies
Ltd.
JAPAN
Quick Heal Japan KK.
UAE
Quick Heal Technologies
(MENA) FZE
KENYA
Quick Heal Technologies
Africa Ltd.
USA
Quick Heal Technologies
America Inc.
Enterprise Security Solutions by 20
COMPANY OVERVIEW
Strong Brand Recognition and Recall
24.5 m+
Product Licenses Installed
7.3 m+
Active Licenses across more
than 80 countries
2.0x Growth
In Active Licenses
30% +
Retail Market Share in India
Preferred Choice of
IT technicians for PC Virus
Cleaning
Enterprise Security Solutions by
THANK
YOU
Protecting your business from
today’s attacks and
tomorrow’s threats.
21
Enterprise Security Solutions by 22
THANK YOU

More Related Content

What's hot

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityAkash Dhiman
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for studentsKandarp Shah
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...Edureka!
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Edureka!
 
Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
 
Social engineering hacking attack
Social engineering hacking attackSocial engineering hacking attack
Social engineering hacking attackPankaj Dubey
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessInnocent Korie
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationParab Mishra
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security VulnerabilitiesSiemplify
 

What's hot (20)

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data Protection
 
Social engineering
Social engineering Social engineering
Social engineering
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
 
cyber security
cyber security cyber security
cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Social engineering hacking attack
Social engineering hacking attackSocial engineering hacking attack
Social engineering hacking attack
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 

Similar to Importance of cyber security in education sector

Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustrySeqrite
 
5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public SectorSeqrite
 
Data security for healthcare industry
Data security for healthcare industryData security for healthcare industry
Data security for healthcare industrySeqrite
 
Cyber Security for Teenagers/Students
Cyber Security for Teenagers/StudentsCyber Security for Teenagers/Students
Cyber Security for Teenagers/Studentsrainrjcahili
 
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docxalinainglis
 
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an UncertaintyCyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an UncertaintyOrganization
 
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITYSYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITYIJNSA Journal
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligencewbesse
 
Data Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network AnalysisData Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network AnalysisIJERD Editor
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber securityCarol Meng-Shih Wang
 
Cyber Security Awareness Program
Cyber Security Awareness ProgramCyber Security Awareness Program
Cyber Security Awareness ProgramJohn Rocco
 
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdfCASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdfkostikjaylonshaewe47
 
REPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptxREPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptxeresavenzon
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Erik Ginalick
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threatsReadWrite
 
4514ijmnct01
4514ijmnct014514ijmnct01
4514ijmnct01ijmnct
 

Similar to Importance of cyber security in education sector (20)

Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail Industry
 
Data Security in Healthcare
Data Security in HealthcareData Security in Healthcare
Data Security in Healthcare
 
5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector
 
Data security for healthcare industry
Data security for healthcare industryData security for healthcare industry
Data security for healthcare industry
 
Class activity 4
Class activity 4 Class activity 4
Class activity 4
 
Cyber Security for Teenagers/Students
Cyber Security for Teenagers/StudentsCyber Security for Teenagers/Students
Cyber Security for Teenagers/Students
 
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
6.Copyright © 2014 Pearson Education, Inc. Securing I.docx
 
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an UncertaintyCyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITYSYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITY
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligence
 
Data Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network AnalysisData Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network Analysis
 
Task 3
Task 3Task 3
Task 3
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber security
 
Cyber Security Awareness Program
Cyber Security Awareness ProgramCyber Security Awareness Program
Cyber Security Awareness Program
 
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdfCASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
 
REPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptxREPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptx
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
4514ijmnct01
4514ijmnct014514ijmnct01
4514ijmnct01
 

More from Seqrite

Cybersecurity Myths for Small and Medium-Sized Businesses
Cybersecurity Myths for Small and Medium-Sized BusinessesCybersecurity Myths for Small and Medium-Sized Businesses
Cybersecurity Myths for Small and Medium-Sized BusinessesSeqrite
 
UTM & Next-Gen Firewall Solution: What's the difference?
UTM & Next-Gen Firewall Solution: What's the difference?UTM & Next-Gen Firewall Solution: What's the difference?
UTM & Next-Gen Firewall Solution: What's the difference?Seqrite
 
Unified Threat Management Vs Next-Gen Firewall: What's the difference?
Unified Threat Management Vs Next-Gen Firewall: What's the difference?Unified Threat Management Vs Next-Gen Firewall: What's the difference?
Unified Threat Management Vs Next-Gen Firewall: What's the difference?Seqrite
 
[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention[Infographic] Data Loss Prevention
[Infographic] Data Loss PreventionSeqrite
 
[Infographic] How ransomware gets into your system
[Infographic] How ransomware gets into your system[Infographic] How ransomware gets into your system
[Infographic] How ransomware gets into your systemSeqrite
 
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the worldSeqrite
 
[Infographic] 5 Security Threats in Healthcare Industry
[Infographic] 5 Security Threats in Healthcare Industry [Infographic] 5 Security Threats in Healthcare Industry
[Infographic] 5 Security Threats in Healthcare Industry Seqrite
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingSeqrite
 
7 Cyber attacks that shook the world
7 Cyber attacks that shook the world7 Cyber attacks that shook the world
7 Cyber attacks that shook the worldSeqrite
 

More from Seqrite (9)

Cybersecurity Myths for Small and Medium-Sized Businesses
Cybersecurity Myths for Small and Medium-Sized BusinessesCybersecurity Myths for Small and Medium-Sized Businesses
Cybersecurity Myths for Small and Medium-Sized Businesses
 
UTM & Next-Gen Firewall Solution: What's the difference?
UTM & Next-Gen Firewall Solution: What's the difference?UTM & Next-Gen Firewall Solution: What's the difference?
UTM & Next-Gen Firewall Solution: What's the difference?
 
Unified Threat Management Vs Next-Gen Firewall: What's the difference?
Unified Threat Management Vs Next-Gen Firewall: What's the difference?Unified Threat Management Vs Next-Gen Firewall: What's the difference?
Unified Threat Management Vs Next-Gen Firewall: What's the difference?
 
[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention
 
[Infographic] How ransomware gets into your system
[Infographic] How ransomware gets into your system[Infographic] How ransomware gets into your system
[Infographic] How ransomware gets into your system
 
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world
 
[Infographic] 5 Security Threats in Healthcare Industry
[Infographic] 5 Security Threats in Healthcare Industry [Infographic] 5 Security Threats in Healthcare Industry
[Infographic] 5 Security Threats in Healthcare Industry
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in Banking
 
7 Cyber attacks that shook the world
7 Cyber attacks that shook the world7 Cyber attacks that shook the world
7 Cyber attacks that shook the world
 

Recently uploaded

How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 

Recently uploaded (20)

How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 

Importance of cyber security in education sector

  • 1. Enterprise Security Solutions by IMPORTANCE OF CYBERSECURITY IN EDUCATION SECTOR 1
  • 2. Enterprise Security Solutions by INTRODUCTION Internet is one significant element of many higher educational institutions. Online services have become key to the modern learning and teaching environment. With plethora of connected devices and increased utilization of Internet, higher educational institutions are exposed to risks that impact their information and data security: cyber threats. 2
  • 3. Enterprise Security Solutions by EDUCATION SECTOR HOLDS HUGE DATABASE AND PERSONAL INDENTIFIABLE INFORMATION (PII) The security in the education sector is incredibly important as the information collected by these institutes can be misused by hackers. The database comprises of: • Students' personal data such as email id, home address, contact number, financial information, etc. • Students' educational data such as projects, marks, etc. • Admission details • Examination details • Administration details • Institute's employee details • Financial data of the Institute 3
  • 4. Sources: the journal, education dive, smart brief, ico.org.uk, BLI 13% of educational institutions in US faced ransomware attacks on their networks in the past 12 months (as per examined by Bitsight Insight report). According to the US Department of Justice Statistics, 4000 ransomware attacks occur on a daily basis in US alone. Education industry is facing increasing number of data breaches and cyber attacks as it holds large volume of personal and financial data. As per BLI (Breach Level Index), 1.69% of total records stolen/lost by industry is captured by education sector with a rise of 1.37% in 2017. In January 2016, the official website of the Indian Institute Managament- Ahmedabad (IIM-A) was hacked where the hackers released the result of 2015 CAT exams of about 2,00,000 students. 19% of data breaches are caused by human error and 32% of system glitches. A rise of 20% in data breach has been observed through emails sent to wrong recipient. 11% of all data breaches were recorded in education industry alone. A whooping number of 3,153,818 data records were compromised in education industry in the year 2016. According to a new study, a data breach in education sector costs $245 per compromised record. 4
  • 5. Enterprise Security Solutions by Cyber Security Incidents in Indian Educational Institutions 5
  • 6. TYPES OF DATA BREACHES THAT IMPACT EDUCATION SECTOR 6 Hacking and malware Uninteded disclosure Portable device Stationery device Physical loss Insider Unknown 36% 30% 17% 7% 5% 3% 1% Source: Advisory Source: advisroy.ey.com
  • 7. Enterprise Security Solutions by TOP 5 SECURITY THREATS IN EDUCATION SECTOR 7
  • 8. Enterprise Security Solutions by #1 Source: Bitsight Insights, the guardian RANSOMWARE In 2016, education industry suffered a huge rise in ransomware attacks. After healthcare industry, education sector has become the biggest target for cyber attackers. 13% 13% of total ransomware attacks were experienced by education sector in 2016 In June 2017, University College of London was hit by a ransomware attack, which brought down the university's shared drives and student management system. “ 8
  • 9. #2 PHISHING Phishing attacks occur when a recipient is tricked to click on a suspicious or malicious link sent through email. 37% of data breaches occur due to email sent to wrong recipient. Sources: Forbes, Columbia Missourian 9 In January 2017, the Westminster College of Columbia fell victim to the W-2 Form phishing scam. An employee accidentally released other employees' confidential information to a third party, compromising their identities. Young adults are among those most at risk at being the victim of a phishing scam that results in malware or ransomware downloads. 37% “
  • 10. Enterprise Security Solutions by #3 Higher educational institutes store huge amount of data. The data generated by the students in the university ecosystem is the main reason they are being targeted by the hackers. Source: id theft center CLOUD SECURITY Educational institutions are becoming highly dependant on cloud computing. The increasing utilization of cloud computing equally enhances the risk of security and protection of sensitive information. “ 10 Sources: id theft center, security score card The US alone has experienced 11.3% breaches in the education sector in the first half 0f 2017.
  • 11. Enterprise Security Solutions by #4 Sources: ForbesSource: BYOD Higher educational institutions are increasingly supporting BYOD in their campus. BYOD comes with multiple security challenges: -Protection against devices which are infected with viruses -Downloading unauthorized content -Social media and access to malicious websites BYOD culture enables students to access multiple malicious sites which are often targeted with viruses and malware. Security Issues 11 PROBLEMS WITH BYOD Network Overload Enhanced Tech Support
  • 12. PASSWORD Most of the educational institutes are now offering open Wi-Fi network along with BYOD policies. Students power up their phones, laptops and tablets using open and easily hackable Wi-Fi network and putting all of their personal information on these devices. PROBLEMS Not secure network Reusing similar or weak passwords Open access #5 Educational institues are considered as a fertile place for password-related cyber crimes and it is all because of the habit of using the same password and username/email for everything. According to a recent report, millions of stolen and fake email credentials are sold on the dark web. “ 12 Source: help net security Sources: help net security, IT governance USA, Forbes REASONS FOR PASSWORD PROBLEMS ON WIRELESS NETWORK
  • 13. Enterprise Security Solutions by Helps mitigate all such security threats in the education sector with its range of Dynamic, Scalable, and Future Ready solutions: SEQRITE Endpoint Security SEQRITE Unified Threat Management Solution (TERMINATOR) SEQRITE Mobile Device Management SEQRITE Data Loss Prevention 13
  • 14. Enterprise Security Solutions by Endpoint Security FEATURES PATCH MANAGEMENT Enables IT administrators to check and install missing security patches for all applications installed on enterprise endpoints from a centrally managed console. WEB SECURITY Automatically blocks websites infected with malware or designed for phishing attacks. APPLICATION CONTROL Categories of applications can be authorized or unauthorized from being executed within the network. DATA BACKUP AND RESTORE TOOL Automatically and periodically (multiple times a day), takes a backup of all important and well-known file formats like PDF and Microsoft Office files that are present on a computer. RISKS MITIGATED RANSOMWARE ATTACKS INSIDER THREATS CORE PROTECTION (IDS/IPS & FIREWALL) IDS/IPS blocks threats that exploit software vulnerabilities and Firewall thwarts malicious attempts to access the corporate network. BEHAVIOR DETECTION Detects and blocks unknown viruses and malware in real-time. INFECTED WEBSITES PHISHING ATTACKSINFECTED EXTERNAL DEVICES SECURITY VULNERABILITIES 14
  • 15. Enterprise Security Solutions by Data Loss Prevention ADVANCED DEVICE CONTROL - Configure access policies for more than 25 device types. - Blocks unverified devices. - Prevents autorun infections. ENHANCED PRIVACY PROTECTION & COMPLIANCE - Identifies Office documents based on their origin. - Prevents data leakage propagated by worms, Trojans, and other malware threats. - Issues regular notifications to reinforce user behavior on data security. LOWER COMPLEXITY & COST OF DEPLOYMENT - Easy integration with existing Seqrite EPS. - Defines DLP security polices and reports across multiple endpoints in scattered locations. - Centralized management and monitoring of crucial business data. CONTENT AWARE PROTECTION - Monitors all actions on confidential files. - Instantly notifies admins about unauthorized data leakage. - Ensures that no confidential data leaves the organization. - TARGETED ATTACKS - HUMAN ERROR - USB DRIVES - WEB EMAIL DATA LEAKAGE caused by: RISKS MITIGATED FEATURES 15 - BLUETOOTH - CLOUD STORAGE
  • 16. Enterprise Security Solutions by TERMINATOR GATEWAY ANTIVIRUS Scans all incoming and outgoing network traffic at the gateway level. Augments existing virus solutions by reducing the window of vulnerability (WoV). FIREWALL Admins can permit or block access for traffic between internal and external networks based on enterprise compliance policies. VIRTUAL PRIVATE NETWORK Provides IT administrators with a means for secure communications between the company's remote users and for building site-to- site connections. IDS / IPS Scrutinizes network traffic in real-time and prevents a broad range of DoS and DDoS attacks before they penetrate the network. DoS & DDoS ATTACKS INTERNET DOWNTIME GATEWAY MAIL PROTECTION Scans incoming/outgoing emails or attachments at the gateway level to block spam and phishing emails before they enter the network. CONTENT FILTERING Allows blocking of non-business related websites including streaming media sites, downloads, instant messaging, etc., in order to reduce unnecessary load on enterprise bandwidth. MALICIOUS INTERNET TRAFFIC MALICIOUS EMAILSMAN-in-the-MIDDLE ATTACKS ADVANCED PERSISTENT THREATS FEATURES RISKS MITIGATED 16
  • 17. Enterprise Security Solutions by MDM APPLICATION CONTROL Apps can be remotely managed/ installed/ blocked in order to maintain policy compliance and productivity within the network. VIRTUAL FENCING Preset virtual boundaries that restrict device usage and functionality. These boundaries can be triggered by geolocation-based, time-based or Wi-Fi network-based data. UNIFIED MANAGEMENT CONSOLE Manage and synchronize all connected devices through a centralized graphical interface. NETWORK DATA MONITORING Admins can view details of Internet data used over mobile networks or Wi-Fi. They can also monitor all incoming and outgoing calls and SMSs on enterprise mobile devices. DATA THEFT FROM LOST/ STOLEN MOBILE PHONES ANTI-THEFT Prevents misuse of lost/stolen mobile phones by remotely tracking and locking them. Also prevents data breach by remotely erasing the phone’s data. INTERNET THREATS JAILBREAKING/ ROOTING OF MOBILE DEVICES MALICIOUS MOBILE APPS SECURITY MANAGEMENT Features such as browsing protection, web filtering, anti-theft, and geolocation tracking ensure the safety of enterprise devices. MOBILE MALWARE BAD SECURITY HYGIENE FEATURES RISKS MITIGATED 17
  • 18. Enterprise Security Solutions by 18 COMPANY OVERVIEW QUICKHEAL Journey • Company renamed as Quick Heal Technologies Pvt. Ltd. from CAT Computer Services Pvt. Ltd. • Quick Heal sets up Technical Support Centre at Nashik 2006 - 2007 • Quick Heal starts Radio Campaign • Quick Heal starts its first branch in Nashik 2002 - 2004 • Private Equity Investment firm Sequoia Capital, invests in Quick Heal • Quick Heal recognized by CRN India as No.1 Channel Champion 2009 - 2010 • Quick Heal becomes Microsoft’s certified partner • Quick Heal hosts AAVAR International Security Conference in India 2008 • Incorporates Quick Heal in Kenya • Incorporates Quick Heal in Japan • Quick Heal acquires SurfCanister Sandbox technology from Apurva Technologies, India 2011 • Launches Quick Heal Mobile Security • Launches Quick Heal Endpoint Security • Quick Heal acquires behavior based technologies from Nova Shield Inc. UK • Incorporates Quick Heal in Dubai • ISO 9000 2012 - 2013 • Launches MDM (Mobile Device Management) • Launches Terminator (UTM) gateway security appliances • Launches free mobile security for Android • Quick Heal invests in Wegilant Net Solutions Pvt. Ltd, India 2014 • Launches Seqrite a brand encompassing security products for Business Enterprise customers • Quick Heal invests in ‘Smartalyse Technologies Pvt. Ltd., India’ • Launches Quick Heal Gadget Securance for Mobile security + insurance • Launches Fonetastic for Mobile security 2015 • Incorporation as ‘CAT Computer Services Pvt. Ltd.’ • Launch of ‘Quick Heal’ DOS version • Launch of ‘Quick Heal’ Windows version 1995 - 1998 • Listing on BSE and NSE exchanges • ISO 27001 • ISO 20000 • Launches ‘Seqrite Services’ and ‘Quick Heal Academy’ 20162017 • QH Academy signs MoU with Pune University, GFSU and Chitkara University, Punjab • Deploys Dell EMC XtremoIO Platform • Collaborates with CERT-In for ‘Cyber Swachhta Kendra’
  • 19. Enterprise Security Solutions by 19 Head Office & R&D Center Pune Quick Heal – 63 offices & warehouses across 35 cities in India COMPANY OVERVIEW EXTENSIVE REACH & PRESENCE INDIA (HO) Quick Heal Technologies Ltd. JAPAN Quick Heal Japan KK. UAE Quick Heal Technologies (MENA) FZE KENYA Quick Heal Technologies Africa Ltd. USA Quick Heal Technologies America Inc.
  • 20. Enterprise Security Solutions by 20 COMPANY OVERVIEW Strong Brand Recognition and Recall 24.5 m+ Product Licenses Installed 7.3 m+ Active Licenses across more than 80 countries 2.0x Growth In Active Licenses 30% + Retail Market Share in India Preferred Choice of IT technicians for PC Virus Cleaning
  • 21. Enterprise Security Solutions by THANK YOU Protecting your business from today’s attacks and tomorrow’s threats. 21
  • 22. Enterprise Security Solutions by 22 THANK YOU