alt =""
Showing posts with label vulnerability assessment. Show all posts
Showing posts with label vulnerability assessment. Show all posts

Tuesday, 29 March 2016

Happiest Minds’ ThreatVigil Wins GOLD at the Infosecurity Product Guide’s Global Excellence Award 2016

Happiest Minds Technologies, a next generation digital transformation, infrastructure, security and product engineering services company, today, announced that ThreatVigil, its cloud-based threat management solution, won top honours in the Infosecurity Product Guide’s Global Excellence Awards. The solution was recognized in the ‘GOLD’ category for Vulnerability Assessment, Remediation and Management.

ThreatVigil is an on-Demand cloud-based threat management solution that comprises of vulnerability assessments and penetration testing of all the system components that include business applications, databases, secure network perimeters, systems and network infrastructure, mobility solutions and virtualized cloud environments. Developed with a combination of industry proven automated tools and in-depth manual assessment techniques, it is highly scalable and offers faster and simpler deployment options with no dependencies.

"We are honoured to be recognized as an industry leader yet again by the Info Security Products Guide Global Excellence Awards. We are seeing increasing global demand for our cloud-based security solutions and these recognitions from industry forums reinforce the impact we are making with our IP based solution accelerators. This award reinforces our commitment to provide an innovative and pragmatic approach for enterprises to help them protect themselves against the dynamic and emerging threat landscape,” said Prasenjit Saha, President, Infrastructure Management Services and Security Business, Happiest Minds Technologies.

The security industry celebrated its 12th Annual Global Excellence Awards in San Francisco by honouring excellence in every facet of the industry including products, industry leaders and best companies. There was participation from many well-recognized companies under 45 categories, and more than 50 judges from a broad spectrum of industry voices around the world analyzed these nominations. An average of their score determined the finalists and winners that were announced during the awards dinner and presentation attended by the finalists, judges and industry peers.

About Happiest Minds Technologies:

Happiest Minds enables Digital Transformation for enterprises and technology providers by delivering seamless customer experience, business efficiency and actionable insights through an integrated set of disruptive technologies: big data analytics, internet of things, mobility, cloud, security, unified communications, etc. Happiest Minds offers domain centric solutions applying skills, IPs and functional expertise in IT Services, Product Engineering, Infrastructure Management and Security. These services have applicability across industry sectors such as retail, consumer packaged goods, e-commerce, banking, insurance, hi-tech, engineering R&D, manufacturing, automotive and travel/transportation/hospitality.

Headquartered in Bangalore, India, Happiest Minds has operations in the US, UK, Singapore, Australia and has secured US $52.5 million Series-A funding. Its investors are JPMorgan Private Equity Group, Intel Capital and Ashok Soota.

About Info Security Products Guide:

Info Security Products Guide plays a vital role in keeping end-users informed of the choices they can make when it comes to protecting their digital resources. It is written expressly for those who are adamant on staying informed of security threats and the preventive measure they can take. You will discover a wealth of information in this guide including tomorrow's technology today, best deployment scenarios, people and technologies shaping info security and market research reports that facilitate in making the most pertinent security decisions. The Info Security Products Guide Global Excellence Awards recognize and honour excellence in all areas of information security. To learn more, visit www.infosecurityproductsguide.com and stay secured.

Media Contact:

Thursday, 21 January 2016

Staying Afloat During a Cyber-Attack

Given the rising frequency of increasingly malicious and innovative cyber-attacks, one can safely conclude that cyber risk is here to stay. It is no longer a question of ‘if’ but ‘when’ your organization will have to deal with a cyber-attack. The cost of a cyber security breach is significant—in terms of money, business disruption and reputation. Depending on the magnitude of the attack, a cyber incident can potentially put you out of business.

The best course of action for a business that is attacked is a swift and effective response. A cyber security strategy with efficient incident response (IR) capabilities coupled with customer engagement initiatives helps limit the damage and ensures that the business is up and running as soon as possible. Reaching out and engaging with customers reassures them, and helps a business that’s dealing with a cyber-attack to regain customer confidence, and prevent defection.

An effective IR strategy navigates the following phases:

Identify
Information on events is collected from various sources such as intrusion detection systems and firewalls, and evaluated to identify deviations from the normal. Such deviations are then analyzed to check if they are sufficiently significant to be termed an event. The use of automation tools ensures swift detection and eliminates delays in moving to the containment phase. Once a deviation is identified as a security incident, the IR team is immediately notified to allow them to determine its scope, gather and document evidence, and estimate impact on operations. Businesses can bolster this process by incorporating an effective security information and event management (SIEM) system into their cyber security strategy.
Contain
Once a security event is detected and confirmed, it is essential to restrict damage by preventing its spread to other computer systems. Preventing the spread of malware involves isolating the affected systems, and rerouting the traffic to alternative servers. This helps limit the spread of the malware to other systems across the organization.

Eliminate
This step focuses on the removal of the malware from the affected systems. IR teams then conduct an analysis to find out the cause of the attack, perform detailed vulnerability assessment, and initiate action to address the vulnerabilities discovered to avert a repeat attack. A thorough scan of affected systems to eradicate latent malware is key to preventing a recurrence.

Restore
In the restoration stage, affected systems are brought back into action. While bringing the affected systems back into the production environment, adequate care should be taken to ensure that another incident does not occur. Once these systems are up and running, they are monitored to identify any deviations. The main objective is to ensure that the deficiency or the vulnerability that resulted in the incident that was just resolved does not cause a repeat incident.

Investigate
This is the last step and entails a thorough investigation of the attack to learn from the incident, and initiate remedial measures to prevent the recurrence of a similar attack. IR teams also undertake an analysis of the response to identify areas for improvement.

What enterprises need now are effective cyber security solutions to monitor and provide real-time visibility on a myriad of business applications, systems, networks and databases. There has been an increasing realization that basic protection tools for important corporate information are no longer sufficient to protect against new advanced threats. Furthermore, enterprises are under tremendous pressure to collect, review and store logs in a manner that complies with government and industry regulations.


Countering focused and targeted attacks requires a focused cyber security strategy. Organizations need to take a proactive approach to ensure that they stay secure in cyber space and adopt a robust cyber security strategy.