Sunteți pe pagina 1din 56

McAfee now a standalone company

Ricoh launches two models of Color MFP





Digitisation and Role of IoT for
Next Generation Enterprise
Thursday, 25th May 2017, New Delhi

VOLUME XVIII ISSUE 08 APRIL 2017 PRICE Rs. 50

www.varindia.com April 2017 1


Huawei SD-DC Distributed Cloud Data Center Solution
meets dynamic data demands

For business enquiries, e-mail us at web-ebg@huawei.com

2 April 2017 www.varindia.com


IBM partners with Red Hat Infosys wins Cloud Elite Status in OPN

CSR Summit &


Awards 2017
Thursday, 25th May 2017, New Delhi

Topic:
CSR @ Inclusive Development

VOLUME XVIII ISSUE 08 APRIL 2017 PRICE Rs. 50 SUBSCRIPTION COPY NOT FOR SALE

GST A big game-changer for the economy 40pg

Flipkart acquires
eBay India
T encent, eBay and Microsoft have
made investments aggregating
to $1.4 billion in Flipkart to acquire eBay
India. The latest funding round from the
three global technology giants, at a post-
transaction valuation of $11.6 billion, adds
to an existing group of marquee investors
that include Tiger Global Management,
Naspers Group, Accel Partners and DST
Global.
We are
delighted that
Tencent, eBay
and Microsoft
all innovation
powerhouses have chosen to partner
with us on their India journey. We have
chosen these partners based on their long
histories of pioneering industries, and the
unique expertise and insights each of them
bring to Flipkart, Sachin Bansal and Binny
Bansal, founders of Flipkart.
The investment by eBay is accompanied
by a strategic commercial agreement with
Flipkart.

Keysight to acquire
Ixia for $1.6 Billion
K eysight Technologies has decided
to buy U.S. data technology
company Ixia for about $1.6 billion in cash
in a bid to increase its software and security
portfolio. The deal comes as the increasing
volume of data
traffic flowing
t h r o u g h
social media,
smartphones and cloud computing tests the
resilience and integrity of networks, making
Ixia's equipment and applications more

popular with its clients and coveted by its  

     


peers.
Ixia's customers include Cisco Systems
Inc., Santa Rosa, California-based Keysight
spun off from life sciences manufacturer
Agilent Technologies in 2014. Ixia would
be its largest acquisition since it bought
Britain's Anite Plc.

www.varindia.com April 2017 3


Optimal Tiered Storage Solution

QNAP TVS-x82T Series


Thunderbolt NAS
Tiered storage | Application-based partitioning | Network traffic distribution

TVS-882T

DDR4 2133
Max 32GB RAM UltraHD

10GbE M.2
Built-in 2 x M.2 Slots

Thunderbolt 2 DAS, NAS, iSCSI SAN Application-based Partitioning for


triple solution optimized throughput
The TVS-x82T Series combines direct attached storage (DAS), The TVS-x82T series fully supports three types of storage
network attached storage (NAS), and iSCSI-SAN into one. The media: M.2, SSD, and SATA hard drives that can be configured
TVS-x82T Series features Thunderbolt 2 technology and dual as independent partitions for different applications, ensuring
10 GbE ports built-in to deliver incredible performance. the optimum throughput level for each application.

Tiered Storage for optimal storage efficiency Network Traffic Distribution for network
resources enhancement
QNAP's Qtier Technology empowers the TVS-x82T series with The TVS-x82T series has four built-in Gigabit Ethernet ports and
Auto Tiering to improve performance and utilization of your two built-in 10 Gigabit Ethernet ports enabling applications to
entire storage infrastructure across M.2 SSD, SSD, PCIe NVMe use dedicated interfaces for ideal network traffic management
SSD, and SATA. and distribution.

TVS-682T TVS-882T TVS-1282T

QNAP Systems Inc., (INDIA) | indiasales@qnap.com


Copyright 2017 QNAP Systems, Inc. All rights reserved. Challam Towers, New No. 113, Dr. Radha Krishan Salai Road,
4 April 2017 www.varindia.com
https://www.qnap.com/en-in/ Myalpore, Chennai - 600 004 Tamil Nadu
Great Products, Great Partners

Prama Hikvision India Pvt. Ltd. www.hikvisionindia.com


H.O.Office #1-4, 2nd Floor, Siddhivinayak Arcade,Akurli Cross Road No.1,
Near Kandivali East Station (Fatak), Kandivali East, Mumbai 400101, India.
Tel: +91-22-28469900 / +91-22-28469953 Tech Support Customer Care Toll Free Tech Support
Email: marcom@pramahikvision.com, sales@pramahikvision.com +91 22 28469999 +91 22 28469977 1800 222 699

www.varindia.com April 2017 5


HELLO INDIA

Indias internet economy is expected


to double by 2020
.. but information security is at risk
I nnovation is what leads to sustainability, and sustainable growth in the current entrepreneurship ecosystem
will enable India to chart its own success story. In the present scenario, India is the second-highest country
in terms of Mobile Internet users with ~391 million users. This is expected to grow rapidly to ~650 million
Mobile Internet users by 2020. At the same time, data consumption by 2020 could potentially increase 1014
times, resulting in a clear roadmap for $250-billion Digital Volcano by 2020.
E-commerce and financial services are projected to lead this growth. Resultantly, digital economy will have
a much broader influence beyond the direct economic impact. Digital adoption has started delivering several
citizen-centric social benefits like enhancing ease of doing business, improving access to services and products
and transforming governance. As the new digital paradigm emerges, adapting to change will become critical, but
at the same time dynamic changes in the technology landscape, led by digitization, are creating opportunities for
cybercriminals.
It is an absolute fact that digitization is happening everywhere, virtually to every business in every industry.
When we talk about the security aspect, we always say it is not a matter of if , rather when you will be hacked. Well when
it comes to Digital, it too is not a matter of it will happen. Cybersecurity threats have become more complex, targeted and
persistent, modern cyber defences require proactive security operations run by highly trained staff with the experience and
expertise to detect and disrupt sophisticated threats.
In the result, digitization brings new risks for cyber-attacks. Cybersecurity in the Digital Economy is the bridge that
connects Digital Innovation to business growth enablement. This opens a new door for cybersecurity experts that has grown
three times faster than any other IT job role, and training a cybersecurity workforce is a priority for many organizations. This
has created a situation of constant risk for organizations not seen at any point in our lifetime. As we increase our connectivity
and create new services, we dramatically expand the attack surface. The question is over recorded 50,300 cybersecurity
incidents like phishing, website intrusions and defacements, virus and DDOS attacks which were observed in the country during 2016. Lack of strong
cybersecurity strategy can impact organizations innovation and growth because it hinders development of digital offerings and business models.
Lastly, security is in top of mind for the enterprises today, and increasingly, at their board level. Cybersecurity in the Digital Economy is the bridge
that connects Digital Innovation to Business growth enablement and security for the Digital Economy must take a top-down strategic approach, heavily
influenced at the board level and driven by the C-suite.

6 April 2017 www.varindia.com


www.varindia.com April 2017 7
CONTENTS
Website: www.varindia.com

Publisher: Deepak Kumar Sahu


Editor: S Mohini Ratna
Executive Editor: Dr. Vijay Anand
Copy Editor: C. M. Dutta
Consulting Editor: Pravin Prashant
Deputy Editor: Samrita Baruah
Sub - Editor: Aparna Mullick
Art Director: Rakesh Kumar
Network Administrator: Ashok Kumar Singh
Manager-IT: Subhash Mohanta
Manager-SEO: Bidyadhar Behera

BUSINESS:
Commercial Manager: Amit Kumar Jha
Sr. Marketing Manager: Ashok Ranjan Dash
Circulation Executive: Manish Kumar
Marketing Manager: Dipendra Kumar

CORPORATE OFFICE: 40pg


VAR House, A-84A/3 Rose Apartment, Paryavaran
complex, Ignou Road, New Delhi - 110030
Tel: 011-41656383, 46061809 VAR CORPORATE 51| Konnect Insights helps build brand
Email: edit@varindia.com image in digital media

Bangalore: Bureau office 28| Cisco India: Will Five Pronged


Marketing Manager: S. Kamala kar Cybersecurity Strategy Work? VAR MOBILITY
Correspondent: L. G. Swami 53| Lenovo partners Govt. of
D-103 G.F., Ashish JK Apartments
Maharashtra for Village Social 48| Samsung ties up with Amazon
Thubarahalli Extended Road India over C7 Pro
Bangaluru- 560066 Transformation Mission
Tel: 080-49530399 | Mobile:09886280836 49| 4G connections to reach 41% by
E-mail: kamlakar@varindia.com TECHNOMANIA 2020
Mumbai: Bureau office
Regional Manager (West): Anil Kumar
38| Israel ready to be the Cyber VAR SECURITY
Sr. Correspondent: Mamta S.
Anurag Residency, 203 - B Wing, Plot No-5, Security partner to India
Sector-9, Kamothe, Navi Mumbai-410 209 52| Network Access Control in Mobility
Tel: 022-65561292, Mobile: 08108017479
TAIWAN EXCELLENCE Era
E-mail: anil@varindia.com, mamta@varindia.com
Chennai: Bureau office
Branch Manager: M.S. Barani 26| Asus the quest for excellence
Door. No.8, Plot No.-837,89th Street, and innovation continues
13th Sector, K.K.Nagar, Chennai - 600 078
Mobile: 09444077065
E-mail: barani@varindia.com
COVER STORY
Hyderabad: Bureau office
Branch Manager: Sunil Kumar
B 383 HAL Colony, Balanagar 40| GST A big game-changer for
HYDERBAD, Telengana - 500042 the economy
Tel: 040-32989844/ Cell No. 08100298033
E-mail: sunil@varindia.com
Kolkata: Bureau office
LEAD STORY
Marketing Officer: Sunil Kumar
Correspondent: Kiran Kumar 30| Security going beyond traditional
67 Sarada Park, Garia, Kolkata - 700084
Mobile: 08100298033, E-mail: sunil@varindia.com
parameters REGULARS
Mobile: 09903088480, E-mail: kiran@varindia.com
VAR SPECIAL Round About 10
Printed and Published by Deepak Kumar Sahu on behalf of
M/s. Kalinga Digital Media Pvt. Ltd. and Printed at Pushpak Hot Bytes 12, 14
Press Pvt. Ltd. Shed No. 203 - 204, DSIDC Complex, Okhla
24| Digital Payment: Making BHIM a
Industrial Area, Phase-I, New Delhi-110020 and Published at Mass Movement On the Ramp 16, 18
A-84A/3 Rose Apartment, Paryavaran complex, Ignou Road,
New Delhi - 110030, Editor - S Mohini Ratna. Voice N Data 20
For Subscription queries contact: info@varindia.com FACE TO FACE Channel Buzz 22
Subscription: Rs. 500(12 issues)Rs. 1000 (24 issues)
27| F5 intends to address bottlenecks Movers & Shakers 54
All payments favouring:
KALINGA DIGITAL MEDIA PVT LTD in an app-centric world Product of the month 25 | 45
All rights are reserved. No part of this magazine may be 39| Canon keen to promote photo
reproduced or copied in any form or by any means without
the prior written permission of the publisher. (1999-2016)
culture in India
46| GST to help government run a
* All disputes are subject to the exclusive jurisdiction of
competent courts and forums in Delhi only.
legitimate economy

8 April 2017 www.varindia.com


www.varindia.com April 2017 9
ROUND ABOUT

Data Mining & Analytics Do They


Rewrite the IT Landscape?
T here are two phraseologies which you may be hearing more
frequently these days in meetings and seminars directly or remotely
connected with information technology. Why I said more often because in
earlier times, these jargons were seldom used.
Let me explain the context in which I hear such jargons. In a serious
discussion on healthcare, I heard from a college professor from an Ivy
League University in the U.S. talk how data mining and analytics are used
to find the trend of diseases in certain countries specific to that area. The
professor elaborated that in a country like Finland, where type 1 diabetes
is very common, particularly among the juveniles. There was a concerted
effort to data mine to find out the possible reasons. One conclusive
correlation between juvenile diabetes and lack of vitamin D, which is
grossly insufficient in a cold country like Finland, was established.
Hardly is there any segment revolutionized by technology as healthcare
is. It may be in a relative sense since the perception is that healthcare is
something that revolves around doctors, hospitals, diagnostics and the
patients interfaces with them individually or collectively. That concept has
gone for a toss. For instance, medical experts are of the view that for cases
that can be treated at the primary healthcare centres need not have to be
through the hospital and the patient need not have to meet the doctors in
person. The interface or consultations with the doctor and patient can take
place in the virtual medium, wherein the doctors can attend to patients
through the virtual medium with the help of a trained nurse, even if the
doctors sit hundreds of miles away. Technology platforms now available
can make healthcare both affordable and accessible. Moreover, the patients
need not have to travel huge distances to get the consultations done. Yes,
technology has made steady strides.
Data analytics is finding acceptability in every sphere of life, even in other countries. It can also instruct the central banks to pursue differing
criminology. Research is being done to find out the genes that make people monetary policies suitable to each situation. In the fiscal administration, a
more prone to criminal activity. If the exact reasons are found out, it may country can gauge the impact of a fiscal levy before it is being imposed by
become possible for the clinicians and genetic engineers to reverse such going through data collated for other countries. What I am trying to drive
trends. Does it mean that the world is moving towards a state that can nip home is that it is possible to find trends that can be extrapolated to arrive
the faulty genes in the bud itself and that way moving towards an orderly at specific conclusions.
society free from all vices. It may sound Utopian now. But who knows it Have we given enough focus to data mining and analytics in our overhaul
may be a possibility in the near future. Through data mining, experts are of of IT policy? I suspect not. There are reasons to believe. Just to imagine that
the view that the DNA that causes ageing can be found out. Should it mean this is an area where start-ups can proliferate is a simplistic inference. Data
youthfulness and agility become disengaged with the process of ageing? mining and analytics fall under the purview of R&D. It is a capital-intensive
Not many know that data mining and analytics in the genome are venture, where huge investments are required. A start-up entrepreneur
emerging as frontier businesses for many IT firms. There are some seldom finds such resources. There should be government funding and
factors that helped such enterprises to come up in India. Foremost is the support for such efforts. Also, there should be greater government, industry
US Supreme Court decision which was pronounced in 2013 in the case and academia tie-ups to foster such costly research. There can be a high
of Myriad Genetics Inc., wherein the court has maintained that natural financial risk involved. Even after years of research, breakthrough results
human genes cannot be patented since it is a product of nature. It said may elude. There can be many alternative proposals that can be thought of
that genome is a basic tool of scientific and technological work and it is in this regard, such as joint research where there can be an investor from
beyond the domain of patent protection. But the court also maintained that outside for meeting the initial cost with an understanding that the outcome
synthetic genetic material, such as clones, can be patented, since billions of can be jointly patented. The other alternative is selling the R&D efforts to
dollars are involved in the research and it should be recouped. Also, the an industry, after it has reached a certain degree of maturity and certainty.
process through which the genome has been discovered can be patented as While we move towards a system that connects with digital economy,
a process patent. from birth to death, what system we have to protect the data and prevent
There are many genome research outfits coming up in India also, while others peeping into our private life. This is a question, which everyone is
in countries like the U.S. and the U.K. they occupy an important position asking. In India, we have heard about Aadhaar data being compromised
in the corporate ladder. Some of them have listed in the stock exchange by the vested interests. There are sporadic complaints being raised by
in anticipation of huge surge in their fortunes once they struck with some the politicians and others about the electronic voting equipment being
landmark discoveries. More than commercial connotations, the research compromised or which can be tampered with human interventions, so
findings of these companies will unravel several mysteries about genetics, much so that the Supreme Court of India has made it mandatory to have
causes for mutation and even prevention of such mutations, saving the a parallel system of digital voting and the conventional method of voting,
humanity from the double whammy of pain and financial loses. wherein the ballot paper generated by the machine has to be dropped in
There is scope for using data analytics in fields like economics, the ballot box. In the U.S., we hear about how Russians had influenced
sociology, and law. For instance, the central bank of a country can easily the recent election and that scandal is refusing to die down. How do we
evolve a solution to an economic ill by looking at the trends, as obtained face this challenge? The way out is embellishing the cybersecurity systems,
earlier. With the help of huge data stored, the trends of the inflation can wherein there should be foolproof devices that can prevent hacking or
be found over the years and what measures that helped in bringing down manipulation. Happily, this is also a multibillon industry, where India can
the prices. The policy-makers also can scan through the data stored for have its legitimate pie. n

10 April 2017 www.varindia.com


www.varindia.com April 2017 11
HOT BYTES

MSDE partners with BYST to boost Snapdeal ties Tableau presents New
skill-based entrepreneurship up with AP Subscription Pricing
The Ministry of
Skill Development
seeks to provide mentor
development services to Government T ableau
announced
has they need to budget and
plan deployments.
and Entrepreneurship
(MSDE) has signed an
the officials suggested by
the ministry for promoting S napdeal has entered
into partnership with
University of California,
subscription pricing for all
of its products, including
Tableau Desktop, Tableau
Many customers
have told us they prefer to
purchase software through a
Berkeley for the Andhra Server and Tableau Online. subscription model to more
Pradesh Governments The pricing model reduces easily access the products
Smart Village Project. the initial expense to deploy they want, reduce upfront
With the objective of best-in-class business expenses and increase
discovering economical intelligence, enabling flexibility, said Adam
and infrastructural barriers customers to access the full Selipsky, President & CEO,
faced by artisans in these value of Tableaus award- Tableau. We have always
villages, UC Berkeley and winning platform and been driven by the success
Snapdeal are aiming to frequent product updates of our customers, and
MoU with Bhartiya Yuva and setting up micro and create viable solutions without purchasing a with subscription pricing
Shakti Trust (BYST). The rural businesses. At BYST, through digitization and perpetual software licence. well be even more aligned
MoU will help nurture the the mentors share the new-age services. With Tableaus subscription with our customers needs
underprivileged residing experience in an advisory Vishal Chadha, SVP, offerings, organizations and further committed to
in the rural hinterlands, capacity and suggest Business Team, said, We of all sizes have the earning their business every
and assist them to become potential areas of market. are proud to partner with predictability and flexibility year.
entrepreneurs through Mentoring in a way opens
effective mentorship. wider vistas to the budding
the Government of Andhra
Pradesh and UC Berkeley,
McAfee now a standalone company
The collaboration

D-Link to amplify SI engagement


businessman.
enabling digital access
and generating a world of M cAfee
announced that
has

it has begun operating as a


operational and technology
resources. With the help
of its new investment
commercial opportunities
standalone company. As a partners, McAfee will apply
through its partner portal for small artisans. Working
with a vibrant base of
standalone business, it will greater market focus, build

D -Link has programs. The company expand upon its leading its platform and target new
3 lakh sellers of various
continued to has also introduced an security solutions platform financial, operational and
sizes, we continue to drive
enhance its focus on exclusive D-Link Partner to better enable customers technology investments
inclusive growth and in-
enterprise business segment Program for its registered to effectively identify and to better address the
sync development." orchestrate responses to
for the year 2017 with users on the website. In cybersecurity markets
renewed business strategy. cyber-threats. significant global growth
D-Link plans to amplify its
addition to partner program,
D-Link will be announcing Pune Police The launch of McAfee opportunity. Intel Senior
engagement with System schemes/ offers for its marks the closing of the Vice- President and General
Integrators (SI) through system integrators at regular adopts previously announced Manager Chris Young will
D-Link partner portal. interval along with a host investment by TPG and lead the new McAfee as
The core objective of of other benefits. D-Link WorkApps Chat Intel Corporation (INTC) Chief Executive Officer.
D-Link partner portal is to
empower System Integrators
on the latest advancements
at present has 3000 plus
registered System Integrators
on its partner portal and is
P une Police has
become the first
government body to join
to establish a pure-play
cybersecurity company with
access to significant capital,
TPG Partner Bryan Taylor
has been named Chairman
of the Board.
in networking domain looking at strengthening its the wave of organizations
via Webinars & training user base this year. moving to Dedicated and Intel announces initiatives to
Secure Chat Applications
Silicon Power aims at building a for better, faster and secure accelerate AI in the country
strong brand in Indian market
communication between
internal teams. With I ntel India has hosted
its first AI Day
where the government, the
Program,
at educating
scientists,
targeted
15,000
developers,

S P/ Silicon Power mobile devices becoming


the primary source of industry, and the academia analysts, and engineers
has welcomed Ajay congregated to discuss the on key AI technologies,
Kogta to its international communication, Public
Chat Applications pose potential of accelerating including Deep Learning
sales team. With its latest the AI revolution in the and Machine Learning.
hire, the Taiwan-based a threat for government
country. The company Through 60 programs
company aims at building bodies as they are neither in
deep dived into across the year,
sustainable sales and service control of the government,
its global AI ranging from
operations in India and is We are very excited about nor is their data hosted in
strategy, and workshops,
excited to have Kogta on the Governments Make- India.
also highlighted roadshows, user
board. As part of its long- in-India initiative and Rashmi Shulka, IPS,
how it is group and senior
term commitment towards would like to be a part of Commissioner of Police, working with technology
the Indian market, Silicon it. Starting from USB flash Pune, said, Speed of the ecosystem l e a d e r
Power has plans to set up drives and power banks, information and its security in India to improve solution roundtables, the initiative
two RMA centers in India we will gradually increase are emerging as the key performances on Intels AI aims at empowering this
the first one in Bangalore, our local manufacturing of factors of efficient policing. platforms. community with the know-
followed by Delhi. other products, explains Information needs to Intel India how for adoption of AI via
For our mission to Kogta. By the end of 2018, be communicated on a has announced a technical sessions involving
be successful, it is crucial SP intends to have a local real-time basis and to the comprehensive developer the use of ready-to-deploy
that we can offer an in- Indian team of 810 head right officers for prompt community initiative the platforms and tools for
country solution for RMA. counts, added Kogta. action." AI Developer Education solution development.

12 April 2017 www.varindia.com


AVAILABILITY for the Always-On Enterprise TM

Veeam makes
the Fortune 500
Available.
24.7.365
To enable its Digital Transformation, 70% of the Fortune 500 rely
on Veeam to ensure Availability of all data and applications. 24 . 7. 365

Learn CIO insights on Veeam.com/availability

www.varindia.com April 2017 13


HOT BYTES

Google and MEITY to HCL signs Infosys wins Cloud Elite


empower citizens MoU with Status in OPN
of
G oogle India and
the
Electronics
Ministry
and
Government I nfosys has achieved
Cloud Elite status in
the Oracle PartnerNetwork
centers of excellence
(COE), industry-specific
solutions, co-development
Information Technology of AP (OPN). With this initiatives, and RapidStart
(MEITY) have announced
a set of initiatives aimed
at empowering citizens
S hri Chandrababu
Naidu, Honble
Chief Minister of Andhra
designation, Infosys is
well positioned to help
customers achieve cloud
Methodology that delivered
as much as 30-per cent
reduction in effort and
Secretary, and Rajan
and creating abundant Anandan, VP, SEA and Pradesh, and Shiv Nadar, transformation, and provide cost, Infosys has a very
opportunities for all. India, Google. Founder & Chairman, HCL sophisticated capabilities strong value proposition to
Some key areas outlined Aruna Sundarajan, & Shiv Nadar Foundation, and next-generation give clients an unparalleled
as part of this initiative Secretary, MEITY, said, signed an MoU to open a services on Oracle Cloud. competitive advantage.
include enabling a safe and MEITY intends to give state-of-the-art Global IT With strategic specialization This new dimension of the
secure digital payments impetus to the Honble Development and Training and training programs, partnership gives an added
experience, imparting Prime Ministers recent Centre at Vijayawada. The innovative joint solutions, impetus to the commitment
digital skills for artisans and call for a 'New India'. ceremony was attended by and a clearly defined and engagement for
Android skills training for Collaboration with Google senior government officials solutions roadmap, Infosys next-generation services
students and developers. will be hugely beneficial in and the leadership team of Cloud Elite status will on Oracle Cloud and
The announcements were harnessing the capabilities HCL. help clients derive better provides greater value
made in New Delhi by for the India growth HCL aims to hire, business value. to our clients through
Aruna Sundarajan, MEITY story. employ and train 5,000 With multiple solutions higher specialization and
local residents in the region on the Oracle Cloud innovative co-developed
with a plan to leverage a
IBM partners with Red Hat gender equal workforce.
Marketplace, dedicated solutions.

I BM and Red Hat


have announced
a strategic collaboration
OpenStack Platform and
Red Hat Ceph Storage on
IBM Private Cloud when
The selected candidates will
undergo a rigorous training
program by industry
A2B Internet acquires Juniper
designed to help the offering launches experts on skills required Networks' vMX Virtual Routers
J
enterprises benefit from for general availability at for working for global uniper Networks internet service providers,
the OpenStack platforms the end of March 2017. customers of HCL. The and A2B Internet web, cloud, hosting and
speed and economics Red Hat Cloud Access centre will also work on have announced that A2B enterprise companies.
while more easily will be available for IBM developing innovative high- Internet has selected Juniper The previous solution
extending their existing Cloud by the end of Q2 end technologies. Networks vMX Virtual was no longer able to
Red Hat virtualized and 2017, allowing Red Hat Routers as the first Virtual meet the growing scale
cloud workloads to the
IBM Private Cloud.
customers to move eligible,
unused Red Hat Enterprise
Spice Digital to Network Function (VNF) of A2B Internet's data
for its next-generation connections. Convergence
IBM has become a Red
Hat Certified Cloud and
Linux subscriptions from
their data center to a
become a GST network platform. This time was also critical for
architecture will enable the provider. When a link
Service Provider, giving public, virtualized cloud
Suvidha Provider A2B Internet to deliver fails or changes, each router

S
clients greater confidence environment in IBM Cloud new agile and automated must rapidly recompute
pice Digital has
that they can use Red Hat Data Centers worldwide. services for its customers. and update its routing
become one of the
GST Suvidha Providers A2B Internet also tables. Juniper Networks
VMware works towards enabling (GSPs) and soon to provide improved monitoring and vMX was selected for its
comprehensive tax-related management capabilities by fast convergence times
emerging businesses in India services to taxpayers. After deploying vMX. and its rich set of routing
VMware is expanding tailor-made solutions will signing the agreement, A2B Internet provides features and automation
its reach to emerging empower them to protect Spice Digital will now offer connectivity solutions to capabilities.
businesses in cities in their IT infrastructure as seamless integration to
India. With the expansion they evolve to support ASPs, Corporates, MSME, CA Technologies buys
rollout, VMware will also their business initiatives. TRPs with the GSTN
focus on the cities like At VMware, we work network to enable the Veracode for $614 million
C
Jaipur, Vizag, Nagpur, towards enabling emerging businesses to be compliant A Technologies
Goa, Bhubaneswar, businesses by empowering with the Goods and has announced
Services Tax (GST). that it has completed the
GSTN has selected acquisition of Veracode.
Spice Digital to be the GSP. The acquisition establishes
As the GST constitutional CA Technologies as a leader
Guwahati, Cochin, them to optimize their amendment having been in the Secure DevOps
Coimbatore, Ludhiana businesses through their promulgated by the market, bridges its Security Veracode business in
and Chandigarh to enable limited resources and Government of India, the business with its broad the companys product
emerging businesses to enabling them to evolve much- awaited GST Bill DevOps portfolio and development organization
overcome IT challenges. the infrastructure from will play a very important adds to its growing SaaS reporting to Ayman Sayed,
With businesses facing within, said Sundar and strategic role. Being business. CA President and Chief
major challenges of Balasubramanian, senior able to provide impeccable With the completion Product Officer.
accessing IT resources director, General Business fintech services, SDL has of the transaction, Bob Under the terms of the
and applications while (Commercial Sales & got the expertise to manage Brennan, former Chief agreement, the transaction
managing complex work Partners), VMware on the companies which pay big Executive Officer, is now is valued at approximately
environments, VMwares expansion plans. revenue taxes. general manager of the $614 million in cash.

14 April 2017 www.varindia.com


www.varindia.com March 2017 23
ON THE RAMP

Xerox unveils Versant 3100 Ixia extends Twitter Lite launched in India
and Versant 180 Presses delivery of along with Vodafone
X erox India has
launched Xerox
Versant 180, Versant 180
visibility to T witter has launched
its global Twitter
Lite product from India,
Performance Package and Public Cloud reinforcing its commitment
Versant 3100 presses at the
Print Miracle 2017. The
launched mid-production
I
extended
xia has announced
that it has further
the reach
to the country as a strategic
mobile and social media
market worldwide. Twitter
as app-like performance
such as a wide range of
push notifications and
Versant family has already
colour presses consist established a merit in delivered by the CloudLens Lite is a mobile web offline support.
of a unique combination productivity, automation Platform to the public experience accessible to Maya Hari, Managing
of higher image quality, and media flexibility. It has cloud. CloudLens Public anyone with a smartphone Director, Twitter Asia-
greater media latitude seen a great response in the provides Visibility-as-a- or tablet with a browser, Pacific, said, India today
and higher duty cycles for market and we are looking Service (VaaS) and is the optimized for speed with is already one of Twitters
more productivity and forward to sustaining the first to be implemented up to 30% faster launch largest and fastest-growing
performances. momentum for this year as as a pure Software-as-a- times, reduces data usage audience markets worldwide
Balaji Rajagopalan, well. The newly-launched Service (SaaS) solution. It is up to 70% with data saver and weve seen significant
Executive Director, presses will achieve a new designed from the ground mode turned on, and takes usage around key moments
Technology, Channels & standard of image quality up to retain the benefits up less than 1MB on mobile in the Indian society such as
International Distributor by delivering four times of the cloud elastic devices. Of course, Twitter the recent State Elections,
Operations, Xerox more pixels than other scale, flexibility, and agility. Lite still provides the key Union Budget, and the Jio
India, said, The Xerox presses. CloudLens Public provides features of Twitter as well Film Fare Awards."
intelligent and automated
Trend Micro protects visibility as a service that
scales with public cloud Honeywell unveils SMX Solution
against Cerber threats infrastructures.
Access to application for secure use of USB Devices
T rend Micro through
its multi-layered
approach, will help protect
endpoint security solutions
like Trend Micro Smart
Protection Suites, and
and network data in
cloud environments is H oneywell Process
Solutions (HPS)
has announced a new
critical for security and
against the new variants of Worry-Free Business monitoring tools to ensure solution for industrial sites
Cerber threats, which are Security to protect users the reliability, security, and as they balance productivity
causing disruption across and businesses from performance of mission- and cyber security demands.
the gateway, endpoints, the threats by detecting critical applications. Honeywells Secure Media
networks, and servers of malicious files, spammed Exchange (SMX) protects
enterprises. The Cerber
family of ransomware has
messages and to block all
related malicious URLs. DIGISOL unveils facilities against current
and emerging USB-borne
in and check devices for
approved use in the facility.
adopted a new technique
to make itself harder to
Trend Micro OfficeScan
with XGen endpoint DG-FS1005PF- threats, without the need
for complex procedures
Contractors check-in
their USB drive by plugging
detect, using a new loader
that is designed to evade
security infuses high-
fidelity machine learning 20 Switch or restrictions that impact
operations or industrial
it into an SMX Intelligence
Gateway. The ruggedized
detection by machine
learning solutions.
with other detection
technologies and global D IGISOL
launched
4-port Fast Ethernet PoE
has
its
personnel.
Honeywells SMX
industrial device analyzes
files using a variety of
"Users should avoid threat intelligence, said provides hassle-free, multi- techniques included with
relying on any single Nilesh Jain, Country unmanaged switch with Honeywells Advanced
layered protection for
approach to security. We, Manager (India and one single mode fiber Threat Intelligence
managing USB security,
at Trend Micro, provide SAARC), Trend Micro. port designed to enhance Exchange (ATIX).
letting users simply plug
network performance in a

BPE launches GTC Series Level compact form factor. The


switch has a sturdy and Epson unveils four models
UPS power supply system compact desktop design.
Thus, the DG-FS1005PF- of InkTank Printers
B
series
PE has launched
GT
LEVEL
challenger
UPS.
20 is an ideal solution for
small Ethernet workgroups
and applications requiring
E pson has launched
four new models
of InkTank printers with
It is a modular, three- PoE along with long- advanced features. The new 18 Paise for color in the
phase, double conversion distance fiber Connectivity. multifunction L361, L380, market. The L380, L385
uninterruptible power The DG-FS1005PF- L385 and L485 printers
to be reliable, efficient, and L485 InkTank printers
supply system which 20 switch offers 4x10/100 will complement Epsons
and scalable. Our latest bring superior performance
provides operating Mbps Fast Ethernet ports current range of highly
addition, GTC series and reliable quality, at
efficiencies as high as 96.5 with Power over Ethernet successful InkTank printers
LEVEL UPS is ideal for improved printing speeds
percent even at half load. support. These PoE ports to provide added value for
all sizes of industrial power of 10 ipm for black and
The GTC series LEVEL are IEEE 802.3af compliant customers.
requirements looking to white, and 5.0 ipm in color.
UPS covers power ranges and can supply up to 15.4 The new models offer
achieve lower costs and All the new printers offer
from 120 kVA to 800 kVA. watt per port. The existing ultra-high page yields of
savings on operational a warranty of one year or
"We are always looking Ethernet cables can be used 7,500 pages in color or
ongoing with greater 30,000 prints. The L380
for ways to make our to power up IEEE802.3af 4,500 pages in black with
flexibility and shorter printer provides more value
customers' experience compliant network devices. each set of inks, delivering
deployment schedules," with an additional two
easy and seamless. Our This eliminates the need of the lowest cost per print
said SK Mahapatra, AVP black bottles on top of the
product portfolio is proven an external power source. of 7 Paise for black and
Technical, BPE. provided set of bottles.

16 April 2017 www.varindia.com


www.varindia.com April 2017 17
ON THE RAMP

Ricoh launches two ADATA launches Western Digital presents


models of Color MFP External SSD Purple 10TB HDD
R icoh has launched
two models of
color MFP MP C2004SP
operation.
Enterprises can A DATA Technology
has launched
SD600 external SSD, which the
W WD
estern Digital
has announced
Purple10TB
customize their work
and MP C2504SP. Powered through iconic automated uses high-quality 3D TLC HDD hard drive line for
by Workstyle shortcuts, user- NAND to offer 256GB and surveillance applications.
Innovation specific security 512GB variants. The drive According the IHS Markit,
Technology, the controls and reaches speeds of 440MB/s anticipated growth of
ingenious feature fingertip access read and 430MB/s write. 4K-compliant and high- environments.
set of the MFPs to critical It weighs a mere 90g for resolution network cameras Advanced imaging
redefines the way information convenient portability, over the next few years is technology advancements
users print and that help drive and works driver-free with driving higher demand for are expanding the value that
share information productivity. This Windows PC, Xbox One, surveillance-class storage to video surveillance provides
in modern work is combined with PS4, and Android. The support systems featuring for applications ranging
environment. A banner printing SD600 is available in all- these technologies. The from retail and public safety
sound-reducing capabilities for black and red-black colour WD Purple 10TB HDD is monitoring to smart-city
design, which high-quality schemes. optimized for 24x7 video infrastructure, all of which
incorporates an output and a new True to its athletic surveillance systems and are driving new storage
anti-vibration Intel processor to look, the SD600 delivers up to 64 high-definition needs, said Khalid Wani,
system and noise-absorbing help productivity and speed 440MB/s read and (HD) cameras in home MD for India Sales, Western
materials, makes for quieter up jobs. 430MB/s write. Even in and small business security Digital Corporation.
the best of circumstances,

Reliance Group's Unlimit signs internal and external


mechanical hard drives ALE launches Hybrid
partnership with Cumulocity cannot hope to come close
to that. Approximately Communication Blueprint
R eliance
Unlimithas
signed partnership with
Groups Enablement allows it to
be tailored specifically for
specialized businesses and
four times faster than spin
drives, the SD600 shortens
load times and results in
A lcatel-Lucent
Enterprise (ALE)
aimed at providing small
and mid-sized companies
is introducing its hybrid with benefits of Telephony-
Cumulocity, the leading provides enterprises with smoother-perfor ming
communications blueprint as-a-Service coupled
IoT software provider the ability to compose their games and applications
to help businesses adopt with Rainbows UCaaS
worldwide. own IoT app in minutes, whenever quick asset
Unified Communications- capabilities. This expansion
The partnership will with the smart rules streaming is essential.
as-a-Service (UCaaS). of the Alcatel-Lucent
roll out a suite of new wizard used to instantly Rainbow Connected OpenTouch Enterprise
products and services
on a new platform, titled
spot operationally critical
states.
Dell launches Platform is an overlay Cloud (OTEC) offer further
service that connects extends the ALE strategy
Enablement. Enablement
will allow businesses to
The newly launched
product line will showcase
Entry-level ALE and third-party to deliver connected
communications platforms platforms by enabling
connect any device over off-the-shelf applications
Thin Client in a hybrid approach, enterprises of any size to

D
any network, and manage for key verticals such as enabling businesses to take advantage of new
ell has introduced
and store asset data, by industrial automation, protect and leverage existing subscription-based models.
its thin client that
controlling them in real- healthcare, financial systems while accessing Large enterprises have
offers good performance
time by monitoring device services and asset tracking new unified communication benefited from the OTEC
and manageability for task
availability and administer and/or tailored to suit the services. multi-instance architecture
and basic productivity
and rectify device faults. unique demands of the ALE is also introducing since its introduction three
users. Compatible with
The versatility of Indian market. OTEC-S cloud-based offer years ago.
Citrix, Microsoft and
VMware virtual workspace
F-Secure launches Cloud Protection environments, the Wyse Kingston launches DC400 SSD
K
3040 thin client provides ingston has
on Salesforce AppExchange a cost-effective endpoint announced Data

F -Secure has "With F-Secure Cloud solution that is highly Center 400 (DC400) SSD,
launched Cloud Protection, we enable secure, yet easy to deploy the latest solid-state drive
Protection on the a holistic approach to and manage. It is the to its range of enterprise
Salesforce AppExchange, security in company cloud industry entry-level Intel solutions. DC400 SSD is an
protecting organizations environments, said Mikko x86-based quad-core thin entry-level enterprise drive DC400 SSD offers
against malicious content Peltola, Vice-President of client delivering robust designed for server use in superior quality of
shared in the cloud. connectivity options and data centers, especially for service for data center
F-Secure Cloud a choice of Wyse ThinOS customers who deploy a customers whose
Protection checks links or ThinLinux operating rip-and-replace strategy. It workload environment
and files for malicious systems. is ideal for read-intensive calls for sustained IOPS
content as they are The Wyse 3040 thin applications such as boot, and consistent low
shared through Salesforce, Business Development, client is an affordable, web servers and lower data latency. A Standard and
ensuring the cloud stays a F-Secure. Sharing content efficient and easy to manage rate operational databases user-adjustable over-
safe place for companies is a vital part of doing endpoint solution that and analytics, especially in provisioning improves
and for users. The solution business, and with our allows IT managers to keep data center mixed workload random IOPS performance
combines award-winning solution, it remains a strong costs low while supporting environments where and endurance while
Best Protection with easy enabler to smooth business basic productivity and light endurance and reliability enterprise firmware
no-middleware installation. operations." multitasking. are important. improves latency.

18 April 2017 www.varindia.com


LEADING IT SOLUTIONS PROVIDER IN INDIA

www.varindia.com April 2017 19


VOICE-N-DATA

Qualcomm to encash on India's Lava adopts Jio launches All Unlimited


4G feature phone market Spreadtrum LTE Plan for Jio Prime Members
Q ualcomm India
has launched SoC platform R eliance
Infocomm
Jio
(Jio)
Dhana Dhan! The plans
start with the Rs.309 ALL
Qualcomm 205 Mobile
Platform to encash on
4G feature phone market
S p r e a d t r u m
Communications
has announced that its LTE
has announced that the Jio
Summer Surprise has been
fully withdrawn, following
UNLIMITED PLAN,
which provides Unlimited
SMS, calling and data (1GB
designed to bring 4G SoC platform, SC9820 has the advice of the Telecom per day at 4G speed)
LTE connectivity and 4G been adopted by Lava for Regulatory authority for 3 months on
services to entry level 4G its Connect M1 phone. of India (TRAI). first recharge.
feature phones. Lava Connect M1 is Jio has T h e
The Qualcomm 205 Platform presents a unique powered by Spreadtrums f u r t h e r company
Mobile Platform includes opportunity for OEMs, 28nm 1.2GHz dual- announced has also
the Qualcomm 205 SoC, operators and content core ARM Cortex-A7 that ALL announced
India and the South providers to extend superior LTE platform SC9820, UNLIMITED the Rs.509 ALL
East Asia regions present experiences to users by supporting VoLTE and dual- plans with special UNLIMITED
growth opportunities in enabling data on feature SIM function. It features a benefits, exclusively PLAN for daily
the telecom space with phones, said Jim Cathey, 512MB RAM/4GB ROM for its Jio Prime members high data users offering
4G adoption rising and senior vice president and storage, a MicroSD slot up is aimed at encouraging Unlimited SMS, calling and
continued adoption of president, Asia Pacific to 32GB and comes pre- Jio subscribers to live data (2GB per day at 4G
feature phones. The launch and India, Qualcomm installed with Facebook the Digital Life without speed) for 3 months on first
of Qualcomm 205 Mobile Technologies. Lite, providing feature restrictions Jio Dhan recharge.
phone users a perfect smart

RailYatri data shows fluctuating experience.


Spreadtrum SC9820
Ericsson and IIT Delhi to launch
mobile connectivity on long integrates 1.2GHz dual- 5G for India program
E
core ARM Cortex-A7
ricsson and the India initiatives and aid
train routes processor, ARM Mali-400
MP1 GPU for 3D graphics
Indian Institute application development

O n a long train
journey,
mobile phone invariably
the
of the screen will map
the route along with the
coverage details.
acceleration and supports
TDD-LTE, FDD-LTE,
of

a
Technology Delhi
(IIT Delhi) have signed
memorandum of
for Indian start-ups and
industries.
The first series of tests
GSM modes and GPRS
becomes the biggest Internet connectivity understanding to jointly under this program are due
connectivity.
entertainment and along the rail routes has, roll out a 5G for India to begin in the second half
knowledge source for
passengers. The new
thus, become important to
ensure a pleasant experience
RCOM gets program. Ericsson will set
up a Center of Excellence
of 2017 and will place India
on par with other developed
version that was recently
launched displays the
for today's travellers. With
the Network Coverage
SEBI approval with a 5G test bed and
incubation center at IIT
countries in terms of 5G
network and application
mobile network coverage
for any train. So, travellers
feature, passengers now
know what to expect along
for proposed Delhi and use this facility to
drive the development of
deployment. Globally,
limited deployment and
can check and compare the
mobile connectivity across
their train route. Armed
with this information, they
demerger the countrys 5G ecosystem.
This program has been
5G trials are expected to
start by mid-2018 while
different routes. To check
the network coverage, just
can make their calls or take
decisions like downloading a
of wireless conceptualized to fast-
track realization of Digital
commercial availability is
slated for 2020.
open the timetable of any movie or book, comments business Nokia's 100G deployment supports
R
train on the RailYatri app Manish Rathi, CEO & Co- e l i a n c e
and a link on the bottom Founder, RailYatri.in. Communications
(RCOM) has received
Jio's pan-India 4G network
Bharti Airtel to acquire
Tikona 4G business
approval of the Securities
and Exchange Board of N okia has provided
100G solutions
for core and metro solution
underserved regions in
India as well as a nationwide
long-distance service. Jio
India (SEBI), BSE Limited

B harti Airtel has UP (East), UP (West), (BSE) and National Stock for Reliance Jio Infocomm's has clocked unprecedented
entered into a Rajasthan and Himachal Exchange of India Limited pan-India 4G LTE network subscriber growth as a result
definitive agreement with Pradesh circles. Airtel (NSE) for the proposed
Tikona Digital Networks plans to roll-out high speed Scheme of Arrangement
to acquire Tikonas 4G 4G services on the newly for demerger of the wireless
acquired spectrum division of the company
in the five circles into Aircel Limited and
immediately. Dishnet Wireless Limited to handle the massive of its plan to bring India
The acquisition (the Scheme). traffic growth fuelled by the into the top ten broadband
of Tikona's Pursuant to the same, operator's initiative to build countries in the world. Jio
4G business Reliance Communications broadband connectivity for deployed Nokia's high-
in Gujarat, UP has filed an application with all of India. capacity transport network
Business including the (East), UP (West) and National Company Law Spanning 90,000 km, to offer high-bandwidth
Broadband Wireless Access Himachal Pradesh will be Tribunal (NCLT), Mumbai Reliance Jio is one of the services such as video
(BWA) spectrum and 350 undertaken by Airtel, while Bench, for approval of the biggest 100G deployments streaming, multimedia
sites, in five telecom circles. in Rajasthan circle, it will said Scheme. The proposed in the world. The Nokia content distribution and
Tikona currently has 20 be accomplished through transaction is subject to transport network allows cloud and business services
MHz spectrum in the 2,300 Airtels subsidiary Bharti other necessary approvals. Jio to offer innovative, to its rapidly increasing
MHz band in Gujarat, Hexacom. high-capacity services to subscriber base.

20 April 2017 www.varindia.com


www.varindia.com April 2017 21
VAR SPECIAL

Digital Payment:
Making BHIM a Mass Movement
Initially, the focus was on promoting digital payment but presently the
stress is on making it a mass movement through Cash Back and Referral
Bonus schemes and declaring 75 townships going less-cash

T o make digital payment a mass


movement, Prime Minister Narendra
Modi launched the BHIM Aadhaar platform
payment a way of life in the days to come.
Initially, the government's focus was on
promoting digital payments but now the
major incentive schemes to promote digital
payments Lucky Grahak Yojana and Digi-
Dhan Vyapaar Yojana. 100 days of Digi-Dhan
for merchants, Cash Back and Referral bonus focus is on creating awareness about digital Melas was led by NITI Aayog in 100 cities
schemes for BHIM and declared about 75 payments to the grassroots level through across India for enabling increased usage of
townships going less-cash on the occasion of BHIM Cash Back and Referral Bonus scheme. digital payments. As per government numbers,
the 126th birth anniversary of Dr Bhim Rao The scheme has an overall outlay of Rs.495 at least 15,000 institutions have gone cashless
Ambedkar in Nagpur. crore for a period of six months. Under the across just these 100 rural and urban cities.
The BHIM Aadhaar is the merchant Referral Bonus scheme, both the existing With a turnout of over 15 lakh from cities,
interface of the BHIM app and it will pave user who uses BHIM and the new user who small towns and villages, the melas have
the way for making digital payments by using adopts BHIM would get a cash bonus credited enabled lakhs to open new bank accounts as
the Aadhaar platform. Any Indian citizen can directly to their account. Under the Cash Back well as create new Aadhaar cards.
pay digitally using their biometric data (thumb scheme, the merchants will get a cash back on Under the scheme, Rs.258 crore of prize
imprint) on a merchants biometric-enabled every transaction using BHIM. Both schemes money was won by 16 lakh winners, including
device which could be a smartphone having a are to be administered by the Ministry of IT customers and merchants belonging to
biometric reader. Any citizen without access & Electronics and would be implemented by different corners of the country and from
to smartphones, internet, debit or credit cards the National Payment Corporation of India varied walks of life. 20-year-old Shradha
will be able to transact digitally through the (NPCI). Mohan Mengshette, a second year student of
BHIM Aadhaar platform. Niti Aayog focussed on creating awareness Electrical Engineering from Latur district in
Already, 27 major banks are now on board about digital payments through Lucky Grahak Maharashtra, emerged as the winner of Rs.1
with 7.15 lakh merchants so that they can start Yojana and Digi-Dhan Vyapar Yojana which crore mega draw for consumers. The second
accepting payments using BHIM Aadhaar. have come to an end after a rigorous 100-day prize of Rs.50 lakh, under the Lucky Grahak
One can expect more banks onboarding information, education and communication Yojana for consumers was won by Hardik
along with increase in merchant numbers as campaign. The Prime Minister felicitated Kumar, a 29-year-old primary school teacher
government has a strong push to make digital the winners of the mega draw of the two from Khambhat in Gujarat. The third prize

24 April 2017 www.varindia.com


of Rs.25 lakh went to Bharat Singh from the
Sherpur village in Uttarakhand.
The first prize of Rs.50 lakh, under the Digi-
Dhan Vyapar Yojana category for merchants,
was won by Anand Ananthapadmanabhan of
GRT Jewellers in Tambaram, Tamil Nadu.
The second prize of Rs.25 lakh was won by
Ragini Rajendra Uttekar, owner of a small
beauty parlour in Thane, Maharashtra. The
third prize of Rs.12 lakh was won by 33-year-
old Shaik Rafi who runs a wholesale clothing
store in Ameerpet, Telangana.
BHIM app has already created a new
record by registering 1.9 crore downloads in
just four months since its launch in December
2016. Until November 2016, the volume of
all digital transactions was 280,000 which
amounted to Rs.101 crore in value terms.
Digital Payment Statistics
In just four months, by March this year, the BHIM App has registered 1.9 crore downloads in just four months
volume of payments using various digital Digital transactions volume has increased by about 23 times with 6,380,000 digital
payment modes saw an increase of about
23 times amounting with 6,380,000 digital transactions in March 2017 to 280,000 transactions in November 2016
transactions for a value of Rs.2,425 crore. The value of digital transactions has increased from Rs.101 crore in November 2016 to
Aadhaar-enabled payments have increased Rs.2,425 crore in March 2017
from 2.5 crore in November 2016 to over 5
crore in March 2017. Immediate Payment Aadhaar-enabled payments have increased from 2.5 crore in November 2016 to over 5
Service (IMPS) transactions have also crore in March 2017
increased from 3.6 crore to 6.7 crore during Immediate Payment Service (IMPS) transactions have also increased from 3.6 crore to
the same period.
In order to achieve the target of 2,500 6.7 crore during the same period
crore digital transactions during the current
financial year, the government will also assessment by PricewaterhouseCoopers The BHIM Cash Back and Referral
(PwC) and only those townships which have Bonus schemes and less-cash townships will
announce about 75 townships spread all
reported more than 80% of the total number definitely help the government to promote
over India as less-cash townships. A less-
of transactions in the township being done digital payments modes to the grassroots
cash township is one where the deployment
through digital modes of payments during the level to meet the target of 2,500 crore digital
of payment acceptance infrastructure is
review period are included in this list. These transactions during the current financial year
complete, all the families in the township
from the present 101 crore transactions in the
are covered under the training programmes. townships are likely to generate over 1.5 lakh
month of March 2017. n
The townships selected for the launch have digital transactions every day, thereby leading to Pravin Prashant
been subjected to independent third-party about 5.5 crore digital transactions in a year. pravin@varindia.com

PRODUCT OF THE MONTH

ZyXEL SBG3500-NB00
The ZyXEL SBG3500-N series Wireless N Fiber WAN Small Business
Gateway is the "multi-WAN gateway" that provides high-speed Internet access
for business users. Featuring not only VDSL2/ADSL2+ functionality but also
one GbE WAN with Small Form Pluggable (SFP) interface, this device offers
flexible multiple-WAN connectivity to adopt various Internet interfaces. It also
enhances network performance for small businesses to pursue the ultimate
success. The ZyXEL SBG3500-N series provides multiple WAN interfaces,
including DSL and Gigabit Ethernet, for load balancing and WAN backup.
Service providers can flexibly offer WAN services of the highest availability in
one single box for small business owners to enjoy non-stop services. Powered
by the load balancing and fail-over mechanisms among multiple WANs, it
maximizes WAN stability for mission- critical Internet applications with
benefits of the integrated bandwidth.The advanced VDSL2/ADSL2+ bonding
and dual-personality Ethernet WAN functionalities enable service providers
to increase bandwidth and extend coverage. With the available copper lines,
service providers can take advantage of VDSL2/ADSL2+ bonding to not
only provide higher speeds for the existing subscribers, but also improve the user experience for those who are far away from the cabinet with stable,
sufficient bandwidth regardless of the distance. Besides, if fiber lines are preferred, the ZyXEL SBG3500-N series can use the Small Form Pluggable
(SFP) interface to connect Fiber Ethernet for distances much longer than Gigabit networks, or simply connect to other Ethernet WAN devices without
additional cost laying new fiber. Based on Access Control List (ACL) rules, Stateful Packet Inspection (SPI), Denial of Service (Dos) and Distributed
Denial of Service (DDoS) measures, the ZyXEL SBG3500-N Series provides the first-line defense against hackers, network intruders and other harmful
threats. The configurable Demilitarized Zone (DMZ) is another benefit that provides more flexible accessibility while preventing external attacks toward
the confidential resources and databases.

www.varindia.com April 2017 25


TAIWAN EXCELLENCE

Asus the quest for excellence


and innovation continues Founded
Type
: April, 1989
: Public listed company

A susTek (or simply Asus) is the #1


international brand from Taiwan and
it has been enjoying this position for the last 4
A Big Focus on Gaming...
We all understand that in spite of the PC
industry slowing down worldwide, the gaming
Traded as : TWSE: 2357/ LSE: ASKD
(Secondary)
Headquarters : Taipei, Taiwan
years. The company has been named the most industry has grown into a billion dollar business.
admired company for 2 consecutive years, and Industry : Computer hardware and
There is a lot of potential to earn profits both in
has retained the position of the #1 motherboard the segments of gaming hardware and software. electronics company
and graphics card makers in the world. It is The gaming hardware market in 2016 alone had No of Offices : 58
passionate about technology and is driven by hit $30 billion globally; the growth has been Employees : About 17,000+ (R&D =
innovation. The company is always in search of however in the higher segment. The high-end 5,500)
incredible ideas and experiences and aspires to purpose built PCs is where PC gaming vendors
be incredible in everything it does. are putting their focus on for profitability. This
Obsessed about innovation, Asus has in its drives home the point that gaming devices might It plans to incorporate more products to this
offerings a number of interesting and innovative be niche but gamers are not. portfolio.
products. In the smartphone category, the Additionally, apps are driving the ROG plays an active part in the global gaming
Zenfone series has been quite great which was gaming industry at a faster pace than what community, helping develop the industry by
founded in 2014. In fact it is one of the top was envisaged a few years back. The E-Sports sponsoring events such as PAX, BlizzCon and
selling smartphone brands in South-East Asia, phenomenon is also gaining momentum, if Dreamhack. ROG has also been recognized as a
not in all the markets, but in a few of the
markets globally. In 2016 alone, there were
alone 148M viewers for e-sports, which
will go up to 215 million in 2019. In terms
of revenues, we are seeing a huge potential
evolving around e-sports as it proves to be
an ideal platform to reach out to young
millennials who are active in the social
space and are technology conscious. In 2016,
e-sports was a $493 Million business, and is
projected to go up to $1.1 billion business by
2019.
ROG (Republic of Gamers) is a gaming
sub-brand of Asus that has been around for
Japan and Taiwan. Asus sees itself well prepared 10 years. Founded in 2006, it tries to give the leader in PC gaming, winning many awards.
for the computing era, where in the next 5 - 10 best experience to the customers and build the In India, the latest product to be launched
years the companys leadership sees covering future gaming landscape. Asus launched its first in the market is the ROG Strix GL553 compact
personal computing, mobile computing, IoT ROG products in 2006. The idea is to deliver the ultra-light gaming laptop. With its new ROG
computing and robotic computing on a large most innovative hardcore gaming hardware and series launch, Asus has tried its best to cater
scale. And this would not be possible without solutions to offer an ultimate gaming experience to the demands of all the gaming segments i.e.
the great leadership at Asus. to truly dedicated gamers worldwide. Since it saw from entry and mainstream levels to professional
Apart from hardware, Asus has got a very this segment as something unique, Asus decided gaming.
big investment in the area of software. Asus to operate it separately as a sub-brand. Today it It has always been Asuss endeavour to
Cloud is one of its subsidiaries; users around the has the most complete portfolio to cater to the provide the best gaming experience to the users
world know them for the web storage service gaming segment. Under the sub-brand, Asus has and ultimately help the gaming industry in India
on the Asus devices. Taipei city government also a huge product line-up of gaming products like and the worldwide to thrive. n
has a very close collaboration with Asus Cloud gaming motherboards, gaming graphic cards,
to provide free web storage to all the citizens gaming monitor, gaming laptop and so on. Samrita Baruah
from the city. samrita@varindia.com

26 April 2017 www.varindia.com


FACE TO FACE

F5 intends to address bottlenecks


in an app-centric world
Keeping application security into focus, F5 is adding to the companys comprehensive security solutions that will provide visibility of gaps
within ones defence system as well as provide a hybrid strategy to mitigate any cyberattacks.
Parag Khurana, Managing Director - F5 Networks throws more light on this to discuss how F5 today looks at application security -

H ybrid cloud is a reality today. F5 recently did a study for 2000


of its top enterprise customers worldwide; almost 75% said
that hybrid cloud is a reality, while another 20% said that they will move
half of their applications to the Cloud. There are three important things
happening at present digital economy, ecommerce and digital banking.
And with this cyber security threats have increased.
The study also indicated that 5-7% of investment is on security
spending nowadays.
From F5 perspective, we still continue to be a leader in the ADC
(Application Delivery Network) area worldwide; we enjoy a 50% market
share. In India, we enjoy a market share of 35%. We are still focusing on
application delivery but security has taken a bigger picture, says Parag
Khurana, Managing Director - F5 Networks.
Business leaders across different sectors are increasingly cognizant
of how powerful applications and data assets can be in the journey to
achieving agility demanded from the shift to the digital economy. More
than ever, organizations need to rethink traditional security architectures,
to focus on areas of greatest vulnerabilities their applications and users.
Apps have become mobile and they can be accessed on mobile
phones. If we talk to a CIO or a CSO today, they say that 75-80% of their
applications are web enabled. The next level for them will be to move
these apps on cloud. But again their biggest concern is security. Earlier
their environment was within a physical parameter, lets say a datacenter. So
even if you place your firewall within your parameter, you are ensured safe.
But now its not the case because apps have moved out of the datacenter.
Again for instance, a company provides infrastructure as a service; the
concern for them will be that when a customer builds, configure and
deploy an app on it, he should be able to deploy and secure it properly.
Security concerns have indeed risen, reiterates Parag.
The mission statement of F5 has been to deliver applications to users
in a fast, secured and a reliable manner. For last 10 years the company has
been protecting applications through its platform called web application
firewall, but now it has brought in purpose-built hardware for that. CSOs

Herculon DDoS Hybrid Defender gives customers a multilayered


defense against volumetric and pervasive DDoS attacks by
need purpose-built solutions and so we are launching now a new series of
integrating high-performance hardware with the intelligence of
products called Herculon. They are into 2 areas the first product is in the
offsite cloud scrubbing via F5 Silverline. This hybrid approach
DDoS area (Herculon DDoS Hybrid Defender) and the 2nd in the area of
improves time to mitigation in scenarios where website and
encryption (Herculon SSL Orchestrator), says Parag.
application availability are crucial to customer interactions and
While focusing on cyber security, F5 has partnered with other security
profitability. The product can be deployed in-line or in out-of-
elements, for instance for Herculon SSL Orchestrator it has partnered
band mode, and provides comprehensive DDoS coverage through
with ATP vendors.
behavioral analytics, sub-second attack mitigation, and visibility
F5 sees massive opportunities for protecting applications. The company
into sophisticated application layer attacks.
is present across verticals, but those companies that are app-savvy or are
Herculon SSL Orchestrator provides improved insight for the
adopting business apps happen to come to F5 for its solutions. Like the
visibility gaps created by the growing use of encryption for
banking sector for their internet banking, IT-ITeS, Telecom are some of
application data. With purpose-built hardware for SSL/TLS, this
the verticals where adoption of application security is deeper and stronger.
product provides leading cryptographic capabilities, context-aware
Even Pharma and Manufacturing verticals are moving to application
dynamic service chaining, and native integrations. A defense in-
security in a big way, says Parag.
depth strategy is employed to enhance detection, enforcement,
He further continues, We are in a kind of business where if
and orchestration with support from a rich ecosystem of security
infrastructure grows, then we are surely to leapfrog. Indian customers have
vendors.
been investing to protect the traditional parameters of physical security,
Cloud-based application security as a service with Silverline
but what is changing drastically is the shift to application security. Security
WAF Express: F5 is introducing a pre-configured, self-service
is a market where threats are evolving and protection has to evolve along
offering that takes advantage of its cloud-based Silverline platform.
with that. There is a catch-up game happening. The challenge before a
Customers can easily select which applications WAF services are
CSO today is how fast they can convince their management to invest
applied to, while F5 manages security policies behind the scenes
more, sums up Parag. n
to protect apps from a wide range of threats including OWASP Samrita Baruah
attacks, parameter tampering, and bots. In this model, F5s Security samrita@varindia.com
Operations Center experts engage and maintain policies, including
monitoring, app attack mitigation, and analytics for applications www.varindia.com April 2017 27
hosted in the public or private cloud, as well as the data center.
VAR CORPORATE

Cisco India:
Will Five Pronged Cybersecurity Strategy Work?
To meet the objectives of Digital India, the company is focussing on a complete suite of cybersecurity solutions such as innovations in
security products and solutions, Cyber Range Lab in Gurgaon, Security Operations Centre in Pune, Security & Trust Organization in Gurgaon
and acquisition of security companies

A ccording to NASSCOM and DSCI


Cyber Security Roadmap, the Indian
IT industry has charted out Vision 2025 to
opportunity, Cisco India is focussing on a five-
pronged strategy laying focus on a complete suite
of cybersecurity innovations, launch of Cyber
security, endpoint security, application security,
messaging security, web security, IoT security,
transaction security, security operations and
grow the Indian cybersecurity products and Range Lab in Gurgaon, Security Operations incident response, risk & compliance and
services market to reach $35 billion and create Centre to be launched in Pune, Security & threat intelligence and specialist threat analysis
one million cybersecurity experts and 1,000 Trust Organization and security companies and protection.
cybersecurity start-ups by 2025. On the other acquisition. This 360-degree approach by Cisco Cyber Range Lab in Gurgaon: Deepening
hand, the global security market is expected to will definitely help government organizations its commitment to enhancing cybersecurity,
reach approximately $190 billion by 2025 from and corporates to secure digital transactions in Cisco recently inaugurated its Cyber Range
$85 billion today and will be driven primarily a seamless manner. Lab in Gurgaon, India. The Cyber Range Lab
by increasing digitization and smartphone For security, Cisco has invested $5 billion in aims to provide highly specialized technical
penetration. the last 36 months be it in terms of acquiring training workshops to help security staff build
According to industry experts, India is cutting-edge security companies or making the skills and experience necessary to combat
among the Top 5 countries in the world to foolproof security products for its customers. new-age threats.
be attacked by ransomware and malware. All Innovations in Security Product and The lab was recently inaugurated by
this creates a big opportunity for companies Solutions: For conducting innovations in the Dr Gulshan Rai, National Cyber Security
like Cisco in the cybersecurity space, thanks cybersecurity space, Cisco has around 5,000 Coordinator, Government of India, in the
to the government's Digital India programme engineers globally and around 1,000 engineers presence of Dinesh Malkani, President, Cisco
and corporate digitization programme which in India. All these engineers focus on different India and SAARC, at the Cisco India Summit
is moving at a brisk pace. To encash on the aspects of security be it infrastructure 2017.
Speaking on the launch of Cyber Range
Security Companies Acquisition by Cisco Lab in India, Dr Gulshan Rai said, "With
this launch, Cisco has taken a leadership
Company Acquisition Year Specialisation step to enhance the security of Indias digital
infrastructure and speed up digitalization of
Network Translation 1995 Firewall India.
Ironport 2007 Email and Web Security "With the launch of Cisco Cyber Range,
ScanSafe 2009 Cloud Based Web Security we are helping our customers to be prepared
to identify and mitigate a threat before it
Sourcefire 2013 Intelligent Cyber Security
becomes a crisis. The Cisco Cyber Range Lab
Neohpasis 2015 Security Advisory is now a reality for customers looking to find
Lancope 2015 Security Analytics an advantage against the growing legions of
cybercriminals and next-generation threats.
OpenDNS 2015 Threat Protection
The Cyber Range Lab in India underlines our
CloudLOCK 2016 Cloud Security commitment to secure and partner with India
ThreatGrid 2016 Dynamic Malware Analysis in its digital transformation, commented
and Threat Intelligence Dinesh Malkani.
Cisco Cyber Range Lab will use 200-500
Source: VARINDIA different types of malware, ransomware and

28 April 2017 www.varindia.com


STO works with public and private-sector
customers to help analyze their infrastructure,
understand cyber risks, identify and mitigate
vulnerabilities, and assist in building networks
on a foundation of secure, resilient, and
trustworthy products. Security & Trust
organization is based in Gurgaon and will help
in identifying, shaping and bridging national
cybersecurity strategy initiatives for the
government.
Acquisition of Security Companies:
"The Cisco Cyber Range Lab is now a Security, cloud and software are critical
reality for customers looking to find an components of Cisco's strategy. During the
advantage against the growing legions last 12 years, the company has acquired 9 "With this launch, Cisco has taken a
of cybercriminals and next generation companies in the security space and is in the leadership step to enhance the security
threats. The Cyber Range Lab in India process of providing foolproof security to of Indias digital infrastructure and speed
underlines our commitment to secure corporates and government departments. up digitalization of India" - Dr. Gulshan
and partner with India in its digital Network Translation, a firewall company, Rai, National Cybersecurity Coordinator,
transformation" - Dinesh Malkani, was acquired by Cisco in 1995 and the National Security Council, Prime
president, Cisco India and SAARC company also acquired IronPort in January Ministers Office, Government of India
2007. IronPort email and web security
gateway and management products, currently
referred as Cisco Email Security and Cisco
100 attack cases to deliver realistic cyber- Web Security, has now become an integral On August 27, 2015, Cisco announced it
attack experiences which can be accessed part of the Cisco Security vision and strategy. has completed the acquisition of OpenDNS, a
virtually from any part of the world. As part The security products and technology from privately-held company that provides advanced
of the Cyber Range experience, Cisco has IronPort complement Cisco's threat mitigation, threat protection for any device, anywhere
designed real-world scenarios to help clients confidential communications, policy control, and anytime. Acquisition of OpenDNS'
experience, defend against and shut down and management solutions. threat protection capabilities complement
cyber-attacks. The scenarios will also help train In December 2009, Cisco acquired ScanSafe and enhance Cisco's current cloud security
organizations with the necessary steps required and kept it as a separate business unit, but, in offerings across Cisco franchise. OpenDNS'
to respond quickly in the wake of an incident, 2012, the service was renamed as Cisco Cloud Software-as-a-Service (SaaS) platform is
right from addressing a basic threat to a highly Web Security. On October 7, 2013, Cisco fast and easy to deploy, accelerating time-to-
sophisticated one, monitoring and analyzing completed the acquisition of Sourcefire, a value for customers as part of their defence
malware infections and providing actionable leader in intelligent cybersecurity solutions. architecture or incident response strategies.
information and intelligence to customers. With the close of this acquisition, Cisco is On August 1, 2016, Cisco completed its
The Cisco Cyber Range Lab will offer a providing industry's most comprehensive acquisition of CloudLock, a privately-held cloud
comprehensive integrated services portfolio, advanced threat protection portfolios. Cisco security company headquartered in Waltham,
which includes: Workshops of 35 days of is also offering a broad set of enforcement Massachusetts. CloudLock specializes in cloud
intensive real-life experience reacting to and and remediation options that are integrated, access security broker (CASB) technology.
defending against rudimentary and complex pervasive, continuous, and open. CASB technology understands and monitors
cyber-attacks at any location; Cyber Range On January 9, 2015, Cisco announced the user behaviour and sensitive data in cloud
subscriptions, which offer advance threat acquisition of Neohapsis, a privately-held applications. It helps secure cloud applications
intelligence reports; Assistance in re-creating security advisory company providing security that customers buy SaaS applications such
similar cyber range labs at customers premises services to address customers' evolving as Google Drive, Salesforce, and Box as well
and provide threat intelligence updates via information security, risk management, and as the applications that they build like the IaaS
subscription. compliance challenges. Neohapsis delivers risk and PaaS platforms.
The lab will also enable customers to tap into management, compliance, cloud, application, With these capabilities added to the Cisco
a pool of resources such as security specialists mobile, and infrastructure security solutions security portfolio, Cisco will be able to provide
and test engineers at Cisco. Cisco security to Fortune 500 customers. The acquisition of customers with greater visibility, compliance
experts will work closely with organizations to Neohapsis helps in reducing complexity and and threat protection regardless of whether
understand their business goals, and security fragmentation while providing advanced threat the applications are fully sanctioned by IT or
challenges and offer test runs on the proposed protection across the entire attack continuum not.
cybersecurity solution/infrastructure. before, during, and after an attack. On June 2016, Cisco completed the
Security Operations Centre (SOC) in Cisco has also acquired Lancope, a privately- acquisition of ThreatGRID, a New York-
Pune: The company is also planning to launch held company headquartered in Alpharetta,
based company that offers dynamic malware
Security Operations Centre in Q4 quarter of U.S.A. Lancope helps customers monitor,
analysis and threat intelligence technology to
Cisco (i.e. MayJuly 2017) timeframe. The detect, analyze and respond to modern threats
enable security teams to proactively defend
SOC will provide multiple services and also on enterprise networks through continuous
provide advance threat analysis (ATA). Security against and to quickly respond to advanced
network visibility and specialized threat analysis
Operations Centre (SOC) in Pune will provide a cyber-attacks and malware outbreaks. The
and protection. Lancope's StealthWatch system
broad range of services from monitoring and ThreatGRID products complement Cisco's
provides visibility into suspicious traffic
management to comprehensive threat solutions Advanced Malware Protection (AMP) portfolio
patterns inside the network to quickly detect
and hosted security that can be customized to a wide range of attacks. This helps enterprises and the private-cloud products expands Cisco's
meet customer/partner needs. With India as reduce time to detection, respond to incidents ability to protect customers with stringent in-
the fourth location in addition to Poland, the faster, improve forensic investigations, and house data retention requirements.
U.S. and Japan, this structure allows Cisco to reduce risks for the company. All these strategies will really help Cisco
provide a 24-hour service for customers and Lancope enhances Cisco's Security to position itself as the leader in the security
partners regardless of time zone. Everywhere strategy, enabling the network to market across all customer segments be it
Security & Trust Organization (STO): become a security sensor, delivering continuous government or corporate. n
The Cisco India Security & Trust Organization visibility, and accelerating incident response Pravin Prashant
(STO) was launched in December 2016. The across the extended enterprise. pravin@varindia.com

www.varindia.com April 2017 29


LEAD STORY

Security going beyond


traditional parameters
Cyber security is of much importance when it comes to datacenters, The aim of physical data center security is largely the same worldwide; barring
any local regulatory restrictions - keeping out the people unwanted in the building, and if they do make it in, then identify them as soon as possible
(ideally also keeping them contained to a section of the building). The old adage of network security specialists, that security is like an onion applies
just as much for the physical security of a data center.
The data center security market is expected to grow from USD 6.32 Billion in 2016 to USD 12.91 Billion by 2021, at a high Compound Annual
Growth Rate (CAGR) of 15.36%. For the purpose of report, 2015 has been considered as the historical year and 2016 as the base year for performing
market estimation and forecasting. The data center security market is witnessing a rapid growth due to the growing need for network virtualization and
cloud computing that bring out higher work efficiency levels within the organization. Data center security solutions help in securing big data transfers
and securing a network from any risk. Additionally, the growing adoption of Bring Your Own Device (BYOD) calls for advanced secured network
solutions.

Ransomware Era of Digital Extortion


Ransomware attacks have increased from a few
hundred(s) in 2005 to 2.5 mn in 2016
encryption ransomware which encrypts the
Ransomware (the hot favourite in the world
files on the hard disk and one may find it
of cybercrime) is setting the new era of digital
quite difficult to decrypt without paying the
extortion. Ransomware is a class of malware that
ransom demanded. Type II is non-encryption
restricts access to the computer system it infects,
ransomware where there is no encryption but
and demands a ransom paid to the creator of
instead locks up the systems with a message
the malware for the restriction to be removed
Your computer is locked.
(Wikipedia). It is nothing but a straightforward
The evolution and prominence of
extortion software tool designed to encrypt your
ransomware can be well imagined with the
data/lock declaring that the system is locked,
growth of ransomware attacks of just a few
followed by a ransom demand. RSA-2048
hundred(s) in 2005 to 2.5 million-plus in 2016.
encryption is used to perform the heinous act.
The year 2015 marked the birth of ransomware.
Since then, it has transformed (matured) from a
Ransomware Attacks
The initial attempts to find an opportunity by
fake antivirus tool to a leading tool in the hands
performing a reconnaissance through a phishing
of digital cybercriminals extorting anywhere
email. Reportedly, 93 per cent of all phishing
between $500 and $20,000 to unlock data/
emails are said to be containing encryption
systems from individuals, businesses and other
ransomware. Phishing emails hit a new high of
organizations.
6.3 million in the last year. The usual infection
Ransomware is of two types. Type I is
(Ex: CryptoWall) is through email attachments
B. S. Rao
Vice-President, Marketing
30 April 2017 www.varindia.com
CtrlS Datacenters
with enticing subject lines are sent attached with among others are the digital extortionists ruling other countries from Europe and Americas.
zip files containing ransomware executables the world of cybercriminals.
or even a link to click on. Once the individual Ransomware Prevention
opens the files, the executable file locks up the Ransomware Demands Across To prevent ransomware attacks, it is critical
system and in case the he/she clicks on the Industry that every organization deploys latest web and
malicious link, a connection is established to the A hospital in LA, USA was infected with spam filters, IDS, antivirus, IP/Cloud reputation
malicious website and immediately an exploit is ransomware and had to pay up ransom in systems, DNS layer security (as per system
launched and malware is shipped online if the bitcoin(s) after their system and network was deployment). Sandboxing is yet another way to
ransomware hacker manages to gain control of locked up for more than a week. In some cases, prevent and secure your systems. This apart, it is
the system, the system is locked and a message MRI is locked until the ransom is paid, an X-ray important to take regular data backups, disable
such as Your system is locked is displayed. machine is turned off and files are encrypted RDPs to thwart any ransomware attacks.
until the ransomware is paid. One other hospital Lastly, it is important to avoid plugging
Browser ended up paying over $10,000 as ransom to in the USB sticks (usually received during
When you visit a website a browser, hijacker restore its IT systems. Almost 80 per cent trade shows) where information is circulated
locks up your browser with a message that healthcare organizations have been affected by for business or academic purposes. It could
Your browser has been locked to indicate ransomware. In yet another case, the ransomware contain ransomware (virus) infecting your
that the hijacker has taken over the browser does criminals gained control of heating, ventilation, initial system where it is inserted and then go
not allow the user to close the browser (window) and air conditioning (HVAC) of a data center on to infect all other systems on the network
or switch to another web page and demands a and released only after the ransom was paid. and then lock up the systems and demand
ransom to gain access to your system again. In a recent case in India, an ERP system of a ransom. To avoid such occurrence, it is
a multinational was locked by ransomware important to scan the USB stick/drive before
Worlds Most Dreaded criminals and they had to pay up the ransom using, encrypt data on USB drive. It would be
Ransomwares in bitcoins. An educational institute too was best to avoid USB sticks in the first place as a
Cryptolocker, Cryptoware, Locky, Jigsaw, hit by ransomware attack and had to cough up policy in the organization.
Teslacrypt, Fareit, Samsam, Peyta, Fantom, the ransom to restore their systems. India ranks Finally, as far as ransomware is concerned,
Crysis, Cerber, Shade, Powerware and Ransom32, number one on the ransomware radar, besides prevention is better than cure.

Lacuna's in Indias Cyber Security


DT Act, 2000 Amended DT Act, 2000 will definitely help India
The amendment of 2008 has failed to define Cyber Squatting which relates to stealing or
word Hacking or Hacker, surprisingly the assuming a domain name of a established brand
act of hacking with the very word hacking by a new or less known brand or a company or
finds a mention in section 66 of the original an individual, is not exclusively covered in the
Act. IT Act.
Section 79 of the amended IT Act, 2000 is The crime of pornography by foreign
not a penal section under the Act. Penalty under websites is let loose and is not discussed nor
the Act would arise on any person or a body being penalized. This flaw also makes Indian
corporate. When an incident has occurred on cyber criminals to host their pornography
account of other sections such as Sec 43, 43-A, related websites on foreign shores without being
65, 66, 66A, 66B, 66C, 66D, 66E, 66F, 67, 67A, accounted for in Indian territory.
67B, 69, 69A, 69B, 70, 71, 72, 72A, 73, 74, 84B, Taxation of ecommerce transactions
84C etc. which can be brought under any of when a transaction is committed from Indian
these sections and the person who is accused is jurisdiction is not explicitly discussed nor are any
otherwise an Intermediary as defined under passing references made in a view to bind it with
the Act, then the provisions of Section 79 apply. Indian tax laws.
These provisions give him an opportunity to Jurisdiction of electronic contracts is
escape his liability. To use these provisions he not clearly defined in the Act. Cross border
needs to act such in a manner which can be contracts since Click-Wrap contracts are
considered as Exercising Due Diligence. Prashant Mali, Advocate Practicing not legally recognized as equivalent to digitally
The amended IT Act, 2000 has not lawyer from Bombay High Court. signed contract, body corporates relying on
specifically dealt with the issues pertaining to (Specialist in cyber and electronic Click-Wrap Contracts (Where the user clicks
Ediscovery. Today, increasingly organizations are evidence related matters) on a button or checkbox I agree) need to take
relying upon digital evidence like email etc. and such additional measures as may be required to
media as a means of communicating with each where spam originates, the legislature did not provide a supplementary evidentiary base for
other and conducting business. IT Act, 2000 think of taking exclusive cognizance to this huge validating the contracts.
remains silent on this issue and also leaves scope menace, which jams our new national resource A clear section with regards to Jurisdiction
for business exploitation of Ediscovery by large the bandwidth. of courts over parties staying or operating in
consulting firms at their own interpretation. A Cyber Cafe is also an Intermediary different jurisdictions or countries is not covered.
The IT Act, 2000 have not dealt with spam hence the obligations under Section 79 and Even though having a complete separate legal
issue in a comprehensive manner. The definitions the rules framed there in for Intermediaries jurisdiction for the cyber world, is not an
section does not define the word spam nor is already apply to Cyber Cafes. The rules for expectation but certain clear guidelines necessary
even mentioned anywhere in the Act. The Cyber Cafes are incomplete rules requiring help lower courts and humble netizens.
practice of sending unsolicited emails is getting further rule making at the State Government Law remains silent for stamp duty on
rampant in India which also amounts to breach level. The rules also infringe on the powers of electronic contracts. eStamp duty if permitted
of individuals right to privacy on the net. While the State Government for maintaining law and can yield lot of revenue to the government.
India already features in the top ten nations from order in the State. Internet hour theft being completely

www.varindia.com April 2017 31


LEAD STORY

intangible and different type of theft other option allows the accessed to seek and get no provision for compensation for cyber/
than theft of tangible items, Internet hours anticipatory bail before even action begins. online defamation.
or bandwidth theft is not taken care of in Major offences covered under this Act are The definition of data includes sound stored,
The IT Act, 2000.Recourse to section 379 of bailable. Thus interim reliefs, anticipatory sent or received, that makes even a person
The IPC may not result in justice for reasons bails etc. would be in vogue with cyber speaking on microphone liable under The IT
of interpretation. criminals. Act, 2000 as what he says is a Data.
There is no power given to police for entering The IT Act, 2000 does not explicitly consider This law does not talk explicitly of forming
and searching private places .Many cyber Intellectual Property Rights in the Internet cyber crime courts for criminal trials. The
criminals operate from homes where police domain. law is silent on authorized cyber forensics
cannot search. Also major penal sections There is no clause under section 43 which tools to be used in investigation.
though cognizable are also bailable, this describes cyber/online defamation, thus has

Create Awareness to Protect Cyber Threats


Mobile networks are inherently secure and data is protected, but the lack of
awareness around risks lurking in the cyberspace is posing new challenges
Internet is undoubtedly one of the greatest Realizing these vulnerabilities, in
technological blessings of our time but we 2014 Telenor started a programme
cannot overlook the possible threats such as
called WebWise in schools. These
hacking, cyber stalking, fraud, bullying and
abuse. They are making headlines every day, and interactive workshops focus on
the incidence has only increased in the recent creating awareness among students,
past. It is easier to identify such harms and teachers as well as parents. The
mitigate the risks in real life, but in the virtual interactive sessions include case-
world very few understand how to identify and studies and practical information
resolve these issues.
on how to surf the Internet safely,
As service providers, the onus is on telecom minimize potential harm on social
operators to ensure that users not only benefit media, be resilient to cyberbullying
from being connected to the information and even tips on how to set smart
superhighway, but they are also adequately passwords.
equipped to protect themselves from falling
prey to online harms. The emphasis is not In 2012, when everyone was discussing
only to bring the new but old mobile users too faster Internet speeds and improving customer
within the folds of a connected world and also experience, a survey commissioned by the
educate the next generation of users on safe Telenor Group revealed that over 134 million
Internet practices. As digitization touches every children will come online by 2017 in India alone. Sharad Mehrotra
aspect of our life, it is important for all of us However, given the pace of Internet growth in CEO
to acknowledge and understand the nature of the last five years, this number will be far higher Telenor India Communications
threats we are exposed to and how to avoid than any estimate. While this is an indication of
them. how fast our younger generation is becoming
part of the technology changes happening over 55,000 students in 102 schools across 14
Digital Transformation through across the world, the survey also highlighted cities.
GSK the low resilience among them when it came to Most of these efforts are voluntary in nature
As users migrate from voice and feature online threats. and not mandated by policy or regulation. If
phones to data and Internet-enabled phones, the industry is talking about an Internet-driven
the transition should be without fear and Proliferation of affordable mobile devices lifestyle, then we should create an environment
hesitation. To make this happen and to answer and easy access to Internet has exposed our where there is no hesitation or fear in embracing
any question on the new way of connected kids to good as well as harmful content and digitization. For example, as part of a global
life, Telenor Grahak Shiksha Kendras (GSK) practices. The survey indicated that in India initiative, Telenor Group collaborated with
or customer education hubs are playing an every second child, who is using Internet, has the European Commissions CEO Coalition
important role. There are nearly 400 GSKs faced some form of cyberbullying. In fact, to make Internet a better place for kids and
across nine states where trained customer cyberbullying has emerged as one of the major worked with Interpol to become the first mobile
relation executives are educating customers on issues online and often it goes undetected as operator in the world to introduce Child Sexual
how to use an Internet-enabled mobile device children do not discuss the issue with parents Abuse filters for mobile phones. In India too,
and telling them about the benefits of being or teachers. Telenor has worked closely with the authorities
connected by taking precautions such as strong to implement CSA filters to block any content
passwords and getting the privacy settings Realizing these vulnerabilities, in 2014 related to child pornography and today these
right. Telenor started a programme called WebWise websites, as per the Interpols list, cannot be
in schools. These interactive workshops focus accessed on mobile networks in the country.
Initiatives like Internet on Wheels, where the on creating awareness among students, teachers
retail store comes to the doorsteps of customers. as well as parents. The interactive sessions Telenor has been able to successfully drive
These are the first steps towards acquiring include case-studies and practical information cyber safety awareness amongst various sections
digital skills and also help customers understand on how to surf the Internet safely, minimize of the society, while ensuring an enriching
Internet to use it more meaningfully. potential harm on social media, be resilient to customer experience. These are small steps
cyberbullying and even tips on how to set smart towards the larger goal that needs support from
Cyber Safety for Children passwords. Till now, WebWise has reached to all stakeholders in the digital ecosystem.

32 April 2017 www.varindia.com


!   #   $ %   & '
()    %$


  
 
 


 
 

  

   



 

        !   "  



 ( !
70, )  &
 
   
 ! "#  $  # 

      %
 


#
  $ #

 
    & $ '


    "%
  

      #  
 
 
    (
#   #


 %
 #
)     $   $  #     
 " 
 #  

 
  
 %
 $  
 #
# 
 $
   #  # %
 
     $ 

 * ! #     
  %
  *  + $  ,-



  
   
 /! / 1    


 2 $$' # /  !  +  '     ( !  


 ' !3#4  ) !  +  /! 7 '8
   !!!  )  !   9 ' $ %   !!!
 !  +  /!  +# 7 '!!
   !!!  5 !   $  *$ 
 ) /   !'  6 '  () 7 1!
2 $ '   
! !
 %) !

  *, .  -
: / /'      /   '!  ! $  

  
 ! "  ! /! 0 "  '! 

  
   
   

  $  '!
+/  *$$ !!  
% '  + !!
+% 
!   
! ,--"""%
.
%
-
/% 
!  #
   
#     " #
0%    
1%       

     #  
! 2
3% 4
  #

 5 
!   
     #


   0!!  -
5 '!  2  1!  

#
 $

   #     
  $  $


    

 
 
  #   $.  % 4 
 

 ,

  
   
   

,--"""%
.
%
-
-
1  *" $

*!!    $   !
 
        



  
 

www.varindia.com April 2017 33 !


 
  
  

LEAD STORY

Regulations Should Protect Citizen's Data


Protecting files and enabling safe sharing of
information will help improve digital adoption
India, in its 71st year of Independence, is
witnessing enormous digital advances. While we While digitization helps
continue to plug into the digital realm, there are improve information-sharing
huge risks lurking around the corner especially and collaboration amongst
in terms of protecting the important privacy your different stakeholders,
documents of the larger population in general.
right protection is mission-
Robust data integrity, both inside and outside
the perimeter of Public Sector Enterprises critical to avoid any misuse of
and Government institutions, including but data. Protecting sensitive files
not limited to third party affiliates and vendor and enabling safe sharing of
organisations, will ensure long terms benefits information will help improve
for all stakeholders. digital adoption. In particular, soft
copies of customers KYC documents
How safe are your ID proofs &
and identification proofs needs to
KYC Documents?
While the government has made the right be protected, ideally with persistent
move with demonetisation, there is still much data-centric security that travels
to achieve when it comes to the digital world. with the files.
The governments digital momentum initiative Amit Malhotra
needs to address the rising security and privacy VP, Sales India,
concerns of citizens. Large private organizations Should third party outsourcing Middle East & Africa
pull out all stops to ensure their information vendors be regulated? Seclore
assets are protected both within their boundaries Hence there has to be a parallel initiative taken
as well as from the risks outside their perimeter. by Government wherein, security of digital data
more than 3.2 million debit cards, fearing
In the same way, government files, documents, needs go hand in hand with digitization of data.
fraud due to data leakage caused by a malware
citizen details stored should also be right It cannot be left aside in this fast-paced world.
infection at a third-party ATM switch used
protected. The all-important question is, how We also hope to see Government organizations
by one of the banks. The growing awareness,
safe is your important data like ID proofs and placing stricter compliance regulations on
coupled with the governments willingness to
KYC Documents etc? We live and work in an their third-party outsource vendors and other
acknowledge the national security risks posed
always-on digital economy. Free movement of external collaboration partners. Third-parties
by cyberattacks, makes us hopeful well see
data, oils the wheels of todays enterprise as such as advisors, vendors, sub-contractors
meaningful progress made in the fight to create
well as the modern-day government by making and business partners pose a huge risk to
effective cyber-legislation.
information flow seamlessly across enterprise organizations because they require access to
Many countries such as the US and Israel
borders. systems and data to conduct business, yet there
have their own cyber security frameworks.
While digitization helps improve information- is no accountability in the way they handle a
Europe is leading the way with the General
sharing and collaboration amongst your different companys data. Besides unsecured systems,
Data Protection Regulation (GDPR) act and
stakeholders, right protection is mission-critical there is also the issue of sub-contractors stealing
we expect countries to follow with similar
to avoid any misuse of data. Protecting sensitive intellectual property.
legislation. There is an urgent need for India
files and enabling safe sharing of information
also to have a robust cybersecurity framework
will help improve digital adoption. In particular, Whats in store in the immediate
in place to set up the backbone of stringent IT
soft copies of customers KYC documents and future? security measures in the country. This legislation
identification proofs needs to be protected, 2017 will be a Historic Year for Cybersecurity may start with mandatory breach notifications,
ideally with persistent data-centric security that Legislation. High-profile incidents such as the which initially eliminate undisclosed (or slowly
travels with the files. It is equally important in breaches at the Democratic National Committee disclosed) cyber incidents, but will eventually
cases of tax & land records, transaction files, and Yahoo, and the Apple encryption debate take the form of specific guidelines for how
court documents etc. that can be accessed and have increased public awareness around the citizens data must be protected, wherever it
utilized by only authorized users. This will help importance of data security and privacy. In India travels or is stored.
build the citizens full trust in our digital march. too several Indian banks blocked and recalled

Stepping into a Secure World


A strong mobile security regime undoubtedly has significant benefits, but,
due to inaccurate end-user preconceptions, it is challenging to implement it
In 2015, a British insurance company, Lloyd's, However, other forecasts, over the past year, organizations around the world.
estimated that, due to cyber-attacks, the industry have put the cybercrime figure at a frightening According to the BlackBerrys mobile security
incurs a staggering loss of $400 billion a year, $500 billion and beyond. In fact, as the world research conducted by BlackBerry Limited, a
which includes direct damage plus post-attack increasingly becomes digital, cybercrime has the leader in secure mobile communications, while
disruption to the normal course of business. potential to be one of the greatest threats to 73 per cent of organizations have a mobile

34 April 2017 www.varindia.com


security strategy in place, just 3 per cent have security in todays world. A world where data
implemented the highest levels of security is on the move on smartphones, tablets,
possible. This is due in part to users attitude wearables and laptops with travelling
82% of executives say their existing mobile executives, sales people, field workers,
security practices cause frustration among their contractors, clients and partners. All this
employees, while 44 per cent fear that too much access comes at a price: security. Companies
security will prevent staff from doing their jobs. and IT departments are working hard to
These attitudes have led to a risky environment, balance the benefits of mobility greater
one in which nearly nine out of ten executives productivity, happier workers, decreased costs
(86 per cent) are nervous that their companys and increased flexibility with the risk that
security wont be enough to keep out hackers or a lost or stolen device, malicious app, insider
malware. Part of the reason organizations are threat or other vulnerability may threaten the
opening themselves up to these risks is because safety of corporate data and assets. In line
of the growing trend of BYOD where despite with this, BlackBerry has recently unveiled
the popularity, almost half believe that supporting its mobile-native approach to security with
a BYOD policy is a risk. So what can be done the launch of a comprehensive platform
about this volatile business environment? designed for the Enterprise of Things. The
Security is an enabler, not an inconvenience BlackBerry Enterprise Mobility Suite enables a
Time and again, we hear people speak consistent approach to endpoint management
about information security as a hindrance or an Narendra Nayak across multiple OS platforms. It completes
inconvenience. However, when implemented MD the integration of the company's prior
properly, security works with the employees, not BlackBerry India acquisitions of security software companies,
against them. Security is, in fact, an enabler. It including Good Technology, WatchDox,
can connect people to their required resources AtHoc and Encription. With over 80 security
with ease, allowing them to work seamlessly as containerization. However, nearly 45 per certifications, BlackBerry recently ranked
with tools they are comfortable using. Security cent have no containerization technology in the highest in all six use-cases of Gartner's
focusses on meeting the needs of the end- place. And no one is sure how to address this "Critical Capabilities for High-Security
user, helping them become more productive, challenge, whether on corporate-owned or Mobility Management" report.
alongside the needs of IT. But, for that, an BYOD devices despite half of respondents According to various industry reports,
active approach is required by IT departments, agreeing that support of BYOD creates risks at cybercrime costs have quadrupled from 2013
especially for BYOD. their company. A strong mobile security regime to 2015. This is expected to quadruple again
Half of executives surveyed by BlackBerry undoubtedly has significant benefits. However, from 2015 to 2019. Juniper research predicts
predict that their employees mobile devices due to inaccurate end-users preconceptions, it is that the rapid digitization of consumers lives
will inevitably result in security breaches at their challenging to implement it. To address this, it and enterprise records will increase the cost of
organization. Therefore, a critical element to a is advisable to regularly evaluate the controls and data breaches to $2.1 trillion globally by 2019,
successful BYOD or COPE (corporate-owned, policies in place to protect the organization. increasing to almost four times the estimated
personally-enabled) mobile environment is Security is not a luxury cost of breaches in 2015. Therefore, now is
ensuring the isolation and separation of The predicted losses of billions of dollars the time to act and secure (our) one of the
personal and business mobile data, also known clearly underline the paramount importance of most valuable assets data!

Managing Cyber Security Risk


Digital technology and cashless economy has given rise to many cybersecurity threats

Every organization with digital information Legal and regulatory risk: What sets of information system unattended and making a
assets should have a well laid-out plan to support compliance, regulations and principles are gateway for criminals to commit crime at your
its security and be compliant to the laws of the required to be followed? expense?
land. To achieve this goal, major stakeholders in How could a data privacy breach or security What could happen if your data is encrypted
the company should come together and build incident do to your reputation among your and demanding ransomware? Would you like to
a remedial plan in case of any cyber incident. customer base? be caught at ransom for your negligence?
Every companys approach to mitigating privacy, What would happen if you are required Once you have identified your risks, start
security risk, complexity and viability of these to notify the media, regulators, shareholders, thinking about programmes and procedures that
programmes differs from company to company, stakeholders of the organization and how this address the risks that could have the largest and
depending on its size, space and industry. shall impact your business and image in the the most immediate impact on your business.
Organization that has a limited clientele and corporate world? A third-party assessment of your system,
revenue, and which handles a small amount of What are the financial risks of an external vulnerability assessment and penetration testing
non-public financial data might develop a brief threat and attack to your information system? and implementation of proper cybersecurity
charter points for a privacy and security plan, Could this downtime affect the revenue of your practices are recommended for data protection,
or perhaps a written standard or policy setting organization? privacy governance, security framework and
forth the entities regulatory and legal obligations Could the external and internal threats compliance.
from a privacy perspective. On the other hand, hamper your operations? What losses directly or
a large and more complex corporation that indirectly your business would incur caused by a Taking Inventory
handles sensitive information is likely to have a security incident or unforeseen disaster? An inventory of your physical and data assets
number of governance documents that outline Could your business partner take you to should be performed to help shape your security
and implement appropriate privacy, security court for laxity in implementing proper security programs. Conduct a sensitive information
policies, processes, procedures and measures. practices and causing huge monetary loss? inventory and data diagramming exercise to
The key factors to be taken into consideration What could happen if the law-enforcement identity the systems and applications on your
while taking stock of your risk are: agency would register offence for keeping the network that need highest level of physical and

www.varindia.com April 2017 35


LEAD STORY

technical security. rules, regulations and industry best practices


by monitoring developments and periodically
Internal governance updating policies to reflect any significant
Creating policy and governance documents changes.
is a very important challenge. Does the company
really need a highly detailed incident response Progress Mapping
plan and should the privacy policy be elaborative Changing organizational culture and
in nature? You should leverage and implement successfully implementing a set of standards
from documented best practices, follow might encourage business leaders to expand and
compliance and build up an ecosystem, wherein implement organizational privacy and security
there is a minimized risk to your information and programmes. An effective cybersecurity plan
data assets. The organizations incident response should have:
plan should be tailored to the risk your business
faces. It should be a road map for security, Training programme for
compliance and business leaders in the event of employees
business interruptions, business attacks, natural Use of licensed softwares
disasters and data breaches. Building, deploying effective hardware and
software firewalls
Monitoring and Compliance Dr Harold DCosta Establishing a collateral server
Any organization handling information CEO Keeping the backup option on while
should have dedicated cybersecurity personnel, Intelligent Quotient Security System configuring the OS. This shall ensure that no
conduct regular audit, monitor network for data be lost.
vulnerabilities, threats and security events. Choose a vendor giving you complete
Organization should ensure that their staff is your security professional has an up-to-date solutions under one roof
aware of security and privacy rules and remains understanding of privacy and security laws,
vigilant against policy violations. Make sure that

Balancing Cloud with Data Protection


Encryption and tokenization are becoming accepted best practices to support compliance

Indias National Cyber Security Policy was that leads to unavailability and security issues.
adopted in 2013 and includes both high-level Human Element
principles and targeted objectives and proposals. You are only as strong as your weakest link.
However, the plan has not been fully implemented If people are improperly trained or (worse)
and the legal framework supporting cybersecurity disgruntled, they can misconfigure technology,
remains weak. India has been no exception to which can cause catastrophic and unrecoverable
the devastating cybersecurity breaches that hit disaster. Companies need to educate employees
multiple industries across the world in 2016. about security teaching them about the dangers
These attacks have proved, time and again, that of phishing, unencrypted data and lax reactions,
no one is immune to sophisticated cyber-attacks. etc.
In this sophisticated threat environment, Choosing Right Security Technology
where traditional security tactics are failing, it is Security products should prevent the enemy
high time we revisit our security posture to build from getting inside the network. Detecting and
a strong cyber-resilient framework. As businesses blocking the threat only after it has penetrated
lean on technology for business advantage, newer the network does not really make any sense,
threat vectors are emerging. especially when you can prevent it.
Substantial growth in the online and A robust security framework that seeks to
digital data, smart city initiatives by the Indian prevent and not just detect security threats is
Government have pushed the Internet of Things an absolute must. In addition, the framework
(IoT) market and indirectly the cybersecurity should evolve with the growing business needs.
Bhaskar Bakthavatsalu
space in India by leaps and bounds. Cyber-attacks Periodic optimization of security infrastructure
MD - India & SAARC Check
have increased year over year making Indian will also help enterprises detect and prevent more
Point Software Technologies
business and government sites more vulnerable. threats and lower the total cost of ownership on
It is now important for Indian enterprises to look previous security investments.
at methods to prevent attacks and not just detect
attacks. For protection against todays attacks, the Peak into the future
emphasis should be on speed and prevention. engage with the brand. As we look into 2017, we expect to see
Organizations need to take a more proactive mobility, Industrial IoT, critical infrastructure
approach to cybersecurity. Components of Cyber Security and the cloud being the key areas of focus for
As businesses and government managed Framework hackers, besides the traditional threat vectors
citizen services go increasingly digital, cyber Right Security Architecture that exist today.
threats are only going to become even more The right architecture creates a framework As attacks on mobile devices continue to
difficult to track, predict and manage. Tackling for a stable security platform. By implementing grow in the world of mobility, we can expect to
or preparing for cybercrime is perhaps going the correct architecture, you eliminate single see enterprise breaches that originate on mobile
to become the most important task for any points of failure providing the necessary strength devices becoming a more significant corporate
enterprise. Without a proactive, people-centred and resiliency to maintain operations and security security concern. The recent nation-state
cybersecurity strategy in place, businesses run under any circumstances. Improper architecture sponsored attacks on journalists mobile phones
the risk of alienating customers even before they is the most common cause for catastrophic failure mean that these attack methods are now in the

36 April 2017 www.varindia.com


wild and we should expect to see organized to plan for the possibility that their networks spreading cloud to cloud or by hackers using
crime actors use them. and systems will see attack methods consistent the cloud as a volume multiplier.
Critical infrastructure is highly with multiple potential threat actors, including No sector is immune to vulnerabilities today.
vulnerable to cyber-attack. Nearly all critical nation-states, terrorism and organized crime. Threat researchers say the number, sophistication
infrastructures, including nuclear power There will also be a rise in ransomware and virulence of cyber threats continue to grow
plants and telecommunications towers, were attacks impacting cloud-based data centers. day by day. Our core focus needs to shift to threat
designed and built before the threat of cyber- As more organizations embrace the cloud, prevention space across endpoint, network and
attacks. In early 2016, the first blackout caused both public and private, these types of attacks mobile, besides detection solutions.
intentionally by a cyber-attack was reported. will start finding their way into this new Cybersecurity is no longer an option, it is an
Security planners in critical infrastructure need infrastructure, through either encrypted files absolute necessity.

Protecting root cause of insecurity


must for securing a datacenter
The world has been always vulnerable and unsecure. The primary reason of insecurity of the world is
greed of human being. The greed of power and money is the primary source of security problem. This is
arising due to non-adoptability of complete spirituality.
Human is still finding the reason of its being on.
and understanding what is best for him to do The problem of data theft happens at two
in life to fulfill the purpose of life. Till the time places - either in-transit or on stored data. The
answer is accepted and followed, mankind is solutions can be different for different size
following certain rules of development defined of company. For example for small size of
by mankind. The rule of development i.e. win organizations, adopting available tools in market
against another human is really dangerous which is best solution however for large and medium
is followed by the world. The entire world is in size organizations whose yearly expenditure
race to be better against other human who has is above 100 crore Rupees should be different.
created competition, hate across the humanity. For mitigating the in-transit problems, the
This race of becoming powerful or successful organization must adopt encryption. End to end
has created insecurity across humanity. Unless we encryption right from end user to data storage
come out of this race, there is no real security. is good option. For stored data, the mid and
When we talk about datacenter security, there large organization should really get their own
are three types of threats and challenges. protocol of storing data or database system
Protecting data lost developed. When there is complete enclosed
Protecting system from unavailability system and others dont have information about
Protecting data from theft. data representation, data value meaning, it would
First two kind of problems focuses on overall Anil Chandaliya be difficult to theft data. Therefore own closed
data lost and system availability. For example, if Chief Innovation Officer - ESDS Software system is always better solutions for large and
there is fire, flood or any accident, it can create Solution Pvt. Ltd. mid-size organization. We all know there are
data lost and unavailability of services. If this act countries in the world who develop weapons,
is done purposely it is called as DoS (Denial of who can damage. Known sources are generally creates fear in the world and then sale weapons
Service). The best method to address both of our employees, vendors, competitors and so on. to others to protect. If this is possible with
these first two problems is distributed system The best way to protect from known sources is countries, there is possibility it can happen with
architecture. The application and database to make them yours in real manner. Although it security organizations as well.
should be distributed across multiple datacenters. is not always possible to make everyone happy Tools which can be used to mitigate against
The traffic of application should be handled but efforts in that directions should be made tools depend upon type of threat. However
by multiple datacenter simultaneously. If data consciously to tackle such human threat. datacenter should start adopting system which
is spread across multiple datacenter then even The problem from known sources is are inter communicable and based on deep
if anything goes wrong at one place or at one primarily of two types. One is physical theft of learning, artificial intelligence. For example,
datacenter, data and system is available at other data and second is remotely theft of data. The if someone has deployed system of anti-virus,
places. Backup using Object storage methodology probability of physical theft of data in cloud era database activity monitoring, NDIS, IPS, end
at multiple datacenter also keeps data safe. CDN or distributed system is really very less and would point protection, application control system,
service is one of the best examples of this kind not be preferable way for any intruder. Therefore SIEM then all these system should have
of solution. the remaining focused should be on mitigating intelligence to talk to each other and pass-on
The threat of data theft is always from two virtual/remote data theft way. Remote data theft threat messages to each other so that every
entities. One is from known sources and second is done using tools. Although the rival is between protection system can act itself to protect all
is from unknown sources. The threat from known humans however tools fight for human being. In doors for intruder. Continuous monitoring
sources is always major as compare to unknown Early years of the world, human used to fight of all activities using SIEM and application
sources. Unknown sources are really not familiar with own organs directly however over the period behavior monitoring system is important which
with you or your data therefore threat from them of tools/weapons fights for human. Therefore to can identify unusual activity and notify. Based
can be protected using various tools. However protect from tool attack, better tools are require. on these unusual activities, security engineers
the threat from known sources is always bigger Certainly there are many tools available in market should start investigating and protecting it. As
as known sources always have full information to protect various threats from other tools. The conclusion of this, tools dont require data, data
about yourself, your data, and importance of available tools like antivirus, anti-malware, anti- is useful for mankind and therefore along with
that data and objective to damage. It is always spamming, end point protections, application tools protections system, the focus should be
important to identity the potential known sources control change system and encryption and so how to protect root cause of insecurity. n

www.varindia.com April 2017 37


TECHNOMANIA

Israel ready to be the Cyber


Security partner to India
T he Indian National Security Advisor
Najit Doval visited Israel on the 28th
February 2017 to prepare and lay the groundwork
cooperative relations with some of Indias top
companies.
On the eve of this historical visit by Prime
and certainly will be one of the high level points
of discussion between Prime Minister Modi and
Prime Minister Netanyahu.
for the Historic upcoming visit of Prime Minister Modi to Israel and the fact that Israel In the midst of these global conflicts, we all
Minister Narendra Modis visit to Israel in early is said to already be amongst the top military face the dual challenges of preventing terrorist
July 2017. This visit, the first ever by an Indian hardware suppliers to India, with more than $1 attacks in any manner and any form, be it cyber
Prime Minster, will significantly mark 25 years of billion in annual sales to New Delhi according carnage or physical destruction. In leveraging
diplomatic ties between the two Nations. to the Hindustan newspaper, Prime Minister all possible resources to meet these obligations
In November 2016, Marc Kahlberg was a Modi will surely discuss both technological these two important and relevant leaders
member of Israels President, Reuven Rivlins cooperation and indeed the threats and must make demands on their peers and those
delegation that visited India for the first time vulnerabilities that lie in the stealth but intriguing entrusted to protect their countries and engage
in nearly 20 years and it signified the growing world of Cyber and Intelligence. in more innovational multinational proactive
closeness of the two Nations. Close to 14 years has passed since the Al efforts of cooperation in the cyber security
Since the upgrade of the relations between Qaida terror attacks of September 11, 2001 in the sphere and indeed turn the big data and mass
India and Israel in 1992, the two countries have United States, 13 years, after possibly the worst amounts of information into actionable and
focused on agriculture and defense as a main single terror attack at the Park Hotel in Netanya, credible intelligence.
focus. India is seen globally as an IT hub of Israel, and 9 years after the 2008 Mumbai attacks In strengthening overall homeland security
excellence, so too Israel is seen as an expert in in India where a series of coordinated terrorist through cooperation between industries, foreign
Cyber Security solutions and the upcoming visit events where carried out by 10 members of partnerships and initiatives that can be created by
by Prime Minister Modi will certainly have an Lashkar-e-Taiba, an Islamic militant organization these two leaders, we all must be committed to
important agenda of broad based Cyber security based in Pakistan, carried out a series of 12 assisting them in expanding and increasing our
subject matter. coordinated shooting and bombing attacks layers of defense, which extend well beyond our
As Israel is ready and indeed has been lasting four days across Mumbai. different borders, by seeking further cooperation
assisting India with comprehensive and effective The world witnesses mass carnage via terror with our international partners and admitting
cyber security plans to counter and thwart threats and cyber threats and the influence of the media that as the free world tries to secure their
from extremist groups, industrial hackers and and more so the social media is so fast and so Homelands, we cannot simply rely on defensive
cyber thieves, the opportunity will certainly arise widely available today that reaction is simply approaches and well-planned response and
to introduce some of the worlds most advanced a thing of the past. Today everyone lives the recovery measures.
cyber intelligence technologies, leveraging some events that take place continents away in a live It must be recognized and agreed that
of the worlds brightest and most qualified scenario. The world is at war, each with a different our combined efforts also must involve self
cyber and HLS security minds with an extensive adversary who are committed to destroying each- defensive methods in all aspects of the term. By
infrastructure of hard earned experience. others people, ways of life and freedom. The deploying passive methods, policies and strategies
Companies like Israels Vital Intelligence only difference today is that the borders are no against aggressors and offenders the criminals or
Group that understand, through such experience longer physical, no longer relevant in many ways enemys plans cannot be disrupted therefore the
and practice, what it takes to minimize risk and each and every human being is vulnerable to impact of future disasters through measures that
through Cyber Intelligence methods of a terror attack not only in the form of a vehicle enhance the resilience of economies and critical
predicative and proactive concepts fusing unique ramming into innocent people anywhere on infrastructure before an incident occurs must be
technology design and integration will assist earth, as seen in Europe recently or a stabbing thwarted predictably and proactively.
in empowering Indian companies and certain or suicide bombing attack but by a simple click The writer, Marc Kahlberg is the
government sectors with Vital Intelligence of a button in the form of a Cyber Attack that CEO and Managing Director of the Vital
through partnerships and recently established has consequences that are so far reaching it must Intelligence Group Ltd

38 April 2017 www.varindia.com


FACE TO FACE

Canon keen to promote


photo culture in India
In a chat with VARINDIA, Eddie Udagawa, Vice-President, Consumer Imaging & Information Centre,
Canon, discusses about the company completing 20 years in India, camera market, its strategy and
roadmap
By delighting people for the last 20 years,
Canon has come a long way in India. It has
created its unique position in the market as
well as in the hearts of customers. With its
innovative product offerings especially in the
camera segment, Canon has carved its niche in
the market. According to Eddie Udagawa, Vice-
President, Consumer Imaging & Information
Centre, Canon, this success has been possible
because of the love and support of the Indian
consumers.
I like to appreciate that we are celebrating
20 years here, but without the Indian people,
customer support, we could not have survived.
So at first I would like to thank everybody for
the support and I hope for the next decades
all the Indian people love and support Canon.
In the past, of course at the beginning it was
challenging. Canon India started its operation 20 Eddie Udagawa
years ago but camera wise the company started Vice-President
its journey in 2003. At that time, professional Canon India
customers want to buy DSLR but the high-end
and the customers who wanted to buy were sales are high. I was actually surprised with the culture the company organizes Photo Marathon
price conscious. But since then we have started last years sales results of 5D which is a high-end every year.
our journey in photography culture in India and camera and was more than my expectation. Lots We have several schemes to maintain the
all the middle standard is getting higher and of people love high-end cameras also, states sales, but the important thing is we need to
people have moved on to photography which Eddie. increase the contact with the customers by
has helped our sale to grow higher, says Eddie organizing workshops, roadshows and Canon
Udagawa. Strategy Image Square (CIS). First, we want to promote
To strengthen its contact with customers, photo culture and this will increase Canon sales.
Camera market Canon has kicked off a pan-India roadshow, We have an event called Photo Marathon which
These days, smartphone camera has captured where customers will have hands-on experience happens every year in all South-East Asian
the market of compact cameras, but often people of the products and the company is targeting countries. We have been doing it for eight years
are not satisfied with the result of smartphone customer base of tier-3 and -4. Moreover, Canon now. It is something like where you are not only
cameras and want to buy DSLRs. So Canon sees is also following the strategy of NCU to CU. supposed to get Canon camera you can get any
the potential in these people. Taking this opportunity of 20th brand camera, compact or a DSLR. It is a whole
Actually, the compact camera has been Anniversary, we have flagged off a roadshow to one-day- long contest.
replaced by the smartphone camera. So Canon is strengthen our contact with our customers. It As long as people are clicking, Canon
trying to promote our high-end compact camera, has started from 10th of March. Customers will cameras will be sold. So we are trying to seed
DSLR and mirror-less camera. Though a lot of have hands-on experience of compact to entry- in that particular photography culture. Secondly,
people use smartphone camera for capturing level to high-end DSLR cameras. It is a pan- we are the only imaging and printing company
photos but then also customers are not so much India campaign where 60 cities will be covered which can give you both. We are the only one
satisfied with the results. Those people want to throughout the year. who say we can give you input through an
buy DSLR for capturing much better images. So This year, our direction is NCU to CU which imaging device and can print through a printing
that is our potential area of customers, explains means Non-Camera Users to Camera Users and device, informs Eddie.
Eddie. also it means Non-Canon Users to Canon Users.
Further, Eddie adds, Last year, we had a All the marketing activities that you see this Roadmap
campaign comparing a smartphone photo with year will either be following into creating a new Canon is aiming for a double-digit growth in
a DSLR. How high quality of photo customers customer base or to converting or upgrading the camera segment. The company is optimistic
can take by using DSLR so we want to promote people from other brands they are using. In this to capture a lions share in the market.
this kind of comparison to understand how roadshow, we are targeting Tier-3 and Tier-4 In the camera division, sales-wise we want
beautiful photos they can shoot. The entry-level cities because there is scope for new customer to grow more than double digit compared with
DSLR is priced at Rs.29,999 which is right now base. There is a market which gets stagnant at the last year. We are handling camera DSLR,
within the purchasing power of the customers one particular point, we do not want that. We compact, video and some selfie printer. Last
who are planning to buy DSLRs. think there is a huge potential and scope for year, we captured 50% market share already,
Talking about the trend Eddie mentions people to have a DSLR right now. So we are according to import and export data. This year
that Canon is observing an increase in sales in going to those markets, lay down our entire also we are aiming to achieve more than 50%
entry-level cameras and last year the company range, discusses Eddie. market share, concludes Eddie. n
witnesses a good demand of high-end cameras. Canon wants to promote photo culture as Aparna Mullick
In terms of quantity, the entry-level camera it will increase camera sales. So to boost the aparna@varindia.com

www.varindia.com April 2017 39


COVER STORY

GST A big game-changer


for the economy
approved the Central GST (CGST), Integrated
GST (IGST), Union Territory GST (UTGST)
GST is a great step by and the Compensation to states law.
Team India, great step Presently, a myriad of indirect taxes are
towards transformation. levied in India without the ability to claim
This cant be seen as credit of such taxes by different persons that
a victory of a party or leads to a situation of cascading effect of taxes.
government, it is a win Amongst others, with the introduction of GST,
the cascading effect to a large extent should be
for the democratic ethos addressed. Accordingly, it is expected that the
of India. We say a lot GST regime would have a positive impact on
about corruption but to the economy in the long run.
eradicate corruption it is GST shall provide the much needed
important to strengthen stimulant for economic growth in India by
our system as well, ensuring the free flow of goods and services
within the economy and also eliminating the
PM Narendra Modi cascading effect of different taxation. It might

Touted as the biggest indirect tax GST, in the days to come will
reform since independence, GST would ensure much larger revenues
subsume central excise, service tax as far as states and the central
and other local levies. GST, the need government is concerned and
for which is felt under the current expands the size as far as the
indirect tax system, is expected to formal economy is concerned.
have a favourable outcome on the New indirect tax regime
economy when rolled out in July. will make India one single
The Rajya Sabha has recently passed
four supplementary legislations which will
market, eliminate multiple
purportedly enable the government to rollout assessments, check evasion
the landmark Goods and Services Tax Bill on and bring more revenues into
July 1. The four Bills are the Central Goods and the system. I am glad that
Services Tax Bill, 2017, the Integrated Goods almost all state governments
and Services Tax Bill, 2017, the Goods and have actively co-operated
Services Tax (Compensation to States) Bill, 2017
and the Union Territory Goods and Services
in making this a reality,
Tax Bill, 2017. The Lok Sabha last month had Finance Minister Arun Jaitley.

40 April 2017 www.varindia.com


Anwar Shirpurwala, Executive Nimish Goel, Head Indirect Tax Rushabh Shah, President - Trade
Director at Manufacturers Association Practice and GST, International Business Association of Information Technology
for Information Technology (MAIT) Advisors (TAIT)

The revised Model GST law contains GST should bring additional business When the GST bill finally rolls out
enabling provisions for anti-profiteering opportunities to a large IT companies. on July 1 this year, it will transform the
in order to ensure that the additional Software and ERP development system of taxation in India by replacing
benefit available to industry inter alia on companies stand to gain the most since all indirect taxes levied on goods and
account of removal of cascading effect of every company now need to overhaul its services by the Indian Central and state
taxes, rate of GST, etc, are passed on to existing IT/ERP system. Additionally, the governments. Although GST has been
the end consumer. The same would have GST Council has also come up with the touted as a simplified and easier tax
a huge impact on the industry at large as concept of GST Suvidha Providers (GSP) regime, which it is, but all sectors are
they would be duty bound to ensure that who will act as mediators between bracing up for a few surprises also. The
the benefits on account of GST is passed taxpayers and Government. entire concept of availment of input tax
on to the end consumer. credit is all set to change.

also increase the administrative costs. One become simple with hassle free documentation. price advantage can increase affordability and
Nation, one Tax will enable abolishment of entry Indirect benefits of not needing a branch/ usage, says T. Jayakumar, Director - Touchline
tax, LBT, Octroi etc. It will enable businesses warehouse for local taxation advantage is a cost Technologies.
to move into different geographies seamlessly. benefit. E-commerce commercials / logistics However, currently services attract 15
Also, with the introduction of electronic will be at the best with uniform taxation. The per cent service tax (including cesses). This is
payment structure, it will ease the process of GST % can be kept at lower side, since we are likely to increase to 18 per cent under GST.
conducting business for IT companies, says in the beginning of the digital money era, the This means there will be additional working
Sudip De Director - Doel International. capital requirements to manage the cash flows
for the period between invoicing and payment
realization.
Gopal Pansari Quantitatively, experts are of the opinion
Director - Savera Digital India that the GDP is expected to rise by 1% to
2%. However, in the short run, it is expected
There is no immediate impact of the to be disruptive due to transition issues while
GST bill as everything depends on the migrating into the new regime, reiterates
final GST bill that will be implemented. Anwar Shirpurwala, Executive Director at
The most important impact will be that Manufacturers Association for Information
the IT distributors need to change their Technology (MAIT).
distribution model to take most out of
new structure. Channel managers and Impact of GST on the IT industry ..
sales executives will be hearing less According to Alok Dubey, CFO, Acer
conflict issues due to price differences India, considering the overall IT industry, there
caused by local taxes. is not any major impact seen on the goods as
the proposed rate of 12% and 18% is almost

GST would provide tax credit to the Sanjay Joshi


manufacturer. Various tax barriers such as check Country Manager at Edimax India &
posts and toll plazas lead to a lot of wastage Sub Continent
for perishable items being transported, a loss
that translated into major costs through higher
Its great that now all taxes would come
need of buffer stocks and warehousing costs as
under a single scheme. GST is intended to
well. A single taxation system could eliminate
this roadblock for them. A single taxation on move all indirect taxes but it may create
producers would also translate into a lower a problem in trade and commerce for the
final selling price for the consumer. Also, there manufacturers who are manufacturing in
will be more transparency in the system as the different parts of the nation. But indeed
customers would know exactly how much taxes it will surely bring transparency in the
they are being charged and on what base. business and for the customers which will,
Indeed, the end consumer is to benefit in turn, eliminate corruption.
to a good extend. Trade across the states will

www.varindia.com April 2017 41


COVER STORY

Alok Dubey Pulkit Punj Sudip De


CFO - Acer India Director - AnG India Director - Doel International

With the adoption of GST there is Some provisions of the constitutional GST would provide tax credit to
a huge scope to address tax policy and amendment bill on the goods GST could the manufacturer. Various tax barriers
compliance. The law, giving enough undermine the competitiveness of Indias such as check posts and toll plazas lead
incentive for companies to declare IT industry and have the potential to to a lot of wastage for perishable items
transaction in order to claim tax credits spark disputes and litigation. I consider being transported, a loss that translated
will reduce overall tax evasion. Businesses that complex billing and invoicing into major costs through higher need
will have only State and Central GST requirements due to supply and valuable of buffer stocks and warehousing costs
Departments to deal with instead of provision of the GST could complicate as well. A single taxation system could
variety of state and central departments- the taxation procedure for our industry. eliminate this roadblock for them. A
bringing down- hopefully, disputes, Currently, we are governed by single single taxation on producers would also
litigation and cost of compliance. regime but new complex GST bill will give translate into a lower final selling price
a huge impact on our industry. for the consumer.

the same of the combined rate of Duty and cities will probably have one physical branch to reform which will now follow destination based
local VAT; however, the services are getting handle billing in different states. Invoices in this tax structure instead of origin based. GST will
pushed to 18% seems to be more expensive. sector are reconciled only after the payments surely reduce the average tax rate. By registering
The foremost impact would be on software are made for transactions that are complete, for all the states we are catering to, we expect
exporters, as most of the companies are but with GST, recording every invoice will be ease in the business processes. Our business will
engaged in export of software and having very the responsibility of IT companies. The input- surely be benefited as it will help in eliminating
negligible domestic sales. The present rate of tax credit can be a pain point for the SME the spurt effects of the present tax structure
service tax on the input services availed by these sector though. Software is at present taxed and will allow free flow of goods and services
companies is presently levied at 15% is now twice in India--service tax and VAT. As a case within our country.
proposed to levy at 18% under GST and the
biggest challenge is utilization of unutilized GST Sudhir Singh
credits. Even though in the proposed draft GST Managing Director, Marg Compusoft
law automatic refund of 80% amount is granted
when claim is submitted but it shall affect the A common market would be created
Companys Cash Flow. Further, the cost of across the nation. It will create a level
compliance may increase due to requirement of
playing field for all. The digitization and
separate registration under model GST Law for
clarity of laws will bring transparency
the Service providers as against the centralized
registration and compliance under the present
which will create ease of doing
law. The industry still hopes that the new law business.
shall allow easy transfers of service tax credits
from one state to another.
Pulkit Punj, Director, AnG India has also
been of a similar opinion. I believe that the
multiple registration GST model will affect
the internal business of the IT industry. Also,
the industry has been discussing about the in point, in the state of Maharashtra, total tax Similar views are also of Sanjay Joshi Country
challenges of this new law model as it could on software is 15 per cent as paper license or Manager - Edimax India & Sub Continent, who
leads to increase the complexities in the industry service tax and 6 per cent as value added tax, feels that GST is a biggest game changer and
and the process as well. or VAT, which adds up to around 21 per cent reforms Indias indirect tax structure. The
With GST on the cards, players in the IT on base rate. Post GST, this will come down amalgamation and comprehensive tax structure
industry are streamlining their existing system to 18 per cent. Essentially, small is not always introduced will surely help in boosting GDP.
of distribution and retail marketing, and are beautiful from GST's prism because below a The Introduction of GSTN enabled softwares
also reworking their channel strategy, preparing threshold IT companies do not get the benefit and new methods of electronic payments will
cash flows, etc. Distributors in the IT industry of the input, explains Rushabh Shah, President surely help in carrying out the business process
are, on the other hand, keeping a check on their - Trade Association of Information Technology with accuracy, speediness and seamlessness.
stocks, are downsizing their inventories, and are (TAIT). Services sector in India is a rapidly growing
also putting their accounting system in place. According to Gopal Pansari Director at and significantly contributing sector to fiscal
As we move towards one nation, one Savera Digital India, in order to accelerate revenues.
tax, IT companies with operations in multiple digitization, GST seems to be a pronounced tax Unlike the product market, IT industry taps

42 April 2017 www.varindia.com


on their services. In the present scenario, IGST,
CGST and SGST are in decentralized place Aniketh Jain
varying as per the location. Through the unified CEO & Co-Founder - Solutions Infini
centralized format, it becomes easy for the
regulatory authorities to maintain an easy track The Centralised GST system can
of where the incoming claims are from. This be beneficial to companies providing
ensures transparency for the service receivers as services from a unified location. However,
to what exactly they are paying their taxes for. there are numerous provisions that can
One centralized platform also ensures that the impact the industry at large eliminating
decentralized compliances get accurate tracking. multiple levies for IT Companies, free flow
Through the centralized system, the service of goods across the country, increased
providers can now be able to provide at a final opportunity for Vendors, double Taxation
lower selling price to the service receiver, views elimination, and so on.
Aniketh Jain, CEO & Co-Founder of Solutions
Infini.
The creation of uniform market across the
country will make doing business in multiple IT companies would need to play a pivotal "GST is really great and it has greatest
sates easy. Elimination of multiple levies for role in creating new and innovative solutions. benefits that it is built ground up as a
IT companies and creation of a uniform tax Additionally, the Government will want to technology-enabled-tax-system which allows for
system across the nation will cause deeper incentivize both IT companies and consumers extraordinary traceability. Being technology led,
penetration of digital services. IT service in this process. For all the above reasons, the it has the potential to spiral upwards the trust
providers would be able to set-off input GST introduction of GST will lower tax rates for the deficit, rather than spiral downwards. However,
on purchase of Goods required for setting up IT and Software industry and enabling adoption one of the major drawback or the most critical
the necessary IT infrastructure with their GST due to reduced cost of software. cause of potential failure of GST will be in the
output liabilities. This may lower the prices of Putting across similar views, Niraj Hutheesing transference of responsibility of tax compliance
IT services and benefit the end user in long run. is the Founder and Director - Cygnet Infotech and remittance to the customers to make them
The compliance has become a lot easier. Laws says, What is seen as a setback for tax-payers eligible for input credit," opines Bharat Goenka,
are not that ambiguous, points out Sudhir due to complete digitization, this move by Co-Founder & MD - Tally Solutions.
Singh, Managing Director, Marg Compusoft. Government is to eradicate the cascading tax
GST, with the Uniformity of tax rates and policy and smoothen the tax-structure with a Limitations still persist
structures and all tax payer services would be flat system. Software and services sector face a The passage of the GST bill will
available to the taxpayers online, which would major challenge of setting up huge datacenter unquestionably usher in the most impactful tax
reform; however, there are few limitations to it.
T. Jayakumar Like for instance, as Alok points out, the
Director - Touchline Technologies draft law is yet to give full clarity on transition
provisions. Especially for trading community,
With GST, consumer states will Rule there may be loss of credit contained in
The Roost and overall development will inventory in hand to the extent of excise /
be higher in those states. The GST % can customs duty paid thereon. Unless an effective
be kept at lower side, since we are in the credit is allowed, the economic activity across
beginning of the digital money era, the trade leading upto the July 01 shall be rather
price advantage can increase affordability slow as traders shall minimize their stocks. For
the IT hardware industry the free spare parts
and usage.
replacement under warranty may require double
/multiple GST payment as the new GST law
fails to clarify the position yet, says Alok.
The Government is still deliberating on the
mechanism to be adopted to perpetuate Make
in India under the GST and no concrete
make compliance easy and transparent for to cater to the huge chunk of data, best in-class framework has put together in this regard. In
business owner. This transparent indirect tax IT infrastructure, eminent knowledge pool and order to reduce the import burden it is essential
regime is widely expected to accelerate overall skill set to develop intuitive software solutions, that the Make in India scheme be extended to all
growth of GDP in India; this may create closely working with chartered accountants ITA goods, specifically to notebooks, desktops,
benefits of spin off for IT business, asserts learning the ropes for financial systems, in- servers and storage. Possible recommendation
Sanjeev Gulati, Country Manager-India & depth know how of financial world and taxation for continuation of duty differential scheme
SAARC -VIVOTEK. and lot more.
With the GST coming in, we may see
certain changes in the IT industry where the Sanjeev Gulati
taxation structure on companies like ours will Country Manager-India & SAARC -
get rationalized. Presently, companies are paying VIVOTEK
two types of taxes one being the service tax
and the other is the VAT. Once GST is rolled For IT software currently attracts
out, we believe that this issue will be resolved different levels of tax. Under GST this
and a single tax will be applied. This will help dual taxation and cascading effect would
significantly in reducing compliance effort and
reduce significantly and the benefits
costs, says Girish Rowjee- Co-founder &CEO,
could accrue to end user in the form of
Greytip Software.
There is a significant push from the
lower prices.
Government to move to a less-cash economy
resulting in a lot of physical transactions
moving online. In order for this to happen,

www.varindia.com April 2017 43


COVER STORY

Presently, a myriad
of indirect taxes are
levied in India without
the ability to claim
credit of such taxes by
different persons that
leads to a situation
of cascading effect of
Girish Rowjee
taxes. Amongst others, Niraj Hutheesing
Co-founder & CEO, Greytip Software with the introduction Founder and Director - Cygnet Infotech
of GST, the cascading Pvt. Ltd.
Implementation of GST will be a big
relief for the industry at large by providing effect to a large extent The biggest implication of GST on IT
ease of doing business. Presently industry should be addressed is industry is Tons of new business! GST
has to pay various taxes on a single is a bigger wave than Y2K problem. When
product which consists Central taxes such in Y2K the 4-digit was resolved easily
as Central Excise duty, Additional Excise existing companies cannot change their sourcing with a 2-digit replacement, GST is a SEA-
duty, Service tax, Additional Custom or distribution strategy, they will find it difficult CHANGE! While Y2K bug impacted the
duty and Special Additional duty as well to take proper advantage of input credit. In the entire IT system, GST implementation will
as state-level taxes such as VAT or Sales current taxation system, input credit is available impact all ERP systems for all clients active
tax, Central Sales tax, Entertainment tax, on tax invoice however with the implementation within the GST network. Implementing
Entry tax, Purchase tax, Luxury tax and of GST; input credit will depend on filing of IT in GST will make faster and speedier
Octroi. These taxes will subsume in GST the returns by the vendor on time. It would be refunds for exporters - a less bureaucratic
which will help in reducing administrative really difficult to deal with small suppliers and way of working and remove the need for
large companies may avoid dealing with small
work involved for compliance under taking multiple different registrations
suppliers to reduce the risk, says Girish.
different laws. under VAT, Excise and Service tax.
Multiple slabs of taxes are not as expected.
The way bureaucracy is involved in most of the
under GST, suggests Anwar. A negative list things, it seems the Red-Tapism is not going to to issue multiple invoices. This is a paradigm
of ITA goods is introduced on import of be reduced. The lack of unity amongst different shift from the way IT companies operate
which (for trading) no credit of CGST portion departments is also a matter of concern, opines currently with a single registration and filing
of IGST would be permissible. Additionally, Sudhir. of two returns annually. Under GST the no.
benefit of upfront exemption from levy of Compliances under the GST shall increase of returns to be filed for each registered office
CGST be provided on the goods manufactured multifold typically for those companies that shall be 37 per annum.
in India; or the benefit may be extended by have multiple offices in India and from where He further says that e-commerce companies
way of a refund mechanism wherein refund of
CGST would be available to manufacturers. Bharat Goenka
According to Pulkit, the new multiple
Co-Founder & MD -
registration GST model is costlier and its the
Tally Solutions
biggest disadvantage as well as challenge for us.
If I talk about current service tax in India is
15% but due to proposed GST, its about 18%- "With the framing of this law, the
20%. According to me previous (single regime) Government hopes that the market will
GST model was much better and simple for self-weed out the bad eggs. While in
us. theory this is fine, not understanding the
Says Aniketh, It can be substantially cascading consequences of doing this in
challenging for the legal system to get the practice, and the mayhem it will create is
centralized platform into execution. The process an alarming concern."
like any other is complex and time consuming.
Its also challenging to the system to get
approval from 15 states once the Constitution
Amendment Bill is passed by the Parliament.
The current taxation system has clearly services are supplied to the customers. This is (that are not engaged as mere aggregators)
defined the powers of state and center in terms because each and every office that is engaged and undertaking millions of transactions
of levy and administration of taxes. As the in supplying a taxable service shall be required shall be required to deduct 'tax collection at
GST will have a dual control model and being to be registered separately under GST. This is source' (TCS) on all supplies made by the
introduced as a new law, there is expected to be unlike the current scenario where all offices vendors through their websites. This means
more litigation in terms of jurisdiction of state could be combined together and registered a very strong and a robust monitoring of the
and center for interstate transactions. The place under a centralized system for service tax. transactions to ensure every supply is subject
of supply provision will require registration Separate registrations shall mean maintaining to TCS. This definitely means making the IT
in more state, if the delivery is made through separate books of accounts, separate payment system capable of recording each and every
offices located at different places. Currently the of taxes and filing multiple returns. All this transaction on a timely basis to ensure correct
law is very clear in terms of input tax credit is going to increase the cost of IT companies adherence to the law. n
process and most of the companies are aligned drastically.
with the current system. Going forward, if the Samrita Baruah
Nimish points out that the challenge shall be samrita@varindia.com

44 April 2017 www.varindia.com


PRODUCT OF THE MONTH

LG speakers Giving a new definition to


Home Entertainment
T he latest music gadgets from LG are the speakers. They have been
developed in such a way that they deliver an unparalleled audio
experience for the user. The portability of the X Boom Handy Speakers with
the telescoping handle makes them a great choice for youngsters who love to
grab their gadgets and go. The enhanced acoustics and versatile shape makes
it a great hit amongst music lovers. The chargeable battery feature ensures a
long-lasting music session along with a special Karaoke feature for people who
love to sing. You will also be able to charge your phones using this speaker. The
wireless connectivity of this speaker truly makes it a high-tech gadget that is a
must have for all music lovers.
The OM4560 adds to the excitement of the party with its powerful amplifier
that includes a 2500W PMPO output. This sound system is developed for music
lovers around the globe. Users can download the Music Flow Bluetooth app to
enhance the functionality of the speakers. The Music Flow Bluetooth is more
than just a remote; it simplifies listening and unites everything music into easy-
to-use app. The sound sync feature allows users to simply link their LG audio product with a compatible LG HDTV wirelessly via Bluetooth,
reducing the cable clutter behind/beneath your TV. If you shake the smart Device (Mobile Phone etc.), the Connection will disconnect from the
Speakers and will switch to the Smart Device. This technology enhances usability and makes your gadgets convenient to use.
LG has always tried to give a new definition to home entertainment. It has been offering a number of options with the ultimate blend of
design and performance. The LG new sound bar SH5 is hassle free to use as the sound starts the moment you send audio to it till then the bar
sleeps; when audio is sent via Bluetooth the bar unit wakes up and plays through integrated Wireless connectivity (Bluetooth), you can free yourself
from messy wires and stay connected. You dont have to change the function of the speaker when you are changing your content. The bar comes
along with a wireless subwoofer which enhances the sounds from your favorite TV shows, motion pictures, games etc. These compact audio devices
rock your homes with a thrilling sound of 320W, while bringing a beautiful addition to your home dcor. LG's differentiated voice enhancing
technology actively analyzes the vocal levels in real time. When it senses high vocal levels, it automatically lowers the bass power to make dialogue
crystal-clear. The auto sound engine feature optimizes the audio at every volume level keeping the frequencies accurate in the right places. This
delivers the correct sound balance no matter the sound volume. Also, the sound starts the moment you send audio to it. The bar sleeps but when
audio is sent via Bluetooth the unit wakes and plays.

I n d i as F i r s t
14.1 LAPTOP


/-

Intel Inside. Amazing Experiences Outside.

Intel Quad Core 8.5 Hours 14.1 HD 1 Year


Upto 1.84GHz PROCESSOR BATTERY BACKUP DISPLAY SCREEN WARRANTY

Sales & Support: 040 - 4816 1111 buy now @ www.rdp.online


1
Taxes and handling charges are extra.Intel, Intel Atom, the Intel logo and the Intel Inside logo are trademarks of Intel Corporation in the U.S. and/or other countries.
Windows is a registered trademark of Microsoft Corporation in the United States and other countries.

www.varindia.com April 2017 45


FACE TO FACE

GST to help government run


a legitimate economy
In a chat with VARINDIA, Tejas Goenka, Executive Director at Tally Solutions has vividly
described GST, reasons behind its introduction, the technology that is embedded in the new
tax format, mechanism of GST and compliance of Tally with all the industry segments

A like VAT, Goods and Services Tax (GST) is a new kind of indirect
tax merging some of the existing taxes to a single tax. Trade across
state and tax on tax are the two major reasons that have triggered the
government to introduce this new type of law, GST. With its introduction
in India it is expected that the burden of tax will become less.
More noise has been made about GST theoretically than necessary. It
is a new kind of Tax but when we actually read the law, we understand the
situation. The government is very clear about it and there are two major
reasons behind introducing GST; first, trade across state is very difficult
and second tax on tax happens as at centre there is tax on certain things
and state tax on certain things - Centre tax on Excise and Service tax and
state tax on VAT. If you are manufacturing then one has to pay excise
tax and then again VAT on excise tax. This means the charge of the tax
is little bit more. With GST the expectation is that a manufacturer will
charge GST and others will also charge GST but there one needs to pay
tax only on the value addition. So the tax on tax is removed. Secondly, the
trade between states should become easier, says Tejas Goenka, Executive
Director at Tally Solutions.

Technology & GST


In todays world everything is being done with the help of technology.
Similarly, GST is also driven by technology. The concept behind GST is
invoice matching. It is expected that this system of invoice matching will
reduce the fraud in taxes.
The world has moved into technology at a faster pace in last 10
years. The large big change was the intent behind VAT which is also a
technology driven law but at that time one could not imagine what kind of
technology was needed. During budget, Finance Minister said that if you
look at demonetization then people will start recognizing where the money
is. Only 5-6% tax is being paid by the people which is less than what they and mine tax liability will automatically be calculated. All you have to do is
are supposed to pay and there are simple ways to get over it. So GST has pay and sign, states Tejas.
introduced a concept of invoice matching. The concept is very simple, if As GST is based on invoice matching it is impossible without
I sell a handset to you then will give you an invoice and suppose the cost technology. So, for that government is encouraging the portal based system
of the handset is Rs 10,000 and assume that GST will be 20% so Rs 2000 build on API system. The APIs will be connected to accounting software
of tax you have to pay me. The government does not want to know the and work becomes easy.
total sales and purchase of the month, it only wants to see the invoice that The reason why GST is important is actually the whole law is based
you have paid Rs 10000 plus Rs 2000 of GST to me. When the invoice is on the concept of invoice matching and it is impossible to do it without
accepted or rejected by you then the government is sure that both parties technology. According to government, if you are selling a phone please
are agreeing who has to pay what tax. Here the fraud that happens in tax upload that invoice and if you are uploading that invoice you cannot be
will reduce. The system of invoice matching that is expected to help the entering it in your Tally or excel sheet and cannot be then entering it into
government make sure that the economy becomes a legitimate economy, government portal and upload it. So please enter it into one place and
explains Tejas. from there itself you should be able to upload. Typically the government
is pushing the portal based system. And with GST, they are very clear
How GST works and building this API based system. Now the APIs will connect the
The government is asking to book the sales and purchases of every accounting application in which you are doing entries and it will then allow
month which makes easy to calculate the tax liability. the business to operate much easier. Whatever the transaction entries that
In GST, government is trying to say that please upload all your sales took place, it will automatically showup at the backend of GST. Our role is
either everyday or on 10th of every month. The moment I upload all my we provide accounting software and you use Tally for invoices and Tally is
sales, the only thing need to do is accept the entire amount that I have sold already connected to GSTN. Therefore your work becomes much easier,
to you. All my sales become your purchase, you can accept the purchases he adds.
or decline or modify it. Now every transaction will either have acceptance,
rejection or a modification. If I have to do this on 10th of every month Tally compliant with market
then it cannot be done without technology. For me I am just building a Tally as an accounting software is compliant with every business. A
system with GST which will basically match invoices and therefore yours

46 April 2017 www.varindia.com


major portion of the market use Tally as their accounting software. With
time people are looking for specific solutions so the company has to focus
on that.
If you look at the number of business that needs to be compliant,
businesses that are automated, 80-90% of the market is ours from an
accounting point of view. The focus has to be, if I look at the next few
years, people are asking for more specific solutions for them and they want
them out of the box. There are some specific industries that are unique
like retail. We have POS billing but we are not the preferred brand for
many people. But the market is also very small if you want to go vertical
specific, says Tejas.
Tally will remain a horizontal player and will also focus on some
the specific segments. It observes that retail is a segment with immense
potential in coming years. The company will also put in its efforts into it.
We will definitely believe that we will remain a horizontal player for
long time and we will take select segments and focus on them. We think
retail has a potential to become very large. Even though the amount of
sales today are very low but the moment you go with the next 3-4 years
and the effort that the government is making like to get digitized, cashless
people will want something which will work in less time. And to get there
is what we need to put our effort into, adds Tejas. world. He is also hopeful that Tally in coming years will no longer be an
Indian brand but a global brand. The company is constantly investing in
few countries like Middle-East, Bangladesh, Nepal, Indonesia etc.
Channel Partners The reason I joined the business is that there are 7 billion people in
Tally has a huge partner base across India and they contribute a major the world today, there are probably about 150 million entrepreneurs in the
portion to the companys total revenue. world today, after 10-15 years the number of entrepreneurs will increase
Partners play a very important role for us. If we consider the entire and you can serve 7 billion people through them. It is basically like how
revenue of the company as 100% then 95% of the revenue is contributed much of a positive impact you can have on the world sitting out of India.
by the Partners on the books. Actually 99% is contributed by Partners. I think in next 15-20 years, Tally will no longer be an Indian brand and
Very few people go to our website and buy the software. We have over become a global brand. For last few years we have put our investment
25,000 partners, asserts Tejas. into Middle-East specifically UAE, Saudi, Oman, Bahrain, Qatar, Kuwait.
We have our office in Nairobi also which we started two years ago. We
Tally- Aspiring to be a global brand operate out of Bangladesh and Nepal but it is more for India. We have also
Tejas aims to serve people by helping the entrepreneurs across the deputed people in Indonesia, concludes Tejas. n

Trend Micros Raimund


Genes passes away
It is with great sadness that Trend Micro and its 5,500 employees around the globe have
learned about the death of Raimund Genes, Chief Technology Officer for Trend Micro. Genes,
aged 54, died unexpectedly of heart attack on 24th March, at his family home in Germany.
It is with a heavy heart that I have to inform you about the incalculable loss of our dear
friend and colleague Raimund Genes, said Eva Chen, Chief Executive Officer for Trend Micro,
in a note to all the employees. We are shocked and heartbroken. Raimund was an exceptional
human being and a great leader. He was a confidant and friend and our heart goes out to his
family.
Raimund Genes was an integral part of Trend Micro during the last 21 years, building up the
Trend Micro organization in Germany and Europe and serving as chief technology officer and
an important public voice for the company.
Trend Micro and the entire security industry have lost an exceptional visionary and a
wonderful human being. Raimunds talent, knowledge, passion and great sense of humour will
be truly missed, said Jenny and Steve Chang, Co-Founders of Trend Micro. Raimund was well
known in the industry for his security knowledge, and he enjoyed using vibrant examples to
educate audiences about the need for cybersecurity. As an integral part of our executive team, we
highly appreciated his ambition to constantly challenge himself and the organization. His drive
for continuous improvement and his remarkable talent sparked the passion of security of others.
He was a great mentor to so many Trend Micro employees.
Raimund Genes gained a wealth of security expertise and experience over the course of his
30-year career. Originally a distributor for Trend Micro with his own business, he founded Trend
Micro Deutschland GmbH, Trend Micros subsidiary in Germany in 1996.

www.varindia.com April 2017 47


VAR MOBILITY

Samsung ties up with Amazon India


over Galaxy C7 Pro
S amsung has come up with its latest
smartphone Samsung Galaxy C7 Pro.
It will be exclusively available sold on Amazon
India.
Galaxy C7 Pro packs in powerful features in
a premium slim design at 7mm to give consumer
a comfortable grip. The device is crafted with
a full metal unibody and a 2.5D Gorilla Glass
that make it very durable. Galaxy C7 Pro also
sports a 5.7 FHD Super AMOLED display that
provides an immersive and enriching viewing
experience.
Galaxy C7 Pro comes equipped with a
powerful 2.2 GHz octa-core processor and
4 GB RAM. The smartphone has an inbuilt

in low light conditions. The rear camera comes colour options - Navy Blue and Gold. The
equipped with Phase Detection Auto-Focus device will be priced at Rs 27,990 and will
and Dual LED flash features, which allow retail exclusively on Amazon.in from April
users to capture clear and bright photographs. 11, 2017.
The front camera offers an upgraded selfie We are pleased to be the partner of
experience with its pre-installed beautifying choice for Samsung and offer our customers
effects. The floating camera button in Galaxy a chance to own the exclusive access to
C7 Pro enables users to take the best shots at Galaxy C7 Pro, said Arun Srinivasan,
ease with single hand. Director, Consumer Electronics (Category
Galaxy C7 Pro will be available in two Management), Amazon India. n

memory of 64 GB which is expandable to 256


GB, so consumers have enough space to store
their favourite pictures, movies or songs.
Galaxy C7 Pro is a slim and stunning
device, which comes packed with powerful
features for unparalleled multitasking and
multimedia experience making it a Lean and
Mean machine for the millennials, said Sandeep
Singh Arora, Vice President, Online Business,
Samsung India.
Galaxy C7 Pro also has a powerful 3,300mAh
battery, with fast charging capabilities to charge
the phone completely in just 100 min.
Galaxy C7 Pro features a 16 MP rear camera
as well as a 16 MP front camera both with an
f1.9 aperture lens for taking great pictures even

48 April 2017 www.varindia.com


VAR MOBILITY

4G connections to reach
41% by 2020

4G globally is planned to double from present 23% to reach 41% by 2020

M obile broadband connection


globally (3G and 4G) accounted for
55% of total connection in 2016 to 75% by
trillion of economic value. Mobile ecosystem
has also supported approximately 28 million
jobs.
connection base in 2020. On the other hand Mobile broadband networks continues
5G is forecast to cover around a third of the to gain momentum and is driven by
global population by 2025, with adoption improved coverage of higher speed
reaching one 1.1 billion connections. networks, attractively priced data tariffs
Total mobile revenues reached $1.05 and greater availability and affordability
trillion in 2016, up 2.2% on 2015, making of smartphones. At the and 2014 mobile
the second consecutive year of rising
revenue growth thanks to digital platform.
Operators are creating digital platform
connects everyone and everything. Players
across the broader mobile ecosystem have
already opened open innovative strategies developing world, 50% of the population is
particularly in the app economy and the covered by 4G which is expected to increase
mobile internet. to almost 70% by 2020. In developed world,
In 2016, mobile economy generated 4.4% the coverage is at 93% of the population
of GDP globally, equivalent to around $3.3
which is expected to improve to 95% by
2020.
The first commercial 5G cellular
networks will launch in late 2019 and early
2020. These networks will be built on
evolved LTE (Release 15) and will offer
broadband connections accounted for 25% increased performance. 5Gs second phase
of total connection (excluding M2M). This based on LTE release 16, will deliver mobile
increased to 55% by the end of 2016, with 4 data over mmw frequencies in facilitating a
billion mobile broadband connections. massive increase in bandwidth potential. 5G
An additional 2.3 billion mobile connections (excluding cellular M2M) are
connection are forecast between 2016 and anticipated to reach 1.1 billion by 2025. n
2020. 4G now reaches 60% of the population Pravin Prashant
up from 50% in 2015 and 11% in 2012. In pravin@varindia.com

www.varindia.com April 2017 49


VAR MOBILITY

OPPO unveils F3 Plus Smartphone Micromax Lava unveils Z Series


O PPO has launched
F3 Plus. The F3
selfie and a 120-degree
wide-angle lens for group unveils Dual 5 Smartphones Z25 and Z10
Plus features the brands
first dual-front camera,
selfie. The rear camera is
co-developed with Sony, Smartphone L AVA has launched
Z Series of
with their 2.5D curved
HD IPS display, creates
including 120-degree wide-
angle Group Selfie Camera.
equipped with a customized
IMX398 sensor for serious M icromax
launched
smartphone Dual 5. The
has
its
smartphones Z25 and
Z10. These smartphones
an ergonomic, compact
design that fits in the users
The F3 Plus First Sale photography. The F3 Plus mark the entry of Lava in hands, thus enabling single-
begins from 1st April, 2017 is a high-end smartphone company aims to achieve the premium smartphone handed functionality of the
across India. It will also be that is efficient, long-lasting, a 10% market share of category and are testimony phones.
available in OPPO online secure and beautiful. the premium smartphone to the companys renewed Lava Z25 and Z10
stores on Flipkart, OPPO is an industry category (INR20K+) in focus and investment
Amazon leader in the Selfie the year 2017. towards in-house
a n d Revolution with Micromax Dual 5 design, quality,
Snapdeal. the recent Selfie features a metal body manufacturing and
The pre- Experts F-series. on edges. With the Arc supply chain.
order Our brand has design, the phone is more A d d i t i o n a l l y,
starts been growing seamless. It is equipped Lava Z25 sports a
f r o m rapidly across with stereoscopic multi- fingerprint sensor
now till Southeast antenna added within which lets users
31st March, Asia and body that helps in unlock the phone in
2017. o t h e r enhancing the signals. It 0.16 seconds. Priced
O P P O s regions comes with an intensified at Rs.18,000/-
New Brand around camera system. The and Rs.11,500/-,
Ambassador, the world. device consists of respectively, Lava
D e e p i k a As per the Wisdom Double Photo Z25 and Lava Z10
P a d u k o n e GFK data, 2.0, two cameras will be available in
and renowned we became the Black & White with an select retail stores
photographer Dabboo No. 2 smartphone brand in ordinary camera three in Delhi from March 23, are powered by an Octa-
Ratnani also shared their the Indian offline market times the amount of 2017. The phones will be Core Processor, and are
own selfie experience with last year. The dual selfie light. The device boasts available in other cities in a supported by 4GB and
OPPO F3 Plus. camera F3 Plus marks a new 13MP+13MP Dual Rear few weeks time. 2GB, RAM respectively.
OPPO F3 Plus delivers Group Selfie trend, and Camera and 13MP Front Lava Z25 flaunts Lava Z25 and Z10 also
great selfie photos through reinforces our position as Camera with flash. It is 13.97 cm (5.5) HD IPS offer wide storage for
the revolutionary dual the Selfie Expert, said Sky fully equipped with Dual Display and Lava Z10 music, videos, pictures and
selfie front cameras: a Li, Global VP & President Camera capabilities that features 12.7 cm (5.0) applications with 32GB and
16-megapixel camera for of OPPO India. automatically combine Display. Both the phones, 16GB ROM, respectively.
depth of field and focus
Vivo to offer V5Plus Smartphone to capture DSLR quality
images. The Micromax Sony launches Xperia
V ivo has entered
into exclusive
Dual 5 is powered by
Qualcomm Snapdragon XZs Smartphone
S
partnership with Flipkart 652 and faster memory Frames per second.
ony India has
for online sale of limited for quicker system The Xperia XZs is
launched its
edition Vivo V5Plus performance that is powered with the Motion
smartphone Xperia XZs.
smartphone. The phone 933MHz. The device Eye camera that comes
Bundled with innovative
that sports an 18-carat is LTE-enabled and with a built-in memory
offerings, this flagship
VIVOIPL logo engraved at integrated graphics with device is integrated with
the back was announced by 64-bit processor. It Motion Eye Camera. It
Vivo in Hyderabad on April comes with 128GB ROM is packed with Super
4, 2017 to celebrate the ten and 3,200mAh battery
to consumers across both Slow Motion video
glorious years of IPL. with Quick Charge 3.0
mediums to own this recording at 960 FPS
The Vivo V5Plus and Power Saving Mode.
exclusive product. in a smartphone and
special edition phones will The new Dual 5 takes
Vivo V5Plus is a unique capturing
go for sale from 10th April, the smartphone security
presently available in gold technique of Predictive
2017 on Flipkart at a price and privacy to the next
colour. The device created Capture.
of Rs.25,990. level as it comes with the
ripples in the market with The Xperia XZs is
Vivek Zhang, CMO, same EAL 5+ security as a
its amazing first-ever 20MP the successor of Xperia
Vivo India, said, We are bank card, which is much
dual-front camera that XZ which was launched
pleased to announce our more secure than the
captures the depth of field, last year, with worlds 5
exclusive partnership with EAL 2+ security featured
thus allowing customers to Axis Image Stabilization
Flipkart to offer limited in other smartphones.
click perfect selfies. The and triple imaging
edition Vivo V5Plus The device comes with
dual lenses of the device, sensor technology. The
smartphone. With this Unique Fingerprint with
i.e. 20MP and 8MP, create Xperia XZs comes with
partnership, we aim to a quick response time within an image sensor.
sharpness on the face Motion Eye camera on top
use the exclusive online of 0.35 second and is This unique feature is
while creating a beautifully of the existing camera tech
market. Today, one cannot equipped with a separate capable of processing each
blurred background which introduced with XZ series.
ignore the power of online security chip to provide image five times faster and
is enhanced by digital optical This Motion Eye camera
medium and through this independent storage improves low-light images
algorithm to generate an makes XZs camera capable
association we want to for your fingerprint and by reducing the noise by
amazing Bokeh effect. of recording images at a
give a chance and comfort password information. around 50%.
Super Slow Motion of 960

50 April 2017 www.varindia.com


VAR MOBILITY

Vivo V5 Plus
V ivo presents V5Plus with dual front camera. It provides a seamless performance
with a better resolution display and a much powerful battery. The smartphone
looks premium with its unibody metal finish covering the entire back and side panel. It is
available in two colours-gold and white.
The handset comes with 13.87cm (5.5) FHD display, with curved edges and ultra-
narrow bezels for a more comfortable touch. The fifth generation Corning Gorilla glass
provides stronger screen protection. It runs on Funtouch OS 3.0 Operating System
(based on Android 6.0) and powers by 4GB RAM, 64GB ROM and a robust Qualcomm
Snapdragon 625 Octa-core CPU. The storage capacity can be increased upto 256GB via
micro SD card.
The smartphone offers dual front camera (20 MP and 8 MP) and 16 MP rear camera
with flash. The combination of two lenses i.e. 20 MP and 8 MP will ensure that a device
captures the much-needed depth of field. The front came has LED flash, called Moonlight
flash. It also creates an amazing Bokeh effect. The camera interface is quite good.
V5 Pluss slender body is packed with a 3055mAh battery, designed to power the device to last through a longer working day. The twin-engine
charging technology offers a faster charging speed and the charging protection system offers a safer, worry-free charging experience.
V5 Plus offers a technological breakthrough with its faster than faster fingerprint unlocking that unlocks the screen in just 0.2 seconds. The updated
fingerprint recognition technology allows users to access their favourite apps by pressing the fingerprint sensor twice.

FACE TO FACE

Konnect Insights helps build


brand image in digital media
In a chat with VARINDIA, Sameer Narkar, Director & Chief Software Architect of
Konnect Insights, talks about the big-data analytics product Konnect Insights, advantages
of the product, the go-to-market strategy and also about the vision of the company.

Kindly brief us about Most of our business is using digital


your offering. marketing and by word of mouth. We are
reaching out to our international markets and
Konnect Insights is a big-data analytics go-to-market over there is initially through
product used for Social Listening and Market agencies and reselling model. Our competitors
Research. It is used by many top brands to are Brandwatch, Radian6 and TalkWalker.
understand conversations all over the web. It
gives detailed reports on how you are faring What is the future roadmap
vs your competition in the industry based of the company?
on online conversations on blogs, forums, Today, Konnect Insights is being used
mainstream news and social media. by brands from automobile, telecom, BFSI,
How it will be helpful for entertainment, IT and pharma. The focus is
your customers to grow? to reach out to more brands in these sectors.
Social listening and analytics has a huge market
Online conversations have an impact on with a total market size of US$5.40 billion and
how your brand is being perceived. Brand we want to be the market leader in this space in
managers make sure that people are not talking a couple of years.
negative about the brand and if they are they Response Management system will help brands
try to understand the reason and offer a proper respond to customers/leads effectively and What is your Vision?
solution. They also want to pick up positive address their concerns. Many telecom and
BFSI companies are benefiting using Konnect Konnect Insights is the most preferred tool
mentions of the brand to help the brand by many brands and agencies today because
advocacy. Listening hence becomes the key. Insights because they have substantially reduced
the cost on customer care. of our own search engine capabilities. It is
The insights help them understand how important for us that we make our search
their Social Media channels are performing and What are your target segments? engines more robust. Today, we crawl close-
they can compare them with their competitors. to 25 million websites and as we are going
We have our clients from automobile,
To sum it up, Konnect Insights helps brand in global we will be further improving on this.
telecom, BFSI, entertainment, IT and
their digital media presence and give insights Our key motto is not to miss any conversation.
pharma. We want to add more clients in these
about their audience and customers. This will, Intelligent dashboards in Konnect Insights
segments.
in turn, help the brand to formulate marketing powered by this data are getting very intuitive,
strategies. Listening to conversations around What is your go-to- we want to further focus on our sKonnect
your brand will help you understand the market strategy? Who Recommends module to help brand managers
customers mind-set, reviews, etc. Using take informed decision based on data. n
are your competitors?

www.varindia.com April 2017 51


Network Access Control in Mobility Era
In order to ensure security at the edge, role based access,
and end point visibility is becoming critical

I n the age of mobility, multiple mobile


devices of the workforce, and end point
devices like printers and scanners including
with Firewall Advanced Threat Detection,
vulnerability management, SIEM, MDM, and
other platforms, thus improving the quality
IoT devices are now the points from where of security by allowing these solutions/
breaches or intrusions occur. softwares to trigger defense actions. The
The other aspect is the network today is not NAC today is orchestrating the entire network
compartmentalized as wireless/ datacenter/ access mechanism, and becoming the central
campus/remote network. It is increasingly console of IT and SOC. The bi-directional
one integrated network where a user can have communication with other security platforms
access from any of these areas. Hence the ensures that these tools in Firewalls/VM etc.
task from the NAC solutions is a combined hugely improve access control.
integrated solution for wired, wireless, and Increasingly, application patches, OS
IoT devices with Complete visibility of all upgrades and policy updates are being pushed
devices. centrally from the NAC, and NAC deployments
We live in an app environment, and all are getting larger in size to accommodate the
interactions start at the EDGE. In order to multiple devices that employees are bringing
ensure security at the edge, role based access, to work or the incorporation of IoT into the
and end point visibility is becoming critical. Santanu Ghose network.
HPE Arubas mobility Security Platform Director Aruba Hewlett Packard Aruba ClearPass solution is delivered
ClearPass, is one of the leading Network Enterprise through two options. One is through its
Access Control Solution in the world. appliance approach, and the other, is its
ClearPass makes the end point visible and An important part of the virtual server method, So that it can scale with
helps to profile them based on role based networking security is being expanding Networks of the enterprises. It is
access. With ClearPassUniversal Profiler, a multi-vendor in nature and supports wired,
contextually aware, and endpoint
IT team can secure the interactions coming wireless and IoT devices helping them to be
from multiple mobile devices of an end user, device visibility is a key element profiled and help in implementing corporate
multiple endpoint devices like printers and that the NAC has to execute. For network access policy by enabling seamless
scanners and importantly the IoT devices & instance, an alert which comes interworking with other parallel solutions like
dumb devices. from an endpoint, the security will firewall softwares, MDMs etc
To exemplify the necessity for this, there need to know how the endpoint An important part of the networking
was situation where the security of a financial security is being contextually aware, and
is attached to the network,
institution was recently compromised, when endpoint device visibility is a key element
hackers managed to gain access from a what certificates are there on that the NAC has to execute. For instance,
network printer. In such situations Aruba the end point, what applications an alert which comes from an endpoint, the
ClearPass helps to mitigate intrusions of this are supported on the endpoint security will need to know how the endpoint
nature. and also gather its posture is attached to the network, what certificates
The #GenMobileworkforce comes to assessment report. Integration are there on the end point, what applications
work with their own devices. Also corporates are supported on the endpoint and also gather
with other security technologies
are increasingly allowing the employees to its posture assessment report. Integration
access corporate applications from their and platform makes the NAC a key with other security technologies and platform
mobile devices. Profiling and establishing the ally to seamless integration for makes the NAC a key ally to seamless
class of services associated with the employee network security operations. integration for network security operations.
becomes very critical in this model. Aruba Aruba ClearPass is a true follower of
ClearPass allows the creation of policies to this fundamental through its concept of
address this need. With Aruba ClearPass, ArubaClearPASS ensures this functionality
ClearPassExchange initiative wherein it
when a user or endpoints is brought onboard through its Adaptive Trust Concept.
integrates seamlessly with MDM and firewall
the network, and access is granted, the user Aruba ClearPass is designed grounds
solutions.
and endpoints are continuously monitored up for this and capable of delivering NAC
The concept of BYOD or BYOT have
for their security status. Based on their services across the Integrated network. it
is also universal in nature as it is uniquely triggered the intensity for the customers
latest security status, they can continue
capable of integrating multi-vendor network to seriously evaluate comprehensive NAC
to be connected or be disconnected - this
instantaneous function, is a key requirement elements & components solutions, and Aruba ClearPass stands out to
from the current era NAC solutions. HPE NAC platforms are increasingly integrated be the most defining one. n

52 April 2017 www.varindia.com


VAR CORPORATE

Lenovo partners Govt. of Maharashtra for


Village Social Transformation Mission
Lenovo has partnered with government story of our country. The initiative by
of Maharashtra to provide technology the state government is a step in the right
for the first phase of the Village Social direction to meet the goal of self-sustainable
Transformation Mission. development and empowering the citizens
by technology.
Under the partnership, Lenovo will
provide 110 tablets with a view to bring The initiative fits well into Lenovos CSR
technology based efficiencies in health, strategy and vision for providing technology
education, water conservation and irrigation for quality education that includes skill
programmes. training and learning practical aspects of
sustainable development through technology
Village Social Transformation Mission is based platforms.
an initiative, announced by the chief minister
of Maharashtra in August 2016 which aims to The Village Social Transformation
transform 1,000 villages affected by drought Mission is a unique mechanism with the
or social challenges into model villages by potential to transform rural Maharashtra. It
2018. aims to provide hard and soft infrastructure
and quality last mile service delivery,
Lenovo tablets will be used by rural empowering villages to practice self-
development fellows who have been sustainable development.
specifically hired to take the mission forward. Rahul Agarwal
The first phase will cover 100 villages that MD & CEO The mission will converge government
will cover talukas and gram panchayats of Lenovo India efforts with activities undertaken by
Aurangabad, Nagpur and Wardha districts. corporates under the corporate social
T responsibility (CSR) Act. Existing corporate
state government. activities will be supported by existing
The chief ministers fellowship members Rahul Agarwal, MD & CEO, Lenovo government schemes and administrative
will own the social transformation and India said, "We believe that technology machinery. Meanwhile, the government
will work with the local government (gram implementation at the grass root level is will incorporate corporate best practices,
panchyats) and corporates/NGOs and the the key to a successful transformation technical expertise and insights.

Lenovo launches Data Centre


Partner Programme
Lenovo has announced the launch of its
new Lenovo Data Centre Partner Programme
for Asia Pacific aimed at helping Lenovo
channel partners bring best-of-breed data
centre solutions to the enterprise market. The
programme provides Lenovo business partners
with exclusive access to top quality support and
attractive incentives designed to help them
grow their businesses, and to reward their commitment to Lenovos solutions. Channel partners
are rewarded with generous economic incentives, training, and dedicated resources regardless of
their partner tiers.
Partners can also look forward to clear and simple pathways through the programme, with
various tiers awarded through the meeting of revenue thresholds, and by maintaining certified
expertise on Lenovos solutions. Partner tiers include silver, gold, and the exclusive platinum tier,
which extends additional privileges such as certification vouchers, invitations to advisory councils
and direct access to Lenovos knowledge base.
As of launch, Lenovo Data Centre Partner Programme has seen more than 800 partners
enrolled across Asia Pacific.
Sumir Bhatia, vice president, Data Centre Group for Asia Pacific said, As the only major
data centre brand with no legacy to protect, Lenovo is uniquely positioned to help our business Sumir Bhatia
Vice President, Data Centre Group for Asia
partners meet diverse needs in the enterprise market, through best-of-breed data centre solutions Pacific
and our open eco-system of partnerships with leading IT providers. We are 100% dedicated to
our channel first strategy, and are laser-focused in our mission to deliver value to our Asia Pacific
partners through profitability.

www.varindia.com April 2017 53


Movers & Shakers

Bruce Davie appointed VP Kartik Shahani quits


and CTO of VMware APJ RSA, to join IBM
VMware has announced the appointment of If internal sources are to be believed, after
Bruce Davie to the role of vice president and a long stint of close to 7 years at RSA, Kartik
chief technology officer (CTO) of the VMware Shahani has left the company to join IBM. RSA
Asia Pacific and Japan (APJ) business, effective is the security division of EMC, where Kartik
immediately. As CTO, Davie will lead VMware has served as its Country Manager for India &
APJs technical community, which includes SAARC.
systems engineers, technical account managers and professional services Kartiks job role and responsibilities at IBM is still under wraps.
organization, with a focus on customers long-term strategy, technical At RSA, Kartik was responsible for leading RSAs business operations
innovation and product quality. in the region and growing sales of the companys offerings in the area of
Davie has more than 25 years of leadership and technical experience. He security solutions for business acceleration.
joins VMwares APJ leadership team from VMwares global headquarters, Kartik came to RSA with an illustrious track record, having held senior
where he most recently served as CTO of networking and a principal positions with McAfee India Sales and Netmagic. At both the companies,
engineer in the networking and security business unit. he was instrumental in the complete turnaround of their operations.

Raman Roy appointed CIS appoints K. K.


Nasscom chairman Shetty as CEO & MD
National Association of Software and After spending 30 years in the component,
Services Companies (NASSCOM) has announced enterprise, communication, and telecom network
the appointment of Raman Roy, chairman and industry, K. K. Shetty, starts his entrepreneurial
managing director of Quatrro as its chairman of journey with Citadel Intelligent Systems.
NASSCOM for 2017-2018. As CEO & MD of CIS, Shettys focus
Raman Roy has been a member of Nasscoms will be on providing cutting-edge fiber- optic
executive council and was the vice-chairman for 2016-17. He takes over technologies in the infrastructure space. CIS will offer state-of-the-art smart
the mantle from CP Gurnani, managing director and chief executive city solutions, security & surveillance, green automobile solutions, and
officer, Tech Mahindra. other value-added assemblies for various verticals. CIS is co-promoted by
CP Gurnani, past chairman, NASSCOM said, Last year has been an Lumipol Holding B.V. (Netherlands) and Hanuka Technology Solutions.
eventful journey for the industry. For me, it was a great experience, to get K. K. Shetty said, "It is an opportunity for me to be surrounded with
this opportunity, and help chart the course for the industry in the new talented people and help them to fulfil their dreams by exploring their full
world order. I wish Raman the very best in his task ahead." potential.

Qualcomm elevates Dr Snapdeal appoints Jason


James H. Thompson as Kothari as CEO of FreeCharge
Snap deal has announced the appointment
Chief Technology Officer of Jason Kothari as the chief executive officer
Qualcomm has announced that Dr James of FreeCharge and a commitment to invest an
H. Thompson, Executive Vice-President of additional $20 million in the company. In addition
Engineering, Qualcomm Technologies, Inc., to taking on the role of the CEO, Jason will
has been elevated to the additional position of continue his key leadership role as chief strategy
Chief Technology Officer (CTO). Matt Grob, Executive Vice-President, & investment officer at Snapdeal. He will also join the board of directors
Qualcomm Technologies, Inc. and CTO, will transition to the role of of FreeCharge.
Executive Vice-President of Technology, Qualcomm Technologies, Inc., Kunal Bahl, Co-founder & CEO, Snapdeal said, Jason is a strong,
and continue to report to Steve Mollenkopf. strategic and versatile business leader & entrepreneur who has already
Thompson will align the companywide technical and product roadmaps been the CEO of two successful companies. We are delighted to announce
across all business areas. He also will have oversight of Corporate R&D his leadership role at FreeCharge. Most recently, Kothari was CEO of
and Corporate Engineering. Softbank-backed online real estate company Housing.com.

Vivek Sharma joins Polycom appoints Marco


Lenovo as Director Landi as President of APAC
Polycom has announced that Marco Landi,
Data Center Business Polycom President, Europe, Middle East
Lenovo India has appointed Vivek Sharma as and Africa (EMEA), has been promoted to
the companys new Director, Data Center Group, an expanded role of leading the companys
India, effective immediately. Vivek will be based operations in Asia-Pacific (APAC). Counting
in Bangalore and will report to Sumir Bhatia, more than 20 years business development and
Vice-President, Data Centre Group, Asia-Pacific, Lenovo. Vivek will also management experience, Landi will be responsible for driving revenue and
be part of Lenovos India Leadership Team which is led by India MD & market share growth within both regions.
CEO, Rahul Agarwal A dynamic sales and business leader, Marco has successfully led large
As the new India DCG leader, Vivek will be responsible for driving and small teams through tough economic climates. His expertise lies in
profitable growth in India. He will focus on customer-centric solutions as driving growth through challenging market conditions, enterprise sales,
well as manage an extensive product portfolio including Server, Storage, channels, marketing and go-to-market strategy across multiple markets.
Software, Services and Networking.

54 April 2017 www.varindia.com


www.varindia.com April 2017 55
RNI
RNI -- NO
NO 72399/1999
72399/1999 Date
Date of
of Posting
Posting 20
20 &
& 21
21
Printing
Printing Date
Date 18
18 && 19
19
Reg.
Reg. No:
No: DL-SW-1/4030/15-17
DL-SW-1/4030/15-17 every
every month
month

56
56 March 2017 www.varindia.com
April 2017 www.varindia.com 56
56 pages
pages including
including cover
cover

S-ar putea să vă placă și