28pg
40pg
VOLUME XVIII ISSUE 06 FEBRUARY 2017 PRICE Rs. 50 SUBSCRIPTION COPY NOT FOR SALE
LG India Donates Rs 1
Crore to CRPF Welfare Fund
T o mark the 20th Anniversary, LG
Electronics India has donated Rs 1
crore to CRPF Welfare Fund.
The celebrations kick-started with LG's
#KarSalaam initiative dedicated to Indian
soldiers, was launched prior to Republic
day. The campaign invited the whole nation
to come forward and send their wishes to
the Indian Armed
Forces. Through
this initiative,
LG salutes the
soldiers spirit of
magnanimous
contribution and service towards the
nation.
LG rolled out this campaign through
radio, digital, outdoor and mall activities
to capture the messages and wishes of
the citizens of India for our soldiers. The
company also engaged the people through
social media platforms and encouraged them
to share their wishes on the microsite www.
karsalaam.in, where more than 1,93,000
wishes written by citizens.
Google, Facebook, Intel, Netflix, Microsoft, Apple and Twitter. We have to wait and watch how the future unfolds Y
in the US.
CM
MY
CY
CMY
BUSINESS:
Commercial Manager: Amit Kumar Jha
Sr. Marketing Manager: Ashok Ranjan Dash
Circulation Executive: Manish Kumar
Marketing Manager: Dipendra Kumar
CORPORATE OFFICE:
VAR House, A-84A/3 Rose Apartment, Paryavaran
complex, Ignou Road, New Delhi - 110030 FACE TO FACE
Tel: 011-41656383, 46061809
Email: edit@varindia.com
VAR MOBILITY
28| Aruba sees a growing wireless 54| LG's Kar Salam initiative salutes
Bangalore: Bureau office market in India Indian jawans
Marketing Manager: S. Kamala kar
Correspondent: L. G. Swami
D-103 G.F., Ashish JK Apartments
VAR EXPERIENCE ZONE VAR SECURITY
Thubarahalli Extended Road 58| 360-degree Surveillance - A new
Bangaluru- 560066
paradigm shift
Tel: 080-49530399 | Mobile:09886280836 29| LG Revolutionizing the UltraWide
E-mail: kamlakar@varindia.com
Screen Experience
Mumbai: Bureau office
Regional Manager (West): Anil Kumar
Sr. Correspondent: Mamta S.
Anurag Residency, 203 - B Wing, Plot No-5, CYBER SECURITY CONCLAVE
Sector-9, Kamothe, Navi Mumbai-410 209
Tel: 022-65561292, Mobile: 08108017479
E-mail: anil@varindia.com, mamta@varindia.com 30| Building Indias Cyber Security
Chennai: Bureau office Framework
Branch Manager: M.S. Barani
Door. No.8, Plot No.-837,89th Street,
13th Sector, K.K.Nagar, Chennai - 600 078 TECHNOMANIA
Mobile: 09444077065
E-mail: barani@varindia.com
40| The changing conversation on REGULARS
Hyderabad: Bureau office
Branch Manager: Sunil Kumar energy efficiency: 5 steps to
B 383 HAL Colony, Balanagar reduce power consumption in Round About 10
HYDERBAD, Telengana - 500042 your data centre
Tel: 040-32989844/ Cell No. 08100298033 Guest Speak 12
E-mail: sunil@varindia.com
Hot Bytes 14, 16
Kolkata: Bureau office EVENT
Marketing Officer: Sunil Kumar On the Ramp 18, 20
Correspondent: Kiran Kumar
67 Sarada Park, Garia, Kolkata - 700084 42| Bhubaneswar holds conference Voice N Data 24
Mobile: 08100298033, E-mail: sunil@varindia.com on Smart Bhubaneswar Channel Buzz 26
Mobile: 09903088480, E-mail: kiran@varindia.com
Movers & Shakers 57
Printed and Published by Deepak Kumar Sahu on behalf of UNION BUDGET SPECIAL
M/s. Kalinga Digital Media Pvt. Ltd. and Printed at Pushpak
Press Pvt. Ltd. Shed No. 203 - 204, DSIDC Complex, Okhla
Corrigendum
Industrial Area, Phase-I, New Delhi-110020 and Published at 48| Budget 2017 pushes for Digital
A-84A/3 Rose Apartment, Paryavaran complex, Ignou Road, economy The name 'Takayuki Inaba Managing
New Delhi - 110030, Editor - S Mohini Ratna.
For Subscription queries contact: info@varindia.com Director NEC India' has been wrongly
Subscription: Rs. 500(12 issues)Rs. 1000 (24 issues)
ISODA CORNER published as Manoj Taskar, Country Manager,
All payments favouring: India & SAARC - Tenable beneath the
KALINGA DIGITAL MEDIA PVT LTD 52| ISODA successfully concludes spokesperson's photograph in the VAR Security
All rights are reserved. No part of this magazine may be
reproduced or copied in any form or by any means without two regional meets section on page 58 in our January VARINDIA
the prior written permission of the publisher. (1999-2016) edition. We regret the inconvenience.
* All disputes are subject to the exclusive jurisdiction of
competent courts and forums in Delhi only.
Cyber security threats have been evolving rapidly and crooks are
coordinating attack vectors to maximise user vulnerability. According
to 2015 Global Cyber Security Status Report, a whopping 92 per
cent believe cyber attacks are one of the top three threats facing
organizations today. Yet, an alarming 87 per cent say there is a shortage
of skilled cyber security professionals in the country, and only 41 per
cent feel prepared to fend off a sophisticated attack. This necessitates
the need to prepare for the threats of the future by ensuring that clear
but flexible national policies support agile private sector solutions that
are best able to respond to global cyber security threats.
M
before the next overhaul.
anageEngine strictest data privacy and Dell EMC have has worked on several
This will help in reducing
has announced regulations, which apply announced a collaborative turnkey projects involving
downtime and increase in
the opening of its two to both on-premises and relationship to enable sensor integration, protocol
productivity because of
new ISO 27001-certified cloud applications, said holistic, integrated Smart implementation, edge
elimination of at least one
data centers in the EU Rajesh Ganesan, Director Building initiatives. The analytics, cloud storage,
intermediate overhaul.
one in Amsterdam, the of Product Management, joint offerings are expected application development
Netherlands and another ManageEngine. Our to drastically reduce and predictive analytics.
in Dublin, Ireland. This on-premises apps have Mastercard and implementation time, save Dells comprehensive
announcement is a part of maintained the highest up to 40% of facility energy solution portfolio, which
its efforts to help IT teams degree of data privacy and CAIT announce costs and enable up to 15% includes a system of globally
move operations seamlessly regulatory compliance for of operational savings. vetted partners such as
to the cloud, while adhering years. With our new EU Digital Apnao L&T Technology L&T Technology Services,
to the data privacy and data centers, we have set Services, which joined reduces complexity and
security standards of the the same standard for our Vyapar Badhao Dells IoT Solutions Partner lowers risk while increasing
EU. cloud apps and eliminated Programme in October the speed of deploying IoT
Our European the privacy barrier to Campaign 2016 as a Preferred Partner, initiatives.
customers are subject
to some of the worlds
adopting our cloud-based
IT management solutions. M astercard and
Confederation
of All India Traders
Inspira gets Tier-1 Status in Avaya
ELCINA Electronics Manufacturing (CAIT) have announced Edge Partner Programme
I
a 90-day Digital Apnao nspira has announced
Cluster launched at Bhiwadi Vyapar Badhao campaign it has been awarded
E L C I N A with RIICO officials and to accelerate the adoption Tier-1 status in the highly
Electronics local leadership. of digital payments respected Avaya Edge
Manufacturing Cluster in The Bhiwadi Cluster amongst traders, enabling Partner Programme. Inspira
Bhiwadi is the first Cluster has an important role to them to grow their will offer Avayas Unified Inspira is very excited to
as a cooperative project. play in the Government businesses. Communication solutions be an Avaya Tier-1 partner as
The industry gathered of Indias Make-in-India As part of the to the key business verticals, the company has a solid track
and Digital India campaign, CAIT and including government, record of implementing
initiatives. We Mastercard will organize banking, financial services the best collaboration
hope it would 500 camps across 30 and insurance. solutions that specifically
be the first to cities in India over a By achieving Tier-1, addresses customers
start functioning period of 90 days. The the highest level available requirements and business
amongst 200 Digital Apnao Vyapar in the Avaya Edge partner concerns. I am confident
clusters planned Badhao campaign aims programme, Inspira that this partnership will
across the to onboard five lakh has demonstrated the strongly address the growing
country, said B. merchants and traders by demanding competency technology needs of a
S. Sethia, Director, bringing together financial requirements to design, rapidly-expanding video
in very large numbers to Elin Electronics Ltd, and institutions and other integrate and support collaboration market, said
celebrate the launch of the Chairman of ELCINA payments facilitators Avayas UC and Manoj Kanodia, CEO,
ELCINA Cluster along Bhiwadi Cluster SPV. under one roof. collaboration solutions. Inspira.
S avera Digital has and is one of the fastest- Hikvision R&D Centre teaming with Eyeota to or by seamlessly combining
become premium growing distributors in will focus on engineering enable marketers and it with additional data
pan-India distributor for India. With this tie-up, we development. The Silicon advertisers to use Eyeota segments from Oracles
award-winning product are looking for enhanced Valley Hikvision Research data in the Oracle Data BlueKai Marketplace.
manufacturer ASRock focus on value products Institute will focus on broad Management Platform to The relationship
Inc. This partnership will and the build-up for DIY technology research. more intelligently target between Oracle Marketing
bring together Savera's ecosystem. Our AMD and personalize non-US Cloud and Eyeota
great distribution network market share continues to campaigns to Eyeotas addresses this challenge by
to deliver ASRock's AMD
range of motherboards.
improve as channel and
customers are looking Persistent three billion unique profiles
in Europe, APAC, and the
providing a new natively
integrated data set that
Manoj Kriplani,
Country Manager, ASRock
for quality products and
ASRock is known for Systems Americas. Eyeota data will
be integrated into the Oracle
enables Eyeota data in areas
such as socioeconomics,
Inc., Taiwan, said, "Savera
Digital India Pvt. Ltd is a
bringing out the best of
the motherboards which partners with Data Management Platform
through the Oracle Data
interest, intent and B2B
to be activated within the
trusted name in the Indian
IT distribution system
can fulfil
requirements."
customers
MuleSoft Cloud, and Oracle Data
Management Platform
Oracle Data Management
Platform.
M
optimize their use of the icrosoft has
r e c e n t l y as-a-Service (PaaS). With to help solve the diverse
AWS Cloud for backup, showcased
announced public preview Azure Analysis Services, needs of people and
archive and recovery. Microsoft Teams, a new
of Azure Analysis a BI professional will be organizations globally. As
Commvault has also chat-based workspace
Services, the latest addition able to explore data and weve learned from our
announced that existing that further enhances the
to Microsofts cloud gain insights from it by just users, all groups have a
customers can apply their collaboration capabilities in
platform at the Professional connecting to the semantic diverse set of needs when it
licences to applications Microsoft Office 365, the
Association of SQL Server model and will be able to comes to working together.
enabled through AWS cloud-based productivity
(PASS) Summit. share it with the business Office 365 is designed for
Marketplace. offering with more than
Azure Analysis Services user. Businesses can get the unique work style of
85 million monthly active
is an enterprise-grade
OLAP (online analytical
on board quickly without
managing infrastructure SAP launches commercial users. Microsoft
every group and includes
purpose-built applications,
Teams brings together
processing) engine and
BI (Business Intelligence)
and can also scale resources
to match their business SAP S/4HANA people, conversations,
all deeply
together.
integrated
SharePoint
content and the tools teams
modelling platform, offered needs.
Private Cloud need to collaborate.
provides intranets and
content management
QNAP unveils Thunderbolt A ligning to the Union
Budget 2017, SAP
has announced the launch
Microsoft Teams joins
the broadest and deepest
solutions to more than
200,000 organizations and
2 NAS TVS-882ST2 of SAP S/4HANA Private
portfolio of collaboration
applications and services
190 million people.
Q NAP Systems
has released the
TVS-882ST2 Thunderbolt
access, backup and sharing.
The TVS-882ST2 is also
suitable for an all-SSD
Cloud, the next-generation
business suite tailored for
midsize companies, which
Juniper Networks presents
2 NAS. Powered by an
energy-efficient Intel 6th
configuration to provide
the utmost performance.
will be available at a simple
and affordable subscription
Juniper Networks Unite Cloud
Generation 14nm Core
i5 Quad-core
Running the new 64-bit pricing.
With increased impetus J uniper Networks has
announced Juniper
Networks Unite Cloud, a
processor with for digital, cashless
AES-NI hardware transactions and a unified, transformative data center
encryption and framework that gives Space Network Director
transparent taxation regime,
supporting eight enterprises the end-to-end management application
companies will need to
2.5" SATA 6Gb/s solutions to simplify the that leverages advanced
gear up for rapid growth
SSD/HDD, it also creation and management automation to analyze and
while balancing business
includes high-speed of hybrid, multi-cloud control data centers, the
control with the agility
Thunderbolt 2 connectivity, QTS 4.3 operating system, environments. As part of new Juniper Networks
to capitalize on emerging
10GbE 10GBASE-T the TVS-882ST2 supports Juniper Networks Unite, QFX5110 switch with 100
opportunities. With
dual networking ports, the Thunderbolt to a secure, agile enterprise Gigabit (GB) capabilities
SAP S/4HANA Cloud,
USB 3.1 Type-C/Type-A Ethernet (T2E) Converter architecture, Unite Cloud is to scale with evolving
Private Edition, midsize
10Gbps ports, 4K HDMI that allows the Thunderbolt designed to reduce the total bandwidth demands, and
companies will benefit
output and provides a port to act as an Ethernet cost of ownership while the new Juniper Networks
from innovation, flexibility,
Thunderbolt/NAS/iSCSI connection. This allows increasing long-term return Contrail JumpStart
and functionality of SAP
SAN triple solution. The users of devices without on investments. In addition service offerings that help
S/4HANA enterprise
TVS-882ST2 empowers Ethernet ports to connect to Junipers existing enterprises rapidly deploy
management solution
intensive applications such to networks without comprehensive data center technologies at lower risk
and derive the benefit of
as 4K video editing, and requiring an extra adapter. solutions, Unite Cloud also to embrace the cloud
effortless scalability, ease
provides high-speed data includes an enhanced Junos seamlessly.
of implementation and
management.
18 February 2017 www.varindia.com
GIGABYTE Technology (India) Pvt. Ltd. Like us on
Tel: +91-22-40633222 Toll Free: 1800-220966 Visit us: www.gigabyte.in www.facebook.com/GIGABYTEindia
Gujarat: 98642 30150; Mumbai: 99677 18653; Rest of Maharashtra: 99677 18653; Goa: 99677 18653; Chhattisgarh 99677 18653; Madhya Pradesh: 99100 86976; New Delhi,
Haryana, Uttar Pradesh: 99583 72672; Punjab, Chandigarh and Jammu & Kashmir: 99100 86976; Rajasthan: 98286 63392; Bihar, Jharkhand: 90075 45577; Orissa: 90405 06080;
North East: 97076 42785; West Bengal: 97485 02710; Karnataka: 94482 93439; Andhra Pradesh, Telangana: 90405 06080; Tamil Nadu: 74117 74666; Kerala: 98950 99231
www.varindia.com February 2017 19
ON THE RAMP
A
6.3 and VMware NSX-T platform for vSphere-
cer Spin 3 is now and locations, opening the breakneck pace of
1.1, VMware is advancing based deployments.
available across up new risks and attack innovation and adoption
support for the most critical VMware NSX-T is a
key retail stores at a price vectors, particularly as IT of connected devices, and
IT use-cases automation, network virtualization
of Rs.4,2999. The device teams extend security and an insatiable appetite for
security and application platform for new
boasts 15.6-inch HD with encryption capabilities new technology introduces
continuity, while offering application frameworks
Acer Color Intelligence across cloud, data center, new problems in the form
development organizations and architectures that have
display. Its backlit and hybrid environments. of increased attack vectors
an agile software-defined heterogeneous endpoints
ergonomic keyboard with a Business leaders to the broader economy.
infrastructure to build out and technology stacks.
1.6 mm keystroke provides
*TBR Corporate IT Buying Behavior and Customer Satisfaction Study x86-based Servers, Fourth Quarter 2015.
The following are trademarks or registered trademarks of Lenovo: Lenovo, the Lenovo logo, ThinkServer and System x. Intel, the Intel logo, Xeon and Xeon Inside are
trademarks or registered trademarks of Intel Corporation in the U.S. and/or other countries. 2016 Lenovo. All rights reserved.
Terms and Conditions apply.
58 August 2016 www.varindia.com
A price tag that will get
you new customers.
Introducing the ThinkServer TS140
for small businesses with big demands.
The following are trademarks or registered trademarks of Lenovo: Lenovo, the Lenovo logo and ThinkServer. Intel, the Intel logo, Xeon and Xeon Inside are trademarks
or registered trademarks of Intel Corporation in the U.S. and/or other countries. Microsoft and Windows are registered trademarks of Microsoft Corporation. 2016
Lenovo. All rights reserved. Terms and Conditions apply. The test(s) above are performed on statistical samples.
www.varindia.com August 2016 59
VOICE-N-DATA
A
India.
irtel Payments on this momentum and Wi-Fi router wirelessly,
AMS-IX India is a
Bank has said serve even more customers strengthening and
collaboration between the
that it has opened over in the days to come. Airtel expanding its signal into
India-based ICT service
one lakh (100,000) savings Payments Bank is fully areas it cant reach on its
provider Sify and the
accounts in Uttar Pradesh committed to taking its own.
Europe-based AMS-IX.
in the first two weeks of simple and convenient It comes with 2.4GHz
Customers will be able
its launch. Approximately services deeper into 300Mbps and 5GHz strong Wi-Fi expansion
to connect to the IX via
60% of these accounts the state and contribute 867Mbps dual bands. Use at combined speed of up
dedicated ports with speeds
have been opened in rural towards financial inclusion the 2.4GHz band to send to 1.2Gbps and operates
of (multiple) 1 Gbps or
areas, underlining the and banking for all. We email and browse the web, over both the 2.4GHz band
10 Gbps. AMS-IX India
massive scope for serving are also building a digital and the 5GHz band for (300Mbps) and 5GHz band
will serve as a neutral
customers, particularly in payments ecosystem that gaming and HD streaming, (867Mbps) for more stable
and independent peering
unbanked and underbanked will enable customers to this range Extender wireless experience. Its
platform with unrivalled
pockets of the state. make cashless payments for supports your dual band intelligent signal light helps
quality offering both private
Shashi Arora, MD & goods and services across router without compressing to find the best location for
and public peering services
CEO, Airtel Payments Bank, millions of merchants on one of its best features optimal Wi-Fi coverage by
at the carrier-grade level to
said, We are delighted with across the country and Dual Band Functionality. showing the signal strength
Internet Service Providers
the response received from invite merchants across The RE305 works with and also it works with any
(ISPs), Internet Content
the customers in UP and Uttar Pradesh to be a part all Wi-Fi routers. It Brings Wi-Fi router or wireless
Providers (ICPs), and
look forward to building of this ecosystem. Wi-Fi dead zone to life with access point.
Telecom operators.
24 February 2017 www.varindia.com
www.varindia.com February 2017 25
CHANNEL BUZZ
VARINDIA organized a full day seminar on Cyber Security
Framework; Securing FinTech Companies; Securing Smart Cities
1,000 Cyber Start-ups by 2025; and Strengthe
We all know that India is moving towards digital economy and we are going to face lots of challenges. Given the size of India and the nature of its
society, lots of challenges stare us in the face. We may not have as robust a system as Israel or America because of the fact that the basic foundation
of our country is slightly different and the structure of our nation is also a bit different. Nevertheless, the time is very crucial for us and we cannot lag
behind in terms of understanding the challenges and the efforts to deal with the issues on hand.
We all know that our Prime Ministers effort and vision is very clear. We are talking about cashless economy and all related steps being taken by
the Government will take us in a particular direction to accept the challenges and move ahead. We cannot achieve this alone in the government. We
have to have all the private organizations integrated into our efforts at various levels and from all of the countries like Israel, America, etc. In recent
times, whenever our Prime Minister or anybody from the government visits or exchanges some bilateral talks with friendly countries, the foremost
understanding is on sharing of intelligence. This has become an integral part of any MoUs which we arrive at. Unless we share information with regard
to various threats, security issues then the forging of partnership remains incomplete. The same reciprocal attitude has been seen from our friendly
countries. The challenges are there for everybody so it has to be a combined effort.
India needs to secure its digital payments system by building its own cyber security framework to provide secure payment to its citizens and it is not
an easy task.
In the Home Ministry, we keep on updating ourselves, but I could clearly see the challenges which are not going to be easy for all of us. This rapid
development of digital technologies and a wide range of services provided for activities in the cyberspace raise the issue of cyber security as a serious
concern for the government. Cybercrimes pose a direct threat to the security of critical infrastructure and information technologies.
With the advent of advanced information and communication technologies, crime now knows no jurisdiction or national boundaries. The very
nature of internet allows for unprecedented collaboration and interaction among particular communities of criminals. As cybercrimes can be created
at anytime in the world in an unprecedented way, it becomes extremely difficult to track, prosecute and enforce penalties. Therefore, criminals are
increasingly turning to internet to facilitate their activities and maximize their efforts. Using cyber-attacks, terrorists can cause a much wider damage to
the country or region than they could by resorting to conventional physical violence.
Government is aware of the vulnerability of information technologies. India is shifting gears by entering into the facet of e-Governance. India
has already brought sectors like income tax, passport, visa under the realm of e-Governance. Sectors like police and judiciary have also planned to
follow. We really need to update our policing system. The travel sector is also heavily relying on this. Most of the Indian banks have gone for full-scale
computerization. This has also brought in concepts of e-Governance and e-Banking. The stock markets have also not remained behind. To create havoc
in the country, these are lucrative targets to paralyze the economic and financial institutions. India has to cover a long road to make its cyber security
effective. It has to cover a long road in cyber security initiatives and we are gaining momentum.
Contd. on pg 39
P.P. Chaudhary, MoS for Electronics & IT, Law & Justice,
Govt. of India delivering keynote address at Cyber
Security India Conclave 2017
Friends, through a series of path-breaking transformative initiatives, under the dynamic leadership of Prime Minister Narendra Modi, the country
has taken giant strides to fast emerge as a digital economy and inclusive knowledge society. This also necessitates putting in place requisite infrastructure,
mechanisms and process in place to fully secure our cyberspace from all possible cyber-attacks and cybercrimes as a pre-requisite and to keep our cyber
defence in place. In this backdrop, I congratulate VARINDIA for organizing Cyber Security India Conclave 2017 which is both timely and relevant.
Friends, I wish to assure you all that the government is alive to ever-evolving dynamic security scenario since cyberspace has taken several proactive
measures to create a digitally trustworthy economy. Under the overarching IT Act, 2000 as amended from time to time, a national cyber security
framework is in place which takes on board all the stakeholders and cover perspective of secure cyber ecosystem, assurance and regulatory mechanisms
24X7, security operations, use of indigenous security technologies, workforce availability and development. Global cooperation and gap analysis with
several countries, a national cyber security policy is already in place in the public domain.
Indian Computer Response Team (CERT-IN) has been operational on a 24x7 basis and all cyber security-related incidents are to be reported to
CERT-IN. It works closely with affected entities and stakeholders both within and outside the country and provides initial response within four hours
to a reported incident. CERT-IN undertakes activities of accessing the security posters of websites of sensitive organizations, particularly in the
government, public financial sectors through both black box security audit and white box security audit. CERT-IN also empanels IT security auditing
organizations which provide audit services on a commercial basis.
Cyber crisis management plan for countering cyber-attacks on cyber terrorism, periodically prepared by CERT-IN and approved by the national
crisis management committee, is widely circulated amongst central ministry departments, states and union territory governments for implementation
at various organizational levels. Regular workshops and drills are also organized by CERT-IN for various stakeholder organizations both in the public
and private sectors.
The government has set up cyber forensics training and investigation labs at CBI academy and in the states of Kerala, Jammu & Kashmir and seven
North-Eastern states of Assam, Arunachal, Meghalaya, Manipur, Mizoram, Nagaland, Tripura for training law-enforcement agencies and judiciary in
these states. The CERT-IN cyber forensic lab also provides its services to law- enforcement agencies, state and union territory governments, PSUs, etc
in the investigation of cyber security incidents and cybercrimes.
Setting up of a national cyber coordination centre under CERT-IN is in progression which would enable to anticipate and prepare to counter cyber-
attacks and to generate cyber security situational awareness. An expert panel has been set up to recommend the changes required in the existing laws
such as IT Act, criminal procedures, Evidence Act and IPC to plug the gaps, if any, in tackling the various forms of cybercrimes.
In the wake of historical demonetization drive which took place in the country recently, digital payments have shown exponential growth and hence
Finance Minister Arun Jaitley has announced that cyber security is critical for safeguarding the integrity and stability of our financial sector. A computer
emergency response team for our financial sector will be established. This entity will work in close coordination with all financial sector regulators and
other stakeholders. The government has taken several initiatives and measures to safeguard and secure our cyberspace and digital transactions.
From L to R: Eric Loit, Chief Systems Architect, RAN International; Marc Kahlberg, CEO, Vital Intelligence Group, Israel; Deepak
Sahu, Chief Editor, VARINDIA; Deepak Kumar Rath, Editor, Uday India; Rama Vedashree, CEO, DSCI; Hemal Patel, Senior VP-India
Operations, Sophos; Atul Gupta, Partner-Cyber Security Services, KPMG; and Dhiraj Gaur, Technical Lead (Govt., Defense and ICS
Solutions), Check Point Software Technologies
Marc Kahlberg: I managed to stop crime of global corporations like Symantec, FireEye, Messaging apps are challenging the usual way
in 2002 in Israel by 70 per cent by implementing EMC and RSA have chosen India as an R&D of communication. Everything around us is
physical security concept which we call the centre. According to our estimate, there becoming connected.
secure zone or safe city. The cyber people of the are around 150,000 people working in their
world called it smart city. It is time to change as professional capacity in the overall information With the right architecture, the right strategy
we are moving forward and we have to be aware. security and cyber security domain. and having a thought process of staying one
We have to work together to create a stop to the step ahead of the security advisory that should
war that is going on in the cyberspace today. If Hemal Patel: Cyber security framework be our key approach to build a resilient cyber
you do not work together, nothing is going to consists of two things. One is definitely security framework.
happen. We have to encourage and cooperate protecting our own assets in the country and
between ourselves. We have to work together building a leadership to promote cyber security Atul Gupta: In the last presentation, it was
to create a platform of security. products and services. Cybercriminals will mentioned that 3.2 million debit card hacks
We have created and developed a couple of always be ahead. Therefore, there will always be happened in India. So there is a need today for
frameworks for cyber security. In the six Ps of a data breach, cybercrime and data thefts. It is us to have a robust framework. While talking
cyber security, the primary concern is the threat, important for organizations or country to make about the good practices, the point goes back
the provision of education and awareness, sure how fast we can catch cyber terrorists and to awareness. I bring three elements around it.
protection; preventative measures are necessary; how fast we can respond to and how we can It is not just awareness. It is also making sure
predictive measures need to be proactive. There slow them down. Focussing on these three that you have the right skills and that is the
are long-term challenges. The tasks we have to principles, if I have to build the cyber security bigger challenge today because making sure
take up to make these challenges a reality. Cyber framework to protect our own countrys asset. that skills are available to address cyber security
security is all about intelligence and the best I dont think there is a framework in the police effectively is a huge issue which we are facing
form of defence is a good offence. force to record those events. as a country. The second area where we need
One of the definite things government to focus upon is competence and many times
Rama Vedashree: It is a well-known fact needs to strengthen is the patent office. it gets interpreted as technology-related risk. I
that India is a powerhouse of Information Second, we need to have a lab to certify our put it differently. It is a risk which has started
Technology. Indias advantage in cyber security products and we are the only odd country because of technology but does not stop over
is a well-kept secret because most global where the government has the lab and it should there, but the challenge which comes when we
corporations which invest in cyber security be privatized. start looking at technology which is changing
centres of excellence or security operation at a fast pace.
centres or network operation centres do not Dhiraj Gaur: Digital initiatives which the
usually advertise that capability and in which Government has taken are touching lives now. Deepak Kumar Rath: In India, cybercrimes
location it is. So we are beginning to feel that We are entering an era where we are talking come under the Indian Penal Code and the IT
India during the last three years has become publicly about available internet, universal Act, 2000 which was amended in 2008. Since
a chosen destination for security operation acceptance to technology, IT jobs for everyone, policing is a matter of state and complaints
centres for a number of global corporations. e-Kranti situations where we are touching have to be lodged with the police, it all depends
Similarly, all industry members, whether it is the lives of farmers, e-governance initiatives under the law that police register a case. It so
HCL, TCS or Infosys, have very mature cyber which are very well can be seen in every state happens that for most of the parts they prefer
security practices. We are also seeing companies and every state is competing with each other. the age-old Indian Penal Code (IPC).
like KPMG building capabilities in India for So having this digitization is very good but at
cyber security consulting and services to be the same time it has a lot of IT components Local police are not conversant with the
able to deliver to the global clients. While it is a and automation involved in it. In this era of intricacies of the IT Act. But once a case is filed
nascent industry, we are beginning to become a transformation, one important thing which under IPC, the method of investigation must
hub for innovation and product development. we have seen is that the mobile phones are follow certain guidelines that make it extremely
taking over desktops. We have also seen that difficult to prove most cybercrimes, according
We are looking at security R&D. A number social scenarios are beating the search engines. to experts.
From L to R: Pravin Prashant, Consulting Editor, VARINDIA; K.B. Lal, Advisor, Information Security, Oxigen Services; Prem K Gurnani,
DGM-SOC, State Bank of India; Arvind Gupta, National Technology Head, Bhartiya Janata Party; Carmit Yadin, CISO and Director
of Cyber Division, Vital Intelligence Group; Puneet Kaur kohli, EVP - IT & Group CTO, Bajaj Capital; and Gurpal Singh, Sr. Market
Analyst, IDC CCR India
Arvind Gupta: In the budget, digital operations centre (SOC) and this environment is all endless as cyber security is a continuous
economy was a special section and the Finance is helping the banks. effort and we have to keep on improving.
Minister has announced CERT for banks. The In 2011, RBI came out with the guidelines
digital should be the norm and the cash should on information security which mandate banks Puneet Kaur Kohli: FinTech industry needs
be the exception. for governance structure, IS Security, and CISO to be digital savvy. We have taken an internal
The banks and the network layer need to report to the management. On 2nd June, 2016, landmark where we will wait to have ISO 27001.
be secure. We dont concentrate on use, app RBI came out with cyber security for banks with It is not about IT security but enterprise level
and instrument they use. If the consumers another list of activities which include: CERT-IN security. How consistent are we in terms of
would have adhered to cyber hygiene, people audits, cyber drills, NCIPC pitching, RABBIT, leveraging the certification and then utilizing
would have saved around Rs.3,700 crore. The and opting of cyber security professionals. The the adoption and cultural change within the
importance of mobile PIN is to get people ecosystem is converging and facilitating security organization and regulated by IRDA and SEBI.
digitally literate. So one needs to educate people for Buddy. One set of rules and regulations is not enough.
on financial literacy. During demonetization, the Products need to be rolled out fast, but
highest number of requests for banks was I do unless these are tested by the security team and a Carmit Yadin: On cyber security, there are
not know my PIN number. clearance is given, the products cannot be rolled three main factors:
In the BHIM app, the app layer is also secure. out. You would see many times that SBI is not 1. It is interesting time for India as it is
If you install an app, it requires 20 permissions. the first to roll out a product to hit the market. going digital. How India is going to protect the
BHIM app is a standard app where the user, app, SBI has a strong security team taking care biometrical database? Every person is going to
mobile phone, network, and server is planned of products, a strong governance structure, get digital identity to manage his financial assets
in a holistic way. In the FinTech companies, all strong awareness about customers and staff and the government needs to provide robust
these parameters are very critical. programme in place. cyber security infrastructure on this asset.
During demonetization, the E-wallet We manage traffic as well as security and No one will change his fingerprint. How the
transactions increased in November and since it is SBI we see attacks every day be it government is going to protect people. If this
December, whereas in January these remained phishing attacks, DoS attacks and DDoS attacks information is leaked, financial information can
stable. In IMPS transactions, it peaked in at a regular frequency. Investigative measures are be broken.
December and January, whereas in the case of in place at the network layer, application layer 2. Awareness and education must be in
BHIM/UPI app, the transactions have increased and transaction layer. place for the entire nation. Everybody has to
from Rs.90 crore to Rs.1,270 crore and are With transactions going up now, there is a understand the risk and needs to know how to
competing with all the wallets combined. separate set-up for monitoring transactions to avoid risk.
The biggest challenge for FinTech companies alert customers whenever there is any suspicion. 3. India has taken dramatic steps in this
is to make digital transactions secure and India financial digital world. It also became very
is leading the world in FinTech revolution K.B. Lal: Oxigen started in 2004 and the attractive targets to hackers and enemies and
globally. initial objective was to perform digital operations everyone wants to put a hand on these critical
Prem K. Gurnani: I am quoting a news like mobile recharge, DTH and bill collection. assets and the way I see and working with
story about millions of cards being blocked and When we want to assure our customers, we have different governments in the world now it is
SBI was mentioned in the headlines. We got calls to look at external threats as well as internal right time for India to build a strong robust
from all over law-enforcement agencies and all threats. We want to assure the customers and we cyber intelligence methodologies and create
regulators but what was the instance. It was a want to make it easy. cyber intelligence infrastructure.
non-SBI company, a particular bank which had Wallet has a six-digit password and has a two These are very interesting and important
outsourced some activity to a particular service factor authentication but the customer does not and how it looks from outside. India will be a
provider. SBI has the largest customer base, want it. secure nation. Whether India will be a secure
largest card base and nothing has happened in Cyber security has a two dimension perspetive. nation or will India lead this industry and create
SBI. What I am trying to highlight is that being a Defensive provides comprehensive vulnerability standard. All countries around India will learn
leader has its own challenges. and is somewhat protected from attacks. On the from India.
SBI, a couple of years back, has outsourced preventive side, train our partners and designers
law monitoring security operations but depending to use secure coding guidelines formalized Arvind Gupta: Our inspiration has been
upon the volumes we do not permit setting up structure within the government. The focus is defined by our Prime Minister. We want to
logs outside. So, we set up our own security also on third-party audit or ISO 27001. This do innovations for the next six billion. We are
technically an advanced superpower with one afterthought as an interface. When you are writing party audits to access your security. Managing
million engineers produced every year. The the first code all the developers should have internal risk comes from advice and third-party
geopolitical situation we are in the world trust that piece. Third, what security tools are using suppliers and contractors.
leaders. six billion grossly ignored because of to identify and access management two factor Lastly, FinTech what kind of SLAs they have
the cost. All platforms have cyber security to the authentication, privilege access management, from the government bodies. The average lag
world. encryption tools. Recently, CERT advised banks time is 14 days in the production system. Post
Gurpal Singh: Four mantras. First, for any and NBFCs to have strong encryption capabilities. demonetization, FinTech companies got the
organization, security infrastructure can be very Every point your database, every point your mail, scale but also got a lot of vulnerabilities in the
expensive. Seocnd, if they dont have architecture every point your product and that ownership lies ecosystem. So there is a need for establishing a
for the product ingrained by design and not as an with lot of Fintech companies. Regular third- regulatory authority for digital wallets.
From L to R: Pravin Prashant, Consulting Editor, VARINDIA; Brijesh Singh, Inspector General of Police (Cyber), Maharashtra Police;
Purushottam Kaushik, Sr. Advisor- Smart Cities and Infrastructure, McKinsey India; Shree Parthasarathy, National Leader- Cyber
Risk Services, Deloitte; Rajnish Gupta, Sales Director, RSA India; Vipin Tyagi, Executive Director, C-DOT; Samir Datt, Founder & CEO,
Foundation Futuristic Technologies; Pankaj Kumar Gupta, OSD, Strategy, Business Growth & Operations, (n) Code Solutions (A Division
of GNFC); and Ajay Purohit, Sr. Vice President, Fourth Dimension Solutions
Brijesh Singh: More than a policy question, can definitely deliver results. And I can assure everything gets connected, it is not too much of
it is about technology question when you look you as a consultant to Gandhinagar smart city, an effort to switch off the lights of the whole
at IoT. It does not have enterprise security like implementation is 100-per cent secure. city. It does not take too much of an effort to
protected firewall, IDS/IPS, Flow Analysis, keep playing with the transparent system of
Malware analysis and endpoint protection. Vipin Tyagi: What we have missed in the city. That is where the big time impact or
I think security for IoT devices is not very smart city is design. The open platform has not exposure can happen.
developed still and it would need much better been adopted as the focus is on the proprietary Presently, smart cities are in silos. Somebody
solutions. platform. Smart city requires an integrated is focussing on Wi-Fi transport solutions,
The IoT devices have very aggressive power IP-based core network and then you require integrated traffic management, waste bin
management and they do not have an operating applications. deployment or smart parking. All these projects
system and they are liable and susceptible to any 30 per cent of the total traffic flow on Internet are executed in silos as there is no framework or
kind of attacks. Surely, all this infrastructure is is BOT or BOT-like. Attacks are large-scale plan and how it will get integrated with smart
outside as the threat surface area is very, very vectors or multi-vectors. How standardization city. As a technology leader, we will focus on
large. So threat of IoT devices and smart cities will build security? how do we build silos around smart city. Now
is more like a technology challenge than a policy Tower Monitoring Site (TMS) is a nationwide perhaps from the consulting point of view
challenge and I hope we will have to find a better public infrastructure and it has to be secured. unless we look at it holistically, we will not be
solution in the times to come. We need to have a standard-based platform able to solve it whether we build a framework
Pankaj Kumar Gupta: Gandhinagar where everybody can connect. With respect of security across the layers or on the services
became the first operational city a month back. It to blast, law-enforcement agencies need to be perspective as we move forward and how do we
is much more than a regular CCTV as our Wi-Fi fully equipped as they can trace where was the manage security on a day-to-day basis.
system has 15,000 concurrent users having about machine, who did it, at what time the command We need to have continuous security layer
2 Mbps and about 30 minutes free Wi-Fi usage. was actuated, at what time did the detonator go on every piece at all exposure points. We need to
Gandhinagar smart city also has smart sensor- and its likely impact. build a services layer perspective. Any of these
driven street lights, environmental sensors and smart cities put a layer on top of it where we are
many other components. Purushottam Kaushik: In smart cities, going to have a third-party practice of analyzing
Technologies can be executed, but the everything will become smarter. The challenge is each and every security layer. Certifying and
big question is how secure are they. We have all the pieces of smart city whether the endpoint auditing it after every three months will help us
conducted 26 tests before we launched this which is in the streets or closer to your home to be proactive.
project. The project was executed in about three and whether it is the gateway which is carrying Shree Parthasarathy: We have involved
months and it took four months to fix those the data network or central piece or command from generation to generation, there are a lot
gaps through 26 tests. and control or maybe the data layer the exposure of expectations from a fundamental city. As we
I think we have security which needs to point is everywhere whether it is touched or are tagging a smart city, the expectations of the
be implemented. IoT sensors are a very good played. The impact can be huge. Presently, we common citizens are just going to go up.
technology. If implemented properly, they are not smart so we are not exposed. When ATM, which is a trusted network so far,
From L to R: Amajit Gupta, ICT Expert & Angel Investor; Rohit Srivastwa, Senior Director (Cyber Security & Education), Quick Heal;
Shrikant Sinha, CEO, Nasscom Foundation; Debabrata Nayak, Chief Security Officer, Huawei India; Dinesh Pillai, CEO, Mahindra
Special Services Group; Harold DCosta, CEO, Intelligent Quotient Security System; and Trishneet Arora, CEO, TAC Security
Amajit Gupta: Definition of cyber security constant is people. We have to do a reality check the commands. They are producing donkeys.
in terms of shapes and sizes and where is the with respect to training on cyber security. Who We will have to get government empanelment.
money? I think national cyber security is getting is going to teach? People who have done CCNS Otherwise, nothing is going to happen. We are
more and more profound. It is the early stage come and say I am a cyber security expert. fighting with young criminals. So how a 50-year-
industry. Like we do it in India one way, i.e. Jugaad. What is the basic definition of cyber security. old man is going to fight with a 15-year-old kid.
We find the size and shape to our story as we go I am an expert in information security and not If I am fighting, I believe a lot of young start-
along. We see a national vision from NASSCOM cyber security. ups are also fighting. We are testing financial
and DSCI of one million cyber security experts Who is going to train? Who is going to institutions and banks.
by 2025, but when we look at the drill you have accredit as cyber security course labs come at an
missed the number by a factor of six times. The exorbitant cost. Dinesh Pillai: To manage 80,000 people,
nearest number we need to train in this country there are 8 people in the info security team and
is 6.5 million every year and that is cyber security Harold DCosta: In 2006, diploma in cyber this bank is of national importance. 8 network
awareness. The rest is IT initiated who need to security in Maharashtra top universities was not and administrators moved to the security cell.
be trained for cyber security are the software and the right time. Nashik University said yes to me If an attack happens, they would not be able to
the service providers and that market is 1-1.5 for Diploma in Cyber Security and there were 101 manage it.
million professionals. admissions. 93 sat for the exam and 62 cleared. 25
What is the state on the supply side? On the per cent left the country and are serving in other Amajit Gupta: We have to target large IT
supply side, only about 20,000 cyber security places. Maharashtra Police Academy has launched experts as government cannot comprehend
professionals of the IT kind churn out every year a 3-day training programme for corporates to tell the problems. Supply vendor relationship will
or may be even lesser. what the police is doing on cyber security from destroy your business. Talent is over here, but
both the technical and legal side. In Nashik, there we dont have the environment to grow. I would
Rohit Srivastwa: We are a start-up in cyber are 5,0006,000 industries and Nashik Police will urge upon large corporates to put money where
security and was acquired by QuickHeal. We are train corporates on cyber security. the mouth is. For private risk ventures, cyber
on the education side called QuickHeal Academy As to training the judicial system, where are the security should be a priority.
where we are designing the course curriculum people? As far as the government is concerned,
for M.Tech in Cyber Security with the help there are 5,060 professionals in the government Dinesh Pillai: The industry has enough
of industry experts. We have signed an MoU system. In 2012, AICTE sent circulars to all challenges to address and there is scarcity
with Gujarat Forensic Sciences University and universities to start a mandatory course on cyber of people. Many times, somebody has to do
Chitkara University. The focus is on converting security. Many of the teachers who came from accreditation. The accreditation has to be done
the educated into employable in the cyber hardware were teaching cyber security. The big by government agencies.
security space. question was where are the people to teach cyber
security? Build cyber security research cell where Rohit Srivastwa: The industry has to teach
Debabrata Nayak: For Huawei, it is do or the government can introduce and we will give as real knowledge will come when the industry
die. There is no budget listed for cyber security. them jobs and we will absorb them. Time has teaches.
We have 160 cyber security professionals for come for more action, more training and then
thorough testing of equipments. Autonomous absorb them at the earliest. Trishneet Arora: We have students for
institutes can bring cyber security courses for industrial training and I think this is the only way
B.Tech, M.Tech and Ph.D. This time, budget Trishneet Arora: We are not empanelled to train resources. Cyber security is a business
talks about cyber security. Institutions can bring even after four years. If we are not empanelled, issue and not a technology issue. It is a business
cyber security courses and then train cyber how will you get 1 million ethical cyber security risk and we should give chance to cyber security
security professionals. hackers. start-ups so that they can come up.
In 2011, NASSCOM talked about 77,000 Who will train? An agency which should
Dinesh Pillai: As an end-user, we do not ethical hackers every year. How many you have certify people. They in turn should train the
follow basic hygiene. Technology shift will got till 2016? A number of institutions provide trainers or professors and professors then should
be there, but there is only one thing which is 6-week and 6-month courses but they dont know train the students.
few hours before we surrender thats the current have to cover all aspects in 1-year, 2-year or and to be globally harmonized and even in the
level of preparedness. 3-year programme. We have to arrange skill country it needs to be harmonized.
In this scenario, you need to have adequate development for students for short-term On the encryption part, on 7th August,
first and foremost legal frameworks and we courses. In Bharti Vidyapeeth, we have Legal 1999 we had 40-bit encryption, but what is
need to know what is happening across the Aid Centre, where we are getting lots of cases. the situation today? We have different types
world. There is laxity in our approach, whereas We give legal advice to students for such kinds of provisions within different regulations.
China during the last 18 months has come of cases and we are giving compulsory cyber In online trading there are three different
up with two important legislations one security to all students. Around one lakh provisions and it is incompatible with one
on national security and the other on cyber students in Bharti Vidyapeeth and students another. We do need to have a consistent policy
security. The law is not only applicable to not need to get compulsory cyber security and legislative framework within the country.
just entire China, entire Internet but outside certificates for getting degrees. The third thing is evidence with respect
space. to cyber crime. Now, if we want to sensitise
The new concept of cyber sovereignty and Samir S. Kanthale: There are two things and prioritise at the legislative level, this is very
what is Indias position on cyber sovereignty? awareness and capacity building. Maharashtra important. When we start looking at all these
India doesnt have a stated position on cyber is the only state which has assigned training of cases with respect to electronic evidence for
security. It is time we go beyond the paradigm public prosecutors. A question often arises if it cybercrime, then I hope legislations will uphold
of the IT Act. is so technical, how do we deal with it. When we much higher authority in the realm of rules.
The IT Act is good when we began; it was studied LL.B., this law was never in existence. In terms of institution capacity, we need
a small legislation. When we amended it in the It is not an easy task to try somebody who is an to take definite steps. The cases are piling up
year 2008, we transformed small legislation to expert in IT before a court which has knowledge at the Cyber Appellate Tribunal as there is
biggest omnipotent mother legislation with of the said subject. The Cyber Security Policy severe shortage of judges. Symantec, along
data and information in the electronic form. of 2011 has specifically dedicated state-of- with NASSCOM, is doing capacity building
But we now incorporating communications the-art facility for cybercrime investigation for five curriculums for the National Skill
device and computer resources, this law has and dedicated state-of-the-art training facility Development which was unveiled last month
become one of the three most significant for law- enforcement agencies and judiciaries. and has rolled out in different colleges.
pieces of information the ther two being Unfortunately, it is yet to see the light of the For critical information provisions, we
Indian Constitution and Indian Penal Code. day. As an incharge of the training institute, I have three protected systems in India like the
India needs an independent Cyber Security am requesting cyber security experts to come Communication System acquired by the Delhi
Law independent of the IT Act. and enlighten our prosecutors on the subject. Police during the Commonwealth Games. The
As a nation, we are unprepared tomorrow When these cases are tried before the second is Ministry of Shipping and third is
if our critical information infrastructure is Supreme Court, we have just 65, but we dont Aadhaar CID Act. Apart from these, we do not
attacked. We cannot afford to fight against have separate rules for investigation and have protected systems. Unless and until these
the entire gamut of warfare agent critical acceptability of evidence. We need to have are protected, the law does not allow higher
infrastructure. standard investigation procedures recognized level of penal provisions. We need to increase
Cyber terrorists are structuring their by law. our critical information infrastructure, be it
activities in such a manner that their activities The second thing is awareness. Even as a the Income Tax database, Voter ID database,
cannot be brought under Section 6- F of the common man, we are hardly bothered about RTGS switch, NEFT switch, international
Information technology Act. As a nation, I personal information pilfered or being misused. gateway of operators and others. Recently,
am quite clear that India cannot fight cyber As a case-study, we studied the privacy policy the US has identified 16 sectors which include
terrorism with one single provision. We need of bank and we found that the privacy policy is waterways and dams.
to have extensive legal provision for judiciary indeed in a way to favour the banks, although
and law-enforcement agencies. prior permission is required to share the data Harmeet Kalra: Given the three pillars
It is time to revisit the law. It is time we with third party. I doubt whether this policy has that we define problem are people, process
need to do lot of capacity building. It is time been challenged at an appropriate authority. and technology. We believe people and process
when to come up with capacity deterrence and Another issue, I would like to highlight are much bigger problems. Our opinion is
or states IT Act. We need to have cybercrime is the availability of free or paid app on the that tangibility from technology is far more
courts as cybercrime is happening all across the App store. This is totally unregulated area and doable. Pointing out the combat, the firewall
world. Cyber is centre to a variety of things. In I believe there needs to be some authority to market is $200 million and application security
2017, my guesstimate is that 3 out of 5 cases regulate, certify subscriptions of apps. market is $6 million. If we pick up any attack
require electronic evidence. It is time we revisit on cyber infra only novices attack the actual
the rules for mobile evidence and who is going Deepak Maheswari: The IT Act is at user. Experts attack application and users are
to give the certificate. the central level. Otherwise, we would have a missing the application part on the top of this
According to a report, the global cost central legislation as well as a state legislation. gigantic wave of digital. As we move towards
of cybercrime is going to exceed $2 trillion. Notwithstanding that, we do have National digital, it is more important to start respecting
According to Forbes, 80 per cent of cybercrime Cyber Security Policy, 2013 much before that the fact that it is the applications which the
is done by organized crime. IT Policy in 2012, but many states had the IT infrastructure is serving. And the focus on
Keerti Nileish Mahajan: It is teachers Policy right from 1997. application security is right from the building
responsibility for creating new leaders. We Our policies have to be at least consistent stage of the applications.
Amit Malhotra: If you look at the history tells somebody to e-mail top 100 customers. which is moving out in any form be it a file, a
of leaks, the majority of the leaks happen The e-mail comes on the mobile phone and pen drive, through network and peer to peer if
by trusted source. There is lot of focus on it is not protected. Today, credit cards and you can provide security to that piece of data
inbound protection. Missing on the 90 per banks will have the best of security, but the and security travels with that that potential is
cent data which is outside of the data center. statement has to be printed and you have to go the best form. Other which is more critical is
Private banks and government banks are to the third party and there is an information maintaining logs and audit trails.
deploying the best of cyber technology. flowing through a secured firewall. Data center Harold D Costa: Data Protection law has
All of us on the vendor side and also on to an outside world and do not know where it to be encrypted and domain registration has to
the enforcement would agree that banks and is going. And so what we believe in Seclor and be governed by Indian authorities. n
telecom sector addresses there cyber security that is the stuff we are looking at is instead of Pravin Prashant
requirement. The challenges are coming with data of looking at data centered security we pravin@varindia.com
respect to information movement. The big boss have to look at data- centric security. The data
are under threat by cybercriminals. Businesses importance of economy. Shri Vipin Tyagi, sources be it individual, SME or enterprise.
have to yet wake up to the grave risks posed by Executive Director, C-Dot, Government of Shri Suvrendu Mitra, IMS Div. East India, Canon
social media. Unless companies come to realize India, spoke on the presence of good education India, shared his experience about the importance
that their security perimeters must grow beyond in Odisha and about the manufacturing cluster. of digitization and documentation which Canon
the corporate firewall to encompass social media He further spoke about reliable communication expertises as an enabler with various range of
networks, then the global cost of cybercrime will which is a must. scanner products.
continue to reach US$2.1 trillion by 2019, he Shri Priyadarshi Mishra, MLA, Bhubaneswar, The event recognized the technology
said. North, spoke on his regular interaction with the enablers in Odisha. The winners are Nigama
Shri R. N. Palai, ITS, Special Secretary to the IT companies in Bhubaneswar, where most of Computech, Tristar Software and Solutions, Tatwa
Government, IT Department, GoO, spoke on the the IT corporates are present in his area. Technologies, E Square Systems & Technologies,
Governments commitment for the growth of IT, In the corporate presentations section, Shri Printlink Computer and Communication, Info
ITeS and electronics manufacturing in Odisha. Nihar Chakraborty, Sr Vice-President & COO Care Solutions and CSM Technologies, which won
He also spoke on the electronics manufacturing East & SAARC, Sify Technologies, spoke the awards, respectively in the segments of Best
cluster, about manufacturing which is to start in about digital transformation and connectivity. VAR Odisha, Best Software Services Odisha,
Odisha in Info valley II. Shri Sameer Bhatia, Country Manager India & Best Technology Services, Best System Integrator,
Dr Gopal Krishna Nayak, Director, IIIT, SAARC, Seagate Technology, spoke on how to Best Distributor, Best Reseller Odisha and Best
Bhubaneswar, addressed the audience on the save data which are going to generate from many IT Consulting Services Odisha, respectively.
Suvrendu Mitra
IMS Div. East India, Canon India
Canon is associated with imaging image capture, delivery & print and display. We can make data secure at
various levels, which is growing at the rate of 15% annually. Documents are the lifeline of any business. There
are certain documents that are issued externally like medical reports, mark sheets, invoices etc. while there are also
internal documents like audit reports, minutes of a meeting etc. But it is becoming important to digitally back-up
these documents. After incidents of loss of data have been reported, most of the organizations including PSUs,
corporates have started digitally backing up and storing the information and data available. The good news is that
they have come to understand the importance of storing these data. Likewise, scanning is another component
that is most important in the Smart City sector.
[Mr. Deepak Kumar sahu, Chief editor- VARINDIA moderating the Panel Discussion( From L to R): Panel members Mr. Nilanjan
Mukherjee, Sr. Vice President- Fourth Dimension Solutions , Mr. Damodar Sahu, Partner & Industry Advisor WIPRO LIMITED, Mr.
Nihar Chakraborty, Sr. V.P.& COO-East & SAARC- Sify Technologies , Mr. Vipin Tyagi, E.D. C Dot, Government of India, Mr. Sameer
Bhatia, Country Manager- India & SAARC- Seagate Technology, Mr. Ayashkant Mohanty, M.D.- Tatwa Technologies ]
The panelists at the discourse discussed on the unique nature of the Indian cities, that one has to understand the dynamics of the city before
designing smart city architecture for the city.
Shri Nihar Chakraborty, Sr Vice-President & COO East & SAARC, Sify Technologies spoke on how IT services companies have to fine-tune
their requirements with respect to the city before coming with the architecture once the uniqueness of Bhubaneswar is finalized. Bhubaneswar has all
the ingredients to become the best smart city. The very fact that 5 top companies have made their investments here speaks volume of the talent pool
that is here. While improving infrastructure is one side of making a city smarter, but empowering the people living here is another aspect that should be
looked at in order for a city to emerge smarter.
Shri Vipin Tyagi, Executive Director, C-Dot, Government of India spoke on how Smart City should have an integrated approach and it cannot be a
piecemeal approach. Better cyber connectivity and local creativity & resources are a better way of looking at this issue. Also local manufacturing should
also spring up in order to meet up rise in local consumption.
Shri Damodar Sahu, Partner & Industry Advisor, WIPRO Limited spoke on how the automobile sector is moving towards transformation and about
the 4th industry revolution that is about to come to India. India is going through a lot of transformation in terms of connected services that is coming
to India, which means that India is now going to produce smart devices from a smart plan and which eventually will give you smart services.
Shri Nilanjan Mukherjee, Sr Vice-President, Fourth Dimension Solutions spoke about how the city needs to use its existing ICT infrastructure if it
wants to leapfrog and wants to save time as all technologies have its life cycle. The Smart city as a concept has to live to everyones expectations to make
a city liveable and is a mean to make the city sustainable. A Smart city does not just mean IoT or connecting sensors but it is much beyond that.
Shri Sameer Bhatia, Country Manager India & SAARC, Seagate Technology spoke about how citizens need to be smart and awareness needs to be
created to use smart technology. Smart cities are made smarter by smart citizens. We might keep talking about datacenters and infrastructure, but the
only way to make it smart is through its citizens who need to be made smarter first.
Shri Ayashkant Mohanty, Managing Director, Tatwa Technologies spoke about how Bhubaneswar can become the best smart city in the country and
how to tap new innovations back into Bhubaneswar Smart City. With little effort, no doubt Bhubaneswar can be converted into a smarter city as it is
well positioned to do that. But the only thing lagging in us is that we do not market our city well.
Key take away: The panel agreed that the people have to be smart to make the city smarter and discussed on the role of corporates/
institutions in Bhubaneswar to come up with their vision and contribute their ideas to make Bhubaneswar a smart and liveable City.
1. The Best VAR, Odisha - NigamaComptech
2. The Best Software Distributor, Odisha-Tristar
Software and Solutions Pvt. Ltd
3. Best System Integrator - E Square Systems &
Technologies Pvt. Ltd.
4. Best Distributor - Printlink Computer and
Communication Pvt. Ltd
5. Best Technology Services - Tatwa Technologies
Ltd.
6. Best Reseller, Odisha - Info care Solutions Pvt.
Ltd.
7. Best Software services, Odisha - CSM
Technologies
Mr. P Acharya, Addl. D.G. Police- Govt. of During the Q & A session During the Panel Discussion session
Odisha, Mr. Sameer Bhatia - Seagate and
Mr. Nihar Chakraborty - Sify Technologies-
participated in the lucky dip www.varindia.com February 2017 45
EVENT
There is no doubt that good sports also Stadium, Utkal University and KIIT Stadium first edition was played among six corporates in
make the city smart. Sports recognize the place, respectively. Altogether 26 IT and telecom the KIIT Stadium, Bhubaneswar. Airtel came out
state and the organization they work for and companies participated in both the tournaments as the runners-up team and the winner of the
it helps in brand building and brand recall. It and it was supported by STPI (GOI) and OCAC Champion Trophy was Infosys. Shri Rajanikanta
also brings out the hidden talent of every hard (GOO). Swain from Tatwa Technologies emerged as The
working employee who spends maximum hours The Tournament drew an overwhelming Man of the Series for the IT Cup.
sitting in 4 x 4 cubicles and 24x7. response from the IT majors in Odisha. The VARINDIA IT Cup 2017 which is in its 7th
To realise this objective, VARINDIA objective of the tournament was to bring all the edition was held at the Biju Pattnaik Stadium
organized its annual cricketing events - the 7th corporate together on a single platform, where (Utkal University) and was played among 20 IT
VARINDIA IT Cup 2017 and VARINDIA they get to know each other and experience the corporates. The runners-up team was Infosys
ICT CUP 2017 in two different cricket grounds real spirit of the game. and the winner of the Champion Trophy was
for the IT and ICT companies, Biju Pattnaik VARINDIA ICT CUP 2017 which is in its awarded to TATWA Technologies.
1&+5*#%1/276'4#22.+%#6+10%'064'
'ZEGNNGPEGKP+65QNWVKQPU
&GXGNQRKPICYGNNRNCPPGFTQDWUVCPFHWVWTKUVKE+6CTEJKVGEVWTGHQTVJGUVCVGVQGPUWTGIQQFIQXGTPCPEGWUJGTKPIJKIJGTGEQPQOKEITQYVJCPF
CVVTCEVKPXGUVOGPVKP+6+6G55GEVQTVJTQWIJKPFWUVT[HTKGPFN[RQNKEKGU
0QFCN#IGPE[VQFGXGNQRG)QXGTPCPEGTQCFOCRHQTVJGUVCVGRTQXKFGVGEJPQNQI[UWRRQTVCPFECRCEKV[DWKNFKPI
+ORNGOGPVKPIXCTKQWUG)QXGTPCPEGRTQLGEVUWPFGT0CVKQPCNG)QXGTPCPEG2NCP
0G)2NKMG159#05&%%5%55&)G&KUVTKEVGVECU5VCVG
&GUKIPCVGF#IGPE[
5VTQPI+PFWUVT[(CEKNKVCVKQP+62TQOQVKQP%GNNVQHWPEVKQPCUVJGUKPINGYKPFQYHQTVJGGPVTGRTGPGWTUKPVJG+6UGEVQT
2GLVKD&RPSXWHU$SSOLFDWLRQ&HQWUH
'HSDUWPHQWRI(OHFWURQLFV ,7*RYHUQPHQWRI2GLVKD2&$&%XLOGLQJ
3ORW1R1'$FKDU\D9LKDU%KXEDQHVZDU2GLVKD,QGLD
(3$%;_)$;_(PDLOFRQWDFW#RFDFLQ_:HEVLWHZZZRFDFLQ
Relaxation in Taxation
Harsh Marwah The Union Budget 2017-18 also remained extremely positive for the Peter Chang
Country Manager - Verizon common man, farmers, small and medium businesses and is believed to Region Head South Asia &
Enterprise Solutions drive significant growth in the Indian economy. Most importantly, the Country Manager - ASUS India
budget promoted the startup ecosystem with tax benefits. Reduction in
the corporate tax for Medium and Small Scale Enterprises (MSMEs) to
25% will also go a long way in attracting more investment in the country,
invest in job creation, increase capital expenditure and explore their digital
journey.
The Governments commitment to make taxation rate reasonable, tax
administration fair and expand the tax base is the step taken in the right
direction. The tax relief given by the Government for the middle class tax
payers will definitely boost the purchasing power, thereby aiding the overall
Rajiv Srivastava growth of the economy, says Rajiv Srivastava, MD, HP India. Satya Pramod
MD, HP India The Finance Minister made several references to using data mining C.F.O (Chief financial officer),
to improve the efficiency of the various tax departments specifically with Tally Solution Pvt Ltd.
regards to transforming India from a cash driven to a digital economy using
new measures such as Aadhaar Pay. This is a step in the right direction
which will have a relevant impact in widening the tax base and make
India fiscally stronger and have a positive impact on national growth and
development, opines Sunil Jose, Managing Director, Teradata India.
The best thing FM Jaitley has done is he has not tinkered too much,
especially with indirect taxes and has gone with the flow which has made the
markets buoyant. Overall, the economy is going in the right direction with
a fiscal deficit of 3.2%. In terms of investment, the removal of FIPB and
Rajiv Mehrotra Rajesh Maurya
making the procedure simpler will attract foreign investments and facilitate
Chairman and Founder - Regional Director, India
ease of business. From a GST adoption standpoint, it is music to the ears
VNL & Shyam Telecom & SAARC, Fortinet
to hear that the GST council has finalized most of the recommendations
made to it and the states and centre are aligned. Also, not changing the
indirect tax rates at this juncture is a clear indication that GST is all set
for 1st July, states Satya Pramod C.F.O (Chief financial officer), Tally
Solution Pvt Ltd.
Going forward, the industry hopes to see additional scope on additional
IT reforms including undertaking measures for the reduction in the service
tax for enterprises. This is exactly what India needs to do if it is to attract
investment, stimulate innovation, and ultimately stake its claim on a share
of the global digital economy. n
Debjani Ghosh Samrita Baruah Vishal Malhotra
MD of South Asia, Intel samrita@varindia.com Tax Telecom Leader, EY India
and President, MAIT
Rajesh Gupta. CEO, Kiosk Technologies: Paul Vijayakumar, CEO, DoBuy Technologies: At
Poaching is a very unethical practice. We spend DoBuy Technologies, we conduct talent enhancement
considerable time and effort on training and grooming programs in different regions on alternate Saturdays.
employees and the whole effort seems to be worthless These programs include technology trainings,
when a competitor tries to poach an employee. personality development, selling skills, negotiation,
In these times of cut throat competition, customer interaction and many more varied programs
protecting our work force and safeguarding the that prepare them for the many challenges associated
interests of our clientele is turning out to be a major with the business.
challenge. It makes sense if an employee leaves an Our programs are at a very corporate level so
organisation for better prospects, but companies targeting employees that our associates can offer better services to our corporate clients.
from their competitors which is definitely not acceptable. Occasionally, we invite external OEMs and arrange relevant sessions.
Learning resources and complete training material is offered for future
reference.
ICT Products
Indias First
14.1 inch Laptop
9,999/-
1
Amit Gujral, head - Corporate Marketing, LG Electronics India said,We salute the spirit of our
soldiers who valiantly give up their life to protect the country but hardly find an opportunity
to reach out to them. Therefore, we took this initiative to bring together the citizens of India to
express their gratitude to our soldiers We would like to thank people for their overwhelming
response. This truly shows the spirit of India towards our armed forces. Taking this forward,
we would be claiming a Guiness record for maximum wishes collected offline.
India remains one of the fastest-growing meets their needs and delivers even more bank
economies in the world, and faces a lot of for their buck, so to speak.
challenges as a result of this growth. The rate at In terms of market vertical, oil & Gas, Safe
which India is expanding puts extra emphasis on City solutions, Retail and the transportation
the need for safe roads, ports and airports, and continue to be critical to its business for Oncam,
railways to support this growth, and meet various but it is also seeing significant growth in the
Safe City initiatives that are now commonplace education market, since panoramic surveillance
in the country. lends itself well to covering campuses with
As a result of this growth, video surveillance minimal investment.
has become a critical element of building a Budgetary constraints are always a concern
comprehensive security posture. when exploring ways to deliver Safe City or
Similar to much of the rest of the world, critical infrastructure solutions, for example.
theres been a significant shift to IP video Customers are looking for ways to maximize
surveillance from traditional analog systems for their investments, which is where more open
many years now especially as the technology solutions come into play, as well as appealing
becomes more readily available and more cost- to a number of departments when investing in
efficient. India is no different, as manufacturers surveillance equipment. Panoramic cameras can
are better able to navigate the channel through Abhishek Kumar also deliver significant cost savings, as a single
strategic partnerships to provide end users with Regional Director, South Asia 360-degree camera can replace between four and
their technology. IP is more common in new Oncam five traditional pan-tilt-zoom (PTZ) cameras,
construction and projects, since many end users saving not only on hardware costs, but on the
in providing solutions to real-world problems
spend a lot of money on their analog systems licenses needed to operate those cameras.
with our extensive strategic partnerships and
and look for ways to create a hybrid option
with new investments on video cameras. So the
technology innovations, says Abhishek Kumar, Looking ahead
Regional Director, South Asia.
shift is happening, but might be slower in some Growth is a significant factor in India, and
360-degree surveillance technology is just the
aspects. as population expands, so too does the need for
beginning for the channel to explore, as the video
cities to provide more comprehensive security
data gathered from these cameras can provide
solutions and safety initiatives to protect citizens.
Oncam & the India Market a lot more for customers looking to streamline
One of the main areas that will see significant
their business operations, see a significant ROI
Oncam is relatively new to the Indian market growth is in the transportation sector. Transit
and find ways to use video for more than simply
but is already seeing considerable traction in applications are an ideal fit for easily adaptable,
security purposes. The channel can be critical
the adoption of its pioneering 360-degree scalable and reliable 360-degree camera systems
to bridging the gap between manufacturers and
technology. The software is developed in the to provide maximum situational awareness for
end users to create a technology solution that
US and the UK and is still leading the market a citys infrastructure, preferred transportation
in terms of customer experience. Oncam is in medium and regulatory requirements. This also
a unique position to provide much more than applies to airports and seaports, which require
video surveillance with its 360-degree cameras. more stringent video surveillance solutions to
Our brand has taken the position of protect critical assets and people.
being more in line with adopting cutting- We also expect to see a dramatic increase in
edge technology through analytics software, how loss or shrink, is managed by retail stores.
technology partners such as drones The retail sector in India is emerging as one of the
manufacturers, and using video in the classroom largest sectors in the economy and is the worlds
within the education sector. At the end of fifth-largest global destination in the retail space
the day, we want to be a brand that provides with a total market size estimated to be around
innovative technology solutions that extent far US$ 600 billion, concludes Abhishek. n
beyond simply being a camera manufacturer. In Samrita Baruah
essence, we want to be a partner to customers samrita@varindia.com