Redefining Cyber Security in Enterprises

In The News

Cybersecurity and digital forensics are the most crucial segments for any enterprise or startup in the modern-day digital realm. However, not many organizations view cybersecurity as a principal solution, and consequently, their networks are vulnerable to both external and internal threats. As more data, digital solutions, and applications flood the market, it is a cause of concern that how little significance is bestowed on the security features of these developments. According to previous year's global threat analysis, around 700000 cyberattack cases have been registered in India alone. Arguably a big portion of this leniency toward cyber-related threats is due to unawareness and sheer lack of technical expertise as well as appropriate technology tools to efficiently combat threats such as ransomware and data theft.
Bridging this gap to reinforce broader cybersecurity awareness, GCID stands resolutely alongside the law enforcement bodies of the nation as a shield for modern enterprises in the battle against cyber threats. K.S. Santosh Kumar, CEO of GCID says, "Cybersecurity is not limited to monitoring of the network but it means being equipped with a digital forensic setup as a part of all the enterprises."

With a team of seasoned experts, Group Cyber ID Technology (GCID) specializes in mobile phone forensics, computer forensics, cell site mapping and analysis, intelligence and investigations, along with services and solutions in domains of Information Security, Digital Forensics, and Fraud Management. The company helps in the implementation of the best practices in digital forensics, eDiscovery, and cyber defense services.

According to Kumar, cyber security issues not only stem from outside sources, but also from inside the organization. It's significantly riskier if the attack is carried out by an organization's employees as the threat is often times unexpected or unknown. GCID provides an in-depth security, built for these organizations to have their insider threats monitored, right from the time a person enters the office to the time of their exit. "We also help the law enforcement in ensuring that they don't penalize the innocent people, whose names have been misused through fake registry or IDs."

Illustrating one similar case study, Kumar cites the example of an insider attack on Abiba Systems. An individual from another company joined Abiba and leaked all their data through an internally built honeypot within Abiba's network. Any new applications or solutions being updated on the network were being sent out to another external server that was run by this individual that eventually allowed the rival organization to gain a competitive edge against Abiba without any investment or research. After Abiba sought GCID's help to analyze the situation, the culprit was discovered to be an ex-employee who orchestrated the entire data theft along with the help of some internal employees in the coding team. After a thorough forensics performed on Abiba's systems, the company was able to track down all the members who were involved in the act by analyzing their chat messages. Thereafter, GCIDT built a robust cybersecurity solution with the help of their Blue Live product that enabled Abiba with exceptional visibility to prevent any such attack further in the future.

GCID is constantly focused on adding technological enhancements to its array of solutions and delivering them to multiple organizations across the world. The company plans to expand its reach to the markets of Israel and the U.S. with a more established presence in other cities of India. "Our business is growing rapidly within the country. In Fact, by the end of March 2019, we are looking at substantial billing revenue coming our way, in terms of services alone,".
Top 10 Enterprise Security Consulting/Services
Companies in APAC - 2018

Company Management Description
AIP Risk Consulting Singapore aipris kconsulting.com Isaach Choong Managing Director Offers global security and risk consulting services to assist clients to develop resilience to security risk and business risk for their assets, infrastructure, facilities, organisations and personnel
Akamai Cambridge, MA akamai.com Dr. Tom Leighton Co-founder and CEO Provides a portfolio of edge security, web and mobile performance, enterprise access and video-delivery solutions.
BlueSky Professional Services Hong Kong blueskysvc.com Matthew Hum CTO and Principal Consultant Offers best-in-class security management services and solutions
GCIDT Karnataka, India gcidt.com K.S. Santosh Kumar (CEO). Provides best practices in digital forensics, eDiscovery, cyber defense services, and fraud management.
LSA Consultants Singapore Isaconsultants.com Max Goh Co-founder and MD Aiding companies to develop, implement, test, and audit their management systems to a compliant standard ready for certification
McAfee Santa Clara, CA mcafee.com Chris Young CEO Provides device-to-cloud security that's open, proactive, and intelligence-driven
Mobilelron Mountain View, CA mobileiron.com Simon Biddiscombe President and CEO Enables organizations around the world to embrace mobility as their primary IT platform in order to transform their businesses and increase their competitiveness
NETSCOUT Westford, MA netscout.com Anil Singhal CEO Offers Adaptive Service Intelligence (ASI) technology that continuously monitors the service delivery environment to identify performance issues and provides insight into network-based security threats
SwiftSafe Glenroy, Victoria, Australia swift-safe.com Akhil Rapelli Information Technology Security Analyst & CTO Evaluates existing IT infrastructure to develop customized cyber security strategies depending on clients' data security needs
Tindo Singapore tindogroup.com Terence Siau CEO and Co-Founder Barney Chan CTO and Co-Founder Renders cybersecurity solutions and services to help its clients in eradicating the security infrastructure challenges

The role of an enterprise security manager in today's connected world has become more challenging than ever before. Even an unpretentious-looking email can turn into a potent attack vector, rendering the company's entire infrastructure inoperative. Last year's high-impacting DDoS attacks are only considered to be precursors for larger and more advanced cyberattacks. In light of this, security practitioners are constantly striving to decipher the probable points of vulnerability that causes these security breaches and catalyze the development of effective solutions.

The growing consensus among business leaders to adopt attribute-based access control (ABAC) frameworks will bring more challenges in the form of setting up the system and fine tuning it to suit their specific needs. Several early entrants in the scene have taken to explore the ABAC approach and provide tailored services based on it. Similarly, Al and machine learning will continue to be chief forerunners in redefining the enterprise security posture in the coming years. Utilizing a microservices approach to break down large applications and connecting them via APIs will also emerge as a trend to decentralize the bulk of an application and lessen the potential threat of a complete shutdown through a single attack.

In this edition of CIOReview, we present to you the "Top 10 Enterprise Security Consulting/Services Companies in APAC - 2018," featuring the best services and most competent consulting vendors in the security arena. In the last few months, a distinguished panel, comprising CEOs, CIOs, CISOs, and analysts, including the Enterprise Security Magazine's editorial board reviewed the top companies and shortlisted the ones that are at the forefront of bringing revolutionary changes to the enterprise security domain.