Emerging online threats and security | Features | ChannelWorld.in

PARTNER HOTLINES

Emerging online threats and security

By Varsha Chidambaram, CIO on Jan 17, 2012

No matter what indicator you choose, cyber crime is getting increasingly serious, forcing enterprises to respond with equal gusto. But given how hard it is to catch cyber criminals, the smart money is on prevention. Enterprises need to ensure that they are aware of the three new trends in the threat landscape and ensure that they are protected against them.

Trend 1: Internationalization of Organized Crime

Highlights: More organized in global terms, resulting in an increased access to funds and resources. Allows a single criminal to attack from multiple locations, confusing investigators. Benefits from a lack of international collaboration.

When Stuxnet hit India last year, it sent alarm bells ringing in the highest offices of the country, after all, India was the third-most infected country in the world. Some even speculated since ISRO is a Siemens customer that it was the cause behind a glitch on the INSAT (Indian National Satellite System) 4B satellite. Whether that's true or not, Stuxnet was undoubtedly one of the most sophisticated and targeted attacks till date.

Stuxnet flummoxed everyone: Analysts, security experts, intelligence officers, and government agencies. But thereís one thing that they all agree on: Stuxnet was not the work of an individual. It was a masterpiece created by a collection of highly-brilliant, highly-motivated individuals with deep financial backingóa trademark of internationalized crime.

ìToday, cyber crime has gone international. It can no longer be traced to a college whiz writing code in his basement. It is organized crime, much like the mafia. There are powerful, geographically-dispersed actors in this scheme, says Krishna Sastry Pendyala, asst. government examiner, Cyber Forensic Division, Directorate of Forensic Science.

Carl Leonard, senior research manager, Websense Security Labs, agrees. The sophistication of attacks we are seeing today requires various skill sets. It indicates that cyber criminals with different levels of expertise are organizing themselves to create these attacks. And these attacks are originating from various geographies and targeting various geographies.

The internationalization of cyber crime is only likely to grow because being part of the cyber mafia is a lucrative business. According to Deloitte, the underground market primarily selling corporate data is estimated at $100 billion (about Rs 450,000 crore), and growing. With ambivalent cyber laws, and a lack of international co-operation, cyber criminals are enjoying a free run, says Pratap Reddy, director, Cyber Security, Nasscom.

It's important to differentiate between two types of international criminals: Those motivated by politics and those motivated by money. Anonymous and LulzSec, for example, fall into the category of international criminals, with political intent. The criminals behind the attacks on Lockheed Martin, or Sony Playstation, for instance, were motivated by critical information that could be sold.

But, motivation aside, they have one thing in common: Their ability to mobilize geographically-dispersed foot soldiers.

While conducting forensic exercises, we see that attacks originate from multiple locations but, often, that is a diversion tactic. The attackers are really the same person or set of persons. The real problem that plagues not just India but the entire world is the difficulty in tracking down and nailing these cyber criminals, says Kanwal Mookhey, founder, Institute of Information Security and author of several books on information security.

The unprecedented wave of successful assaults that we see around us today is because hackers are grouping themselves together, says Pendyala.

One of the biggest barriers in the fight against international cyber crime rings is inter- and intra-national collaboration. However, that's changing. According to the Global Information Security Survey (GISS) 2011 that's run by PwC and CSO magazine (a sister publication to CIO)Indian IT and security leaders are ready to give up some of their old resistance to letting the government take more control the first step towards more collaboration. About 75 percent of Indian security leaders, for instance, are willing to support the government-mandated intrusion-penetration and identity-threat monitoring standards. And about 65 percent would support a government implementation of mandatory adoption of real-time threat analysis.

The need of the hour is to enhance collaboration with various international bodies (government bodies, industry and, for profit / not for profit bodies) working in the areas of enhancing cyber security and cyber crimes prevention, so as to bring in increased cooperation into cyber crime investigations, says Reddy.

The Interpol has a wing called the IT Crime Working Group. It's a group of top cyber crime investigators from across the globe who meet to discuss the latest strategies to fight cyber crime. While there has been effort to boost international co-operation to fight cyber crime, it is very time-consuming and often frustrating to the investigators, says S. Murugan, deputy inspector general of police, Cyber Cell.

In the meanwhile, CISOs are ensuring that security, in general, is tightened. Being a financial services company, security is one of our top concerns. We have various levels of confidential data, with security becoming progressively stronger at each level. Not even top management has access to all sensitive data; it is based on a need-to-know basis, says Parag Deodhar, chief risk officer and VP process excellence and program management at Bharti AXA General Insurance.

He's also making sure that the company attacks security holistically. We put a lot of emphasis on the people and process part of security. Instead of having lengthy security handbooks, we conduct interactive training sessions which have a mix of video and text to keep awareness levels high and employees interested, he says.

The growing focus on security is even being witnessed in manufacturing companies. Take the Essar Group for instance. Essar has instituted a multi-layer security policy encompassing all business units. We have extensive security armor involving the latest security tools such as DLP, GRC, end-point protection, and encryption. The current global threat landscape suggests that BYOD (bring your own device) may well be the next challenge. As a proactive measure to mitigate risks attached to end-points, Essar Group has taken a lead to adapt desktop virtualization, says Manish Dave, CISO, Essar Group.

Trend 2: The Growth of Social Media

Highlights: Has a direct correlation with the rise of spear phishing and socially engineered attacks.

Social media adoption within the enterprise is unstoppable. From using it for sales leads to brand building or just giving a new generation of staffers access, social media is inexorably going from nice-to-have to must-have. According to data from GISS, 49 percent of Indian enterprises intend to increase access to social media.

The use of social media is no longer a choice; it is a necessity to do business. If the enterprise does not engage and respond to comments, it will start losing customers, investors, and members, says Jamuna Swamy, head-Information Security Practice, Hexaware Technologies.

But few enterprises are ready either strategically or tactically for social media: Only 30 percent say the use of social networking is part of their organization's security policy and less than half (42 percent) monitor employee postings on blogs or social networks.
Two threat vectors emerge from this trend: An increase in spear phishing and socially-engineered attacks.

Social media plays a significant role in spear phishing attacks. Since these attacks are targeted at specific victims, cyber criminals craft an attack that would lure them more effectively, says Anand Naik, director of Systems Engineering for India and SAARC Region, Symantec.

Already, an increase in spear phishing attacks is apparent. Since March this year, there has been a spate of spear phishing attacks targeting RSA, Epsilon, JP Morgan Chase, Sony, Oak Ridge National Laboratory, Lockheed Martin, Citi Group, Gmail, and The IMF.

According to a recent report by Cisco (E-mail Attacks: This Time It's Personal), spear phishing levels have jumped three-fold in the last 12 months. And for good reason: They are more profitable for the bad guys. The report points out that for a single e-mail campaign, mass phishing has an open rate of 3 percent and a click through rate of 5 percent compared to 70 percent and 50 percent for a spear phishing campaign. The result? The value per victim of a mass phishing attack is about $2,000 (about Rs 94,000), compared to $ 80,000 (about Rs 37.6 lakh) for a spear phishing campaign.

The other threat vector socially-engineered attacks is also growing, although at a slower pace. About 27 percent of Indian enterprises have been victims to social engineering attack in 2011, up from 22 percent last year, points GISS data.

Clickjacking is another method of executing a social engineering attack that works by fueling human curiosity on a social network. Clickjacking is defined as an activity that encourages somebody to click on a video, open a PDF file, or browse through a website. The ultimate goal is to encourage someone to perform a certain action.

Clickjacking is most commonly noticed on Facebook. Let's say a friend posts a shocking video on Facebook. If the post tickles your curiosity enough you'd be tempted to watch the video. But when you click on the play button, you notice that instead of the shocking video you've gone and liked the video and it goes as a news feed to all your friends.

In click jacking a malicious code or a hidden component of a website sits on top of a video button, for example. So while you think you're pressing the play button you're actually executing a social engineering attack, says Websense's Leonard.

In response, CISOs are pushing more money and focus at the problem. In the next year, 43 percent of Indian enterprises plan to increase security spending related to social media, 40 percent promise to make social media security strategy a top priority, and 50 percent say monitoring employee postings on social networks is also a top priority.

In a number of security awareness training exercises we carry out for our customers, we include slides on how social networking sites can be used for social engineering, says Bharti AXA's Deodhar.
At Hitachi Consulting India (formerly Sierra Atlantic), IT director and CISO, Sesanka Pemmaraju is taking both operational and non-operational routes to de-risk social media. He publishes desktop wallpapers with pictorial representation of multiple scenarios along with do's and don'ts. We are also in the process of integrating DLP and a rights management system (RMS) to enable tight monitoring of various actions performed by employees internally to prevent any leaks and avoid information landing in the wrong hands, he says.

Trends 3: The Emergence of Advanced Persistent Attack

Highlight: These are targeted, sophisticated attacks. Aim is to steal data, not destroy. Remains undetected for long periods of time. Requires advanced protection like deep packet inspection and network forensics.

The attack on RSA in March is among the most audacious security breaches this year. It started when attackers sent an e-mail with an Excel file titled 2011 Recruitment Plan. The mail was only sent to 12 people within the organization and went straight to their junk folders. Eleven of them deleted the e-mail, one didn't. But one click on the attachment was enough for the attackers to sniff around the network, determine key servers, and then slowly get access to them. It was only a matter of time before hackers extracted private keys that were at the heart of RSA's security algorithm.

That's the power of APT (advanced persistent threats). APT is characterized by sophisticated, directed, and persistent attacks. The sophistication is the result of multiple experts building up an attack to target specific organizations in a systematic and persistent manner.
Unlike some malware that result into random infections, APTs are directed attacks on specific entities, explains Sandeep Godbole, member ISACA India Task Force. And their objectives are much more sinister and serious.

ATP attacks require meticulous preparation before the actual attack. In this case, the criminal gathers detailed information about the target; the network infrastructure, the security deployed, etcetera, say Leonard.

A significant characteristic of an APT attack which is also a determining factor for its success is its ability to remain undetected for long periods, creating a longer window as it hunts down the crown jewels. APT attacks depend on their ability to get inside an organization and stay hidden in plain sight. This differs greatly from the smash-and-grab style of more unsophisticated cyber thugs.

What makes these attacks more lethal is that they are guided by external entities with a high degree of human involvement. Think of an APT attack as a remote-controlled car creeping about your system with the controls in the hand of
a criminal.

What makes them tricky to deal with it is that they function diligently, step-by step, avoiding detection for long periods of time, says Deodhar.

So do CISOs in India need to start worrying? Depends on how they profile risk in their organizations. Organizations that have strategic, national, or military significance have a higher threat profile, says Godbole. Also, known names or brands in the commercial world or those that hold information that can be exploited may be equally at threat. It's very important to determine whether your organization falls in these buckets.

Currently only 35 percent of organizations in India have a strategy to combat APT, according to GISS. Over 85 percent of these rely on traditional intrusion detection or intrusion prevention systems to counter APT.

But while basic security practices such as patch management, vulnerability assessment and configuration management will ensure APT entry points are secured; this new threat will need more sophisticated protection like deep packet inspection, network forensics, and robust net flow analysis tools. In the next year, 64 percent of Indian organizations say that APT will drive security spending, which is lower than the Asian average of 70 percent.

Organizations that are high on a criminal's radar would need to hire or train expert malware analysts capable of analyzing data to identify the activities of malware and bots to identify APT, says Godbole.

The more visibility and context you have around the status of your security environment, the more prepared you will be to respond to threats when they strike. Because it's not a matter of if you are going to be attacked, the question is when, and how quickly will you be able to respond when it happens.


Latest Features

TECHNOLOGY DIRECTIONS 2015

Enhancing Digital User-Experience in 2015: Karthik Ananth,Zinnov

How digital transformation is impacting the way companies engage with their customers.

Collaborating To Outcome Based World: Priyadarshi Mohapatra, Avaya

Priyadarshi Mohapatra, Managing Director, India and SAARC, Avaya, on how IT is transitioning from a keep-the-lights-on role to one that enables customers to deliver results.

Journey to the Third Platform in 2015: Rajesh Janey,EMC

Rajesh Janey, President, EMC, India and SAARC, says that flash storage will accelerate the growth of the third platform.

Fostering New Relationships in 2015: Partha Iyengar, Gartner

In order to adopt a digital business strategy, channel partners need to establish relationships with LoBs.

Combating a New Breed of Cyber Attacks in 2015: FireEye

Ramsunder Papineni, Regional Director, India and SAARC, FireEye, on the paradigm shift in today’s threat landscape and how organizations can combat new threats.

The Dawn of the Digital Age: Akhilesh Tuteja, KPMG

The development of digital infrastructure will be a key growth driver for technology and solution providers. 

Paradigm Shift from End-Users to User-First : Parag Arora,Citrix

Parag Arora, Area Vice President and India Head, India Sub-continent, Citrix, says new technologies will force organizations to take a user-first approach in 2015.

HP's Blueprint for 2015 - SDN and Cloud Computing : Neelam Dhawan

Neelam Dhawan, VP and General Manager, Enterprise Group and Country MD, HP India,  on why a combination of cloud computing and SDN will dominate 2015.

SAP Banks on HANA for 2015 : Ravi Chauhan

Ravi Chauhan, Managing Director, India and Sub- continent, SAP, on becoming a cloud company powered by HANA.

Mobile and Cloud Are Gamechangers of the Future: Karan Bajwa,Microsoft

Karan Bajwa, Managing Director, Microsoft India, says, in  2015, organizations will adopt a mobile-first and cloud-first strategy to get ahead of competition.  
 

Ready to Fight 2015's Threats : Jagdish Mahapatra,McAfee

Jagdish Mahapatra, Managing Director, McAfee, India and SAARC, part of Intel Security, says the company is armed with new solutions to beat sophisticated threats.

A Network for the Internet of Everything : Dinesh Malkani,Cisco

Dinesh Malkani, President, India and SAARC, Cisco, talks about IoT and the significant technology transitions in the networking world.
 

Moving to the Third Platform: Jaideep Mehta, IDC

Cloud and mobility are the two technologies that will fuel the rapid adoption of the third platform in India.

Envisaging a Holistic Security Strategy For 2015: Sanjay Rohatgi,Symantec

Sanjay Rohatgi, President–Sales, Symantec India, says the company has a set of holistic solutions in place to secure organizations from security threats. 

Intel's 2015 Plan: Taking the Digital India Story Forward

Debjani Ghosh, VP-Sales and Marketing Group and MD, South Asia, Intel, is banking on innovative technology to make the Digital India dream a reality.

Embracing SDN in 2015: Ashish Dhawan,Juniper Networks

Ashish Dhawan, Managing Director, India and SAARC, Juniper Networks, talks about the company’s well-etched roadmap to ride the SDN wave.

Beating the Bad Guys: Sivarama Krishnan, PwC

Organizations will need to turn inwards to establish robust information security strategies.

Hybrid Cloud is 2015's Biggest Gainer: Sunil Gupta,Netmagic

Sunil Gupta, Executive Director and President, Netmagic, an NTT Communications company, expects the hybrid cloud to be the biggest gainer in 2015.

2015 is the Year of SDDC: Arun Parameswaran,VMware

Arun Parameswaran, Managing Director, VMware India, says 2015 will be the year of software-defined datacenter.

Enterprises Surging Ahead with Hybrid Cloud in 2015 : Anil Valluri,NetApp

Anil Valluri, President, NetApp, India and SAARC, says, in 2015, enterprise platforms will start encompassing hybrid cloud architectures.
 

Armed for 2015's Security Threats: Anil Bhasin,Palo Alto Networks

Anil Bhasin, Managing Director, Palo Alto Networks India, says new threats weaken an organization’s network but advanced security tools can change that.

Building Capabilities for a Digital Tomorrow: Alok Ohrie,Dell

Alok Ohrie, President and Managing Director, Dell India, on the company’s investments to build end-to-end solutions and delivery capabilities for a digital world.

Going Truly Mobile in 2015: Vikram Sehgal, Forrester Research

India is embracing mobile faster than mature economies. Here’s what it needs to watch out for to do it well.

VIDEOS | FORECAST 2015

SAP Cloud Strategy Powered by HANA: Ravi Chauhan

CIOs will rapidly adopt SMAC in 2015, and SAP has innovative solutions to provide business advantage and competitive edge to India Inc., says Ravi Chauhan, MD, SAP India.

Dell to Dominate Converged Infrastructure Market in India: Alok Ohrie

From a PC manufacturer to an end-to-end solutions provider, we are gaining India market share through a strong partner ecosystem: Alok Ohrie, MD & President, Dell India.

Citrix Will Catalyze Shift From End-user to User-First: Parag Arora

Parag Arora, Area VP and India head, India Sub-continent, Citrix, talks about the company’s vision to drive a paradigm shift in enterprise IT: From an end-user approach to a user-first approach powered by mobile and cloud computing and enabled by competent channel partners.

Mobility to Boost Collaboration and Conferencing in 2015: Priyadarshi Mohapatra, Avaya

Avaya delivers great value as an end-to-end communications solutions provider across data, audio and video, says Priyadarshi Mohapatra, MD India and SAARC, Avaya

Securing Organizations Against Modern Day Threats: Sanjay Rohatgi, Symantec

We have proven that we can manage and secure an organization’s data from within and outside a network, which is a vital requirement by CISOs today, says Sanjay Rohatgi, President-Sales, India, Symantec.

We are the Apple of Network Security World: Anil Bhasin, Palo Alto Networks

Anil Bhasin, Managing Director, Palo Alto Networks India, says new threats weaken an organization’s network but advanced security tools can change that.

Software Defined Networking to Rule in 2015: Ashish Dhawan, Juniper Networks

Networking is definitely moving towards a software-defined paradigm and we continue to dominate the India market with an extensive portfolio, and well-entrenched channels, says Ashish Dhawan, MD, India and SAARC, Juniper Networks.

EMC to Dominate 3rd Platform Across India Inc.: Rajesh Janey

In the last year, EMC has refreshed its entire product line to enable customers take advantage of the 3rd platform, says Rajesh Janey, president, India and SAARC, EMC.

IoT Vital for Digital India Initiative: Debjani Ghosh, Intel

The tons of data that will be generated in the coming years will open opportunities in storage, and analytics, says Debjani Ghosh, VP, sales and marketing group, and MD-South Asia, Intel.

VDI, Flash and Hybrid Cloud to Propel Storage Market: Anil Valluri, NetApp

We are witnessing a movement from traditional data storage systems to a hybrid cloud environment says Anil Valluri, president, India and SAARC, NetApp.

SDDC is the Big Shift for 2015: Arun Parameswaran, VMware

Arun Parameswaran, MD, VMware, says that in India, unlike other countries, there is still a huge untapped opportunity to virtualize existing infrastructure in 2015.

Go Cloud for Business Advantage: Sunny Sharma, Foetron

Sunny Sharma, CEO and Founder, Foetron, speaks about the company's focused roadmap to ride the public cloud wave.

FireEye to Combat APTs Across Multiple Vectors in 2015: Ramsunder Papineni

Going into 2015, organizations need to think of security more holistically, including ways to defend end points, e-mail, Web, file, and mobile security, says Ramsunder Papineni, regional director, India and SAARC, FireEye.

The 2015 Challenge: Retaining IT Talent: Shirish Anjaria, Dynacons

Shirish Anjaria, CMD, Dynacons Systems & Solutions, speaks about how partner companies can enhance the talent pool of skilled IT staff.

New Style of IT to Gather Traction in 2015: Neelam Dhawan, HP

SDS, SDN and software defined infrastructure will play a key role across Indian organizations in 2015, says Neelam Dhawan, VP and GM, enterprise group, country MD India, HP.

Building Strong Vendor-Partner Relationships: Pawan Khurana, QuantM

Pawan Khurana, CEO, QuantM, on what he expects from technology vendor companies in 2015.

IoE to be Biggest Market Disruptor in 2015: Dinesh Malkani, Cisco

We continue developing innovative solutions in IoT and cloud computing and help our partner ecosystem capitalize on market opportunities, says Dinesh Malkani, president, Cisco India and SAARC.

New Technologies For New Growth: Murtuza Sutarwala, Swan Solutions & Services

Deep selling and upselling emerging technologies to customers enhances our value proposition as a competent solution provider, says Murtuza Sutarwala, Swan Solutions & Services.

Analytics is a Goldmine for Channels in 2015: Anoop Pai Dhungat, Galaxy Office Automation

Analytics, mobility, and security are the technology megatrends for us in 2015, says Anoop Pai Dhungat, CMD, Galaxy Office Automation.

Smartphone Proliferation to Impact Mobile Strategies in 2015: Vikram Sehgal, Forrester

Enhancing customer experience through mobility will be key priority for organizations in 2015, says Vikram Sehgal, VP and Research Director, Forrester.

3rd Platform to Take Off in India: Jaideep Mehta, IDC

Jaideep Mehta, MD, India and South Asia, IDC, say cloud computing and mobility will be the fastest growing 3rd platform technologies in India.

Opex Model the Way Forward for Partners in 2015: Ajay Sawant, Orient Technologies

Ajay Sawant, Orient Technologies, talks about the massive shift as traditional system integrators move towards an Opex-led business model.

Digital India is Colossal Opportunity for Channels: Akhilesh Tuteja, KPMG

Channel partners should devise a vertical strategy with the right alliances and innovative solutions, says Akhilesh Tuteja, Partner-IT Advisory, KPMG India.

Going Digital the Way Ahead for India Inc: Karthik Ananth, Zinnov

Since India is a mobile -first market, Indian organizations that are turning digital should ensure that they deliver a uniform experience for their customers, says Karthik Ananth, Director, Zinnov.

EDITOR'S PICK

Forecast 2015: IT Spending On An Upswing

As purse strings loosen up, CIOs blend innovation into 2015 IT budgets, but security and cost containment remain top priorities.

‘Security Compliance is Not a Proactive Phenomenon in India’

Pavan Duggal, Cyber Law Expert at the Supreme Court of India, explains why channel partners need to look beyond the IT Act 2000 as the security standards, given today’s fast-changing threat landscape, rapidly evolve.

IT is Indispensable for Business Optimization: David Aires, Intel

David L. Aires, VP, Information Technology Group, and GM, Information Technology Operations, believes security to be the biggest challenge in the current IT environment.

Is the CIO Role Nearing Extinction?

New technologies are shifting power to the hands of the user, endangering the CIO role. But do Indian CIOs consider that a threat or an opportunity? 

The Authentication Market is Big Play for Channels: Gaurav Chawla, Gemalto

We are building a partner network to address the increased demand for authentication solutions across India, says Gaurav Chawla, Director, IAM, Gemalto India.

Versatile Infosecurity: Riding the Security Wave

It takes vision and persistence to stay on top of the security curve. Versatile Infosecurity has mastered that art.

How Futurenet Technologies Helped Sterlite Copper Adopt Next-gen Client Computing

Sterlite Copper was able to successfully adopt next-gen client computing facilities with hand-in-hand assistance from Chennai-based Futurenet Technologies.

DigitalTrack Solutions: Right on the Security Track

DigitalTrack is keeping pace with the changes in the IT security space through DDoS and WAF solutions and is pushing security audits as part of its next move.

SLIDESHOWS

6 Leaders Who Headed for an Abrupt Exit

The abrupt exit of top leaders of Indian and global tech companies this year, with many of them citing ambiguous reasons, surprised the technology world.

Gartner Executive Summary Survey 2014

Gartner's Annual CIO Survey highlights the trends that will drive organizational IT spend in 2014.

10 Overhyped Tech Products That Crashed and Burned

The demos blew everyone away. Then reality hit.

Gartner Executive Summary Survey 2014

Gartner's Annual CIO Survey highlights the trends that will drive organizational IT spend in 2014.

ChannelWorld Survey: State of the Market 2014

Partners poll their sentiments, expectations, pain points, and challenges for the coming year.

FAST TRACK

TIM Infratech

Delivering ‘best of breed’ technologies to enterprises is key to success, says Monish Chhabria, MD, TIM Infratech

Mudra Electronics

A vendor-agnostic strategy helped us sustain business, says Bharat Shetty, CMD, Mudra Electronics.

Systematix Technologies

Our USP is a customer-friendly approach backed by services, says Akhilesh Khandelwal, Director, Systematix Technologies.

CorporateServe Solutions

Our ability to turnaround complex ERP projects in record time is what gets us customer referral, says Vinay Vohra, Founder & CEO, CorporateServe Solutions.

KernelSphere Technologies

We are emerging as an end-to-end systems integrator, says Vinod Kumar, MD, KernelSphere Technologies.

Uniware Systems

We constantly validate emerging technologies for first-mover advantage, says Vergis K.R., CEO, Uniware Systems.

Astek Networking & Solutions

An innovative approach helps us stay successful, says Ashish Agarwal, CEO, Astek Networking & Solutions.

CSM Technologies

Our approach is backed by innovation and simplicity, says Priyadarshi Nanu Pany, CEO, CSM Technologies.

EMC PARTNER SHOWCASE

Partnering for Profitability

Atul H. Gosar, Director, Network Techlab, shares how the company’s association with EMC has provided it with a competitive edge and a wide customer base, leading to increased profitability.

Sponsored Content

Promising Pipeline

Venkat Murthy, Prime Mover, 22by7 Solutions, shares how EMC brings in competitive edge by enabling technology, GTM and lead generation, helping 22by7 acquire new customers and retain old ones.

Sponsored Content

Powerful Performance

Deepak Jadhav, Director, VDA Infosolutions, says initiatives by EMC around training and certification have helped the company’s staff improve its performance and enhance customer experience.

Sponsored Content

Performance Booster

Rajiv Kumar, CEO, Proactive Data Systems, says that the solution provider’s association with EMC has helped expand its customer base and added value to existing offerings.

Sponsored Content

Pursuit of Profitability

Santosh Agrawal, CEO, Esconet Technologies, shares insights on how the systems integrator’s association with EMC has spelled sustained success over the years.

Sponsored Content

Non-Performance is Not an Option

Nitin Aggarwal, Director, Trifin Technologies, shares insights on how the association with EMC has helped the system integrator stand out and empowered its personnel to deliver consistent performance.

Sponsored Content

STRATEGIC DIRECTIONS 2014

Driving IT to Make an Impact: IDC

IT is being increasingly viewed as something which would help drive revenue rather than just another cost line-item.

Software-Defined Infrastructure: Forrester

Firms must invest in transforming infrastructure to eradicate complex infrastructure to keep pace with business needs.

Better Safe Than Sorry: PwC

Organizations should create a culture of security that starts with commitment of top executives and cascades to all employees and third parties.

New Skills for a New Era: Gartner

A new talent strategy is required—one that is a key part of the evolving IT strategy and one that focuses on a blend of business and modern IT skills.

The Rise and Growth of Big Data: Ernst & Young

Leading organizations are reaping rich rewards on their investment in big data even as competition struggles to keep pace.

SOCIAL MEDIA @ CW India
SIGNUP FOR OUR NEWSLETTER

Signup for our newsletter and get regular updates.