Download Certificate- CMOs | ECIO | Most Admired Brand | Most Trusted Company

“Building a robust and strategic infrastructure design based on Zero trust architecture has helped us to improve overall infrastructure security posture”


By MYBRANDBOOK


“Building a robust and strategic infrastructure design based on Zero trust architecture has helped us to improve overall infrastructure security posture”

Ved Prakash Nirbhya
CIO - Tech Mahindra

 

Key priorities for 2021
At Tech Mahindra, we have designed an integrated digital strategy encompassing business models, customer experiences, and talent. We believe in leveraging digital tools to create human-centered experiences driven by innovation, design, and resilience-building technologies, and this is what I will always prioritize in my role as the CIO. Being the digital changemakers, we are here to disrupt old ideas, blaze new trails, and create connected experiences, for a connected world. We are focused on building a sustainable future where everyone can access the benefits and opportunities created by technology.  

 

Adopting Work-From Anywhere
When the pandemic broke out, we had two key priorities – ensuring the safety and wellbeing of our associates and enabling seamless business continuity for our clients and partner ecosystems. The pandemic changed the workplace dynamics and in response, we rapidly rolled out the required technology infrastructure, creating a suitable environment to help our associates to work from ‘anywhere’ in the “New Normal”.  Relentless focus on security and adopting new-age technologies like Artificial Intelligence, Machine Learning, and collaboration tools in place, helped us to facilitate seamless remote working. 

 

Redesigning IT & Security strategy
Today, cyber-threats and attacks are pervasive and so we continue to re-evaluate our IT strategy to secure our digital infrastructure in the wake of these increasing cyber threats.

The surface area of attack has increased with the Work from Home (WFH) model as end points are now everywhere.  Our Cyber Security control is not confined to one point or on one vector solution. We have always hardened our desktops and laptops, as per Tech Mahindra’s and customer’s Security policy. To ensure a safe work from home environment, we have also enabled two-factor authentication with VPN (Virtual Private Network) connection so that complete data traffic movement is encrypted. Additionally, perimeter security and network security has been tightened keeping the Internet as entry point apart from other controls which are already in place. We have significantly increased the frequency of monitoring our internal and external facing assets to ensure a safer and resilient work environment. Building a robust and strategic infrastructure design based on Zero trust architecture has helped us to improve overall infrastructure security posture. Enforcing agile perimeter security has enabled us to detect, mitigate and prevent network threats while maximizing business processes and securing remote workplaces simultaneously. 

 E-Magazine 
 VIDEOS  Placeholder image

Copyright www.mybrandbook.co.in @1999-2024 - All rights reserved.
Reproduction in whole or in part in any form or medium without express written permission of Kalinga Digital Media Pvt. Ltd. is prohibited.
Other Initiatives : www.varindia.com | www.spoindia.org