SlideShare a Scribd company logo
1 of 7
AMAZON S3 CONSOLE
NOW REPORTS
SECURITY WARNINGS,
ERRORS, AND
SUGGESTIONS FROM
IAM ACCESS ANALYZER
AS YOU AUTHOR YOUR
S3 POLICIES
SPEAKER
Dhaval Soni
A W S A P N A M B A S S A D O R A N D
S O L U T I O N S A R C H I T E C T
• India’s first Red Hat Certified Architect in 2009
• 10x AWS Certified Solutions Architect
• 10x Red Hat Certified Architect
• ISO/IEC 27001 Lead Auditor
• Certified Payment-Card Industry Security Implementer (CPISI)
• EU Registered European Data Protection Professional (GDPR)
• Certified Cyber Security Analyst from GFSU – Department of
Forensic Sciences, Gujarat State
Confidential Information - Infostretch Corporation - For intended recipients only. ©2021 Infostretch. All rights reserved. 3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
3
Confidential Information - Infostretch Corporation - For intended recipients only. ©2021 Infostretch. All rights reserved. 3
3
AGENDA
• What is Amazon S3 & IAM Access
Analyzer?
• Latest announcement
• How will it help you?
WHAT IS AMAZON S3 & AWS IAM ACCESS
ANALYZER?
• Amazon S3 is an object storage service offering industry-leading scalability,
data availability, security, and performance.
• Customers of all sizes and industries can use Amazon S3 to store and
protect any amount of data for a range of use cases.
• AWS IAM Access Analyzer helps you identify the resources in your
organization and accounts, such as Amazon S3 buckets or IAM roles,
shared with an external entity.
• This lets you identify unintended access to your resources and data, which
is a security risk.
Amazon S3
AWS IAM Access
Analyzer
ANNOUNCEMENT
• AWS S3 console now reports security warnings, errors, and
suggestions from Identity and IAM Access Analyzer as you author
your S3 policies.
• The console automatically runs more than 100 policy checks to
validate your policies. These checks save you time, guide you to
resolve errors, and help you apply security best practices.
• You can also validate your S3 policies programmatically by using the
Access Analyzer API.
HOW WILL IT HELP YOU?
• By resolving errors and security warnings reported by the S3 console,
you can validate that your policies are functional before you attach
them to your S3 buckets or access points.
• Programmatic validation helps you identify errors and security warnings
in policies as a part of your CI/CD pipelines and allows you to run
policy validation at scale.
THANK YOU!

More Related Content

What's hot

What's hot (17)

Amazon SQS Announces Server-Side Encryption with Amazon SQS-managed encryptio...
Amazon SQS Announces Server-Side Encryption with Amazon SQS-managed encryptio...Amazon SQS Announces Server-Side Encryption with Amazon SQS-managed encryptio...
Amazon SQS Announces Server-Side Encryption with Amazon SQS-managed encryptio...
 
Application Load Balancer and Network Load Balancer end-to-end IPv6 support
Application Load Balancer and Network Load Balancer end-to-end IPv6 supportApplication Load Balancer and Network Load Balancer end-to-end IPv6 support
Application Load Balancer and Network Load Balancer end-to-end IPv6 support
 
Amazon EC2 Auto Scaling Now Supports Predictive Scaling with Custom Metrics
Amazon EC2 Auto Scaling Now Supports Predictive Scaling with Custom MetricsAmazon EC2 Auto Scaling Now Supports Predictive Scaling with Custom Metrics
Amazon EC2 Auto Scaling Now Supports Predictive Scaling with Custom Metrics
 
Amazon Athena now supports new Lake Formation fine-grained security and relia...
Amazon Athena now supports new Lake Formation fine-grained security and relia...Amazon Athena now supports new Lake Formation fine-grained security and relia...
Amazon Athena now supports new Lake Formation fine-grained security and relia...
 
Amazon CloudWatch RUM for monitoring applications’ client-side performance
Amazon CloudWatch RUM for monitoring applications’ client-side performanceAmazon CloudWatch RUM for monitoring applications’ client-side performance
Amazon CloudWatch RUM for monitoring applications’ client-side performance
 
AWS Leeds Meetup - How do you manage secure access to AWS in an ever-increasi...
AWS Leeds Meetup - How do you manage secure access to AWS in an ever-increasi...AWS Leeds Meetup - How do you manage secure access to AWS in an ever-increasi...
AWS Leeds Meetup - How do you manage secure access to AWS in an ever-increasi...
 
Amazon Lambda & API-GW
Amazon Lambda & API-GWAmazon Lambda & API-GW
Amazon Lambda & API-GW
 
Visualization with Amazon QuickSight
Visualization with Amazon QuickSightVisualization with Amazon QuickSight
Visualization with Amazon QuickSight
 
Overview of Blue Medora - New Relic Plugin for MongoDB
Overview of Blue Medora - New Relic Plugin for MongoDBOverview of Blue Medora - New Relic Plugin for MongoDB
Overview of Blue Medora - New Relic Plugin for MongoDB
 
AWS Summit Singapore - The Age of Security Automation for Modern Application ...
AWS Summit Singapore - The Age of Security Automation for Modern Application ...AWS Summit Singapore - The Age of Security Automation for Modern Application ...
AWS Summit Singapore - The Age of Security Automation for Modern Application ...
 
Security & Compliance
Security & ComplianceSecurity & Compliance
Security & Compliance
 
Operational Visibility at Global Scale
Operational Visibility at Global ScaleOperational Visibility at Global Scale
Operational Visibility at Global Scale
 
Computing DevOps Summit, London, July 5, 2016
Computing DevOps Summit, London, July 5, 2016Computing DevOps Summit, London, July 5, 2016
Computing DevOps Summit, London, July 5, 2016
 
How to Protect your AWS Environment
How to Protect your AWS EnvironmentHow to Protect your AWS Environment
How to Protect your AWS Environment
 
Azure what's new in 2018
Azure   what's new in 2018Azure   what's new in 2018
Azure what's new in 2018
 
Capital One Data Breach
Capital One Data BreachCapital One Data Breach
Capital One Data Breach
 
AWS IoT Day - Using AWS IoT Core
AWS IoT Day - Using AWS IoT CoreAWS IoT Day - Using AWS IoT Core
AWS IoT Day - Using AWS IoT Core
 

Similar to Amazon S3 console now reports security warnings, errors, and suggestions from IAM Access Analyzer as you author your S3 policies

What's New in AWS Security Features
What's New in AWS Security FeaturesWhat's New in AWS Security Features
What's New in AWS Security Features
Amazon Web Services
 

Similar to Amazon S3 console now reports security warnings, errors, and suggestions from IAM Access Analyzer as you author your S3 policies (20)

Amazon s3 storage lens metrics now available in amazon cloud watch
Amazon s3 storage lens metrics now available in amazon cloud watchAmazon s3 storage lens metrics now available in amazon cloud watch
Amazon s3 storage lens metrics now available in amazon cloud watch
 
Amazon s3 adds new s3 event notifications for s3 lifecycle, s3 intelligent ti...
Amazon s3 adds new s3 event notifications for s3 lifecycle, s3 intelligent ti...Amazon s3 adds new s3 event notifications for s3 lifecycle, s3 intelligent ti...
Amazon s3 adds new s3 event notifications for s3 lifecycle, s3 intelligent ti...
 
Core strategies to develop defense in depth in AWS
Core strategies to develop defense in depth in AWSCore strategies to develop defense in depth in AWS
Core strategies to develop defense in depth in AWS
 
Security and Compliance – Most Commonly Asked Questions - Technical 101
Security and Compliance – Most Commonly Asked Questions - Technical 101Security and Compliance – Most Commonly Asked Questions - Technical 101
Security and Compliance – Most Commonly Asked Questions - Technical 101
 
Frequently Asked Questions in the AWS Security Interview.pptx
Frequently Asked Questions in the AWS Security Interview.pptxFrequently Asked Questions in the AWS Security Interview.pptx
Frequently Asked Questions in the AWS Security Interview.pptx
 
Frequently Asked Questions in the AWS Security Interview.pptx
Frequently Asked Questions in the AWS Security Interview.pptxFrequently Asked Questions in the AWS Security Interview.pptx
Frequently Asked Questions in the AWS Security Interview.pptx
 
On a trail with Amazon Detective | LCloud
On a trail with Amazon Detective | LCloudOn a trail with Amazon Detective | LCloud
On a trail with Amazon Detective | LCloud
 
SEC309 Secure Your Cloud Investment: Mastering AWS Identity Access Management...
SEC309 Secure Your Cloud Investment: Mastering AWS Identity Access Management...SEC309 Secure Your Cloud Investment: Mastering AWS Identity Access Management...
SEC309 Secure Your Cloud Investment: Mastering AWS Identity Access Management...
 
Proteggere applicazioni e dati nel cloud AWS
Proteggere applicazioni e dati nel cloud AWSProteggere applicazioni e dati nel cloud AWS
Proteggere applicazioni e dati nel cloud AWS
 
Partnering to Deliver Cost Efficient and Reliable Corporate Services to Agenc...
Partnering to Deliver Cost Efficient and Reliable Corporate Services to Agenc...Partnering to Deliver Cost Efficient and Reliable Corporate Services to Agenc...
Partnering to Deliver Cost Efficient and Reliable Corporate Services to Agenc...
 
Security & Compliance
Security & Compliance Security & Compliance
Security & Compliance
 
Beginners guide to aws security monitoring
Beginners guide to aws security monitoringBeginners guide to aws security monitoring
Beginners guide to aws security monitoring
 
GDPR and Automation Overview
GDPR and Automation OverviewGDPR and Automation Overview
GDPR and Automation Overview
 
Top 5 security errors and how to avoid them - DEM06-S - Mexico City AWS Summit
Top 5 security errors and how to avoid them - DEM06-S - Mexico City AWS SummitTop 5 security errors and how to avoid them - DEM06-S - Mexico City AWS Summit
Top 5 security errors and how to avoid them - DEM06-S - Mexico City AWS Summit
 
AWS Webcast - Understanding the AWS Security Model
AWS Webcast - Understanding the AWS Security ModelAWS Webcast - Understanding the AWS Security Model
AWS Webcast - Understanding the AWS Security Model
 
Security and compliance
Security and complianceSecurity and compliance
Security and compliance
 
Amazon Time Sync Service now makes it easier to generate and compare timestamps
Amazon Time Sync Service now makes it easier to generate and compare timestampsAmazon Time Sync Service now makes it easier to generate and compare timestamps
Amazon Time Sync Service now makes it easier to generate and compare timestamps
 
Threat detection and mitigation at AWS
Threat detection and mitigation at AWSThreat detection and mitigation at AWS
Threat detection and mitigation at AWS
 
What's New in AWS Security Features
What's New in AWS Security FeaturesWhat's New in AWS Security Features
What's New in AWS Security Features
 
Scaling Security Operations and Automating Governance: Which AWS Services Sho...
Scaling Security Operations and Automating Governance: Which AWS Services Sho...Scaling Security Operations and Automating Governance: Which AWS Services Sho...
Scaling Security Operations and Automating Governance: Which AWS Services Sho...
 

More from Dhaval Soni

More from Dhaval Soni (14)

AWS Shield Advanced introduces automatic application-layer DDoS mitigation
AWS Shield Advanced introduces automatic application-layer DDoS mitigationAWS Shield Advanced introduces automatic application-layer DDoS mitigation
AWS Shield Advanced introduces automatic application-layer DDoS mitigation
 
AWS announces Construct Hub general availability
AWS announces Construct Hub general availabilityAWS announces Construct Hub general availability
AWS announces Construct Hub general availability
 
AWS WAF adds support for Captcha
AWS WAF adds support for CaptchaAWS WAF adds support for Captcha
AWS WAF adds support for Captcha
 
EC2 Image Builder enables sharing Amazon Machine Images (AMIs) with AWS Organ...
EC2 Image Builder enables sharing Amazon Machine Images (AMIs) with AWS Organ...EC2 Image Builder enables sharing Amazon Machine Images (AMIs) with AWS Organ...
EC2 Image Builder enables sharing Amazon Machine Images (AMIs) with AWS Organ...
 
Amazon DynamoDB now helps you meet regulatory compliance and business continu...
Amazon DynamoDB now helps you meet regulatory compliance and business continu...Amazon DynamoDB now helps you meet regulatory compliance and business continu...
Amazon DynamoDB now helps you meet regulatory compliance and business continu...
 
AWS Database Migration Service now supports Azure SQL Managed Instance as a s...
AWS Database Migration Service now supports Azure SQL Managed Instance as a s...AWS Database Migration Service now supports Azure SQL Managed Instance as a s...
AWS Database Migration Service now supports Azure SQL Managed Instance as a s...
 
AWS Control Tower now provides controls to meet data residency requirements
AWS Control Tower now provides controls to meet data residency requirementsAWS Control Tower now provides controls to meet data residency requirements
AWS Control Tower now provides controls to meet data residency requirements
 
AWS Control Tower introduces Terraform account provisioning and customization
AWS Control Tower introduces Terraform account provisioning and customizationAWS Control Tower introduces Terraform account provisioning and customization
AWS Control Tower introduces Terraform account provisioning and customization
 
Introducing the aws migration and modernization competency
Introducing the aws migration and modernization competencyIntroducing the aws migration and modernization competency
Introducing the aws migration and modernization competency
 
Amazon Pinpoint launches in-app messaging as a new communications channel
Amazon Pinpoint launches in-app messaging as a new communications channelAmazon Pinpoint launches in-app messaging as a new communications channel
Amazon Pinpoint launches in-app messaging as a new communications channel
 
AWS Backup adds support for VMware workloads
AWS Backup adds support for VMware workloadsAWS Backup adds support for VMware workloads
AWS Backup adds support for VMware workloads
 
Sustainability Pillar for AWS Well-Architected Framework
Sustainability Pillar for AWS Well-Architected FrameworkSustainability Pillar for AWS Well-Architected Framework
Sustainability Pillar for AWS Well-Architected Framework
 
AWS announces the new Amazon Inspector for continual vulnerability management
AWS announces the new Amazon Inspector for continual vulnerability managementAWS announces the new Amazon Inspector for continual vulnerability management
AWS announces the new Amazon Inspector for continual vulnerability management
 
AWS Secrets Manager increases secrets limit to 500K per account
AWS Secrets Manager increases secrets limit to 500K per accountAWS Secrets Manager increases secrets limit to 500K per account
AWS Secrets Manager increases secrets limit to 500K per account
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Amazon S3 console now reports security warnings, errors, and suggestions from IAM Access Analyzer as you author your S3 policies

  • 1. AMAZON S3 CONSOLE NOW REPORTS SECURITY WARNINGS, ERRORS, AND SUGGESTIONS FROM IAM ACCESS ANALYZER AS YOU AUTHOR YOUR S3 POLICIES
  • 2. SPEAKER Dhaval Soni A W S A P N A M B A S S A D O R A N D S O L U T I O N S A R C H I T E C T • India’s first Red Hat Certified Architect in 2009 • 10x AWS Certified Solutions Architect • 10x Red Hat Certified Architect • ISO/IEC 27001 Lead Auditor • Certified Payment-Card Industry Security Implementer (CPISI) • EU Registered European Data Protection Professional (GDPR) • Certified Cyber Security Analyst from GFSU – Department of Forensic Sciences, Gujarat State
  • 3. Confidential Information - Infostretch Corporation - For intended recipients only. ©2021 Infostretch. All rights reserved. 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 Confidential Information - Infostretch Corporation - For intended recipients only. ©2021 Infostretch. All rights reserved. 3 3 AGENDA • What is Amazon S3 & IAM Access Analyzer? • Latest announcement • How will it help you?
  • 4. WHAT IS AMAZON S3 & AWS IAM ACCESS ANALYZER? • Amazon S3 is an object storage service offering industry-leading scalability, data availability, security, and performance. • Customers of all sizes and industries can use Amazon S3 to store and protect any amount of data for a range of use cases. • AWS IAM Access Analyzer helps you identify the resources in your organization and accounts, such as Amazon S3 buckets or IAM roles, shared with an external entity. • This lets you identify unintended access to your resources and data, which is a security risk. Amazon S3 AWS IAM Access Analyzer
  • 5. ANNOUNCEMENT • AWS S3 console now reports security warnings, errors, and suggestions from Identity and IAM Access Analyzer as you author your S3 policies. • The console automatically runs more than 100 policy checks to validate your policies. These checks save you time, guide you to resolve errors, and help you apply security best practices. • You can also validate your S3 policies programmatically by using the Access Analyzer API.
  • 6. HOW WILL IT HELP YOU? • By resolving errors and security warnings reported by the S3 console, you can validate that your policies are functional before you attach them to your S3 buckets or access points. • Programmatic validation helps you identify errors and security warnings in policies as a part of your CI/CD pipelines and allows you to run policy validation at scale.

Editor's Notes

  1. RYM SLIDE​​ ​​ *Hello and good morning, everyone. We will begin the webinar here in a few minutes, still seeing some people signing on at this time. In the meantime, I would like to ensure we could hear our speakers, Shabir, Kinjan, Chintan, can you say a quick hello? --- Perfect, thank you. Okay, stay tuned, we’ll begin here shortly.  ​​  ​​ *Hi all, we’ll begin the presentation in about a minute. Thank you.  ​​ ​​ *Hello and welcome to our webinar, ”Secure Real Time Monitoring & Analysis for IoT Product Engineering". ​​ My name is Rym Badri and I will be your host today. ​​
  2. RYM SLIDE​ ​ Today’s presenter are: ​ ​ Shabir ​​Rupani, Sr. Partner Solutions Architect at AWS, Kinjan Shah, Director of IoT and MedTech Practice at Infostretch and Chintan Prajapati, Solutions Architect focused on IoT and MedTech at Infostretch. Shabir is a Senior Partner Solutions Architect at AWS. He has a background in Application Infrastructure Architecture with a core focus on migrating and modernizing applications for the cloud. Currently, at AWS he is focused on helping AWS Partner Network (APN) partners build and develop their AWS Practice, and innovate on the AWS platform to deliver the best possible outcomes for their customers. Kinjan is our Director of the IoT and MedTech Engineering Practice here at Infostretch, He has led the creation of various frameworks that enable MedTech companies to shorten their product development cycle. He has more than 22 years of experience in IoT solutions and MedTech Engineering along with enterprise mobile applications, embedded systems, and enterprise solutions. He has worked with both startups and Fortune 500 companies across different industries including Healthcare, Medical Devices, Financial (Mobile and Digital Payments) and Industrial Automation (M2M and IoT solutions). Finally, As Solutions Architect part of the IoT and MedTech Practice at Infostretch, Chintan is involved in building Accelerators & Frameworks to expedite delivery of IoT & Mobility Solutions. Chintan is involved in Project seeding activities and Solution Development for customer on their Consumer IoT, Industrial IoT, Internet of Medical Things (IOMT), Mobility & Cloud initiatives.
  3. KINJAN SLIDE
  4. RYM SLIDE I believe that’s all the questions we are able to answer at this time. ​ Many thanks to our speakers, Ketan, Shabir and Deven and Thank you everyone for joining us today! ​ Be sure to check out and subscribe to DTV – A digital transformation channel that brings in industry experts including Intermiles! ​ You will receive an email in the next 24 hours with the slide presentation and link to the webcast replay. ​ ​ If you have any questions, please contact us at info@infostretch.com or you can reach out to the presenters directly. ​ ​ Thank you, all. Enjoy the rest of your day!​ ​ <END PRESENTATION>​ ​