ETEK building a cybersecurity aware community
By MYBRANDBOOK
Praveen Sengar
Global CEO - ETEK
STRATEGIZING BUSINESS GOALS
ETEK is a Global Managed Security Services expert with 30 years of experience in cybersecurity. In terms of its credentials, ETEK has more than 200 cybersecurity specialists, and 20+ top industry certifications (ISO 27001, ISO 9001, ISO 20000-1). It manages critical infrastructure for more than 350 clients across industry verticals, including OT infrastructure. ETEK also has 3 SOCs, ensuring 24*7 operations and securing billions worth of transactions.
ETEK focuses on building cybersecurity awareness in its client base and in the community. It has gamified its cybersecurity training modules so that employees find it interesting and take deep interest in it. ETEK has its own training institute which has trained more than 11000 professionals.
ETEK is guided by its VISION to provide “Proactive Fingerprinted Protection. Guaranteed.” This is a key differentiator for ETEK and makes the brand stand out in the market. It follows a consulting approach where it understands the business of the company, its technology landscape, current risk posture and then only it goes into offering solutions.
ETEK’s method of ‘Proactive, Fingerprinted Protection’ is a triad of -
1. Contextualize: Map client’s business & cybersecurity context. Internal as well as external
2. Automate: Recommend a platform-based approach which significantly reduces human intervention through automation
3. Continuum: Constantly monitor the ever-changing threat landscape through ETEK’s Follow the Sun Delivery Model (3 SOC Centers, ensuring 24 X 7 monitoring)
Also, there is a constant endeavor to incorporate more automation in ETEK’s Go - to - market solutions. It is working with innovative and disruptive players in the market in order to fulfil its vision of ‘Proactive Fingerprinted Protection. Guaranteed!’
AI, ML, AUTOMATION - BACKBONE FOR ETEK’S PLATFORMS
ETEK focuses on protecting its clients from both signature and non – signature-based attacks, aka Zero Day Attacks. ETEK understood that it needs to tap into the vast amount of data generated by digital systems and networks to identify patterns, anomalies, and potential threats with greater accuracy and efficiency. Therefore, all the solutions that are part of its Go - to - Market are 100% AI and ML driven whether it is the SOC Platform, Threat Intel Platform, Data Protection Platform, Server Protection, etc. you name it.
These platforms are leveraged by ETEK’s expert team of more than 200 cybersecurity specialists to analyze and respond to security incidents more effectively, mitigate risks, and adapt to evolving cyber threats.
DATA SECURITY & PROTECTION
There are majorly six stages in the data lifecycle - i.e., Create, Store, Use, Share, Archive and Dispose. To protect one’s data, it is critical to protect it along each of these stages. Each of these stages has specific set of requirements related to data protections -
1. Data discovery and classification is required in the Create, Store and Use stage
2. Data loss protection and Access control is required in the Use and Share Stage
3. Data Encryption is required for the Archive and Dispose stage
A lot of the organizations are using manual effort to classify data, create policies and implement controls. Manual effort will take upwards of 6 months to be fully deployed while the data protection should start at the click of a button which is what we are trying to provide through our solution.
ETEK believes in working with a platform that leverages the power of AI and ML to automatically discover, detect and classify data, defined policies and access controls based on the user role / function and job profile and finally ensure that no malicious leakage takes place in the system.
Legal Battle Over IT Act Intensifies Amid Musk’s India Plans
The outcome of the legal dispute between X Corp and the Indian government c...
Wipro inks 10-year deal with Phoenix Group's ReAssure UK worth
The agreement, executed through Wipro and its 100% subsidiary,...
Centre announces that DPDP Rules nearing Finalisation by April
The government seeks to refine the rules for robust data protection, ensuri...
Home Ministry cracks down on PoS agents in digital arrest scam
Digital arrest scams are a growing cybercrime where victims are coerced or ...
Icons Of India : Debjani Ghosh
Debjani Ghosh is the President of the National Association of Software...
Icons Of India : CP Gurnani
Former Managing Director and CEO of the well-known IT service company ...
Icons Of India : MUKESH D. AMBANI
Mukesh Dhirubhai Ambani is an Indian businessman and the chairman and ...
CERT-IN - Indian Computer Emergency Response Team
CERT-In is a national nodal agency for responding to computer security...
GSTN - Goods and Services Tax Network
GSTN provides shared IT infrastructure and service to both central and...
EESL - Energy Efficiency Services Limited
EESL is uniquely positioned in India’s energy sector to address ener...
Indian Tech Talent Excelling The Tech World - JAYASHREE ULLAL, President and CEO - Arista Network
Jayshree V. Ullal is a British-American billionaire businesswoman, ser...
Indian Tech Talent Excelling The Tech World - AJAY BANGA, President - World Bank
Ajay Banga is an Indian-born American business executive who currently...
Indian Tech Talent Excelling The Tech World - George Kurian, CEO, Netapp
George Kurian, the CEO of global data storage and management services ...