Tata Communications is rapidly occupying customer mindshare as a strong player in innovating and building service platforms to drive managed security services solutions aligned to customer needs. The company has a managed security services and solutions which help cover critical operational and capability gaps in cyber security for customers to deliver measurable and effective protection against attacks and malware. In conversation with Dataquest, Avinash Prasad, Vice President, Managed Security Services, Tata Communications, talks about trends in security space and what is company’s business plan. Excerpts:
What are the key considerations for different industries in securing critical digital infrastructure?
Today, effective security for any organisation is a factor of both the security technology and infrastructure as well as the associated operations and processes. With the increasing adoption of new technologies like the Internet of Things (IoT), 5G and AI change the business landscape, organisations are choosing to embark on their own distinct journey of digital transformation.
In the current scenario, businesses are required to have the foresight to factor in security at the outset of planning their digital transformation strategy to mitigate the risks from outside threats and potentially reduce the downstream costs of fixing security. This is the process of ‘building a Security Profile’ for your organisation based on a considered understanding of the relevant threat landscape. While planning for security within an organisation, the enterprise needs to factor the well-established pillars of confidentiality, integrity and availability while also adhering to laws around risk and compliance and data sovereignty. The other imperative aspect is to protect the infrastructure across the entire spectrum through which the most important asset – ‘sensitive or critical data’ travels – from its origin right till the disposal. This means that the cybersecurity measures need to be integrated into the multiple layers – including hardware, software and applications – and access device layers to potentially reduce the risks of a serious data breach.
How does the ecosystem work together to ensure integrated security, right from the wireless infrastructure to data acquisition and analytics infrastructure?
Diese Geschichte stammt aus der October 2018-Ausgabe von DataQuest.
Starten Sie Ihre 7-tägige kostenlose Testversion von Magzter GOLD, um auf Tausende kuratierte Premium-Storys sowie über 8.000 Zeitschriften und Zeitungen zuzugreifen.
Bereits Abonnent ? Anmelden
Diese Geschichte stammt aus der October 2018-Ausgabe von DataQuest.
Starten Sie Ihre 7-tägige kostenlose Testversion von Magzter GOLD, um auf Tausende kuratierte Premium-Storys sowie über 8.000 Zeitschriften und Zeitungen zuzugreifen.
Bereits Abonnent? Anmelden
How big is India's Computer Accessories Market? Innovations expected by FY25
India’s computer accessories sector grows with Make in India, Digital India, and rising demand for high-tech accessories like AIl-powered devices, boosting exports globally.
When Network Threats Are Not Allowed to Check-in
Like elevators, networks in this hotel are segregated for guests, for service, and locked for outsiders unless they prove bona fide. Does this approach work?
Robotic Surgeries can turn into double-edged Swords
Technology should never come at the cost of affordability, privacy, training ease, the ability to practice anywhere, CRM’s real use and sensitivity to patient experience. Surjeet Thakur, CIO Rajagiri Hospital, Kochi gives us an X-ray from different angles.
Does Santa Claus watch when you pay rent on time?
If yes, what kind of diary does he use to distinguish good kids from delinquent ones? And what stockings can you hang to translate this good behaviour into rewards home loan discounts, prop-tech speed, landlord KYC or more?
Roadmap for Bank-based Apps to Gain UPI Market Share A missed opportunity!
As UPI dominates, will banks step up to reclaim their market? UPI continues its meteoric rise, handling 69.6% of India's digital transactions and reaching ₹20.6 lakh crore across 14.8 billion transactions in August 2024 alone.
The Future of Machine Identity
The biggest challenge today in the digital security sphere is securing machine identities -the digital entities such as APIs, software applications, and IoT devicesthat are constantly being targeted due to the changing nature of cyber threats.
Redefining AI Application Delivery
In this discussion with F5’s Ahmed Guetari and Adam Judd, we explore the collaboration between F5 and NVIDIA, which leverages the innovative capabilities of NVIDIA's BlueField-3 DPUs and F5’s BIG-IP Next platform. This partnership is set to redefine AI application delivery and security, particularly in the high-growth Indian market, by enabling better resource allocation, faster data processing, and robust security enhancements. With AI adoption surging across industries, F5 and NVIDIA's synergy brings transformative solutions for service providers and enterprises, poised to drive India’s AI-led innovation.
EPAM's Bold Leap: Transforming Business with Al-Driven Salesforce Solutions.
Siba Padhy, Head of Salesforce Business, EPAM Systems highlights how Salesforce has evolved from a core sales solution to a comprehensive platform that encompasses service, marketing, and commerce, with a significant emphasis on leveraging AI technologies, particularly the newly launched Agentforce and Einstein GPT. Padhy discusses the burgeoning agent tech economy in India and EPAM's strategic focus on delivering tailored solutions that address specific market needs. With ambitious growth targets, EPAM aims to double its Salesforce expertise in the coming years, positioning itself as a key player in driving digital transformation across various industries.
The Smart Manufacturing Revolution in India
Explore how cutting-edge technologies are redefining manufacturing in India, shaping a future where efficiency and sustainability go hand in hand.
Digital Governance: Changing that Red Carpet into a Green One
India's approach and success stories in digital governance show how technology should be used to cover the entire carpet area - From expanding inclusion to the digitally not-so-savvy folks to strengthening interoperability - we have made sure the grass is green, every side