1 / 7

Dr. Prasanna Mulgaonkar, CEO

Configuration Management The key to cybersecurity 11th India Security Summit August 31, 2018. New Delhi. INDIA. Dr. Prasanna Mulgaonkar, CEO. www. Cyber Threats Growing Worldwide.

zandra
Télécharger la présentation

Dr. Prasanna Mulgaonkar, CEO

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Configuration Management The key to cybersecurity 11th India Security Summit August 31, 2018. New Delhi. INDIA Dr. Prasanna Mulgaonkar, CEO www

  2. Cyber Threats Growing Worldwide Attacks via ATM machines in over 28 countries for over 2 hours. Losses of over $11.5M, and an additional $2M in fraudulent wire transfers. August 18, 2018 Hackers attacked twice in eight months and made off with over $2.4M. Insurance company refused to cover losses. April 2018 Accenture left a huge trove of highly sensitive data on exposed servers. The four exposed servers had no password, but contained the "keys to the kingdom." October 2017 The names and contact information of 2.2 million Dow Jones & Co. customers, including Wall Street Journal subscribers, were exposed due to a configuration error on a cloud storage server. A Dow Jones spokesman said: "This was due to an internal error, not a hack or attack." July 2017

  3. The Challenge: Security Configuration Management Consistently Comprehensively Continuously Collaboratively

  4. The Solution Proactive Automated Security Configuration Management

  5. Effective Security Management: A Business Enabler Reduce Your Cyber Risk Business Impact Convert your security & compliance budget from a cost center to a profit center • Malware attacks disrupt operations • Regulators shut down business • IP loss is catastrophic • Less capital in reserve • Lower insurance costs • Not dependent on internal skills Lower Your Costs Business Impact • Automation reduces labor costs • Eliminate rework from mistakes • Take advantage of public clouds • Improve your core competence • Convert your capex to opex • Avoid legacy lock-in Improve Productivity Business Impact • Mix and match new technologies • Continue using legacy systems • Empower developers’ speed • Introduce new products & services • Outcompete your competition • Integrate global operations

  6. Cloud Raxak: A Made In India Success Story • Raxak Protect Patent Pending “SaaS” solution dramatically reduces the attack surface, while reducing cost and enabling development • Hardens servers to internationally recognized specifications • Hardens cloud foundations • Integrated with VRealize, AWS, Azure, GCE, Softlayer, Open Stack • Tamper proof method for compliance verification • Developers, Investors, Founders -- all Indian • Extensively tested and deployed in many Indian and worldwide IT installations Together we can make India’s IT driven business thrive, and make your infrastructure safe

  7. THANK YOU! For more information visit www.cloudraxak.com Contact: Dr. Prasanna Mulgaonkar, CEO prasanna@cloudraxak.com

More Related