Вы находитесь на странице: 1из 76

INNEFU LABS MAKES INROADS INTO

IS YOUR MOBILE APPLICATION SECURE AND

THE DEFENSE SECTOR p. 24

ENABLED WITH RIGHT LEVEL OF PROTECTION? p. 26 VDI IN THE WORLD: MILIND YEDKAR, DELL p. 38

INDIA IS THE FOURTH LARGEST MARKET FOR

`100

www.dqindia.com

VOL XXXIV No 09 I MAY 15, 2016

THE BUSINESS OF INFOTECH

The First Steps


How will the first set of Indian smart cities look like?

76 pages including cover

Special Subscription offer on page 56

MAY 15, 2016

TALKING POINT

Startups motivated
banks to digitize fast

28
RITESH PAI, Senior President &
Country Head, Digital Banking, YES Bank

India is the fourth


largest market for VDI
in the world

38
MILIND YEDKAR, General Manager, Asia Pacific
and Japan, Cloud Client Computing, Dell

popSLATE 2 E-Ink iPhone


Case: One Mobile Phone
Case to Rule them All

46
GREG MOON
CMO, Co-founder, popSLATE

Concentrix is focusing
more on analytics and
digital

52
ANUJ KUMAR, GM India and South Asia and
Global Lead Analytics, Concentrix

Todays security
challenges cannot be
secured with mere
incremental thinking

60
BS NAGARAJAN, Senior Director- Systems
Engineering, VMware India

May 15, 2016

16 I
COVER STORY

Indias Quest
for Smart Cities
As the Indian government has stepped up its
efforts to shape up the first set of smart cities,
there are active discussions how the Indian smart
cities are going to look like

www.dqindia.com

A CyberMedia Publication

CONTENTS
INDUSTRY
32

36
41

Building Cities for Tomorrow

How a Liquid Workforce will Propel


Organizations into the Digital Landscape
Threat Landscape Grows Complex and
Chameleon-like

54

Five Barriers to Broadband Adoption in India

58

Smart Cities Not Necessarily Secure Cities

63

Relevance of End-to-End Security in an IoT


Environment

65

IoT: Its Impact and the Importance of Testing

67

The Future of Email Marketing

69

Critical Role of Technology in Shaping the


future of HR Practices

43

The Signal and the Noise: Unleashing the


Power of the IoT

49

Network SecurityIts Everybodys Business! 71

ENTERPRISE
26

Is Your Mobile
Application Secure
and Enabled with Right
Level of Protection?

A CyberMedia Publication

Staying Ahead of Data Breaches

REGULAR
06
07
08
74

Edit
DQ Team
Short Takes
Last Matter

www.dqindia.com

May 15, 2016

EDIT

Ed Nair
ednair@cybermedia.co.in

The Two Parts


M

uch has been written and spoken about the making of a digital enterprise. It is now well understood that
the digital enterprise is not only about technology but it is also about identifying areas for innovation,
creating new business processes, and in many cases, creating new business architectures and new
business models. Converging technologies make these endeavors possible. Even though it might seem to
be the preponderant element, technology alone wouldnt help in realizing the dream of the digital enterprise.
What is/are the missing element/s? It is hard to call it by one any name, but it is a motley set of capabilities
that really determine the chances of success in creating the digital enterprise. This set includes things
as diverse as organization culture, mindset towards innovation, ability to understand customer behavior,
organization structure, and many more. Call it the creative part of the organization. Taken together with
technology, it forms one whole. It is like the yin and yang, the body and the mind, or the left brain and the
right brain.
Enterprises need to understand this dichotomous aspect to be able to transform themselves into digital
enterprises. In reality, mastering the creative side of the organization is the bigger challenge. Technology and
capabilities in technology can be sourced externally most of the time, but the creative aspects have to be
nurtured internally. For example, the creative aspect could mean devising a new approach for customers to
co-create products or services in a hyper-customization mode and the technology used to deliver this new
approach could be procured from a technology vendor.
The impact of this duality is so telling that even technology service providers are grappling with their
own set of challenges. I met a leading global IT services vendor who claimed to offer digital transformation
services. The vendor had acquired capabilities in digital marketing, customer experience management,
consulting by buying out various specialist companies. But when they set out to sell their services in the
market, various incompatibilities between the technical part of the organization and the creative part of the
organization arose. The vendor pointed out that such incompatibility issues also existed within their client
organizations so much so that it became a four-way problem!
CIOs would often find themselves bang in the middle of this turmoil. Yet, CIOs are the most suited to
play the bridge between the technical and creative sides of the organization. The challenge is huge, but the
rewards are handsome.

Ed Nair
Editor-at-large

May 15 2016

www.dqindia.com

A CyberMedia Publication

EDITORIAL

EDITOR AND GROUP EDITOR: Ibrahim Ahmad


GROUP EDITOR - IT BUSINESS : Ed Nair
GROUP EDITOR - TECHNOLOGY: Anil Chopra
GROUP EDITOR - SPECIAL PROJECTS: Rajneesh De

SR. VICE PRESIDENT


Rachna Garga (rachnag@cybermedia.co.in)

SALES
NORTH
GENERAL MANAGER: Harminder Singh, Vandana Chauhan
MANAGER: Ajay Dhoundiyal, Sudhir Arora, Shoeb Khan
WEST
GM SALES : Rajeeb Banerjee
EXECUTIVE: Kanchan Kadam
SOUTH
GM SALES: Satish Kutty
MANAGER: Arun D
EAST
SENIOR MANAGER: Sandeep Roy Chowdhuri
Marketing & Alliances
SR. VICE PRESIDENT
Rachna Garga (rachnag@cybermedia.co.in)
Events, Online & Communities
MANAGER: Debabrata T Joshi
ASST. MANAGER: Prerna Chauhan
ASST. MANAGER: Renuka Deopa
ASST. MANAGER MKTG: Rajiv Pathak
Operations
GENERAL MANAGER: CP Kalra
MANAGER MIS & DATABASE: Ravi Kant Kumar
MANAGER: Ashok K
Shared Services
HEAD: Dhaval Gupta
PRINT SERVICES: T Srirengan
CIRCULATION & SUBSCRIPTION:
C Ramachandran,
Raghavendra S, Raju Salve
SR MANAGER AUDIENCE SERVICE: Sarita Shridhar
SR PRESS COORDINATOR: Harak Singh Ramola

ASSOCIATE EDITOR: Shrikanth G (Chennai), Onkar Sharma (Gurgaon)


SENIOR ASST EDITOR: Smita Vasudevan (Bengaluru)
ASST EDITOR: Ruchika Goel
MANAGER DESIGN & COVER DESIGN: Pramod S Rawat
ASST MANAGER DESIGN: Bhagbat Pattnayak

OFFICES
GURGAON (Corporate Office)
Cyber House
B-35 Sector-32, Gurgaon,
Haryana 122 001
Tel: 0124 - 4822222, Fax: 0124 - 2380694
BENGALURU
205-207, Sree Complex (Opposite RBANMS Ground)
# 73, St Johns Road, Bangalore 560 042
Tel: +91 (80) 4341 2000, Fax: +91 (80) 2350 7971
CHENNAI
5-B, 6th Floor, Gemini Parsn Apartments
599 Mount Road, Chennai 600 006
Tel: 044 28221712, 28229116, 28220360, Fax: 044 28222092
KOLKATA
23/54, Gariahat Road, Ground Floor
Near South City College, Kolkata 700 029
Tel: 033 65250117/18, 65341101, 40012906
MUMBAI
103, Andheri Saurabh CHS,
Above Andhra Bank, Andheri Kurla Road,
Andheri (East), Mumbai 400093
PUNE
C/o MM Activ Sci-Tech Communications
Ashirwad, 1st Floor, 36/A/2, Pallod Farms,
Near Bank of Baroda, Baner Road, Pune - 411045
INTERNATIONAL
Cyber Media (Singapore) Pte Ltd
#14-03, High Street Centre, 1 North Bridge Road,
Singapore 179 094 Mobile: +91 9945723607,
Fax: 00 63369145, Email: roshans@cybermedia.co.in
CALIFORNIA
Huson International Media
President, 1999, South Bascom Avenue, Suit 1000,
Campbell, Ca95008, USA
Tel: +1-408-879 6666, Fax: +1-408-879 6669

Dataquest (not affiliated with Dataquest Inc., a division of Gartner Group, USA), is printed and published by Pradeep Gupta, on behalf of
Cyber Media (India) Ltd, printed at M/s Karan Printers, F 29/2, Phase II, Okhla Industrial Area, New Delhi, published at D-74, Panchsheel Enclave
New Delhi 110017, India. Editor Ibrahim Ahmad. Distributors in India by IBH Books & Magazines Dist. Pvt. Ltd, Mumbai.
Subscription (Inland): `2900 (24 issues), `3000 (48 issues)
Subscription (Foreign): US $145 (SAARC Countries), US $75 (Rest of the world) By Airmail.
(For subscription queries contact : rsedqindia@cybermedia.co.in)
Dataquest does not claim any responsibility to return unsolicited articles or photographs unless accompanied by adequate returnpostage.
All rights reserved. No part of this publication may be reproduced by any means without prior written permission from the publishers.
|

A CyberMedia Publication

www.dqindia.com

May 15, 2016

INDUSTRY | SHORT TAKES

Compiled By:
Ruchika Goel
ruchikag@cybermedia.co.in

Honeywell Process Solutions Digital Transformation


Business to Help Customers Benefit from Industrial IoT

oneywell Process Solutions (HPS) announced it has established a new business


unit to help manufacturers harness the Industrial Internet of Things (IIoT) and more
rapidly deploy technologies that will allow
them to better manage and analyze data, making their
operations safer, more reliable and more efficient.
Since HPSs introduction of the modern automation
control system, we have helped plants and manufacturing
sites around the world use an increasing amount of data
to solve customers productivity and safety challenges
said Vimal Kapur, HPS president. As manufacturers are
looking to take the next step to manage and exploit data
across multiple sites in locations across the globe, our
new business unit will be a focused resource to provide
that expertise.
Andrew Hird has been named vice president and general manager of Honeywells new Digital Transformation
unit and will report to Kapur. Hird most recently served
as HPSs global vice president of sales, where he gained
exposure to customers in industries ranging from oil and
gas and mining to power generation, and pulp and paper.
Hird has more than 20 years of industry experience, including 12 years with Honeywell.
Honeywells deep expertise in IIoT allows us to solve

customer challenges by consolidating data in the cloud


from multiple disparate systems, applying higher-level
analytics and leveraging experts who are often physically
remote from the customer site, Hird said. Honeywell is
in a unique position of being the recognized leader in automation and control room solutions for a wide range of
process industries, plus we have advanced knowledge in
connectivity with OPC UA, cyber security and advanced
software development.

VirtusaPolaris and WorkFusion to Deliver


Robotic Automation and AI-powered Cognitive
Automation to the Financial Services Sector

irtusaPolaris and WorkFusion announced a


partnership to deliver new smart automation
solutions for the banking and financial services (BFS) market. The combination of VirtusaPolaris deep BFS industry and process expertise and WorkFusions cutting edge platform will help
clients reduce operational costs, while improving quality,
productivity and agility.
Most financial services organizations continue to struggle with inefficient legacy systems that have not kept pace
with the change in business and regulations, introducing
gaps in process automation that negatively impact efficiency of business operations. Many of these gaps are low
complexity high volume routine process steps and most
organizations have deployed large operational workforces,

May 15, 2016

www.dqindia.com

frequently offshore, to handle these processes, said Bob


Graham, global solutions head, Banking and Financial
Services at VirtusaPolaris. WorkFusions combination of
robotic and cognitive automation supported by VirtusaPolaris expert consulting and implementation services
allow customers to improve quality through greater accuracy and the removal of human error, reduce costs through
rapid automation of manual tasks, and accelerate time to
market with our proven delivery approach.
At the core of WorkFusions SPA software are three
powerful capabilities: Workforce orchestration, robotic
process automation (RPA) and cognitive automation
which, together, help organizations improve workforce
agility and elasticity and automate manual processes
through rapidly evolving AI.
A CyberMedia Publication

INDUSTRY | SHORT TAKES

Insurers will Succeed at Digital Transformation


by Putting People First: Accenture

hile the next wave of digital technologies will transform the very nature of insurance organizationsincluding what
they do and how they do it those
that succeed will do so by dramatically
transforming their workforces and cultures to operate in a
digital world, according to a new report from Accenture.
Based on a survey of nearly 450 insurance executives,
the Accenture Technology Vision for Insurance 2016 report
titled People First: The Primacy of People in the Age of
Digital Insurance states that the next wave of technology Internet of Things (IoT), platform-based ecosystems
and artificial intelligence is maturing and expected to ultimately transform the very nature of the insurance organization and what it does. In fact, 90 percent of the insurers
surveyed said they expect the pace of technology change
to increase rapidly or at an unprecedented rate over the
next three years. In addition, more than four-fifths (83 percent) of insurers see IoT bringing about significant change
or complete transformation in the industry.
The report states that the digital trends identified in Accentures Technology Vision 2016 report intelligent automation, liquid workforce, platform economy, predictable
disruption and digital trust offer insurers an opportunity
to shift from their traditional business model to one where
they can automatically assess and price risk directly, individually and in real-time, as well as help customers avoid
losses in the first place. However, taking full advantage of
these trends will require insurers to dramatically transform

their workforce and culture.


The emergence of digital technologies and the adoption of platform partnerships is causing a shift in the insurance workforce, said John Cusano, senior managing
director of Accentures global Insurance practice. Digital
insurers are hiring employees that are more tech savvy,
creative and analytical, and they are now competing for
top scientific, engineering, technology and mathematics
talent. Insurers are also increasingly introducing intelligent automation that can consume and analyze vast
amounts of data and perform complex processes to
complement this new workforce. Companies need to be
forward-thinking about evolving their culture to embrace
all of these changes.

Seniorworld.com Unveils Easyfone:


Indias Most Friendly Phone for Seniors

eniorworld.com, Indias first company which


is focused on the holistic needs of seniors
has announced the launch of easyfone, Indias most senior-friendly feature phone with
unmatched features.
Every aspect of easyfone has been designed keeping in
mind the unique needs of seniors; whether it is the easyto-read large screen with big font, large dialing keys, the
cradle charger which makes phone charging easier or
Photo-dial with which Seniors can dial their favorite contacts through a single key press.
With an increasing number of seniors living by themselves, their safety & security needs are bigger than ever
10

May 15, 2016

www.dqindia.com

before. Easyfone helps seniors get help during emergencies


through the SOS button. Pressing the SOS button sets off a
chain of 4 automated actions including calls and SMS to 5
emergency contacts with critical details. The critical details
comprises the location of the user, the battery strength of
the device and contact details of the users doctors, medical Insurance etc. Other features include the Whitelist optionwhich limits incoming calls only from the white listed
numbers, a customizable menu that helps hide unused features, and some other features which havent been seen in
feature phones before. The after-sales service is also designed for the comfort of seniorswith the company offering a home pickup and delivery service for repairs.
A CyberMedia Publication

INDUSTRY | SHORT TAKES

Hitachi Data Systems Adds Native NAS and Cloud Tiering


to Virtual Storage Platform, Expands Analytics Software

itachi Data Systems (HDS), a wholly owned


subsidiary of Hitachi, announced new upgrades and additions to its Hitachi Virtual
Storage Platform (VSP) G series portfolio designed to reduce the ongoing costs of traditional environments and exploit and monetize data, which
is too often trapped in silos of technology. Digital transformation has put data at the center of business strategy
and has made IT a key element of corporate success, but
is also putting new pressures on IT to modernize processes, systems and skillsets. To help break down data
silos and modernize storage management, Hitachi Data

Systems has embedded NAS functionality, cloud optimization and enhanced VMware integration into VSP G400,
VSP G600 and VSP G800 storage platforms to simplify
and accelerate data center modernization efforts.
OPTIMIZED FOR THE CLOUD

Customers continue to re-assess their IT strategies to find


ways to optimize and reduce the ongoing costs of traditional storage and cloud services, but they are in need
of flexible solutions that can address disparate environments such as virtualization, remote and core data centers and dynamic cloud strategies, to meet infrastructure
requirements for a variety of applications. As a
cloud-optimized, unified
storage platform, the VSP
G series was built to meet
these needs and continues to exemplify Hitachis
strong investment philosophy in innovation, with
more than 4,000 patents
in SAN and NAS-related
technologies.

NEC and DMIC Trust form JV to


Provide Logistics Visualization Services in India

EC Corporation and the DMIC Trust have


established a joint venture company,
DMICDC Logistics Data Services Limited,
for providing logistics visualization services
in India. NEC and DMIC Trust will each hold
50% of the joint ventures total capital of approximately 8
mn Indian Rupees (INR).
This is the first commercial project to originate from
the Smart Community initiatives of the Delhi Mumbai Industrial Corridor, which is being promoted jointly by the
Indian and Japanese governments. Since 2010, the Japanese Ministry of Economy, Trade and Industry (METI) has
played a key role in helping NEC and DMIC Trust to establish this new company.
The new company will provide shippers and transport
operators with logistics visualization services, enabling
them to perform real-time searches based on accurate
positional information, showing the location of contain|

A CyberMedia Publication

ers being transported by rail or road between Delhi and


Mumbai. This will make significant contributions to shortening shipping lead times, reducing inventory levels and
improving the accuracy of production plans.
To provide these services, the new company will affix
RFID tags to shipping containers being loaded and unloaded at ports in Mumbai. It will also install RFID reader/
writers at locations such as port entrances and exits, toll
plazas on the expressway between Delhi and Mumbai,
and inland container depots where customs inspections
are carried out and cargo reloaded. Positional information
obtained by RFID reader/writers will then be gathered in
real time via a cloud-based logistics visualization system.
There are plans to link up the logistics visualization system with rail transit management systems, port management systems and other existing systems in the future, in
order to gather information such as freight train running
times and container management status at the port.
www.dqindia.com

May 15, 2016

11

INDUSTRY | SHORT TAKES

Freecharge Appoints Fareed Jawad as


Vice President and Principal Product Architect

reecharge, digital payments platform announced the appointment of Fareed Jawad as


the Principal Product Architect and Vice President (VP) payments. In his new role, Fareeds
mandate will be to build payments technologies at Freecharge. Additionally, he will lead the efforts
on building technologies for solving the unique payments
problems in India.
Freecharge is on a mission to build the world-class
payments ecosystem for merchants and customers. The
company seeks to work collaboratively with various innovators and emerging FinTech players to implement
the most reliable and frictionless payment method and
Fareed will be instrumental in driving this with the senior
leadership team at Freecharge.
Prior to his appointment at Freecharge, Fareed most

recently served as Principal Product Architect at Amazon


India, where he was responsible for building the core payment processing infrastructure for the organization. Before joining Amazon, Fareed was with Flipkart as Director
Product Management and was part of the core team
that launched PayZippy.
Fareeds appointment reaffirms Freecharges commitment to hiring the industrys best talent. We are on a
cusp of a revolution to accelerate the FinTech capabilities in India. We look forward to Fareeds contribution
in strengthening our technical expertise and payments
capabilities with his in-depth understanding of payments
sector. Fareed will be responsible for developing products
for customers and merchants both online and offline, in
line with our vision to be the digital OS for the payments
business in India. said Govind Rajan, COO, Freecharge.

Mobile-Optimized Work Environments Drive


Higher Employee Engagement and Performance

new global study, Mobility, Performance and


Engagement by The Economist Intelligence
Unit (EIU) has established a measurable link
between more mobile-first working environments and an increase in employee engagement, proving that CIOs can drive increased business
performance through well-developed and executed mobile strategies.
Sponsored by Aruba, a Hewlett Packard Enterprise
company, the study showed that companies rated by employees as pioneers in how they support mobile technology saw a rise in productivity (16%), creativity (18%),
satisfaction (23%), and loyalty (21%), when compared to
organizations that were poorly rated at supporting mobile
technology.
Today, most companies and employees understand
that a mobile-first approach can be good for business,
but if you can tell a CEO of a Fortune 500 company that
their organization can achieve a 16% increase in employee output, or tell HR directors that they can increase
loyalty by over one-in-five, we believe they would make
mobility an even greater investment priority, said Chris
Kozup, Vice President of Marketing at Aruba, a Hewlett
Packard Enterprise company.
While past studies have recognized the impact of increased mobility on employee engagement, establishing

12

May 15, 2016

www.dqindia.com

the business outcome has been a missing link. This report


quantifies it, he added.
The report, which surveyed 1,865 employees globally,
demonstrates that many workers recognize the benefits
of mobile-optimized work environments. In fact, six in ten
(60%) employees said mobile technology makes them
more productive, while more than four in ten (45%) believe it causes their creativity to rise.
The EIUs analysis looked to define how the wide adoption of mobile technology was impacting business outcomes by defining the key dimensions of a mobile-first
employee experience, then demonstrating how each
dimension contributes toward business performance. A
number of key trends stood out:
A CyberMedia Publication

INDUSTRY | SHORT TAKES

Lendingkart Group Appoints


Anand Mishra as VP, Product Analytics

endingkart Group recently announced that


Anand Mishra, a tech veteran, has stepped in
the critical role of VP- Product Analytics. In his
current undertaking, Anand Mishra would be
actively involved in honing the product profile
and enhancing the small business financing platform.
After completing his Bachelors and Masters in Electrical Engineering from IIT Kanpur, Anand has worked as
an Analytics Specialist Consultant, Senior Data Scientist
and Senior Manager with some of the most renowned organizations. An expert in creating and leading teams to
achieve high impact business goals, Anand effortlessly
juggles between problem identification, brainstorming &
strategizing and seamless implementation of solutions.
In his most recent endeavor, he headed the Analytics
team of HTMedia and accomplished the systems revamp
to achieve 200% better mailer responses and 30% improved responses to cold calling.
Speaking about the recent hire, Harshvardhan Lunia,
Co-Founder & CEO, Lendingkart Technologies said,

Lendingkart Group is perpetually on lookout for the right


talent to enhance and escalate the processes. We are
pleased to have Anand Mishra on-board, who has already
proven his mettle as a data scientist and VP, Analytics. I
am positive that this alliance will help us, both Lendingkart Group and Anand, to realize the best of our potential
and achieve our personal and professional objectives.
Anand Mishra, who has worked as VP, Analytics in
the past with Tickled Media, the largest parenting portal in South East Asia, is excited to be part of Lendingkart Group. Further commenting on the announcement,
Anand Mishra, VP, Product Analytics said, I feel passionately towards the vision of Lendingkart Group, striving to
facilitate the working capital for SMEs. Given the rise in
entrepreneurial ecosystem, our service offerings are more
paramount than ever. I am also excited to be working
closely with a team of passionate techies, data scientists
and seasoned bankers at the Group and hope that together we would create significant synergies to achieve
our highest goals and responsibilities.

Forcepoint 2016 Global Threat Report:


Evasion, Insider Threats, and Ransomware Advance;
New Jaku Botnet Targets Asia

orcepoint, empowering organizations to drive


business forward through transformative security technologies, released the Forcepoint
2016 Global Threat Report, detailing some of
the latest evolving threats, gathered from more
than three billion data points per day in 155 countries
around the world.
This years report analyzes the impact of:
A brand new botnet campaign that Forcepoint is
calling Jaku that was discovered as a result of a 6-month
investigation by Forcepoints Special Investigations (SI)
team
A new crop of opportunistic ransomware, antimalware tools and issues caused by the ever-dissolving
perimeter that are posing serious challenges to
cybersecurity professionals and the organizations they
aim to protect
Increases in data breaches caused by both
malicious and accidental insiders
|

A CyberMedia Publication

Inconsistent security controls between cloud


providers and businesses, which are complicating data
protection
The continuing convergence of email and web attack
vectors as nine out of ten unwanted emails contain one or
more URLs and millions of malicious macros are being sent
The rapid evolution of the cyber threat environment
has consequences that are much broader than just technical, operational, and financial they can impact every
piece of a business, said Forcepoint Chief Scientist Dr.
Richard Ford. With this Threat Report, we want to demystify these threats and help enable businesses with
tools, recommendations and, quite simply, knowledge, so
they can continue to move forward without fear.
The Forcepoint 2016 Global Threat Report details multiple behavioral and technique-based trends and provides
guidance on todays most impactful threats to assist security professionals in planning their cybersecurity defense strategy.
www.dqindia.com

May 15, 2016

13

INDUSTRY | SHORT TAKES

Vodafone M-Pesa Enables


Consumers in UP to Pay Electricity Bills On the Go

odafone M-Pesa, a unique and innovative Digital Wallet service from Vodafone that offers
Money Transfer, Bill & Utility Pay, Merchant
Payments and Business Solutions, has partnered with has partnered with the UP (W) State
Distribution Companies Paschimanchal Vidyut Vitran (PVVNL), Dakshinanchal Vidyut Vitran (DVVNL) & Madhyanchal
Vidyut Vitran (MVVNL), offering over 35 Lakh households
in Uttar Pradesh a simple, easy-to-use option to pay their
electricity bills instantly. Vodafone M-Pesa offers customers a cashless, secure platform for electricity bill payments
with the largest network of agents (or CashIn Points) to enable digitization of money for Cash holding population. Vodafone has more than 115 lakh subscribers in UP(W) who
will now be able to pay their electricity bill through M-Pesa,
supported by more than 10,000+ outlets (or CashIn Points)
including Vodafone Company owned stores, franchisees,
and multi brand outlets. These CashIn Points provide
convenience and ease to Customers to convert cash into
digital money to participate in digital payment of Bills and
e-commerce /m-Commerce. The bill payment touch points
are easily available at every nook and corner, including 27
Vodafone brand stores.

Inviting the residents of UP(W) to reap the benefit of


instant electricity bill payment on the go through Vodafone M-Pesa, Commenting on this initiative,Dilip Kumar
Ganta, Business Head, UP West Vodafone India said
It has been our constant endeavor to deliver and bring
innovative and simplified service offerings relevant to the
needs of our customers in UP(W). Vodafone M-Pesa partnership with the three key electricity distributing bodies
in the state is one such initiative that bridges the need for
a simple, timely and cashless payment solution for consumers through their mobile phones.

Infosys Finacle partners with


Onegini to Strengthen Digital Banking Offering

latform integration will enable secure mobile


banking through advanced biometrics and
multi-factor authentication.
Infosys Finacle, part of EdgeVerve Systems, a product subsidiary of Infosys, and
Onegini announced a partnership to integrate the Onegini
mobile security platform with Finacle banking solutions.
The integration will allow banks to provide their customers enhanced security to access and transact across
channels. Using this solution, banks can offer customers
an option to select advanced authentication methods,
including fingerprint, facial, eye and voice recognition as
well as multi-factor authentication for added security as
they transact on devices. The end-user will be presented
different authentication methods depending on device,
location and type of transaction.
Andy Dey, President of Customer & Operations at EdgeVerve said, A bank is no longer somewhere to go you
carry it with you. This offers a new level of convenience,
14

May 15, 2016

www.dqindia.com

but at the same time our customers demand secure solutions. Through this partnership, we aim to provide advanced security with convenience to customers.
Since we started the company, we have worked with
many multinational enterprises in the financial industry. By
combining EdgeVerves product capabilities and deep experience with global banks, we will further strengthen our
combined offering to reach new markets and customers
in the digital era, said Denis Joannides, CEO, Onegini.
A CyberMedia Publication

INDUSTRY | COVER STORY

Ruchika Goel

ruchikag@cybermedia.co.in

Indias Quest
for Smart Cities

everal reports suggest that the urban population in India is expected to rise by more
than 400 mn people to 814 mn by 2050. India, therefore faces the kind of urbanization
which was earlier seen in China. To stand up
to this challenge, the newly elected government has proposed the smart city project which aims to create 100
cities in India by 2022, though only 22 cities have been
chosen for the first phase. Indian citizens, empowered by
the digital tech, expect quality in the government services. Hence the public authorities are seeking to reduce
costs and raise performance by adopting technological
approaches in the delivery of public services. To this end,
the smart city initiative is gaining momentum.
Smart cities will no longer be smart enough without the
deployment of smart solutions in every aspect of these
cities. While there are several key aspects to this, smart
cities will consume smart meters, sensors and management systems, to name a few. These tools and solutions
will play a big role in the smooth functioning of these cit-

16 | May 15, 2016

www.dqindia.com

As the Indian
government has
stepped up its
efforts to shape
up the first set
of smart cities,
there are active
discussions how
the Indian smart
cities are going to
look like

ies. ICT will help these cities to allocate resources properly. There would be barely any leakages as the resources
will be used in an adequate manner. There would be more
usage of renewable energy. Security would be elaborate
as the sensors powered by IoT systems will keep watch
on each nook and cranny.
At a city-wide scale its about connecting, servicing and
supporting devices in a framework that manages consumption and encourages efficiency. In our search for
some of the key questions around smart cities, we asked
the solution providers and sought their insights on how
these cities can be built. One of the key points which seldom emerges is that it would be unfair to generalize the
smart city concept globally. Indias smart cities can not
be the lookalikes of the smart cities in Europe or the USA.
Cultural and geographical challenges are bound to shape
up the cities differently in every part of the globe.
Major IT companies are evaluating the potential of smart
cities. Let us read how IT companies view smart cities in
India and what type of business opportunities lie in them.
A CyberMedia Publication |

INDUSTRY | COVER STORY

There is no
one-size-fits-all
solution for
smart cities

urrently, majority of the states in India are


blueprinting plans around how the smart city
roadmap is going to be ready. While some of
the states are ready to go to the next stage,
others are still in the process of creating
the blueprint. Cisco is already in discussions with various state governments to transform around 20 cities into
smart, connected ones. Some of the Indian cities Cisco
is already in an advaned stage of discussion are Jaipur,
Pune, Nagpur, Navi Mumbai, NDMC and Lucknow, Madhya Pradesh, Punjab, Andhra Pradesh. Beside this we
are also working with some private smart cities, industrial
townships, and large IT campus to be developed as smart
cities.
Delhi Mumbai Industrial Corridor: Cisco has developed
pilot ICT master plans for four cities in the Delhi Mumbai
Industrial Corridor the $90 bn flagship public sector infrastructure project by the Government of India.
The four cities are:

JAIPUR SMART CITY

In an effort to make Jaipur a smart city, Cisco announced


its partnership with Jaipur Development Authority wherein Cisco has set up the digital infrastructure to offer citizens amenities including connected transport, interactive
kiosks, wireless broadband, safety and security services,
traffic management and environmental updates. To manage the city with greater efficiency and effectiveness,
Jaipur will also have a Command and Control Centre
as well as a Response Control Room powered by Cisco
technologies

A CyberMedia Publication

PURUSHOTTAM KAUSHIK
MD, Sales, Growth Verticals,Cisco India & Saarc
SMART SURVEILLANCE SYSTEM IN LUCKNOW

To make Lucknow a safer city, Cisco along with


Mahindra Defence Systems, is working towards a project
under a `40 crore contract
About 10,000 drones are expected to be installed
across the city over the next one year
The surveillance project currently covers 70 crossings
where police have installed 280 cameras
Mobile surveillance vans equipped with night vision
cameras have also been deployed
CITY SURVEILLANCE IN NAVI MUMBAI

Cisco has deployed an IP-based city surveillance


system in Navi Mumbai that includes video surveillance
which provides analytics and intelligent incident response,
emergency communication
The system also provides alerts to the Police
Department about abnormal movements/ suspicious
objects and allows better management of security through
24x7 intelligent monitoring
It facilitates faster response to security breaches and
improved turnaround time for investigation
Including Navi Mumbai, the company is carrying out
five more smart surveillance projects

www.dqindia.com

May 15, 2016

17

INDUSTRY | COVER STORY

We are working towards bridging


the cybersecurity skills gap

SHRIKANT SHITOLE
MD, India, Symantec

uch an aspiring initiative


will provide benefits but
will at the same time,
expose
vulnerabilities
in the form of information security challenges. With digital
transformation, information security
needs to be considered as an integral part of the plan rather than an
afterthought. We are unlocking tremendous organic innovation in our
products and working towards bridging the cybersecurity skills gap.
Symantec has a successful history
of partnering with governments and
law enforcement agencies worldwide
to counter cyber threats. In 2013,
Government of India identified a cy-

bersecurity skills deficit in the country. Symantec has been contributing


towards bridging the skillset deficit
since 2012. Starting in 2012 and concluding in 2016, Symantec Education led a project sponsored by the
Government of Meghalaya (Meghalaya Information Technology Society
(MITS)) to train the youth of Meghalaya in IT and security principles, followed by exams, certification and job
fairs to connect them to employers.
Last year we partnered with Nasscom and took another big step towards building cyber security skills
in India, by announcing our intent to
train over 50,000 cyber security professionals over the next few years.

IoT would bring a city alive with


connected sensors and devices
generating real-time feeds

AGENDRA KUMAR
President, Esri India
18 | May 15, 2016

sri is working with governments, organizations in


India as well as globally
in helping them set up an
enterprise GIS technology
platform which is now the backbone
for customers to strategize their decision making, planning, execution and
management. We have a complete
platform ArcGIS with comprehensive
suite of tool which helps city address
different aspects of end-to-end city life
cycle. There are best practices, references, solution templates, frameworks
and experiential learning that could be
leveraged for rapid deployment. Esris
supporting technologies that utilize
Geodesign principles would be pivotal

www.dqindia.com

in building smart cities.


In India, most of the mega projects
such as like PMGSY, Highway development, R-APDRP, and Municipal
Corporations, Forest departments,
Utilities and Transport departments
are already using ArcGIS extensively.
GIS ready data is a very essential
component in an overall GIS implementation. Almost all the mapping
agencies in India such as Survey of
India, Town and Country Planning Organizations, Registration General of
India, Forest Survey of India and remote sensing centres also use Esris
ArcGIS for data creation and analysis. This GIS ready data can be the
basis for smart city planning.
A CyberMedia Publication |

INDUSTRY | COVER STORY

Smart cities will run on


smart, digital infrastructure

RAVINDER SINGH
Director, Solutions Strategy &
Business Development at Dell
IoT, Smart Cities

he foundation of Smart
Cities will be built on
open, scalable, futuristic, and converged infrastructure, which will be
complemented first by data solutions
and then, applications. And Dells
core offerings are in the compute,
storage, server, datacentre and end
devices space. If we look at these facilitators and Dells core capabilities,
we are leaders in most of the pivotal
Infrastructure pieces. As we all know,
data forms a core part of smart cities and the conversation is generally
around 3 important aspectsData
collection, Data Storage and Data
Consumption. Dells leadership in IoT
Gateways, Storage and end devices
is essential complete the cycle here.
Dell is well-equipped to create a
digital blueprint of a smart city, and
have a network of partners to provide
the application support. Our partners
bring along applications like garbage

tracking, video analytics, surveillance, smart utilities, intelligent traffic


management, and so on. With this
large network, we are well placed to
partner with the government in this
journey. We work with customers in
3 ways: As their digital architects to
help them create digitally enabled
smart cities, providing core foundation technologies, and bringing an
ecosystem together.
In India, Dell India has been involved
with the e-Kranti project in launched
by the Gujarat State Cooperative
Credit Societies Federation, with the
objective to facilitate the delivery of all
government services electronically to
citizens. Under this context, a Memorandum of Understanding (MoU) was
signed between the Gujarat State
Cooperative Credit Societies Federation and Dells channel partnerEarth
Syscom and Project Central Partner
Jintech Solutions for the execution of
this project.

Connectivity is infusing a new


layer of intelligence into cities
SEKARAN LETCHUMANAN
VP, Operations, Flex

lex has recently acquired Wink, the smart home


platform that enables smart products to work
together seamlessly, and connect and communicate globally.
Wink improves the functionality and usefulness of disparate devices in the home by allowing them to
communicate with each other, while enhancing usability
through a shared common interface in the Wink mobile
app.
|

A CyberMedia Publication

Wink lets you control hundreds of smart products


from companies like GE, Honeywell, and Philips from
your Android or iOS device. What does that mean for
everyday life? Imagine driving home in your Tesla. As you
turn down your street, you call up Wink on the car screen
and activate the Chamberlain garage door opener. The
Schlage lock on the door separating the garage from your
house unlocks as you approach, the lights come on, and
the thermostat is set to your optimal temperature.
www.dqindia.com

May 15, 2016

19

INDUSTRY | COVER STORY

It is vital to engage with state


government, city administration
and planners to understand
their objectives and KPIs

MANISH OBEROI
Head of SalesGlobal Enterprise and Public Sector, Nokia

okias smart city solution is designed to provide the building blocks for enabling new
smart city applications that can be rapidly created, deployed and managed. Nokia delivers
products, tools and services for city devices
and sensors, city-wide access, a city shared network for
aggregation and backhauling of data communication, city
cloud architectures, IoT service creation, security and
threat intelligence, device and connectivity management
platforms, data collection, analytics, application enablement and ecosystem, while addressing customer experience, security, scalability and professional services.
For example, through our extensive mobile networks
and small cells portfolio we provide cellular and Wi-Fi
coverage and capacity to outdoor and indoor locations.

We also provide a mission critical Wide Area Network


(WAN), leveraging our IP/MPLS, optics, and microwave
products portfolio, as well as our unified service aware
network manager, converges multiple point to point
legacy networks into a single IP backbone supporting
all city agencies needs. We offer City Cloud networking
solutions to help cities reap all the benefits of an open
cloud architecture, in a secure manner. Our open cloud
networking offer comprises Nuage Networks SDN and
datacenter interconnect, offering low latency and highly-secure connections in between datacenters. The IoT
Community ecosystem of the ng Connect Program innovative companies together to collaborate on solution
concepts, end-to-end prototypes, business models, and
market trials.

Concerns about reliability, performance,


and security need to be addressed
SRINIVAS PADMANABHARAO
Director, Product Marketing, Akamai Technologies

o be able to successfully deliver digital services over the Internet, concerns about reliability, performance, and security need to be
addressed. According to our latest Q4 2015
SOTI report, the average Internet connection
speed in India is just 2.8 Mbps and ranks 114th globally. Only 17% of the Internet connections in India have 4
Mbps speed or more, and only 2.8% have speeds of 10
Mbps or more. India was also among the top 10 source
countries for DDoS attacks and also features in the top
20 | May 15, 2016

www.dqindia.com

10 target countries for Web Application Attacks during Q4


2015. Fast Internet speeds and cybersecurity are prime
challenges and ensuring that a robust and secure infrastructure is established should be a priority.
Akamai is partnering with organizations across different
verticals to deliver secure and engaging user experiences
to any device, anywhere. Our portfolio of web performance, media delivery, cloud security and cloud networking
solutions are integral to delivering on the promise of smart
cities.
A CyberMedia Publication |

INDUSTRY | COVER STORY

Good transportation system is


very important to make a smart city

SRINIVAS RAO
Sales Director, Government
Sector, Hitachi Data Systems,
India

he governments Digital
India vision is expected
to propel the country into
its next phase of growth.
While both Smart Cities
and Digital India projects will create
new economic and social opportunities, they will also bring up challenges
related to technology adoption and
implementation to make the Digital
India vision a reality.
Hitachi Data Systems is focused to
support the public safety feature for
Smart Cities, especially with the help
of its enhanced Hitachi Visualization
Solution Portfolio Hitachi Visualization Suite 4.5, along with Hitachi
Visualization Predictive Crime Analytics (PCA) and Hitachi Video Management Platform (VMP) 2.0.
Hitachis digital technologies can
provide real-time, aggregate and
contextual data, support public safety initiatives which will transform law
enforcement to prevent crimes and
ultimately make the cities safer. Hitachi Visualization solutions are part
of Hitachis Social Innovation solu-

tions portfolio, which is committed to


the development of smart societies
that are safer.
Hitachi Visualization Suite is a
hybrid cloud-based platform is enhanced with predictive crime analytics, to integrate disparate data
and video assets from public safety
systems. It will provide law enforcement with critical insight to improve,
and with capture real-time event data
from sensors.
Hitachis Video Management Platform (VMP), an appliance-based solution, comprehensively manages all
video data, and offers rich data integration management and visualization for video applications.
Public safety is a fundamental pillar of our vision for smart cities and
societies. Smart Cities needs to be
empowered with the ability to take
a proactive approach to crime and
terrorism. The ultimate goal for any
citysmart or otherwiseshould be
to create an environment where people can live without worrying about
safety.

The challenge is primarily


two fold funds and time

VISHVESH PRABHAKAR
Managing Director, Sustainability for Accenture

t Accenture we have capabilities to help a


city envision its future for next 5,10,30 years
and convert that vision into blueprint of distinct programs defining objective, governance, partnerships, technology and capacity
building for each program. We are organized into 5 horizontal capabilities Strategy, Consulting, Digital, Technology and Outsourcing and these also represent our areas
of specialization.
|

A CyberMedia Publication

We have worked on smart cities across the globe.


For example, for Yokohoma we are leveraging multi
stakeholder partnerships to drive environment sustainability while in Singapore we have worked on making the city safer while back home in India we have
worked recently with Nasscom to demystify definition
of smart city and further west, in New York, we have
worked on 311 as a single number to call for all citizen
services.
www.dqindia.com

May 15, 2016

21

INDUSTRY | COVER STORY

Social media presents a unique opportunity


to engage citizens in identifying and
resolving key issues for the city

SIDDHESH BHOBE
CEO, eMee & Center Head at
Persistent Systems

mart Cities will be built


on advances in technologies like IoT (Internet of Things), big data
and geo-spatial analytics coupled with rapid adoption of
smartphones and social media, allowing city officials and administrators to take smart decisions, allocate
resources in the most efficient and
effective way, and provide citizens
with the right information at the right
time to improve the quality of life for
everyone. Todays cities generate
huge amount of data, and the challenge is to analyze, visualize and link
it to effective delivery of civic amenities and services for millions of citizens. Social media presents a unique
opportunity to engage citizens in
identifying and resolving key issues

for the city, and bring in transparency


and accountability in administration.
Persistent has been working with
large, global enterprises as they go
through an exciting phase of digital
transformation in their business, and
Smart Cities are no different in need
and approach. Persistents digital
transformation platform, Vega, brings
together our traditional strengths in
big data analytics, mobile, social and
cloud to provide a strong, API-based
analytics and engagement platform
as the foundation for Smart City
projects. Coupled with immersive
user experiences through gamification (eMee), digital content delivery
(Genwi) and monetization (Hoopz),
Vega helps Smart Cities jumpstart
their data-driven journey of growth
and sustainability.

The dream is to have all major cities


in India safe as well as self-sufficient

ANAND NAVANI
Country Manager, VIS, Verint Systems
22 | May 15, 2016

mart Cities continue to


be an important agenda
for the central government and preliminary
work has already gathered momentum in many cities. Safe
and Smart Cities were also reemphasised by the allocation of Rs 3,205
crore in the recent Union Budget to
the development of 100 Smart Cities across the country by 2020 and
some minor reduction in custom duty
exemption for come components
for CCTV. Although the implementa-

www.dqindia.com

tion of this is taking more time than


anticipated, many cities are indeed
gearing up to make themselves safer.
At the forefront of this adoption is
Surat which became a Safe City almost three years ago following the
implementation of Verint Solutions.
This precedent was soon followed
by cities in Maharashtra who have
already started implementation and
will start functioning as Safe Cities in
near future. Other cities like Hyderabad, Noida and Lucknow are in various stages of becoming one.
A CyberMedia Publication |

DE
GRA

- Perceptual study by

out of Top
25 Engg. Colleges
in INDIA

INDIAS
First
MICROSOFT
Ed-Vantage Platinum Campus
MICROSOFT

ADITYA

INNOVATION CENTRE (MIC)

* Technical Skills Development


* Certification & Gaining hands on experience

ENGINEERING, PHARMACY &


MANAGEMENT
COLLEGES
50+ Institutions
5000+ Employees
50000+ Students

Diploma, B.Tech
B.Pharm, Pharm D

ADITYA INCUBATION
CENTER
FOUNDATION
STONE LAID
BY

Efficient members in CRT

A huge campus situated in


Acres

Green zone with zero percent polluuon

Concentrated effort in the learning process


Separate blocks for Juniors Class Work

Periodical feedback from the students

E-classrooms
Girls waiing halls
WiFi Campus
Discipline is the hallmark
Project Clubs
AC Seminar halls.
AC / Non-AC Hostels Open Air Theatre
Industry oriented teaching
Separate Hostels for Boys & Girls

2015-16 PLACEMENTS

M.Tech, M.pharm, PGDM

INDUSTRY | IN FOCUS

Onkar Sharma

onkars@cybermedia.co.in

Innefu Labs Makes


Inroads into the Defense Sector
Innefu Labs is a relatively younger company in the cyber security space
in India. However, the company has won quite a few elite customers from
Indian defense and CRPF for its multifactor authentication solutions. Innefu
Labs is now gearing up to strengthen its footprint in India and is about to
raise funds

lthough there are many organizations in the


country, providing information security services, but there are not many Indian companies working on developing niche security
products. There was a huge gap in terms of
developing quality information security products within
the country. Innefu Labs, which is relatively younger, has
been focused on creating innovative cyber security solutions for securing critical IT Infrastructure. We felt that
there is space for quality indigenous security products
which will continue to grow since these products would
offer lower costs and much better support compared to
foreign products, says Tarun Wig, Co-founder, Innefu
Labs.
24 | May 15, 2016

www.dqindia.com

Innefu AuthShield, which is their flagship solution, integrates multi factor of authentication (MFA) using a protocol decoding mechanism. The integration at the protocol
level ensures that AuthShield can be integrated into even
those applications which do not inherently provide support for MFA including SAP, Microsoft Exchange, Oracle
Communication messaging servers, Database Queries,
legacy applications etc. Major Government institutions
such as the Defence Research and Development Organisation (DRDO) and National Housing Bank (NHB) are also
using the Innefu Labs security solutions, adds Wig.
DIFFERENT FROM ITS COMPETITION

From the day one, Innefu Labs has developed a niche in


A CyberMedia Publication |

INDUSTRY | IN FOCUS

We felt that there is space for quality


indigenous security products which will
continue to grow since these products would
offer lower costs and much better support
compared to foreign products
Tarun Wig, Co-founder, Innefu Labs

the indigenous cyber security product. Although there are


many established competitors in the market who are providing them multifactor authentication but their solutions
are dependent on end point applications for integrations.
Our unique solution can be seamlessly integrated with any
ERP/ SAP, Microsoft Exchange, Oracle Communication
messaging servers, Database Queries, legacy applications
etc, reiterates Wig, classifying itself from the rest.
According to the company, AuthShield authentication
security is a multifactor authentication technology that
combines device mapping with multiple authentication
form factors such as facial biometrics. From the research
and development perspective, the company is working
on Artificial Intelligence to add on vocal and facial recognition.
WINNING CUSTOMERS IN THE DEFENCE

Innefu Labs has bagged a good number of customers


from the Indian Defence and other agencies in the governments. The trust laid by Indian defence organizations
is expected to help the company customers in the enterprise space. Recently, CRPF has requested 1500 AuthShield Tokens in the first phase and is expected to deploy
it in different parts of the country. Some of the top government institutions such as the Defence Research and
Development Organization (DRDO) and National Housing
Bank (NHB) are already using the AuthShield Labs security solutions.
Innefu AuthShield is a very unique product which can
be implemented in applications such as mail clients on
smart phones / desktops, SAP, etc. This is a unique feature which is not available in any other authentication so|

A CyberMedia Publication

lution in the market, further says Wig. Despite winning


such big customers,
Innefu Labs faces challenges in terms of convincing
customers about the benefits of their solutions. As a result, we had to do a lot of proof of concepts and demonstrations to get the clients to understand the solution
and figure how different and unique it is compared to their
existing solutions, shares Wig.
SEEKING FUNDS

Although Innefu Labs has won customers in the defence


and is profitable, it needs VC support to expand in the
market. The company has not yet taken any round of
funding. Innefu Labs has been a profitable venture so
far. We havent taken any angel round of funding. We are
in talks with three separate VCs for the fund-raising, and
one of them has already done a valuation process. However, since the talks are yet to conclude, we would not like
to name the investors, reveals Wig.
ROADMAP AHEAD

In 2016-17, the company intends to cover the whole Indian market and target Asia Pacific, South East Asia, SriLanka, and Bangladesh as potential markets for the future. We believe our unique points give us a strong edge
over other players in the authentication market and we
should be able to treble our revenues in the coming year,
adds the Co-founder.
The company plans to lay out its full-fledged roadmap
once it is able to secure the funding. In terms of R&D it
is working on implementing authentication in embedded
devices to cater the fast increasing IoT.
www.dqindia.com

May 15, 2016

25

ENTERPRISE | REAL CASE

Ruchika Goel

ruchikag@cybermedia.co.in

Is Your Mobile Application Secure and


Enabled with Right Level of Protection?
As financial institutions capitalize on new opportunities by providing
online services, they continuously face security breaches. Lets see how a
bank showed 50% reduction in security issues in the subsequent mobile
applications and how these mobile applications were benchmarked against
global and RBI security standards

n the recent years mobile device adoption has become necessary for every industry. People can easily make purchases online, check their mails, and can
also make online transactions on-the-go. One of the
biggest drivers of change in the financial sector has
been advances in technology, with many banks capitalizing on new opportunities by providing online services
such as mobile banking.

THE FEARS

A recent study discovered that 90% of mobile banking


26

May 15, 2016

www.dqindia.com

applications have serious security problems that could


potentially compromise user data. On the same lines,
following a breach to one of their mobile applications, a
financial institution turned to Paladion to ensure that all
future applications were tested, compliant and above all
secure for their customers. The bank identified that its
mobile banking application had suffered a major security
breach, which put many of their customers at risk of
exposing or losing their banking data.
After a lot of research, the bank chose to work with
Paladion because of its experience in cyber security
A CyberMedia Publication

ENTERPRISE | REAL CASE

We needed to consider various elements


for the banks upcoming mobile
applications like: A short go-to-market
timeline, the ability to cater to all types of
mobile operating systems, and the need
to work for multiple vendors
RAJAT MOHANTY
CEO & Co-Founder, Paladion Networks

and risk management. To make sure applications were


safe for customers use they decided to check the
interface of both apps using a threat-based approach
to systematically highlight possible security breaches.
Going forward, another biggest challenge was also to
devise a meticulous plan in a short time to rectify and
remove possible security threats from both apps, while
complying with the standards of RBI and OWASP within
in a short period of time.
We needed to consider various elements for the banks
upcoming mobile applications like: A short go-to-market
timeline, the ability to cater to all types of mobile operating
systems (Android, Windows, and iOS), concern over the
security posture of mobile applications, and the need to
work for multiple vendors, says Rajat Mohanty, CEO &
Co-Founder, Paladion Networks.
Paladions Mobile Application Security Testing Program
included code review, mobile application penetration
testing, web application penetration testing, and security
configuration audit among other features. It also made
sure that the client creates more durable mobile apps
based on improved threat elimination approach that can
identify potential risks.
THE SOLUTION

In order to provide a solution, the provider needed to take


a number of elements into consideration for the banks
new and future mobile applications such as: A short goto market timeline, mobile business applications need to
cater to all types of mobile platformsAndroid, iOS, and
Blackberry, the applications needed to work for multiple
business owners and multiple vendors, and concern over
the security posture of mobile applications.
|

A CyberMedia Publication

The solution provider has unique strategy. Its structured


testing methodology ensures that vulnerabilities in
applications are identified and removed. They deployed a
team of security testing experts at the banks head office,
which included trained professionals and an off-site team
of researchers who provided the required support at
every step. The bank was given customized solutions for
different applications along with its security testing plan
to achieve maximum security assurance.
Awareness sessions were conducted and continuous
communication was provided with development teams to
help eradicate security issues with quick turnaround time
and remediation validation.
TANGIBLE BENEFITS

After the previous security breach, the bank has now


taken extreme precautions and is now securing its
applications with thorough security checks and a
greater awareness to avoid future incidents. They are
also considering a periodical testing system, which
would continuously ensure the security of their mobile
apps.
After rectifying the security problems, several high risk
vulnerabilities across different mobile applications were
discovered. Out of those, up to 60% risks were identified
and repaired within a span of two months.
Reduction in the go-to market time resulted in
fifteen secure mobile applications being released in
the first quarter alone. All mobile applications were
benchmarked against global security standards as well
as RBI standards and up to 50% reduction in security
problems was seen in successive mobile applications
that were launched.
www.dqindia.com

May 15, 2016 | 27

INDUSTRY | TALKING POINT

Onkar Sharma
onkars@cybermedia.co.in

RITESH PAI
Senior President &
Country Head,
Digital Banking,
YES Bank

28

May 15, 2016

www.dqindia.com

A CyberMedia Publication

INDUSTRY | TALKING POINT

Digitization is helping banks to reach out to more customers in an innovative


way. Dataquest spoke to Ritesh Pai, Senior President & Country Head, Digital
Banking, YES Bank, to know how the bank has modernized its processes through
digitization and other technology deployments. Excerpts

STARTUPS
MOTIVATED BANKS
TO DIGITIZE FAST

ow is digitization changing the banking


space in India?
Digitization is one of the key elements which
enable the banks with traditional processes
to compete and meet the customer expectations in this eCom/mCommerce universe. Various initiatives taken up in this space has helped banks to access
data across geographies almost near real time and hence
we can see improved efficiencies and also reduced errors
as there is no loss of information. As a result of digitization, banks now can access customer information at
finger tips and revert to the customers on various queries
in the matter of seconds which meant reduced TATs and
increase customer delight.
|

A CyberMedia Publication

How do you see the challenges posed by startups


which are competing with banks through their wallet
apps?
Startups are not really competition. Startups have definitely motivated banks to move fast on the technology space to offer convenience to the customers. At
YES BANK, we actually saw this as an opportunity and
started to partner with them. Startups can bring in agility
and innovation, banks can bring in governance and offer regulatory support along with robust payment system
infrastructure and hence it showed us a clear way that
combining our strengths is the best way to go to market
and offer services.

www.dqindia.com

May 15, 2016

29

INDUSTRY | TALKING POINT

Which are the key initiatives undertaken by Yes Bank


to digitize?
Yes Bank has embarked upon the journey to be Finest
Large bank in India by 2020 and we believe that customer service plays a key role in determining the success
on this journey. We have identified core banking, digitized
workflows, intelligence middleware/mobility platform, and
CRM & analytics as four pillars which will determine our
ability to engage with customers through various touch
points. Over the past few years, YES BANK has been on
the journey of automation and digitization of backend
workflows and process flows, getting the elements of
middleware and mobility platforms in place. Currently, we
are running with various implementations around CRM,
big data analytics, and core banking upgrade, etc. All
these are coming up fast and will enable us to move in
the direction of offering best in class customer service.
Another area where we are focusing is to partner with already digitized industries to offer banking and payments
on their platforms and again here digitized processes and
middleware shall play a key role.
In what ways has the whole digitization helped the
bank?
As mentioned earlier, the efficiencies grew to such an extent that the bank can now actually achieve scale beating
all the constraints like geographical reach, manpower, etc.
Especially in the space of payment digitization, we have
achieved multi-fold success or disproportionate growth.
With digitized payments platform, a small team can now
monitor a business that does a million transactions every
month. By partnering with a digitized entity, we now facilitated more than a million users to transact digitally in less
than a quarter. This scale was possible only by digitizing
the payments and processes. Digitization not only made
these transactions STP but these are conducted in risk
controlled and error-free environment
How easy or challenging has the digitization process
been for the bank?
Like any journey this has been challenging as well, this
required a lot of new ideas, investments in technology
platforms, changing mindset of internal stakeholders and
training employees. At Yes Bank, we have created an end
state picture after thorough brainstorming and have broken the journey into multiple small blocks. Now we are
moving in the direction of putting various parts of this jigsaw to complete the picture.
30

May 15, 2016

www.dqindia.com

How do you handle the security of your various apps


and digital tools?
While customer education has been one of the approaches, we also need to idiot proof these applications. This
can only come from immense understanding of the process, risks and build in controls that can be layered into the
digital framework with minimum friction.
What is the total digital spending planned for this
year?
At Yes Bank, we follow a merit based funding rather than
a budget based funding when it comes to investments in
technology. Between 2015-18, bank has invested in core
banking upgrade, mobility platform, enterprise middleware, CRM, master data management, analytics platform,
big data, credit card platform, digital channels like internet, mobile app, wallet, social media banking, UPI, BNA,
kiosk banking, etc. All these simultaneous investments
were possible only because of the merit based funding
approach by YES BANK
What are the ongoing projects?
Some of the projects at Yes Bank: Mobile banking upgrade, core banking upgrade, implementation of MDM/
CRM and big data platforms, enterprise mobile applications, etc.
A CyberMedia Publication

Estd.:2000

BANSAL

Group of Institutes, Bhopal (M.P.)


Approved by : AICTE, New Delhi | Affiliated to : RGPV, Bhopal

TOP

17

ts

Placemen

rating

Celeb

th

Years of

Excellence

or of M.P.

ion by Hon. Govern

Excellent Educat
stitutes of MP for

Awarded Best In

Congratulations to Bansalites for Selections in TOP MNCs.


Group Colleges

BIST

BCE

BIRT BIRTS SDBCT SDBCE


Campus Address:
Kokta, Anand Nagar, Bhopal
Ph. : 0755-2922699, 2922705, Fax : 0755-2922697
Corporate Office Address:
2nd Floor, Tawa Complex, Bittan Market,
Arera Colony, Bhopal - 462016, Ph. : 0755-2423736
Website : www.bansalgroup.in, Email : info@bistbpl.in

INDUSTRY | IN FOCUS

Ashish Gulati

maildqindia@cybermedia.co.in

Building Cities for Tomorrow


Government to rebuild 100 cities with basic infrastructure, transportation and
ICT, which will link every aspect of city life
32

May 15, 2016

www.dqindia.com

A CyberMedia Publication

INDUSTRY | IN FOCUS

y 2030, 40% of Indias population will be living


in urban areas and contributing 75% of GDP. An
estimated 400 mn people are expected to migrate to cities over this period. In fact, the great
rural-to-urban migration has already begun.
To meet the challenges these changes will raise and
the pressure will be added on basic services, utilities
and on an already crumbling infrastructureIndia
needs to build new cities and create new jobs over
the next two decades. This will, however require wellplanned development of physical, social, economic, and
institutional infrastructure.
Indian government has already made a start and
work is being done at a fast pace
to achieve the targets. Recognizing
that urban centers are engines of
growth and employment, it has
launched a strategic initiativethe
smart cities mission. Under the smart
cities mission, the government will
virtually rebuild 100 cities with basic
infrastructure, including transportation
and ICT, which will link nearly every
aspect of city life.

SMART CITY PROGRAMS

Transportation will
also play a vital
role in any smart
city program as
it deals with the
efficient movement
of goods and
services

There is a big push for smart cities.


The government has allocated
significant capital both at the central
and state levels to make these
a reality. Smart cities promise to
reinvigorate local economies and improve the quality
of life. But the smart city programs encompass several
components which need to be linked together for this
project to be successful.
Smartphone penetration and fast bandwidth is the
key to smart city programs and is needed to connect
citizens, businesses, and the government on a fast
network. In India, the pace of smartphone penetration
is rising quickly. 4G would play a key role in connecting
and usage of Smart phones. Telecom operators are
already gearing up their infrastructure to roll out 4G
services.
Every city needs reliable power and Indian cities
need a lot to do to deliver reliable electricity at the best
|

possible price. Too many smart city programs globally


follow the western model of centralised power plants
and grids. While India still grapples with challenges
like Internet availability, bandwidth issues, power and
internet reliability, the prospect of large scale adoption
of internet of things (IoT) in the power sector might
seem like a remote possibility, or one for the very distant
future. However, with the governments plan to create a
$15 bn Internet of Things (IoT) market in the country by
next five years, or the 100 smart city project under the
IoT policy, there is significant scope for growth in the
power sector as well.
Transportation will also play a vital role in any smart
city program as it deals with the
efficient movement of goods and
services. Today, India has about
150 mn vehicles and the roads are
already choked. The goal of smart
transportation is to help people move
around and use efficient public and
private transportation system more
than personal vehicles. The success
of Ola Cabs and Uber in India is an
encouraging sign. It means that Indian
consumers want efficiency, not just a
car for sitting which not only wastes
time and money but also pollutes the
environment.
With GPS technology in car
navigation and the capability to
receive signals from multiple satellite
systems to collect information has improved accuracy
and response time in determining vehicle position which
has expanded the utility of this function beyond basic
navigation to safety-related applications.
Indian telematics market is exhibiting growth and
consumers are becoming more cautious about their
safety while driving. Moreover, automobile companies are
collaborating with telematics manufacturing companies to
develop in-built telematics systems during the production
process itself. Added to this, the low-cost telematics
solutions which are embedded in the automobiles is
encouraging end users as they are able to afford this
technology and also enjoy the services being provided by
this technology.

A CyberMedia Publication

www.dqindia.com

May 15, 2016 | 33

INDUSTRY | IN FOCUS

INTERNET PLAYS A VITAL ROLE

The Internet-ready vehicle also brings with it a host of


security concerns related to the data it generates. Like the
smartphone platform, the new cars are embedded with
this technology face critical issues related to business
model, standardization etc. The absence of a certified
body or an agency for standardization and regulations
of Telematics industry is the biggest challenge faced by
this sector. Regardless of certain core challenges like
adoption of technology, developing
countries have a massive potential
to leverage and reap benefits of road
safety and also improvements in
economic efficiency.
Internet of Things will also play a
vital role in building smart cities. IoT
is already heralding transformation
across industries and it will bring
about
significant
changes
in
the coming years. IoT can help
organizations utilize their business
infrastructure and assets in innovative
ways to offer new services and deliver
additional revenue. Moreover, deriving
meaningful information from the huge
volumes of data that IoT produces
can improve decisionmaking and
enable proactive, predictive insights.
While the scope and potential of IoT
is vast. There are many advantages of incorporating IoT
into our lives, which can help individuals, businesses,
and society on a daily basis. For individuals this new
concept can come in many forms including health, safety,
financial, and every day planning. The integration of IoT
into the healthcare system could prove to be an incredibly
beneficial aspect for both the individual and the society.
A chip could be implanted into each individual, allowing
hospitals to monitor the vital signs of the patients. IoT can
also function as a tool that can help people save money
by making home appliances communicate in an energy
efficient way.
IoT has innumerable opportunities and provides
innovative services that can be offered using smart
devices, machines and products. Organizations can
benefit from new revenue streams generated by new
business models and services, as well as reduced time to
market and increased returns from their R&D investments.

Todays manufacturers face extraordinary challenges in


the form of rigid specifications, tight timelines and even
tighter budgets. This sector also includes asset tracking
of large industrial equipment and the monitoring and
control of factory assets. Analog sensors, for instance,
are used to measure real-world conditions and process
control systems measure performance analysis and
control of manufacturing
The penetration of smart phones with latest technology
in the next few years can distribute
sensors and instruments throughout
the community that can be used by
people without medical training to
gather key medical data in real time
and transfer it to a core body of
doctors and experts for analysis. 4G
will allow for remote video connection,
and combined with real time sensor
data of blood analysis, iris scan,
brain imaging, etc, can help experts
quickly diagnose most ailments and
prescribe solutions.
Some interesting examples are,
trash bins announcing when they
need to be emptied mainly seen
in western countries; automatic
control of flow in storm drains to
avoid flooding; parking spaces that
communicate when they are free;
smart and connected lamp posts providing street lighting
when required to save energy and that can measure
particle concentrations in the air; as well as providing Wi-Fi
and installing sensors in homes to detect the movements
before damage the building. The list is endless but India
has miles to go to achieve this excellence.
The biggest challenge for the Smart Cities Mission will
come from the challenges faced during implementation
and the mindset of the people. They need to understand
that cities are engines of future growthand urbanization
is an inevitable necessity. Major reforms in contract
enforcement, environmental clearances, land acquisition
and permit and procurement processes are required at
the state and city levels to accelerate the
implementation of this initiative through
public-private partnerships (PPPs).

4G will allow for


remote video
connection, and
combined with
real time sensor
data of blood
analysis, iris scan,
brain imaging, etc,
can help experts
quickly diagnose
most ailments and
prescribe solutions

34

May 15, 2016

www.dqindia.com

The author is Country Head, Telit India


A CyberMedia Publication

INDUSTRY | IN FOCUS

Bhaskar Ghosh

maildqindia@cybermedia.co.in

How a Liquid Workforce will Propel


Organizations into the Digital Landscape
Organizations can use technology not only as a disruptor, but as a way
to enable their people, projects and entire operations to become highly
adaptable, nimble, and liquid to effectively compete in todays everchanging digital landscape

echnology continues to strengthen its position as a primary driver of profitability and


market differentiation in almost every industry.
Pioneering companiesstart-ups and larger
enterprisesare embracing social, mobile,
cloud, and analytics to transform themselves into truly
digital businesses. And advancements in technology
continue to accelerate at an unprecedented rate, further
disrupting status quo.
According to findings from the Accenture Technology
Vision 2016 global survey of more than 3,100 business
and IT executives, 33% of respondents believe that the
global economy is already impacted by digital. Whats
more, 86% of survey respondents anticipate that the
pace of technology change will increase at a rapid or
unprecedented rate over the next three years.
While keeping up with the pace of the digital landscape
is critical to compete and stay relevant in the market, there
is one essential ingredient which established enterprises
and start-ups are overlooking in their fervent quest for
growththe workforce.
Companies cannot survive with only technology running
their business; they need to harness the technology to
enable the right people to do the right things in a highly
adaptable, change-ready and responsive liquid culture.
This is identified as the Liquid Workforce one of five
trends (along with Intelligent Automation, Platform
Economy, Predictable Disruption, and Digital Trust) in
this years Accenture Technology Vision 2016.
Look into the workings of any tech startup and youll
witness work being done differently. These companies
operate in a dynamic culture shaped by passion,
innovation and agility. This is the kind of culture that

36

May 15, 2016

www.dqindia.com

a digital workplace will look like in the not-too-distant


future.
A dynamic culture is not often associated with
traditional organizations. There are exceptions though. GE
for example is changing its culture to push the historical
boundaries of success. Through a new approach called
FastWorks, GE is embedding lean startup practices into
the workforce. It is empowering its people to change
faster and make smarter decisions while staying close
to its customers, in part by doing away with rigid
approval processes. In the new approach, employees are
empowered to make rapid changes to their projects or
quickly switch direction. The organisation supports these
projects by providing constant and relevant training that
gives employees the skills they need to adapt and thrive.
And this shift is proving to be successful: Thanks to
GEs FastWorks methodology, the company built a new
regulation-compliant diesel engine for ships nearly two
years ahead of its competitors. The same methodology
enabled GE Appliances to design and deliver in less than
one year a high-end refrigerator that sold twice as well as
preceding models.
The workforce as we know it, has changed and is
rapidly changing. In the past, anyonefrom accountants
to machinistscould spend their entire careers doing the
same job, using the same skills to support businesses with
largely unchanging goals. But today, digital is disrupting
industries to such an extent that businesses have no
option but to continually change products, services, and
sometimes even business modelsnot just once, but
constantly. Businesses are using a digitally powered and
highly adaptable liquid workforce to change not only what
they do but how they do it.
A CyberMedia Publication

INDUSTRY | IN FOCUS

A FEW FACTORS IN THE CHANGING WORKFORCE


LANDSCAPE

Fueled by significant numbers of millennials entering the


workforce, the employee pool itself is also dramatically
changing. In 2015, the millennial generation became the
largest segment in the workforce, and it is expected to
account for 76% of the global labour market by 2025.
C l o s e r
home, it is
estimated
that
the Indian
workforce
will grow by
over 8 mn per
annum over the coming
decade, and most of it will
be driven by youth entering
the labour market. Now
let us view this against
the backdrop of these
trends:
Respondents from India
in the Accenture Technology Vision
2016 predict that 47 percent of their total workforce
will be made up of internal temporary positions and
freelancers in three years time.
51 percent of the business and IT executives surveyed
in India believe that the workforce of the future will be
structured more by projects than by job functions.
Our global survey further highlights that deep
expertise for the specialized task at hand was only the
fifth most important characteristic required for employees
to perform well in a digital work environment, whereas
other qualities such as ability to quickly learn and
ability to multitask or willingness to embrace change
ranked higher, indicating that organisations are placing
a premium on candidates whom they believe will evolve
with their business.

A CyberMedia Publication

Research from Accenture also finds that 38 percent of


businesses globally are struggling to find the right talent.
These factors in the changing workforce landscape
add to the larger problem of attracting, retaining
and deploying talent, and leading enterprises are
starting to re-think the whole concept of skills in their
workforce.
While technology is at the
center of these

workforce
disruptions, it also needs to
be at the center of creating the
solutions. To successfully create
a liquid workforce, organisations
must utilize various tools to facilitate the adaptation,
such as: massive online open courses for scalable
training; collaboration tools such as Slack that foster
collaboration; and predictive workforce analytics that
allow vast organisations to make better decisions.
Pioneering organisations will also use intelligent
automation to drive a new and much more productive
relationship
between
people
and
machines.
The author is Group Chief Executive
Accenture Technology Services
www.dqindia.com

May 15, 2016 | 37

INDUSTRY | TALKING POINT

Smita Vasudevan

smitav@cybermedia.co.in

MILIND YEDKAR
General Manager, Asia
Pacific and Japan, Cloud
Client Computing, Dell

38

May 15, 2016

www.dqindia.com

A CyberMedia Publication

INDUSTRY | TALKING POINT

INDIA IS THE FOURTH


LARGEST MARKET FOR VDI
IN THE WORLD
Mobility is the lifeline of any new age organization. Employees are demanding
the flexibility to work on-the-go and enterprises are increasingly looking for
flexible IT infrastructure solutions to make this possible. On these lines, Milind
Yedkar, General Manager, Asia Pacific & Japan, Cloud Client Computing, Dell,
shares his views on the role of client virtualization and VDI (Virtual Desktops)
in a modern day enterprise, also outlining the companies contribution in the
space. Excerpts

ell us a bit about the evolution of VDI.


A notebook is self-sufficient. It can be used as
a stand-alone system, even without internet.
We call it a fat client. So ideally, one can work
on mails without internet and then connect
it to send or receive mails. But this system has risk
associated with it. The integrity of the data in a fat client
can be disrupted. It is vulnerable to theft, hacking etc.
But when the same system is centralized, say, a data
centre, the encryption or protection is multi-layered and
stronger than a stand-alone OS in a fat client.
The concept
of
DV (Desktop
Virtualization) is not

A CyberMedia Publication

new but technology takes time to catch up. VDI is part of DV.
What makes VDI so important in the case of a modern
enterprise?
Microsoft is releasing updates and patches frequently
and for a large organization, to install those updates on
every machine (thick client) is a big job. It gets expensive
to maintain and update assets in that environment. But
in a VDI environment the maintenance becomes much
easier and cost effective because everything is in one
place. For instance, a bank in Australia doesnt want
to maintain office space. They hate travelling to CBDs.
From the aspect of quality of life, a work-from-home
suits them. In this case, I will not give them laptops
with data in it (fat client) but a thin client, which works
regardless of their location. If they have a client meeting,
they take their laptop and access information from there
(without taking risk).
www.dqindia.com

May 15, 2016 | 39

INDUSTRY | TALKING POINT

The traditional End User Computing is marked at 4B


in number worldwide. Its growth is slow, sometimes degrowing, and mostly stable. Whereas VDI is growing in
double digit. Last quarter (2015) India had the highest
growth in this segment (86% y-o-y).
How is demand for VDI shaping up in the Indian
market? And the opportunities?
India is the fourth largest market of VDI in the world. India
has overtaken Japan this year (2016). The largest market
is China followed by USA and UK. Business market in
India contributes to 5.5% of the VDI segment worldwide.
Given the double-digit growth in this segment, Dells
position is very stable now.
There are five big verticals mainlybanking and
financial services, education, healthcare, government
and back offices/BPO. For certain jobs like video
processing, designing or video calling we have dual
core systems in place. We have quad-core, quaddisplay for clients in trading where the jobs demands
it. It is ultimately sharing; some things are better done
at the end point some things are better done at the
servers! That is why we are a solution provider. It not a
little box that we sell and tell people that this is a thin
client!
40

May 15, 2016

www.dqindia.com

How do you see the market competition in this


space?
We are not market leader in India, but we are getting
there. Worldwide we are market leaders. In USA,
three years back Dell bought a company called
WYSE, which is a market leader. Today we have 45%
market share in North America, 30+% in Europe. In
Asia, because WYSE was more focused on those two
regions the growth is slower, but we are getting there.
We are about 24-25% in India. In Indian market people
are yet to adopt to this technology and soon they will
understand the value. We are still number two but our
share is growing.
The value that Dell is providing to the IT industry is
that we are the only company offering a true end-toend solution. We bought WYSE three years back and
the total number of patents in this field that Dell owns
is higher than all other companies put together. It is not
just a win in terms of the market share but we have a
dominance in terms of the Intellectual Property and we
are driving the development of this industry.
Other makers either use Windows or Linux based thinclient, we have our own operating system called WYSE
thinOS in which we own the IP. It is so thin that it is virus
and malware immune.
What Dell has done is that we have separated this
into a completely stand-alone business unit. We are only
company to do so, and most companies sell thin clients
as an option. If anybody talks about VDI, I am obliged to
talk to him. I have sales teams around the globe who talk
only VDI. That is end-to-end solution.
Dell is still largely known as a traditional PC brand,
though it is an end-to-end player. How did this
synergy (DELL + WYSE) happen? And how important
is VDI to Dell in its overall strategy?
Think of it this way; from the companys point of view
we have a large P&L on traditional end-user computing
(desktops & notebooks). This is our bread and butter.
Now imagine a bank saying we dont need traditional
desktops and are moving to VDI. If Dell does not have
VDI as a business unit, we lose a customer. So from an
end-customer point of view, to maintain the relationship
with the customer, we are offering a solution with an IP
win at that. This is tomorrows technology and that is
why it is growing in double digits. It is absolutely key as
far as the companys strategy is concerned.
A CyberMedia Publication

INDUSTRY | IN FOCUS

Team DQ

maildqindia@cybermedia.co.in

Threat Landscape Grows Complex


and Chameleon-like
Overall malicious content in e-mail increased 250% in 2015, compared to
2014, with the Dridex banking malware and various ransomware campaigns
largely responsible for the rise

orcepoint recently released its 2016 Global


Threat Report claiming a definitive breakdown
of many of todays most impactful cybersecurity threats with far-reaching technical, operational, and cost impacts on affected organizations. The report details specific, notable threats
in-depth and provides the information about the threat
composition and their severity.

INSIDER THREAT:
ACCIDENTAL

THE

MALICIOUS

AND

THE
JAKU AND BREAKING RANSOMWARE

The report outlines that insider threats describe attacks


that either originate or receive cooperation from sources
within an organization. Preying on globalization and
more dynamic business relationships and supply chains,
attackers are targeting insiders in victim and adjacent
organizations. They often gain access to systems by
manipulating staff into what appears to be legitimate
activity. This is in fact designed to steal their credentials.
Forcepoint and third-party research shows that policing
|

insider activity and accounting for privileged credentials


are security issues organizations feel least-prepared to
confront. The report outlines that nearly 80% of security
remains focused on perimeter defenses, with less than half
of organizations having dedicated budget to insider threat
programs. Common challenges cited in the report included
organizations lacking enough contextual information
to discern suspect from benign activity and insufficient
visibility into overall behaviour on networks, due to reliance
on disparate, disconnected tools in order to monitor users,
actions and sensitive files. More sophisticated technology
combining data loss prevention (DLP) and threat behavior
analytics that correlate with other IT and business
systems (like badging and IP log records) is now evolving
to determine whether a threat is from a true insider or a
malicious masquerader using stolen credentials.
Forcepoints Global Threat Report documents a
case study of an organization undergoing merger and
acquisition (M&A) activity, where personnel affected
by downsizing were observed violating their generous
separation agreements by trying to exfiltrate proprietary
company information before their departures. This
activity was prevented, yet could have had costly
business repercussions if it were successful.

A CyberMedia Publication

Whats JAKU: JAKU is a global botnet named after


the harsh desert planet in Star Wars: The Force Awakens
and exhibits a split personality. Its attack infrastructure
seeks to both compromise victims at large scale, in
order to co-opt and herd them for mass effect, and
simultaneously conduct narrow, highly-targeted attacks
on individual victims, seeking to harvest sensitive
files, profile end-users, and gather valuable machine
information.
www.dqindia.com

May 15, 2016 | 41

INDUSTRY | IN FOCUS

Fighting back against the Locky ransomware: poses severe consequences. Unfortunately, when IT and
Locky is delivered in Microsoft Office files that contain security teams cannot see data in shadow IT systems,
malicious macros. While Forcepoints technology they cannot protect it.
To help prevent breaches stemming from unsanctioned
platform recognized the threat and began blocking
execution of the malicious content, the SI team set cloud accounts and access, the Threat Report underlines
about analyzing how Locky forcibly encrypted files, in measures organizations can take to educate users and
order to defeat this action. Forcepoints SI team claims block the movement of particular files to unauthorized
that it reverse-engineered how the malware worked cloud destinations.
and blocked access to domains needed to complete
the key process, rendering Locky harmless on systems THOUGHTS FROM FORCEPOINTS OFFICE OF THE
that would have otherwise been encrypted. Lockys CSO (OOCSO)
controllers fought back by instructing Locky to access Forcepoints Office of the CSO boasts to tap the
new crimeware domains, but Forcepoints SI team expertise of Forcepoints own cybersecurity and data
matched this move, blocking the new domains and protection leaders to help customers create new
negating the malware again.
security strategies, improve existing
While
specialist
teams
like
programs and repel ongoing attacks.
Forcepoints can thwart the arrival of
Each expert in the Office of the CSO
Almost 92% of
ransomware, organizations best bet
organization brings to bear decades
is to put strong data back-up postures
of industry experience.
unwanted (spam,
in place that provide the luxury of
In 2015, the OoCSO team saw
malicious) e-mail
simply ignoring ransom demands and
M&A activity as one of the greatest
now contains a URL
seamlessly moving to copied files in
cybersecurity risk catalysts across
the event of data loss or destruction.
industry sectors. Too often, extensive
and the presence of
due diligence and confidential
malicious macros in
proceedings that lay the groundwork
WEB AND E-MAIL: A TWO-PRONGED
e-mail is up 44.7%.
for M&A overlook the state of
THREAT
cybersecurity controls in companies
According to a study, almost 92%
party to a deal, opening opportunities
of unwanted (spam, malicious)
for attackers, insiders or others to
e-mail now contains a URL and the
obtain privileged information or steal trade secrets and
presence of malicious macros in e-mail is up by 44.7%.
Forcepoint Labs outlined that overall malicious other data that could gut the value of a transaction.
Today, more than 84% of the S&P 500s value now
content in e-mail increased 250% in 2015, compared
to 2014, with the Dridex banking malware and various consists of intellectual property (IP) and other intangibles.
This means almost any type of data breach event exposing
ransomware campaigns largely responsible for the rise.
such information can bring immediate profitability, legal,
regulatory and shareholder consequences.
MOVING TO CLOUD IS STILL A SECURITY CONCERN
In this years Threat Report, OoCSO experts recap how
Cloud computings cost, scalability, and accessibility
have offset security concerns for many enterprises, comprehensive security controls were managed during
yet these issues present headaches for many cloud the M&A activities that created Forcepoint itself the
prospects wary of how inconsistent security controls combination of the former companies Websense, Raytheon
between cloud providers and their own environments Cyber Products (RCP) and Stonesoft. With so much at
could upend data protection. Somewhat ironically, CIOs stake, the coming together of these companies had to be
and CISOs holding off on cloud adoption nonetheless conducted within the highest levels of security. The Threat
find themselves wrestling with the consequences of Report offers a phase-by-phase timeline of how security
employees independent decisions to use the cloud apps risks were consistently evaluated, compared, mitigated and
they prefer for personal productivity and convenience. managed at every step, from conception of the deal through
More than 80% of decision-makers feel this shadow IT the unveiling of Forcepoint on January 14, 2016.
42

May 15, 2016

www.dqindia.com

A CyberMedia Publication

INDUSTRY | IN DEPTH

Rajesh Ramnani

maildqindia@cybermedia.co.in

The Signal and the Noise:


Unleashing the Power of IoT
Lets read on to see the current and future impact of the Internet of Things
and the ways in which companies must prepare on an infrastructure level for
such a massive influx in data that connected devices will create

he Internet of Things (IoT) may still be more


hype than reality, with a certain amount of inbuilt scepticism surrounding it but this is going
to change, and companies need to be ready.
Germanys main telco, tech, and manufacturing companies have already formed the Internet of Things
Alliance (IoTA) ahead of the upcoming IoT onslaught. The
aim is to make sure that when devices do start speaking
to each other, theyll be speaking German. However, even
with all this planning theres a large stumbling block lurking
on the horizon, which is a lack of a proper infrastructure
to manage the vast diversified data, traffic, storage, and
processing demands associated with the IoT behemoth.
As IoT expands, with everything from thermostats to
cars increasingly being plugged into the Internet, so does
the need for a solid infrastructure and requisite compute
|

A CyberMedia Publication

power to underpin it. Thus, leading to a revolution within


data centres throughout the land.
HOT BEDS FOR INNOVATION

The fact that IoT controllers are getting ever smaller


and affordable, makes it relatively easy to enable IoT
connectivity on all kinds of devices. However, its not
just fridges and table lamps that are moving online, IoT
is being used on a mass scale too, empowering a wide
variety of innovations.
For example, scientists are helping forward thinking
wine growers in the Napa Valley to alter their long held
irrigation techniques through the use of smart sensors
embedded within the vines. From simply wirelessly
transmitting readings from the sensors, they can analyse
the findings to determine the plants level of hydration,
www.dqindia.com

May 15, 2016 | 43

INDUSTRY | IN DEPTH

turning laggard vineyards into top performers that use


far less water at a time when California is facing a widely
reported catastrophic drought.
Healthcare has been one sector swift to embrace
the benefits that the IoT can bring. One such solution
is Philips medication dispensing service. Designed for
elderly people who often forget to take their medication,
the device alerts a patient when its time to take their pills.
When a patient pushes the button, pre-filled cups with
medication are dispensed. The device is synced to the
users phone line, so messages are tracked if the person
misses a dose, if its time to refill the medication, or if the
power goes out, preventing the device from working.
Gartner forecasts that the number of IoT devices will
grow to circa 25 bn units by 2020. By comparison, the
total number of computers, tablets, and smartphones in
2020 is only expected to be 7.3 bn units. BI Intelligence
expects this year to be the tipping point where the number
of IoT devices surpasses the number of computers,
tablets and smart phones combined for the first time. By
the end of the decade, IoT devices will produce 40,000
exabytes (40 tn gigabytes) of data that needs to be stored
and interpreted into meaningful intelligence.
SIGNAL TO NOISE RATIO

The adoption rate of IoT will very much depend on how


easily businesses can circumvent the stringent German
Bundesdatenschutzgesetz (BDSG) to unlock and use the
information gathered from it, with the key component,
whether from consumer or business focused devices,
being the application, not the sensor itself.
With billions more network-connected devices expected
to emerge in the coming years as the IoT trend takes off,
datacentre operators will need to invest to ensure their
facilities have sufficient data capacity to cope with the
influx of information that these IoT endpoints will generate.
The problem is that the big data coming out of the IoT
explosion generally has a very high noise-to-signal ratio
with a large proportion of irrelevant data leading to a high
data exhaust rate. This will have both an immediate impact
on the bandwidth needed to and from the datacentre and
the storage and compute power within.
Because of this, for IoT to reach the type of growth
predicted by Gartner et al, businesses will need to have a
datacentre capability that can handle this potentially huge
influx of data. Investments in IoT platform services residing
in the datacentre will be instrumental in delivering the IoT
44

May 15, 2016

www.dqindia.com

promise of anytime, anywhere, any way connectivity and


context.
In fact, IDC warns that the IoT may fall short of its promised
potential without urgent investment in datacentre upgrades
in its research5 on datacentre demand and operations.
The analyst group predicts that the datacentre capacity
consumed by IoT workloads will increase by nearly 750%
between 2014 and 2019, putting pressure on facilities from
a networking, storage, and analytics point of view.
A CHANGE IN INFRASTRUCTURE REQUIREMENTS

Given the number of devices connected and the amount


of data generated, businesses must focus on their IoT
service platform requirements at the level of the datacentre
itself, not just the individual servers or storage devices. And
with IDC predicting that more than 90 per cent of the data
created by IoT devices will be hosted in the cloud within
the next five years, it is datacentres that will feel the strain.
However, companies striving to analyse and make sense
of the data generated by the plethora of network-connected
devices out there in real time, may find that their traditional
legacy datacentres are ill-equipped to cope. Rather
than trying to plug the gaps by purchasing infrastructure
by component part, we will see modern switched-on
businesses moving to a virtualised converged infrastructure
to offer flexibility to the huge steps in data to come. This, in
turn, will lead to the emergence of hyperscale datacentres
built upon converged and hyper-converged infrastructures
to cope with the unique pressures of the IoT era.
CHANGING THE PERCEPTIONS OF IT

To enable this IT needs to change its perception from a cost


centre to a revenue enabler. Only when this thinking is flipped
can an organisation truly embrace the advantages the IoT
can bring. Once technology is put at the core, businesses
can achieve the integration, speed, scalability, and resilience
goals of a modern digitally transformed business.
It may have started with an internet connected fridge,
but the IoT will in effect become the top driver of IT
expansion into larger datacentres in the future, speeding
the transition to cloud-oriented converged infrastructures
that have the ability to scale and data platform
architectures.
The author is Regional Director at
VCE, the Virtual Computing Environment
Company
A CyberMedia Publication

Bengaluru, Chennai, Delhi, Gurgaon, Kolkata


Nikom An ISO 9001 Company and Member of IGBC
(Indian Green Building Council-CII) has an integrated
capability to design & build State-Of-Art IT & Networking
Solutions, Audio/ Video Solutions, Data Center Solutions,
Safety & Security Solutions.

Services Oered:
IT & Networking Solutions
Information Security System, Servers/Computer
Power, SAN & NAS Equipment, Tape Backup
Systems, Network Equipment, External World

GO GREEN !!
(Power to do More)

Connectivity, Data Center Safety & Security


Systems, Enterprise Management Systems

Audio / Video Solutions


Video Conferencing, Video Wall Solutions, Smart
Rooms, Conference Rooms, Interactive Solutions.

Address

Data Center Solutions


DCIM

Software

Solutions,

High

Density

Head O: 309, Skylark Building 60

Containments & Specialized Precision Cooling,


Rack

and

Row

based

Cooling

Nehru Place, New Delhi-110019

Solutions,

Compliance to TIA942 & Tier guidelines, High

India

Eciency & Modular UPS Solutions, Racks, Rack,


iPDU,

Switched

PDU,

Power

Contact: 9811135559, 9968127604

Distribution,

Website : www.nikom.in

Environmental Monitoring Solutions, PUE Analysis

Safety & Security Solutions


Surveillance & Smart City Solutions, Integrated
Access Solutions, Intelligent Safety Solutions

Call us

Mail us

9968127604
info@nikom.in

INDUSTRY | TALKING POINT

Shrikanth G

shrikanthg@cybermedia.co.in

GREG MOON
CMO, Co-founder,
popSLATE

46

May 15, 2016

www.dqindia.com

A CyberMedia Publication

INDUSTRY | TALKING POINT

POPSLATE 2 E-INK IPHONE


CASE: ONE MOBILE PHONE
CASE TO RULE THEM ALL
You can call it a disruptive innovation or pushing the mobile phone accessory to a whole new
level. How about using the backside of your iPhone 6 series into a secondary E-Ink display?
This is what the revolutionary popSlate does. The company says that popSLATE is pioneering
the second screen experience by embedding an e-paper screen in a smartphone case.
In an exclusive interview to DATAQUEST Greg Moon, CMO, Co-founder, popSLATE speaks
about how this mobile case will take user experience to a new level and his companys recent
offering - popSLATE 2. Excerpts

an you talk about the genesis of


popSLATE - from version 1 to 2 and how
did you bump on to this idea?
We started shipping our original popSLATE
(popSLATE 1), in April of last year. Since
that time, we have thousands of enthusiastic users in
more than 45 countries. popSLATE 1 also generated a
lot of excitement in the press as a new category-defining
product in the rapidly expanding smart hardware space.
popSLATE 1 focused primarily on visual selfexpression, by connecting people to multiple sources of
vibrant images with which to instantly customize their
phones (including the iPhone camera and photo library,
Instagram, and other members in the popSLATE user
community). Users started hacking around with alwayson productivity uses, too, such as daily schedule screen
shots, boarding passes, and grocery lists. These early
experiments spurred further brainstorming at popSLATE,
which led to the development of our first productivity
|

A CyberMedia Publication

features, like popBook where you can store your


scannable membership cards, and auto-pops, which
enabled notification-type bits of information (eg, a
sports score), to be delivered automatically to the back
of the phone. For the latter feature, we created an IFTTT
channel to integrate with 100+ popular content sources;
IFTTT served as a terrific sandbox to understand which
content sources were most popular, and how they could
best be leveraged within the always-on experience.
For the uninitiated, IFTTT, if we go by Wiki is a free
web based service that allows users to create chains of
simple conditional statements called recipes, which
are triggered based on changes to other web services
such as Gmail, FB, Instagram and Pinterest. IFTTT is an
abbreviation of If This Then That.
After popSLATE 1 - it was time to ask the question,
What should the smart second screen really be?
Driven by this question, we conceived of a slew of new,
always-on features, in order to take full advantage of
www.dqindia.com

May 15, 2016 | 47

INDUSTRY | TALKING POINT

that big space on the back of the phone: configurable


Dashboards, richer news and information feeds; phonesized clocks, a clutter-saving e-reader, a quick list
maker, faster access to the digital wallet, and a few other
surprises we have in store.
It also became clear that to knit together all this
new functionality, we needed to develop a whole
new interaction model to runand seamlessly jump
betweenmultiple apps on the popSLATE device.
What about the design and the hardware in popSLATE 2?
We needed to re-imagine the hardware to usher in an
expanded user experience. We had already heard from
users that they wanted popSLATE to be thinner and sleeker,
and that they found it to be a hassle to charge popSLATE
separately from the phone. The new UX would also require
slightly more, but still minimal, device interactivity, and a
higher resolution screen. The result was a product that
was 40% thinner, had a bigger, higher-resolution screen,
three captive touch navigation keys, and an interface with
the iPhone through the Lightning connector. Once you go
through the Lightning connector, it was a no-brainer to add
phone charging capabilities to the product.
When the dust of the design process had finally settled,
we realized that we hadin addition to capabilities
unique to popSLATEco-opted the best features of a
smartwatch, a battery case, and an e-reader. And with
that, popSLATE 2 was born.
Can you talk more about your entrepreneurial
journey- like founding popSLATE and disrupting the
mobile phone case space?
The idea came from the following thought experiment:
48

May 15, 2016

www.dqindia.com

Look at the front of your phone. Lets say you are trying
to get an update on a game score (or, if you are at the
office, trying to locate your next meeting). You start by
unlocking your phone, then you swipe and tap around
to find and open your app and then you scroll around
for the information you want. Now think about the fact
that people on average do this 150 times per day. We
figured out that there had to be a better waya way that
surfaces the information you need. We thought, wouldnt
it be much better if your apps did the work for you, rather
than the other way around.
Now look at the back of your phone. What do you see?
nothing. That big, empty space offers you zero value, and
you carry it everywhere you go. Instead, imagine that you
saw: a beautiful clock face, pictures of your friends and
family, customized dashboards, news and sports score,
stock quotes and your latest e-book and reminders. In
other words, imagine any image or information you could
want, awaiting your glance, changing up throughout the
day.
Can you give more insight on eInk technology?
E-Ink is a great technology. To date, it has mainly been
valued for readability in Kindles and other e-readers. We
were the first to start touting its always-on capabilities,
due its incredibly efficient use of power: it takes zero
power to hold an image, and just a sip of power to
change an image. Its therefore the perfect medium
for the popSLATE use case of providing personalized
content for consumption at a glance, 24/7, without
unlocking your phone.
Can you talk about the pricing modelswill it be
available in emerging geos like India?
US pricing will be USD129 for the 6/6S and $149 for
the 6+/6S+. We recognize that there is downward
pricing pressure in emerging markets, but we will need
to understand each market a bit more before making any
adjustments to pricing.
Your plans for futurewill you launch similar cases
for other brands other than for Apple phonescurrently which iPhone models are covered?
We are focusing only on iPhone for now. popSLATE 2
addresses the 6, 6S, 6+, and 6S+. With the right partner,
we will step into the Android space in the future.
A CyberMedia Publication

INDUSTRY | IN DEPTH

Maan Al Shakarchi

maildqindia@cybermedia.co.in

Network Security
Its Everybodys Business!
Some might think network security is a third world problem, and more
developed countries have moved on, but the truth is that the vast majority of
enterprise networks globally have yet to move on

s the week kicks off, we are greeted with


yet another network security breach making
headline news. The story comes from Bangladeshs central bank, where hackers failed
in their e-heist to transfer $951 mn of funds,
yet still managed to make off with a cool $81 mn, which
|

A CyberMedia Publication

they moved to the Philippines and then funneled towards


Casinos there. A security investigation blamed the breach
on lack of basic security infrastructureno firewalls, and
outdated second hand switches. That problem there
seems pretty obvious, but is there more than that meets
the eye?
www.dqindia.com

May 15, 2016 | 49

INDUSTRY | IN DEPTH

Security is always a combination of three pillars;


technology, people, and process. In this case, technology
was blamed as the primary culprit, and rightfully so.
Large organizations have IT security teams responsible
for hardening the overall infrastructure. They build
high walls (firewalls) and set traps (intrusion detection)
around the city to protect the perimeter. The problem is
that more and more frequently, attacks are coming from
the inside.
The SWIFT room in Bangladesh Bank is located
on the 8th floor of their building in Dhaka. It is 12 x 8
feet large, containing four servers, four monitors, and
a printer. It has no windows, and would appear quite
physically secure. However, the rules of traditional IP
networking meant that the room is exposed to the wider
network, spanning across to other remote locations.
The culprit in this case was not the second-hand $10
switch which an engineer decided to deploy to connect
the stations and the printer. The real culprit was relying
on legacy network technology which does not offer
genuine segmentation.
A FEW EXAMPLES

To draw an analogy, think of traffic on a traditional


computer network like sending a letter through the
standard post office system. Your envelope stops at
each location, mixing with other envelopes as it is routed
across the system. Now think of a courier model, where
your envelope is put into a special package, hidden from
the outside world, and flies directly to the destination
without being exposed to any stops. Modern network
50

May 15, 2016

www.dqindia.com

technologies, called fabrics, allow you to encapsulate


traffic streams from different systems. This segregates
you network into secure isolated zones, each completely
separate and hidden from the rest. Fabrics also have the
additional benefit of automating the response to possible
breaches, dynamically moving attackers to quarantine
zones, and immediately alerting network administrators.
Some might think this is a third world problem, and
more developed countries have moved on. The truth is,
this is a global problem. In the US, one of the largest
department stores recently faced a similar breach when
hackers were able to access its network using an HVAC
contractor. To use our analogy, the envelopes that
contain the contractors traffic were being mixed with
the customer payment envelopes on the same postal
system (network). Why was the contractor access not
cordoned off? Exactly the same answer; we continue to
rely on the same insecure legacy network technologies.
The vast majority of enterprise networks globally have
yet to move on.
While some network manufacturers continue to
promote complex legacy systems, the impact on their
customers is huge. Every time a CIO or network manager
decides to invest in traditional network technologies,
they are exposing their business and inviting hackers
in. The headline news is a constant reminder for us to
embrace the next generation of network technologies,
and secure our businesses from both external and
internal threats.
The author is Networking Leader, Avaya AMEA/EU
A CyberMedia Publication

INDUSTRY | TALKING POINT

Onkar Sharma
onkars@cybermedia.co.in

ANUJ KUMAR
GM India and South Asia
and Global Lead Analytics,
Concentrix

52

May 15, 2016

www.dqindia.com

A CyberMedia Publication

INDUSTRY | TALKING POINT

Concentrix works on analytics solutions across sectors such as banking, financial service and insurance,
automobiles, retail, healthcare and travel. The company serves clients across the United States, India, Japan,
Korea, and other Asia-Pacific markets. Dataquest had a chat with Anuj Kumar, GM India and South Asia and
Global Lead Analytics, Concentrix to know more on how the company is chasing opportunities in the big
data and analytics space. Excerpts

CONCENTRIX IS FOCUSING MORE


ON ANALYTICS AND DIGITAL

ow do you see big data and analytics adoption trends and how is Concentrix focusing
on big data?
As a company we are focused on being more
impactful to our clients and delving into high
value areas. When we talk about high value areas, we do
not mean high price. Rather it is high value delivery to
our clients. For more than a year we are focusing on 4-5
discrete areas which are critical to our customers. And
these areas are other than the normal operating CRM
BPO which we do. One of these areas is of course process transformationwhich we have done till date. We are
giving it further impetus. We have commenced a consulting practice internally which centers around analytics and
digital. This practice is in line with the market trends and
the requirements from our customers, small and large.
Have you built the product or are you implementing
analytics at the banks or the retailers?
We work on standard, off the shelf products. Our expertise lies in being able to operate all these products from
Oracle, SAP, IBM, etc. We are not in the business of building cutting edge IP. We are not in the business of selling
a tool which customers should buy and start operating.
That is what IT companies like Oracle, SAP and IBM do.
Our focus remains on using various tools and techniques,
which are familiar with, so that we can help our customers
in the best possible way.
What are the challenges that come while deploying
analytics or big data in different verticals?
One of the biggest challenges is privacy and security. Besides, the regulations globally differ from country to coun|

A CyberMedia Publication

try and organization to organization. There are countries


where the governments do not allow data to be hosted
beyond the boundaries of the country. This poses a challenge. Besides, in scenarios where the organizations are
not allowed to move data outside their networks particularly banks, we have to move out of our delivery center to
offer services. However, the challenges have given birth
to new business opportunities.
Talking about the analytics globally, how big is the
market, what are the growth trends, and which are the
verticals where most adoption is happening?
The analytics BPS market particularly, going by analysts
globally, is somewhere in the range of $4 bn and growing
in mid-20s. We find banking, insurance, healthcare, retail,
and CPG as lead adopters.
For analytics, we have teams based in India, Korea, and
a part of Eastern Europe. Across these teams we service
the entire world. It is an emerging area of endeavor for
us. We are embedding analytics into many new solutions
possible. We are showcasing an offering to almost all our
entire client-base. The entire client-base is aware of our
capabilities. We are happy showcasing our capabilities
through pilots, proof of concepts and regular commercial
engagements.
Is it possible for you to share some of the customer
names?
I can tell you that the leading life insurance companies in
India and leading healthcare companies globally are our
customers. As discussed earlier, we continue to focus on
the 5 sectorsbanking, insurance, healthcare, retail, and
CPG.
www.dqindia.com

May 15, 2016

53

INDUSTRY | IN DEPTH

KS Rao

maildqindia@cybermedia.co.in

Five Barriers to

Broadband Adoption in India


As the telecom industry in India prepares for the next level of growth through
new digital initiatives, let us look at the challenges that prevented the
implementation of an effective broadband network in India in the past

ust months after India watched the grand unveiling of the ambitious Digital India and Smart
Cities 100 initiatives, an industry report ranked
Indian telecom industry the worst in Asia Pacific
in terms of broadband speed. Will high-speed
broadband remain a myth in my lifetime? asks an average Indian who has been frustrated with the 3G/4G services available on his mobile network. If we compare the
broadband subscriber figure between India and its peers,
it becomes clear that rural broadband will remain a dream
for India at least for the next 5 years. With just 120.88
million subscribers, which include wireless and wireline
services, Indias broadband customer base comprises
just 26% of 3G and 4G subscriber base of China Mobile
alone. As per Measuring the Information Society Report
of 2015 published by ITU. India is ranked 135 in both the
access sub index and use sub-index, which are basically
measures for Telecom Infra & penetration indicators.
As the telecom industry in India prepares for the
54

May 15, 2016

www.dqindia.com

next level of growth through new digital


initiatives, let us look at the challenges
that prevented the implementation of an
effective broadband network in India in
the past.
Regulatory hurdles: Over the last
decade since the advent of broadband,
the regulatory authority in India missed
several opportunities to formulate a
proactive broadband strategy that could
help address the digital divide and boost
the countrys economic growth. World
Bank estimates that a 10% increase
in broadband penetration accelerates
economic growth by 1.38% in developing
countries. Regulatory hurdles apart,
Indian telecom sector was hard hit by
the onslaught of multiple issues and
procedural delays typically associated with public offices.
Telcos who got their fingers burnt in 2G taught the industry
that investment in Indias telecom sector is a risky affair.
Also, the reactionary policies that immediately follow
such delays and implemented without having a futuristic
outlook, make the scenario worse for the investors. Striking
a balance between transparent measures which prevent
such malfeasance and an economically viable model
that facilitates a level-playing field for the participants
is integral for the health of the Indian economy. A single
regulatory framework that facilitates swift decision making
and transparency among the stakeholders could address
the challenges in rolling out a broadband infrastructure.
Lack of fibre infrastructure: The poor quality
of service (QoS) and call drop issues are primarily
attributed to the countrys low investment in fibre and
backhaul infrastructure. It is a well understood fact that
fibre networks are the most viable medium to deliver
increased data capacity and improve the quality of voice
A CyberMedia Publication

INDUSTRY | IN DEPTH

calling. The fact that less than 20% of the towers in India
are backhauled compared with an average of 80% in
countries like the US, China, and Korea emphasizes the
need for an effective policy that gives due importance
to fibre deployments. Industry reports reveal that India
currently deploys an average of 15 million kilometres
of fibre every year whereas current demands indicate it
needs to increase to at least 50 million kilometres per year.
As telcos lock horns with regulators on call drop issues,
there is an underlying issue that seeks the attention of
all: Where should the investments come from? Apart from
the state owned MTNL/BSNL, leading private telcos like
Reliance Communications, Reliance Jio, Bharti Airtel
and Tata Teleservices have come forward to connect
their base stations with fibre; however their investments
are logically fit into existing lucrative circles, so rural
deployment is not likely to happen in the current scenario
among these participants. The disparity in broadband
penetration between urban and rural India continues to
haunt Indian economy. TRAIs September 2015 report
reveals that Indias rural teledensity is less than 50%
whereas the urban figure comes about 150%.
Right of Way issuesIndias telecom sector was
plagued with Right of Way (RoW) issues since the
beginning creating roadblocks for the development of
the countrys backhaul infrastructure. Currently RoW
charges vary from a few lakhs to `1.5 crore per km across
different states. With different states having different RoW
policies, telcos are losing out significant amount of their
infrastructure investment to municipal bodies across
different states. As the industry evolves to the next level
of growth through 4G and LTE that demands 30 to 120
Mbps of backhaul capacity, operators are likely to face
the brunt of RoW issue more severely. While Section 7
of the Indian Telegraph Act calls for consistency in the
conduct of any such work done by the government or the
licensed parties, no such notification has been issued by
the government on RoW.
Last mile connectivity: Lack of fibre optic infrastructure
to provide last mile connectivity has affected the
performance of broadband especially in rural India.
The NOFN project was launched to bring optic fibre as
close to the end-user as possible so that high-speed
broadband can be made available to the customers.
The NOFN had envisaged laying OFC connecting all the
2,50,000 Gram Panchayats of the country. The work for
laying the cable was allotted to three CPSUsBSNL,
|

A CyberMedia Publication

RailTel and PGCILin the ratio of 70:15:15 respectively.


Also, non-discriminatory access to the NOFN was to
be provided to all service providers. The network was
supposed to be commissioned in two years; however
as per the information available from BBNL, as on
November 2015 only limited Gram Panchayats have
been connected despite best efforts. Recently TRAI has
invited various industry sectors asking for suggestions
on implementation models with an objective to improve
overall Bharatnet delivery. Discussions are on to bring
best implementation model for the state led program with
an increased participation from private sector including
emphasis on network utilization
Capital-intensive affair: Indian telcos are financially
stretched not only due to the rising spectrum prices but
also due to the heterogeneity of the networks they operate
on. The hasty transition from 2G to 3G and now to 4G/LTE
demands huge investments in spectrum and supporting
technologies. Additionally, the ongoing FTTH investments
in India are highly capital intensive especially in rural areas
where penetration is far below the national average. As
regulators play wait-and-watch game on infrastructure
expansion, operators are facing pressure on multiple
fronts to expand network and ensure QoS. This chickenegg dilemma can be addressed only through a clear
directive and incentivization of telecom investments. This
apart, telcos are facing competition from Wi-Fi providers,
OTT players, cable companiesall of which force telcos
to rethink strategies so that they can increase broadband
ARPU. In this context, telcos are left with an option either
to forego near-term returns from their investments or
indirectly pass them on to end customers.
Conclusion: The telecom industry has been a major
contributor for economic growth. In order to achieve GDP
growth levels of 10%, the telecom industry will have to
revolutionize the way the current state of ICT services. For
this to happen participation is required from various stake
holders, both government and private. The government
thrust should be on increasing rural connectivity/
penetration by addressing hurdles by facilitating various
policies and improve investment climate through fast
tracking reforms; whereas the private players will need
to invest in improving the capabilities for the rollout of
Telecom infrastructure.
The author is COO Power and Telecom Business,
Sterlite Technologies
www.dqindia.com

May 15, 2016 | 55

INDUSTRY | IN DEPTH

Kartik Shahani

maildqindia@cybermedia.co.in

Smart Cities Not Necessarily

Secure Cities

Our smart cities current attack surface is huge and vulnerable to attackers
who are evolving continuously

arly this year, the government of India announced the names of the first 20 smart cities,
thereby taking a step closer towards developing 100 Smart Cities in India. This has been one
of the most ambitious projects undertaken by
the government which plans to invest $1.2bn towards the
realisation of this dream.
As India prepares itself for rapid urbanisation, it also
becomes important for us to understand that smart
cities are a cradle for economic activities that are likely
to attract a lot of security threats. Therefore the need for
the government to equip itself to ward off these attacks is
greater than ever.
SECURITY CHALLENGES IN SMART CITIES

As per a report from KPMG , 72% of Indian companies


58

May 15, 2016

www.dqindia.com

have faced cyber-attacks in 2015. Cybercriminals


are known for their attack techniques and malwares
which are continuously evolving. Hacktivists groups
are known for launching cyber-attacks campaigns
on organizations, groups of people and the most
important being attacks against governments which
result into monetary gains or access to sensitive
information resulting in sabotaging of national
security.
LACK OF CYBER SECURITY TESTING

One of the biggest challenge is that new technologies are


being deployed in our cities without any proper security
testing. There is more stress on ease-of-use and quick
deployment of systems as a result of which security gets
compromised sometimes.
A CyberMedia Publication

INDUSTRY | IN DEPTH

IT RISKS

Smart cities use ICT (information, communication and


technology) to carry out functions like traffic management,
surveillance & security, remote controlling etc. For these
three components to work together in harmony its
necessary to come up with a cyber-security framework to
ensure protection of data.
LACK OF CITY CERTS

A lack/ absence of city specific Computer Emergency


Response Team may lead to weak coordination and
communication. Existing CERTs are already having
challenges today and loading them with additional
responsibilities will only stretch them further.
LARGE AND COMPLEX ATTACK SURFACES

Internet of Things (IoT) is the basis of smart cities which


involves a huge number of machines, devices, sensors
and other objects become interconnected to each other
and to higher-level systems. With so much complexity
and interdependency, smart cities have a huge and
unknown attack surface that is an easy target for cyber
criminals. Simple problems could cause a big impact
due to interdependency and chain reactions. This is what
makes having a threat model in place for every smart city
very important.
LEGACY SYSTEMS

Smart cities will have many cases of new technology that


is being combined with an old legacy systems that may
be vulnerable. Old technologies will need a supporting
technology that would enable the old and new systems to
work together while some systems will not run on newer,
more secure operating systems because of which older
operating systems are being used. This adds complexity,
increases the attack surface, and makes for slow adoption
of new technologies.
HOW TO MAKE SMART CITIES SECURE

While our cities are getting smarter by virtue of the thrust


being provided by the government, it has also given rise
to a situation where there are millions of connected
devices transforming the way we go about our daily
lives. As a result of which the cyber security threat is
likely to increase in the coming months. Therefore the
need to secure our cities against cyber criminals is
greater than ever.
|

A CyberMedia Publication

To begin with, we would need a large number of well


trained and well equipped cyber experts who can fight
off such attacks. At present there is a dearth in number of
cybersecurity professionals which is a matter of concern.
Government must put in efforts to create a pool of
cybersecurity practitioners by following international best
practices for such trainings.
Security issue should be fixed as soon as they are
discovered. It must be made mandatory for the vendors to
provide all security documentation and timely response.
A formal communication channel must be defined and
secondary services/procedures should be implemented
in case of cyber-attacks.
Constant coordination between government and local
planning authorities will play an important role in making
smart cities secure. The government must understand the
security need of each city and then look for a solutions
provider as per the requirement. Meticulous planning will
be required to address the safety and security needs of
commercial establishments, railway stations, airports,
city markets and shopping malls, residential areas and
educational institutes. A smart city needs to have such
solutions properly planned and effectively deployed and
monitored by the administrative agencies.
Thanks to latest technology, innovative analytics tools,
sensor technology and artificial intelligence can now be
added to both existing and new surveillance installations.
These tools can help in various ways such as crowd
monitoring/ detection, traffic management, left baggage
identification, criminal identification etc.
In conclusion, one can say that our smart cities current
attack surface is huge and vulnerable to attackers
who are evolving continuously. It is only a matter of
time until attacks on city services and infrastructure
become common. Smart Cities related technologies
should be properly audited to make certain that they
are secure before use. Smart cities become not so
smart cities when the data that feeds them is blindly
trusted and easily manipulated, hence actions must
be taken to make cities more secure and protect them
against cyber-attacks.A smart city with connected
solutions which is able to listen and understand what
is happening and also make better decisions is what
everyone is looking for.
The author is Senior Regional Director, RSA- India and
Saarc
www.dqindia.com

May 15, 2016 | 59

INDUSTRY | TALKING POINT

Shrikanth G

shrikanthg@cybermedia.co.in

B S NAGARAJAN
Senior DirectorSystems Engineering,
VMware

60

May 15, 2016

www.dqindia.com

A CyberMedia Publication

INDUSTRY | TALKING POINT

TODAYS SECURITY
CHALLENGES CANNOT
BE SECURED WITH MERE
INCREMENTAL THINKING
The security landscape is changing as the threat landscape becomes challenging by the day. Many
large enterprises are upping their ante in security by investing in new technologies and people
in order to create a pro-active security backbone. In an exclusive interview to DATAQUEST, BS
Nagarajan, Senior Director- Systems Engineering, VMware India talks about the leading security
trends and best practices in managing enterprise security. Excerpts

ow has enterprise security changed in the


last few years?
With the pace of business and technological
disruption ever accelerating, enterprises
around the globe and across many
industries seem poised for total digital transformation
this year. Todays security challenges cannot be secured
with mere incremental thinking. We need a new security
architecture that fundamentally changes how we
prevent, detect, and respond to threats.
Protecting a corporate network isnt as simple as
building a wall around it. Threats can still sneak through
the network firewall or circumvent security infrastructure
altogether. Once theyre inside, they can move around
and attack at will since there are few, if any, controls
inside the data center to prevent malicious traffic.
For a lot of security guys, nirvana is the ability to do
micro-segmentation within the data center, or build a
honeycomb, in effect, so that any threat that gets into the
data center is actually captured within the honeycomb
and cannot move very much. What we can do with
network virtualization is bring that firewalling all the way
down to the virtual interface.
|

A CyberMedia Publication

Given the challenges what are some of best practices


CISOs and CIOs can adopt?
As the threat landscape for data breaches continues to
advance in both volume and sophistication, businesses
must mature their security strategies to confront and
hopefully outpace these new challenges. Unless
changes are made to existing security protocols,
it is only a matter of time before security barriers are
penetrated and valuable data is lost. While there is no
silver bullet to ensure complete protection from data
breaches, companies can greatly reduce their risk and
exercise greater control over their network by taking the
following steps:
Create a model of security designed to be both
strategically resonant and tactically implementable.
Adopt a Zero Trust mindset. Strategically, Zero Trust
suggests making all network ports untrusted, thus
ensuring data is protected across all layers and not just
at perimeter access points. Tactically, Zero Trust identifies
clear steps companies can take to achieve this model.
Micro-segmentation is one of these critical steps, and
it must be accomplished for Zero Trust to be tactically
implementable.
www.dqindia.com

May 15, 2016 | 61

INDUSTRY | TALKING POINT

Architect your Zero Trust network by enabling


micro-segmentation of the network through network
virtualization. Modern networks must be segmented so
that micro-perimeters can be created and data controlled
more granularly. Virtualized network micro segmentation
is the easiest way to build these micro-perimeters.
Set up micro-perimeters to manage your toxic
data, and map how this data needs to flow through
your organization. Zero Trust is data centric. By
understanding how your data works and how it needs
to move on your network, you can create a more robust
solution that will enable both data usage and protection.
In the process of mapping out how your data flows, you
may also identify opportunities to improve and optimize
data movement.
Build a cross-functional team to implement Zero
Trust concepts. Zero Trust breaks down silos. Use
your Zero Trust initiative to solve business problems by
creating a team from various stakeholder groups. Involve
representatives from security, networking, application
development, and enterprise architecture.
What is VMwares approach to security and what are
your focus areas?
At VMware we see the ability to provide networking and
security services to a range of endpoints move to another
level. VMware NSX solves the data center challenges
by delivering a completely new operational model for
networking. This model breaks through current physical
network barriers and allows data center operators to
achieve orders of magnitude better agility and economics.
The set of endpoints that NSX can manage will extend
to containers and public cloud workloads. Well also see
NSX extending out to branch offices as Software Defined
WAN (SD-WAN) solutions take root.
VMware NSX has been around for more than two
years now, and in that time software-defined networking
and network virtualization have become integrated
into modern data center architecture. It seems like an
inconceivable amount of progress has been made.
But the reality is that were only at the beginning of
this journey. The transformation of networking from
a hardware industry into a software industry is having
a profound impact on services, security, and IT
organizations around the world.
As more data centers adopt the power of network
virtualization and a software-defined data center
62

May 15, 2016

www.dqindia.com

architecture, well see a broad range of traditional


security solutions that leverage the unique position of
the network virtualization platform in the hypervisor.
Detailed knowledge of VMs and application process
owners, combined with automated provisioning speed
and operational efficiency, is the foundation for an
exciting new approach to some very old challenges.
A common theme among customers is that they like
the security and visibility features that NSX provides,
and would love to have those same features available
for public cloud workloads. Recognizing that for at least
some of their end users, public clouds will be the chosen
venue for a workload to run. IT managers want to have a
consistent view of networking and security policy. They
also want to maintain that consistency even if a workload
at some point moves from one public cloud to another,
or moves back to on- premise deployment. Meeting
this requirement will be the objective as we expand
NSX into public cloud environments. A similar desire
for consistency in networking and security policies will
drive the extensions to support containers as first-class
endpoints for NSX.
Any India specific trends?
In India, we have seen growing momentum in the
adoption of network virtualization. Just as server
virtualization changed the paradigm for server operations
and management, we are seeing network virtualization
to change the paradigm for network operations and
management.
In 2015, the VMware NSX business, the network
virtualization and security platform for the softwaredefined data center, grew over 100% year-over-year
globally, bringing the total annual bookings run rate to
well over $600 million.
VMware NSX offers organizations the new,
architecture-based security solution they need to
defend themselves against the growing number and
types of cyber threats. As VMware CEO Pat Gelsinger
explained in his recent RSA 2016 keynote, VMware NSX
network virtualization offers organizations the alignment
and ubiquity needed for a true security architecture that
defends across compute, network, storage, and even
clouds. The micro-segmentation made possible by
these NSX capabilities transforms security by creating
the proactive, strategic defense needed to protect an
organizations most valuable assets.
A CyberMedia Publication

INDUSTRY | IN DEPTH

Mehul Doshi

maildqindia@cybermedia.co.in

Relevance of End-to-End
Security in an IoT Environment
With IoT serving as a medium it also brings with it multitudes of possible
security issues like that of identity theft, hacking, and cyber threats

A CyberMedia Publication

www.dqindia.com

May 15, 2016 | 63

INDUSTRY | IN DEPTH

he Internet is a vast space filled with networks, local, global, private, and public, connecting devices all over the world, and highly
susceptible to attacks. This rapid penetration of the Internet in our lives is leading to
a scenario wherein we are digitally connected around
the clock, with human beings interacting more and more
through machines. With IoT serving as a medium for
this, facilitating the communication between man and
machines, it also brings with it multitudes of possible
security issues like that of identity theft, hacking, and
cyber threats.
In 2013, there were 10 bn things
connected to the Internet, and it
is estimated that the number will
reach 40 bn by 2020, bringing with
it an evolving threat landscape.
Over the years, the BFSI sector
in particular has become a target
of security breaches with DDoS
attacks, mobile platform threats,
ATM jackpotting and personal
information
theft
becoming
rampant. Anthem, the secondlargest health insurer in the US,
took a big hit last year when a
data security breach led to theft of
personal information of 78.7 mn
customers, and cost the company
over $100 mn.
Heres how these security
breaches can be dealt with:
Fix the loopholes within the
business: In this past year itself, over 93% of the large
corporations have faced major cyber breaches. Even
the small businesses are no longer safe as it affects the
business. No one would be confident about investing in a
business that has been hacked or faces a similar threat.
The first and foremost pre-requisite is having skilled
security specialists who can aptly isolate the threats
and prevent it. This is imperative as on a normal basis
it can take a business roughly 9 months to identify the
vulnerabilities. Given the fact that BFSI is a burgeoning
sector, there is a major hindrance in terms of outdated

technology. Especially in India, there is a hesitation


towards adoption of new technology.
All-round stock of information: One of the main
reasons why it may take an organization a long time to
identify a security breach could be because of ambiguity
in terms of how vast the stored information is. A crucial
step towards this direction can be taken by measuring the
extent of information an organization has, and categorise
it with regards to its history and sensitivity. Once the
filtration is done, it can be further be scaled down by the
degree of importance, retaining only whats important,
rather than hoarding anything and
everything. Lesser the amount
of information stored, lesser the
degree of vulnerability.
End user security: Investing in
end user security training can be
fruitful for a business as it will not
only limit instances that could lead
to a breach but also instil a sense
of alertness in the employees
towards spotting odd or malicious
behaviour. It will bring in a security
minded environment. Over and
above this, having a security plan
in place will prove invaluable. In
case of a breach, the organization
will be able to contain it effectively
and come up with swift solutions.
The advancements in technology
has facilitated the influx of
digital records, making physical
records defunct. Such a scenario
further re-affirms the importance of extensive password
protection for all things involved.
The time has passed when cyber security was the lone
headache of just the IT department, it equally affects
all branches of an organization. By starting a practice
of using highly secure authentication, not only can the
number of breaches be reduced but it will also cut down
the losses incurred by the company due to breaches.

The time has


passed when
cyber security
was the lone
headache of just
the IT department,
it equally affects
all branches of an
organization

64

May 15, 2016

www.dqindia.com

The author is Country Head of Technology, Server,


Storage CCD & Datacenter Solutions, Fujitsu India
A CyberMedia Publication

INDUSTRY | IN FOCUS

Sairam Vedam

maildqindia@cybermedia.co.in

IoT: Its Impact and the


Importance of Testing
IoT is the next revolution which is swiftly transforming electronic products.
Users are fascinated and informed through Internet, hence it cannot be
overlooked or ignored

efore going in to the details, lets understand


what has set the pace for this new technology.
Increased penetration of broadband internet
which is widely available, decrease in costs
for connections and devices, increase in the
wi-fi availability or capability devices and sensors built into
them, technology costs are going down, surge in smart
phone usage, digitalisation across the spheres and the
impact these are creating to a human in terms of setting
speed, reduced costs and better economy. All the above
are creating a momentum for Internet of Things (IoT).
So now lets understand about IoT, it is the networking
of physical object through embedded sensors, actuators
and devices that collect and transmit information about
the object. Computers, vehicles, machinery, gadgets,
|

A CyberMedia Publication

smartphones, just about everything can be connected and


made to talk to each other without human intervention.
Needless to say, IoT is revolutionizing the way we
operate our business, irrespective of the industry or
geography. McKinsey Global Institute research states
that IoT can have an economic impact of $6.2 tn by 2025.
According to Cisco, the economic value added by the
Internet of Everything will be close to $19 tn by 2020.
HOW DOES IT IMPACT YOU?

Alert your technicians about a technical snag before it


actually happens. Travel hassle-free on smart roads that
give you optimized routes based on real-time traffic and
weather information and diversion warnings. Sound like
scenes from a sci-fi movie?
www.dqindia.com

May 15, 2016 | 65

INDUSTRY | IN FOCUS

Alarm waking you up at 5 am and making AC to switchoff automatically when you get out of the bed and notifying
the coffee machine to prepare coffee for you.
Yes, IoT is going to create impact in every part
of the life. May be with extensive support from the
governments, the initial impact will be in the urban area
where IoT has potential to transform everything including
transportation, communication, healthcare, banking,
domestic services and industries. But, it is inevitable to
keep away the agriculture and the allied sectors.

Smart Living: Improved quality of life along with


Safety and Security
Environment: Better waste management and air
quality monitoring, all of which contributes to greener
planet
It is good to note that Govt. of India has exhibited
its commitment by drafting policy to create a $15
bn IoT market place. However, it does require some
more research and development, and infrastructure
development to encourage IoT adoption

CONNECTED CARS - A MARKET PERSPECTIVE

WHY IOT TESTING IS IMPORTANT

IoT in connected cars is going to play a leading role


and are already driving the machine-to- machine space,
Gartner predicts there will be a quarter-billion connected
vehicles on the road by 2020, with new vehicles increasing
the proportions of connected cars. Gartner said the
proliferation of vehicle connectivity will have implications
across the major functional areas of telematics,
automated driving, infotainment and mobility services.
A study suggests that worldwide sales of connected car
products will increase almost fourfold between 2015 and
2020, adding more than 110 bn ($149 bn) in revenues
in the passenger car segment alone Added revenue isnt
the only benefit that car companies will see from the rapid
development of the connected car. These technologies
will offer buyers greater flexibility in personalizing the
cars they choose, and enable greater contact between
manufacturers and customers.

In order to master and implement IoT, organizations need


to work closely with mature vendors and overcome key
hurdles, such as:
There is a lack of consensus on how to apply
emerging standards and protocols to allow smart objects
to connect and collaborate. Its difficult for organizations
in integrating applications and devices that use multiple
network technologies and operate on various networks.
Testing IoT before launch can help error detection and
avoid failure of IoT products.
IoT generates huge amounts of data. Capturing,
Routing, Analyzing and using the insights of IoT data in
timely and relevant ways is a real challenge with traditional
frameworks.
Privacy and security are major concerns in using
IoT, because most of the devices have minimal human
interference, so there is a potential risk of security
breaches or malfunctioning devices that may cause
catastrophic failures in the IoT ecosystem. Continuous
testing of devices is required to avoid security breaches
and guard the systems from major damage from
attacks.
Enterprises are unable to manage IoT complexities
of managing the amount of data generated by sensors
every millisecond. For implementing an efficient
IoT, organizations require huge storage, strong data
management, and analytical skills.
The future of manufacturing is interlinked with the
usage of the power of IoT. Quality plays a key role in
helping the IoT market succeed. Testing IoT in addressing
data management, security, and privacy concerns helps
in offering trusted products.

WHAT DOES IOT MEAN FOR INDIA?

IoT for India means enabling over 1 billion people connect


to internet via various devices in context, for the efficient
and optimal usage of resources to create a sustainable
India. IoT can address several challenges today India is
facing. To mention few, some areas include:
Government: Better decision-making as the
information collected will be accurate and enables quicker
reaction for natural disasters, while also helping improve
transparency and accountability;
Agriculture: Effective utilisation of resources like
water, fertilisers, etc., for high yield agriculture and brings
predictability on demand supply requirements.
Transportation: Intelligent traffic management
contributing towards fast, safe and economic
transportation
Healthcare: Health maps on demand, better services
for emergency and disaster recovery.
66

May 15, 2016

www.dqindia.com

The author is Head Global Marketing,


Cigniti Technologies
A CyberMedia Publication

INDUSTRY | IN DEPTH

KG Manjunatha

maildqindia@cybermedia.co.in

f
o
e
r
u
t
The Fu

Email
g
n
i
t
e
k
r
Ma

If wrapped by the right technology and for the right market at the right time,
email marketing will continue to create ripples among the marketing fraternity
and shall be regarded as one of the topmost effective means of marketing

n a survey conducted by Kenscio, marketers second


highest priority as a reliable marketing tool went to
Email Marketing (59%), and preceded by social media (76%). Interestingly, Social Media Marketing has
achieved overwhelming response globally within just a
couple of years in contrast to more than two decades of
existence since email technology was developed in early
90s. Social Media Marketing in the last couple of years has
grown like no other, easily drawing the lions share of every
marketing campaign; such has been its impact in so less
time. However, its not that Email Marketing is lagging behind. As a matter of fact, email has become an integral
part of day-to-day life and is too common to talk about.
The evolution of email marketing is slow but its steady
so far. As we see with increasing competition at a time
when an active subscriber is bombarded with thousands
|

A CyberMedia Publication

of promotional emails in a month, the future of email


marketing in terms of its usability and deliverability will
depend on several aspects of its logical and technological
architecture. A few important aspects demonstrate what
will shape the future of email marketing.

Personalization: Personalization imparts a


sense of purpose and warmth to email
communications. A well personalized email responds to
subscribers based on individual behavioral attributes. The
gist of one-to-one communication in email marketing
actually lies in successful implementation of
personalization tactics in emails.

Dynamic content: Based on individual


subscribers, email messages can be variant.

www.dqindia.com

May 15, 2016 | 67

INDUSTRY | IN DEPTH

This variation can be used to create dynamic content to


target subscribers based on their online behaviours, past
purchase behaviour, email open behaviour, etc. Innovative
approach to create dynamic content in emails can provide
marketers tremendous business value in terms of reaching
out right customers with right offers.

In-email transactions: Email transactions


by clicking in the embedded hyperlinks and
re-directing subscribers to external landing page might
become a history in near future. Quick transactions for
special offers, purchase, form etc. These can be enabled
in the email body itself which will cut down the process
time drastically and will make transactions hassle-free.

Automation and integration with other


channels: Innovative approach to integrate
with newer channels/versions of platforms is one key
issue faced by email marketers. The ability to work
seamlessly with multiple channels can increase reliability
of email marketing platforms to a great extent.

Open-time based customization: Intuitive


approach to understand email behaviour
can help in multiplying email effectiveness. Email open
time, clicking behaviour, subject lines impact etc which are
essential benchmarks for marketers. They provide whole
lot of informative understanding of email subscribers and
their behaviour. If a consumer gets a promotional email at
the moment of opening the inbox in the morning, it can
have a better impact than hundreds of other promotional
mails remaining unread. To make it technologically viable, a
data-driven approach to deploy email is the only way out.
Innovation can give the further ride to success.

Micro-segmentation: Micro-segmentation
has contributed immensely to eCommerce
brands in terms of devising an appropriate targeting
strategy. Different theoretical models such as Clustering,
RFM Analysis, Predictive Analysis, CLV Analysis etc which
plays a pivotal role in sharpening targeting of consumers
with right messages. It will be worth-watching how email
marketers take competitive advantage through synchronic
Micro-segmentation and Email Marketing strategy.

Email triggers: Email triggers are response


based automations of the recipient. Building
recipient communication and engagement based
workflows in an automated way creates an expected and
68

May 15, 2016

www.dqindia.com

compelling relation between the brand and the customer.


By personalizing emails, the content of transactional
messages can deliver greater value to customers by
being contextual in communication. Optimization of
images/creatives of emails based on highest clicks is one
example of such email triggers. How cutting edge
technology can imbibe theoretical aspect of modern day
marketing like urgency and social proofing in email
marketing through technological advancement in future is
going to be the key to competitive advantage.

Mobile based approach to email marketing:


Email Marketing in the last couple of decades
has come a long way. Mobile has already overtaken
Desktop in terms of most widely used devices to open
emails. Adding to this, mobile application based approach
to deliver value to customers is ubiquitous now.
Synchronizing emails with such Apps is going to change
the way of email interaction in mobile. Not many days are
left when social buttons will include WhatsApp like button
(if the email is opened in mobile) for interacting with a brand
through WhatsApp.

Responsive design: Besides desktop, there


are dozens of different devices for opening
emails. Being adaptable to each and every kind of devicespecific resolution is very essential to avoid distortion of
designs/content of emails.

10

Innovate, innovate and innovate: This is


the basic framework of all the points
mentioned above. Email is the most reliable tool for
reaching out the customers with latest news/offers/deals
for a marketer. Innovation will keep email marketers
moving up to the learning curve. All new technologies
become redundant after one point of time (we get used to
it). An email marketers ability to keep an email fresh, alive
and new every time it arrives in your inbox will define
whether you will open the email or not.
With these evolving advancements in context to email
technology, email marketing is here to stay. Undoubtedly,
innovation is key to its survival considering the increasing
marketing and socializing platforms. If wrapped by the
right technology and for the right market at the right time,
email marketing will continue to create ripples among the
marketing fraternity and shall be regarded as one of the
topmost effective means of marketing.
The author is Chairman and CEO, Kenscio Digital
A CyberMedia Publication

INDUSTRY | EVENT REPORT

Team Dq

maildqindia@cybermedia.co.in

Critical Role of Technology in


Shaping the future of HR Practices
SHRM India hosted second HR tech conference and exposition 2016, and
saw a gamut of business leaders and delegates discuss how technology is
driving hiring and what the future holds

he Society for Human Resource Management (SHRM), association devoted to human


resource management, commenced its 2nd
HR Technology Conference and Exposition in
Mumbai. The two-day conference witnessed
650+ delegates, 15+knowledge sessions, 100+ CHRES
and business leaders, and 40+ expert led tech demos.
The conference aimed to showcase the most disruptive
and innovative HR Tech Trends.
The first day of the event started with the welcome address by Ms Achal Khanna, CEO, SHRM India. It was followed by vibrant sessions and panel discussions where
some of the eminent speakers including Jason Averbook,
|

A CyberMedia Publication

Thought Leader & Author; Kevin Freitas, Director, Global


Recruiting and Rewards InMobi; George Oommen, Dir
HR, Tech. & Process Consulting Cognizant; Animesh
Kumar, Group Head - HR & Corp. Svs, IDFC; Viresh
Oberoi, Founder CEO & MD Mjunction; Damodar Padhi,
VP & Global Head, L&D TCS; Abhijit Bhaduri, CLO
Wipro; Sid Bannerjee, CEO Indusgeeks; Prithvi Shergill,
CHRO - HCL Technologies, shared their insights on the
growing trends and need of technology in HR.
In this era of rapidly evolving technology, HR must rethink about its strategy and processes to meet the requirements of present day workforce. Jason Averbook,
Thought Leader and Author, in his keynote HR Innovation
www.dqindia.com

May 15, 2016

69

INDUSTRY | EVENT REPORT

in the Age of Technology emphasised that people, process, and technology should work in tandem for organizational development.
In an engaging panel discussion: HR Tech: Making it
About the User Experience, panelists Jason Averbook,
Thought Leader & Author; Kevin Freitas, Director, Global Recruiting and Rewards InMobi; George Oommen,
Dir HR, Tech. & Process Consulting Cognizant; Madhura Dasgupta Sinha, Head, Employee Experience - IDFC
Bank, discussed about the changing role of technology
in HR.
In another engrossing panel discussionDisruptive
Learning: An Eagle Eye View, the panelistsDamodar Padhi, VP & Global Head, L&D TCS; Abhijit Bhaduri, CLO,
Wipro; Sid Bannerjee, CEO, Indusgeeks; Prithvi Shergill,
CHRO, HCL Technologies, shared their experiences and
viewpoint on how technology can be harnessed to build a
holistic learning environment.
Kevin Freitas, Director, Global Recruiting and Rewards
Inmobi, threw light on How technology is driving hiring
and what does the future entail or what really matters?
in a session named MasterClass: Recruitment Redefined.
The first day of the event also saw SHRM India launch70 | May 15, 2016

www.dqindia.com

ing Vendor Community Platform in partnership with


Start-board. Through this partnership, Start-Board and
SHRM will help in implementing people focussed strategy
effectively, and would continue to work towards enhancing value for the HR Community! Also there was an expert
led demo session: Source, Screen, and interview the best
tech talent, Where Hacker Ranks automated CodeChallenges gave an in-depth insight into accelerated hiring.
We are extremely pleased to host the second edition
of SHRM Tech conference, after the overwhelming success of the last years conference. It is SHRMs endevaour
to bring best minds on one platform where we can debate, discuss, and dissect evolving trends, key issues
and challenges. I am hopeful that the engrossing keynote
addresses, panel discussions, and expert led demo sessions will provide indepth insights to our valuable participants on the critical role of technology in shaping future
of HR practices, said Achal Khanna, CEO, SHRM India.
The evening concluded with some interesting sessions
like Technology-enabled Learning: Can it deliver as well
as classroom learning? Harnessing a Digital Mindset: Is
it Digital HR or HR in a Digital World and Re-engineering
Tech Recruitments.
A CyberMedia Publication |

INDUSTRY | IN DEPTH

Rana Gupta

maildqindia@cybermedia.co.in

Staying Ahead of Data Breaches

In the time of increased vulnerability, viewing security in


a single layer approach is no longer sufficient. Since your
confidential data is passing through different layers, hence
securing data at every level is crucial

yber criminals have known to make attempts


to infiltrate our systems since the early 1980s.
Banking and financial data in particular is frequently sought after by cyber-hackers and
such looters, thus accounting for highly targeted and sophisticated cyber heists across the globe. The
Bangladesh Central Bank robbery where unknown hackers breached its computer systems and got away with $81
mn, while attempting to steal $951 mn from its account
at the Federal Reserve Bank of New York, exposed very
serious flaws in security and confirmed that our financial
infrastructures remain vulnerable in terms of complete
security deployment. What follows such a breach is the
obvious monetary loss combined with cost of notifying
data subjects, investigation and breach control. Involved
organizations may also end up facing (potential) law suits
and penalties. However, the most severe ramification is the
damage caused to the customers trust, corporate brand
and decline in share value.

INADEQUACIES LEADING TO CYBER BREACHES

Technological advances over the last decade or so


have completely changed the way we use, store and
transfer data. With the growing use of the Internet, higher
adoption of smart devices, and even increased adoption
|

A CyberMedia Publication

of cloud we are becoming increasingly vulnerable to


security threats such as data breaches, identity thefts
and fraudulent transactions. Banking and financial
services are also becoming increasingly digitised and
private information such as credit card details, ATM pin
and account authentication details etc, are stored and
processed digitally which gives more vulnerable entry
points to hackers.
Here are some of the most common methods used by
hackers for cyber breaches:
Trojan horse program: Using this program the
intruders trick you into installing back door for them to
penetrate the system. In case of the Bangladesh Central
Bank heist the hackers installed some type of malware
(possibly a Remote Access Trojan RAT) in its computer
systems few weeks before the incident observed how
money was withdrawn from its United States account.
(DoS) attack: A denial-of-service (DoS) attack is when
the target computer is instructed to crash or to become
busy processing data that you are unable to access it
Cross-site scripting: A malicious script is attached
to something sent to a website, such as a URL exposing
the web browser
Phishing: Phishing attacks could either be in the
form of an email from a trusted source asking for personal
www.dqindia.com

May 15, 2016 | 71

INDUSTRY | IN DEPTH

information such as passwords, bank details, personal


details, or it could mimic an existing website or webpage
and trick a user into entering confidential information on
the page.
Tapping unprotected computer networks
As many as 534 phishing incidents were reported last
year, of which 342 involved phishing websites hosted
outside India, according to data provided by the Indian
Computer Emergency Response Team (CERT-In). In a
different case, Russian banks have lost more than $US25
mn over the period of six months in 2015 to a hacker
group infecting their computers using tainted phishing
emails, according to Russian security firm Group IB.
Similar, to the recent Bangladesh bank incident,
British banks lost around 650 mn in 2015, after hackers
managed to infiltrate the banks internal computer
systems using malware, thereby infecting networks in
more than 100 financial institutions worldwide.
Another glaring loophole in the system is organizations
incompetence to evolve along with the technology. Gone
are those days when cyber security was considered an
additional feature. Preventive measures are a necessity for
smooth functioning of any business. An organization will
use multiple layers of security on multiple fronts, to block
every combination of attack. Many organizations leave the
confidential data like bank records and passwords without
encryption or proper security making it vulnerable to the
hacking. Hackers may have had complete access into
Bangladesh Central Banks database to know which major
projects in the country are waiting for finances. Authentication
credentials database should be stored confidentially.
BEST PRACTICES TO ENSURE DATA SECURITY AT
DIFFERENT LEVELS

Strong authentication and authorization: Strong multifactor authentication adds a layer of identity verification to
existing username password combinations. Using One Time
Passwords (OTP) or the challenge-response authentication,
organizations can implement effective security mechanisms.
Using multifactor authentication where the corresponding
keys are safeguarded in FIPS certified cryptographic
modules making it impossible to steal by any external hacker
or an unauthorized insider. This measure can be furthered
by implementing multi-level authentication over the access
of accounts so that at least more than one person is required
to approve any transaction.
Ensuring data confidentiality: By classifying and
encrypting the sensitive data at rest at the organizations
72

May 15, 2016

www.dqindia.com

respective data centers malicious program like Trojan


can be prevented from perpetuating, collecting and
sending the sensitive information out of the system.
Opting for world class solutions for safeguarding sensitive
information can ensure Data confidentiality of sensitive data by encrypting it
Security of the keys responsible for data encryption
Granular access that will grant data on need to know basis
Usage of multifactor authentication to access the
sensitive information
Management of the keys in efficient manner based on
defined policies
Many layers of security like tokenization and secure
key exchange for communication over and above data
encryption
Encryption for not only preventing the breach in an
effective manner but to also Secure the Breach incase
it happens
Ensuring data integrity: Data integrity can be
accomplished by encrypting the transaction details so
that while the data is in transit it cannot be analyzed by
any middlemen. Also by digitally signing the transaction
it can only be verified for authenticity at the other end.
The signing keys should be stored in temper resistant
cryptographic device like a Hardware Security Module
or HSM. HSM based public key infrastructure (PKI)
generates a unique key for each and every session.
Regular auditing and reporting: A large number of
Indian banks are susceptible to security threats because
they do not maintain their database safely. RBI issued
guidelines (prepared by the Working Group formed
under the chairmanship of G Gopalakrishna) for the
Indian banking industry for information technology (IT)
governance, information security, and cyber fraud, laid
out clear measures for the effectiveness of IT controls.
New set of security challenges follow with the growth in
technology, however regular examining the methods and
transactions can keep data leakages in check.
Increased connectivity comes with its own set of risks.
The potential for exposure of sensitive, confidential, and
legally protected data has increased making financial
systems vulnerable targets to malware, hacking, spyware,
and performance-corrupting activity. In the time of
increased vulnerability, viewing security in a
single layer approach is no longer sufficient.
The author is VP-APAC Sales, Identity
and Data Protection, Gemalto
A CyberMedia Publication

The Industry is poised for the


performers & achievers,
Are you???
This August, Dataquest unveils the most credible, comprehensive industry
ranking & analysis
DQ Top20 - ranking and prole of Top20 IT
companies
DQ Top20 - CEO Interviews

DQ Top 20 Business Leaders - Ranking of Top 5-10

players & Analysis of the following hot & happening


segments in the market:
Cloud
Mobility
Business Intelligence
Analytics, and Information Management
Enterprise Apps
Security
Collaboration and Social
Data Management
Middleware, and Development Platforms

IT Infrastructure and Data Centres (includes Storage


and Servers)
Domestic IT Services - SI
ADM, Outsourcing
Consulting
Managed Services
IoT
End user Computing
Join the leader to be the leader
Write to us: rajivp@cybermedia.co.in
Landline: 0124 482 2222 ext: 219
Mobile: +91 8010757100

LAST MATTER

Shrikanth G
shrikanthg@cybermedia.co.in

Low Cost Smartphones:


Scam or Reality?

e can hear most of you saying Cmon give me a break, not


again. Here comes another dirt-cheap smartphone (Does it
Ring a Bell?) from a company no one has ever heard about. The
companys name this time is Docoss and going by other news reports,
this company is based in Jaipur and thats it.
The phone is called X1 and does have impressive specs. Its got a
4-inch IPS display, 2MP rear and 0.3MP camera, 4GB storage and option
to have a 32GB Micro SD Card, 1GB RAM. Its 3G and dual SIM. The OS
is Android Kit Kat.

In the case of DOCOSS X1, it is to be seen how ethical it is in terms of


honoring the bookings and the integrity of the product. For instance industry bodies have debunked these low cost smartphone initiatives and
has openly said that it is very difficult to make a 3G smartphone at such
a low costeven the bare minimal estimate of key components like display, processors et al will come to $30 are `2,000.
The government must act to check the safety standards/business
practices. Clearly, there seems to be a lot of unfair trade practices that
are being followed by these unknown companies.
Lets look at what makes for a good quality mobile phone. The WHO
has identified the ICNIRP and the IEEE as two international bodies that
have developed standards based on detailed assessments of the available scientific evidence. Compliance for mobile phones and other wireless devices intended for close use to the head or body is based on
satisfying a specified Specific Absorption Rate (SAR) limit, stated in units
of watts per kilogram (W/kg). The international limit applicable to mobile
devices and used in most countries is 2 W/kg measured in a mass of 10 g.
Clearly, making a smartphone is not that easy and the consumers must
exercise caution and must not fall prey to it.

Shrikanth G
Associate Editor
74

May 15, 2016

www.dqindia.com

A CyberMedia Publication

UWP Edition
Desktop, tablet, phone, and wearables
become one - and you only have to
code once.

Catapult your applications to new heights with our stunning


visualization, powerful reports, and complete schedulers available
on any Windows 10 device.

-------------------

Manage Reports
and Schedules with Ease

Stunning and
Superior Data Visualization

--------------------------------------------------------------------------Develop Once
and Build Universal Apps

Optimize Your
Visual Studio Experien

UWP Edition is a part of C1Studio.


For complete UWP Experience, Visit
http://www.componentone.com/Studio/Platform/UWP

Sales: 120-2470111
sales.india@grapecity.com

IN STYLE.

Whether youre working out or going out, the new Fitbit Blaze
is about to ignite your everyday fitness routine. With features like
guided workouts, continuous heart rate, call and text alerts, and
interchangeable bands, finding your fit has never looked better.

Licensed to Post WPP. U(SE)26/2016-2017.

Work out. Night out. Stand out.

RNI No. 40432/82. Published on 1st & 15th of every month. DL(S)17/3159/2015-17.
Posting Date: 3&4 and 17&18 of every month. Posted at Lodi Road HPO.

GET FIT.

Вам также может понравиться