February Issue 2020

Page 35

FEATURE STORY

“OUR MAJOR FOCUS WOULD BE ON PRODUCTS SUCH AS KASPERSKY ANTI TARGETED ATTACK PLATFORM (KATA), ENDPOINT DETECTION AND RESPONSE (EDR), SANDBOX, THREAT INTELLIGENCE REPORTING, AND SERVICES, MANAGED SERVICES PROVIDER PARTNERSHIPS, SECURITY CLOUD AND INDUSTRIAL CYBERSECURITY SOLUTIONS.” DIPESH KAURA General Manager for South Asia, Kaspersky.

“WE OFFER OUR PLATFORM FOR VULNERABILITY MANAGEMENT CALLED HOLM SECURITY VMP TOGETHER WITH A POWERFUL MULTI-TENANT PORTAL. THE PLATFORM IS A COMPLETE SOLUTION FOR CONTINUOUS AND AUTOMATED SCANNING PROVIDED FROM THE CLOUD AND AS AN ON-PREM PRODUCT.” ALOK SAHAY country manager India and SAARC, Holm security

“TRAINING AND UPGRADING PARTNER SKILL SETS IN AN ONGOING PROCESS AND WE DO THIS PROGRAMMATICALLY TOGETHER WITH THE CHANNEL MARKETING TEAM. THIS IS WORKING WELL FOR RSA AND WE WILL CONTINUE WITH IT IN FY’20.” RAJNISH GUPTA Regional Director – RSA Security

popular application to launch focused attacks with financial gains in mind. Threats from Ransomware, Data Leak, Malware, and Phishing will increase in 2020, at the same time Identity and authentication cloning are likely to grow. It means the landscape is going to be very complex. On this Rajnish of RSA Security says, “In 2020, we can expect 75% of all major breaches to happen due to fundamental mistakes, and not by extremely sophisticated techniques. As a result, new stan-

dards and regulations will drive a return to basic security best practices forcing security providers to improve some of the foundational security work that they should have been doing all along. On the business front, the accountability for cyber risk will move up the organizational chart, with businesses appointing board members with experience in risk management and information security. On the technology front, businesses will look to reduce dependency on talent via security

orchestration and automation software, risk-based prioritization and comprehensive threat analytics”. Cloud security is the future of cyber security. To predict and defeat attacks in real time, cybersecurity must move to the cloud, Harpreet of Palo Alto Networks added, “More businesses are seen to be leveraging containers (i.e., operating system virtualisation) for their efficiency, consistency and lower costs. However, the potential dangers of exposed and misconfigured containers will

SME CHANNELS 35 FEBRUARY 2020


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.