"We have a few deployments with ISPs"
Under the Indian setup, how can a best-of-breed network architecture be put up? How do you plan to differentiate your service offerings?
We have a great team of people with security expertise and have developed new technologies and algorithms to come up with a best-of-breed solution. Many of these have been filed as patents. Along with our own development, we have partnered with leading vendors in this space to integrate their technology into our solution. This has allowed us to come up with a solution which offers compelling value to our customers.
Integrated multi-security services has been our USP from the beginning and we have further reinforced these aspects by bringing new services such as inline anti-virus and real time vulnerability correlation meeting the demands of scalability & high performance.
What is the nature of threats in India? What are Indian CIOs looking at in the future?
With the connectivity provided by Internet, the issues faced by an Indian CIO are very similar to the issues faced in other countries, but due to low level of internet penetration the scale of issues such as denial of service attacks etc have not been fairly visible.
Still an Indian CIO needs to be as well prepared as his counter part in developed countries. Protection from worms, viruses and spyware and protecting from unauthorized entry in the network are some of the current issues faced by Indian CIO. These threats can be countered with use of IDS/IPS and network anti-virus, anti-spyware technologies and iPolicy plays an important role in bringing these technologies.
Can you share any specific details about your client wins?
iPolicy has introduced its security solution to the carriers and the ISPs. We have a few deployments with ISPs and we are about to have a closure with a multinational ISP in India. iPolicy has deployed its systems in multiple carrier networks and expect to see closures soon.
You have been granted a patent last year by US authorities for your universal application decode engine. How will you integrate this into your products?
This technology has now been integrated in our product. Universal application decode technology allows us to adapt our product to changing application and threat scenario prevalent in the networks. Rather than making changes in the product releases to address security needs of new applications or new threats, this technology allows us to perform deep packet inspection of application traffic without any modifications in product software.
Recent news indicates that iPolicy Networks is bolstering its intrusion-prevention firewalls to provide IT managers with more security events that threaten an organization. How can an IT management policy be evolved?
iPolicy is enabling the IT managers to make more informed decisions on the threats and tune the counter measures based on the severity of threat and asset value of the resource under potential threat by brining in the real time vulnerability correlation technology. This technology allows an IT manager to categorize IT resources based on their criticality to business operations, and based on this categorization tune the counter measures can be taken by the intrusion prevention firewall in case of a potential threat. For example, a potential malicious access to web server of an enterprise serving B2B needs can be denied while a similar access to a less business critical server could just raise a warning which could be looked into at a later stage by the IT administrator.
What is the support policy you have in India? Expansion plans and verticals you are looking at? What about your cyber security lab? Any other initiatives in the offing?
Unlike most other security product companies, iPolicy preferred to have the research team and the product implementation out of India. This made it possible for us to develop the product here. In contrast, our preference was to have the support team based outside such that their strong customer interaction can be leveraged as a knowledge base. We have now decided to have a global support center in India while retaining the key support group outside to continue the invaluable customer traction.
We have a cyber security expert research team that is constantly looking at the threat scenario prevailing on the internet, and analyzing these threats. The quantum of research activity going on in this team is at its peak and we are looking for more security professionals to join this team.
- How Companies Can Disrupt Ransomware Attacks
- Central Government Clears BharatNet For Tamil Nadu
- Is Gender Gap In Tech Industry Getting Any Better
- Weekly Rewind: Top 10 Stories On CXO Today (Oct 16-20)
- Password Protected Wi-Fi Is Also Prone To Hacks: Study
- The 10 Best Companies For Women In India
- Delving Into The ABC Of Cyber Security
- Large-Scale IoT Projects Doubled In Last One Year: Study
- Weekly Rewind: Top 10 Stories On CXOToday (Oct 9-13)
- Nissan Motor Appoints Anthony Thomas As Global CIO