Hot Products

ANT MY ERP Solution for SMEs and MSMEs: Optimizing Business Functions Management

ANT MY ERP guarantees elimination of data duplication and provide data integrity Too many equipment and processes to manage using too many steps, makes it difficult to manage time and business effectively. The best solution to this is automating the entire businesses that can help achieve increased efficiency and profitability. ANT MY ERP, a SaaS

Tech Buzz

ATEN gears up for InfoComm India

ATEN will be participating for the 3rd consecutive year at InfoComm India, being held in NESCO, Mumbai from 18th to 20th September. InfoComm India is one of the leading Pro-AV events in the market. The rising AV network complexity aided by increased number of devices has made it imperative for organizations to opt for intelligent

Power Play

Dell Technologies Cloud Advancements Deliver New Kubernetes Support and Hybrid Cloud Infrastructure Options

Latest Dell EMC and VMware integration supports cloud-native applications and increased choice in consistent hybrid cloud infrastructure Dell Technologies has announced a host of advancements and new options that allow organizations to benefit from Dell Technologies Cloud for both traditional applications and cloud-native environments. More than half of organizations formulating hybrid cloud strategies have cited

Deep Dive

Apple iOS Attack Underscores Importance of Threat Research

By Steve Povolny, Head of Advanced Threat Research at McAfee and Philippe Laulheret, Senior Security Researcher, McAfee Advanced Threat Research The recent discovery of exploit chains targeting Apple iOS is the latest example of how cybercriminals can successfully operate malicious campaigns, undetected, through the use of zero-day vulnerabilities. In this scenario, a threat actor or

Consumers Failing to Embrace AI Benefits, Says Pegasystems

Pegasystems study highlights the need for greater empathy in artificial intelligence systems Consumers lack trust in artificial intelligence (AI) and don’t understand the extent to which it can make their interactions with businesses better and more efficient, according to new research from Pegasystems, the software company empowering digital transformation at the world’s leading enterprises. The

Cloud Hosted Services: Some security considerations

By Nikhil Taneja Managing Director-India, SAARC & Middle East, Radware A multi-cloud approach enables organizations to move application services to various public cloud providers depending on the desired service level and price points. Most organizations will use multiple cloud providers; some in addition to their private cloud and on premise deployments. Multi-cloud subsumes and is

Narayana Provides Affordable and High-Quality Healthcare using Analytics and AI

“How much will the surgery cost?” This is one question that has haunted Dr. Devi Shetty, Founder and Chairman of Narayana Health since he began his practice in 1983. Even today, more than three decades and over 15,000 surgeries later, he dreads the question from his patients. “As healthcare providers, it is important that we

Tenable’s Data Science Innovations Accelerate Vulnerability Prioritization and Remediation

Tenable has announced new Predictive Prioritization capabilities within Tenable.io and Tenable.sc, for vulnerability management in the cloud and on-premises, that accelerate the discovery, prioritization and remediation of vulnerabilities before they are published in the National Vulnerability Database (NVD). Depending on the issuing software vendor, a significant lag may exist between when a vulnerability is publicly

Apple iOS Attack Underscores Importance of Threat Research

By Steve Povolny, Head of Advanced Threat Research at McAfee and Philippe Laulheret, Senior Security Researcher, McAfee Advanced Threat Research The recent discovery of exploit chains targeting Apple iOS is the latest example of how cybercriminals can successfully operate malicious campaigns, undetected, through the use of zero-day vulnerabilities. In this scenario, a threat actor or

Technology

Over a third of SMBs have breached so far in 2019

Small businesses in particular are not taking the proper precautions to prevent threats from happening. According to new research from Kaspersky, roughly 36% of small businesses have been victims of data breaches so far in 2019. While data breaches remain an area of concern for businesses of all sizes, the survey revealed that small businesses

IBM Delivers 100+ SAP S/4HANA Enterprise Transformations

IBM Services leads the way in helping clients accelerate modernization of enterprise systems, with more than 100 clients now live with SAP S/4 HANA IBM has announced it has completed more than 100 successful SAP S/4HANA implementations that are enabling companies to speed up their digital reinventions. As companies look to simplify increasingly complex business

Automation Anywhere acquires Paris-based Klevops

Company introduces new Attended Automation 2.0 Automation Anywhere has announced that it has acquired Klevops, a privately-held company based in Paris. With the acquisition, Automation Anywhere fast forwards the RPA category to Attended Automation 2.0, where managers can easily orchestrate workstreams across a team of employees and bots, driving a higher level of employee productivity

Trend Micro to host discussions around hybrid cloud security at CLOUDSEC India 2019 

Enterprises can adopt new technologies to secure their digital infrastructures and assets CLOUDSEC, the leading global cybersecurity conference, will take place in Mumbai on October 10th, 2019. Hosted by Trend Micro, CLOUDSEC India 2019 provides an avenue for enterprises and organizations to discuss and collectively address issues such as the increasingly complex cyberattacks, shifting IT

Security flaw leaves Android users subject to advanced SMS attacks

Researchers determined that certain Samsung phones are the most vulnerable to this form of phishing attack Check Point Research, the threat intelligence arm of Technologies Ltd., has revealed a security flaw in Samsung, Huawei, LG, Sony and other Android-based phones that leaves users vulnerable to advanced phishing attacks. The affected Android phones use over-the-air (OTA)

Keysight Joins 5G-ACIA to Accelerate Deployment of New Industrial 5G Use Cases

Keysight’s 5G expertise and solution portfolio helps global forum shape 5G in industrial domain Keysight Technologies has announced that the company has joined the 5G Alliance for Connected Industries and Automation (5G-ACIA) to help establish a framework for test and verification that will accelerate deployment of new industrial 5G use cases. 5G technology in industrial

Over a third of SMBs have breached so far in 2019

Small businesses in particular are not taking the proper precautions to prevent threats from happening. According to new research from Kaspersky, roughly 36% of small businesses have been victims of data breaches so far in 2019. While data breaches remain an area of concern for businesses of all sizes, the survey revealed that small businesses

CEO Vision

CFO Perspective

Grameenphone Appoints Jens Becker as the New CFO

Grameenphone has appointed Jens Becker as the new Chief Financial Officer (CFO) of the company, effective from August 15, 2019. He will be replacing Karl Erik Broten. Jens Becker has been serving as CFO of T-Mobile Poland. Previously, he was the CFO at T-Online International AG. He has over 20 years of experience in Deutsche

CISO Outlook

Cloud is safer than on-premise, but not without security 

Nominet has announced its Cybersecurity and the Cloud research, according to which 61% of security professionals believe the risk of a security breach is the same or lower in cloud environments compared to on-premise. The research, surveying nearly 300 UK and US C-level security professionals, marks a tipping point in the perception of security of the

Top