“There is an urgent need to redefine the concept of national security secrets and moving beyond protection of the defense industry and public sector”
What do you feel about IT security compliance in India?
In the US, securing your network against attacks is not only good practice but is also mandated by laws such as Sarbannes-Oxley (SOX), PCI-DSS, HIPAA, GLBA and more. All these regulations require detailed reporting and an audit trail to show that you have indeed complied with the letter of the law.
India’s current IT Act doesn’t have the scope and vision to ensure a granular degree of control over electronic data covering various industries. Complying with these and other regulations is often complicated, time-consuming, and costly. Cyberoam helps to minimise these headaches by providing the consolidation of all required perimeter security tools into one unified platform to protect the network and guarantee the integrity of data.
What are international IT?security trends that can be?readily adopted in India and will it make a difference?
The nature of worldwide data, information pilferage and economic intelligence gathering through the use of Internet has redefined security needs and strategies to combat growing threats. In one recent case, a company, a major player in power and utilities, was sabotaged and its critical information assets compromised by its very own security vendor – a foreign security company – something that highlights the vulnerability of networks, especially those of a nation whose information security needs are manifold. There is an urgent need to redefine the concept of national security secrets and moving beyond protection of the defense industry and public sector to include even the entire private sector through compliance regulation. Setting up a Central Nodal Agency and Accreditation for Cyber-Security Solutions along the lines of. National Security Agency in USA and other Approval and Certification bodies for Security Solutions is crucial. It should be made mandatory for security product to be indigenous, especially in importantly identified centres like HQ and R&D in India The need to choose deployment of security solution that integrates identity of a user as important criteria in providing protection.
How are you addressing the security landscape of the country?
Cyberoam is an Identity-based UTM appliance that takes security to a level closer to human intelligence by weaving identity controls in its features that can trace user movement in the network, not only till the IP address of a machine which is the traditional approach in the industry but till the actual user itself. This gives a completely transparent view over the network as to ‘who is doing what’ in the network. It, thus, gives an unprecedented degree of control over the users and enables taking both preventive and remedial actions in real time for achieving one of the most comprehensive protections possible, against internal and user-targeted threats.
Currently, what are the products that you are offering?to the government vertical?
With the rise in e-Governance across India and the establishment of State Data Centres that meet the information requirements of the citizens, threats to the government vertical has risen manifold. With the arrival of the e-Governance era, information like taxation, land records and more while available easily and readily to the citizens stands vulnerable to attackers. Securing the data centres and other repositories of information, thus preventing confidential data leakage, controlling access to inappropriate sites, complete visibility into the network so as to know who is doing what in it, and monitoring and control of user behavior hold the key to future security. Cyberoam is a unique security solution that fulfills these security needs with a unique and highly granular approach through its identity-based technology.
Are you in discussion with any state government for offering your solutions
Yes, Cyberoam is in discussion with certain government institutions for securing their huge and heterogeneous networks and data centres. More over, Cyberoam is already securing many government networks with critical data and information assets.