26.09.2015 Views

PDF: 2962 pages, 5.2 MB - Bay Area Council Economic Institute

PDF: 2962 pages, 5.2 MB - Bay Area Council Economic Institute

PDF: 2962 pages, 5.2 MB - Bay Area Council Economic Institute

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Software/IT Services/Business Process Outsourcing<br />

The Mid-Market/Security Nexus<br />

Competition has intensified in the storage and security space, whether from Microsoft, Trend Micro,<br />

and McAfee, or from Indian providers such as former Satyam subsidiary Sify Ltd. A particularly<br />

important nexus is developing in the mid-market segment where companies are looking for scalable<br />

storage and backup solutions that will help them grow. As they do, they are open to security attacks<br />

through the most vulnerable point of contact, the “endpoint infrastructure”—a customer’s, vendor’s<br />

or employee’s computer that may have both business and personal uses.<br />

Symantec managing director Vishal Dhupar told the <strong>Economic</strong> Times in 2006 that 86% of automated<br />

network attacks in 2006 were against home users in Mumbai, Delhi and Bangalore. As<br />

broadband usage in India has grown, an estimated 59% of Indian home PC users share music and<br />

video, play games online and visit social networking sites. These same computers may be also be<br />

used in an office: In 2006, more than one in six Indian companies experienced a security breach<br />

aimed at extortion, fraud, or intellectual property theft, most often through various endpoints.<br />

That, in turn, has potential implications for domestic and offshore firms outsourcing from all but<br />

the largest Indian IT services vendors.<br />

Attacks include data theft and manipulation, disruption of business critical services, and damage to<br />

company brand and reputation. These attacks have become increasingly sophisticated, commercially<br />

focused, and multi-staged, initiated by corrupting or duplicating trusted sites of a targeted end<br />

user. A Symantec study released in March 2008 said that the number of distinct, monthly “phishing”<br />

attacks on Indian banks—fraudulent emails and website links aimed at soliciting personal<br />

identification and financial information—grew from 20 in October 2007 to 120 in January 2008<br />

alone. Each potentially reached tens or hundreds of thousands of bank customers.<br />

In April 2007, Symantec opened a Centre of Innovation in Chennai that now employs some 200<br />

staff, making India its second largest engineering site, behind the U.S. (Other global centers include<br />

Australia, New Zealand, Estonia, Poland, the UK and Belgium.) The center is a focal point for<br />

Symantec Research Labs (SRL) and Advanced Concept Group (ACG) projects in India. Chennai<br />

also provides backup redundancy for Symantec India operations and helps broaden the talent pool<br />

from which the company has been hiring. Within its Pune facility, whose workforce is currently<br />

about 2,500, Symantec has set up a Global Security Response (GSR) lab that gathers security threat<br />

information from some 40,000 third-party “sensors” in 180 countries, analyzes threats and the code<br />

running them, and develops signatures to protect clients worldwide.<br />

Symantec executive vice president and chief technology officer Mark Bregman says mid-sized<br />

businesses will be an important market in India itself for integrated security solutions:<br />

Any large enterprise today is already all over security. In the consumer market<br />

there’s some awareness and it’s growing. In the mid-market, which is subject to<br />

all of the same risks, they need security but don’t always know they need it.<br />

What we’re seeing is a consumerization of the enterprise, where consumers<br />

want to use their systems to communicate with the enterprise’s back end and we<br />

don’t know what’s on their computers. At the same time you have employees<br />

131

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!