ETEK building a cybersecurity aware community
By MYBRANDBOOK
Praveen Sengar
Global CEO - ETEK
STRATEGIZING BUSINESS GOALS
ETEK is a Global Managed Security Services expert with 30 years of experience in cybersecurity. In terms of its credentials, ETEK has more than 200 cybersecurity specialists, and 20+ top industry certifications (ISO 27001, ISO 9001, ISO 20000-1). It manages critical infrastructure for more than 350 clients across industry verticals, including OT infrastructure. ETEK also has 3 SOCs, ensuring 24*7 operations and securing billions worth of transactions.
ETEK focuses on building cybersecurity awareness in its client base and in the community. It has gamified its cybersecurity training modules so that employees find it interesting and take deep interest in it. ETEK has its own training institute which has trained more than 11000 professionals.
ETEK is guided by its VISION to provide “Proactive Fingerprinted Protection. Guaranteed.” This is a key differentiator for ETEK and makes the brand stand out in the market. It follows a consulting approach where it understands the business of the company, its technology landscape, current risk posture and then only it goes into offering solutions.
ETEK’s method of ‘Proactive, Fingerprinted Protection’ is a triad of -
1. Contextualize: Map client’s business & cybersecurity context. Internal as well as external
2. Automate: Recommend a platform-based approach which significantly reduces human intervention through automation
3. Continuum: Constantly monitor the ever-changing threat landscape through ETEK’s Follow the Sun Delivery Model (3 SOC Centers, ensuring 24 X 7 monitoring)
Also, there is a constant endeavor to incorporate more automation in ETEK’s Go - to - market solutions. It is working with innovative and disruptive players in the market in order to fulfil its vision of ‘Proactive Fingerprinted Protection. Guaranteed!’
AI, ML, AUTOMATION - BACKBONE FOR ETEK’S PLATFORMS
ETEK focuses on protecting its clients from both signature and non – signature-based attacks, aka Zero Day Attacks. ETEK understood that it needs to tap into the vast amount of data generated by digital systems and networks to identify patterns, anomalies, and potential threats with greater accuracy and efficiency. Therefore, all the solutions that are part of its Go - to - Market are 100% AI and ML driven whether it is the SOC Platform, Threat Intel Platform, Data Protection Platform, Server Protection, etc. you name it.
These platforms are leveraged by ETEK’s expert team of more than 200 cybersecurity specialists to analyze and respond to security incidents more effectively, mitigate risks, and adapt to evolving cyber threats.
DATA SECURITY & PROTECTION
There are majorly six stages in the data lifecycle - i.e., Create, Store, Use, Share, Archive and Dispose. To protect one’s data, it is critical to protect it along each of these stages. Each of these stages has specific set of requirements related to data protections -
1. Data discovery and classification is required in the Create, Store and Use stage
2. Data loss protection and Access control is required in the Use and Share Stage
3. Data Encryption is required for the Archive and Dispose stage
A lot of the organizations are using manual effort to classify data, create policies and implement controls. Manual effort will take upwards of 6 months to be fully deployed while the data protection should start at the click of a button which is what we are trying to provide through our solution.
ETEK believes in working with a platform that leverages the power of AI and ML to automatically discover, detect and classify data, defined policies and access controls based on the user role / function and job profile and finally ensure that no malicious leakage takes place in the system.
TAC Security becomes Cyber Security Assessor for the App Defen
The cybersecurity company, TAC Security has been selected as a key Cyber ...
InterGlobe’s Rahul Bhatia and C.P. Gurnani together announce
In a move that is set to transform the AI landscape, Rahul Bhatia, Group M...
Download masked Aadhaar to improve privacy
Download a masked Aadhaar from UIDAI to improve privacy. Select masking w...
Sterlite Technologies' Rs 145 crore claim against BSNL rejecte
An arbitrator has rejected broadband technology company Sterlite Technolog...
DELL TECHNOLOGIES INDIA PVT. LTD.
ZOHO CORPORATION PVT. LTD.
TAC SECURITY SOLUTIONS
BHARAT ELECTRONICS LTD.
Technology Icons Of India 2023: Deepinder Goyal
Deepinder Goyal is the Founder and CEO of Zomato. Deepinder, or Deepi,...
Technology Icons Of India 2023: Nikhil Rathi
Nikhil Rathi, Co-founder & CEO of Web Werks, a global leader in Data C...
Technology Icons Of India 2023: Roshni Nadar Malhotra
Roshni Nadar Malhotra is an Indian billionaire businesswoman and the c...
GeM maintains transparency in online procurement of goods & services
Created in a record time of five months, Government eMarketplace is a ...
TCIL continues to strengthen India with its technology expertise
TCIL undertakes consultancy & turnkey projects in the field of Telecom...
PGCIL transforming India with its wide power transmission network
Engaged in power transmission, POWERGRID or PGCIL is a stated owned In...
SUPERTRON ELECTRONICS PVT. LTD.
Supertron deals in servers, laptops, components, accessories and is a...
REDINGTON INDIA LIMITED
Redington (India) Limited operates in the IT product distribution busi...
B D SOFTWARE
BD Software is the distributor of IT security solutions in India. The ...