PDF: 2962 pages, 5.2 MB - Bay Area Council Economic Institute
PDF: 2962 pages, 5.2 MB - Bay Area Council Economic Institute
PDF: 2962 pages, 5.2 MB - Bay Area Council Economic Institute
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Software/IT Services/Business Process Outsourcing<br />
The Mid-Market/Security Nexus<br />
Competition has intensified in the storage and security space, whether from Microsoft, Trend Micro,<br />
and McAfee, or from Indian providers such as former Satyam subsidiary Sify Ltd. A particularly<br />
important nexus is developing in the mid-market segment where companies are looking for scalable<br />
storage and backup solutions that will help them grow. As they do, they are open to security attacks<br />
through the most vulnerable point of contact, the “endpoint infrastructure”—a customer’s, vendor’s<br />
or employee’s computer that may have both business and personal uses.<br />
Symantec managing director Vishal Dhupar told the <strong>Economic</strong> Times in 2006 that 86% of automated<br />
network attacks in 2006 were against home users in Mumbai, Delhi and Bangalore. As<br />
broadband usage in India has grown, an estimated 59% of Indian home PC users share music and<br />
video, play games online and visit social networking sites. These same computers may be also be<br />
used in an office: In 2006, more than one in six Indian companies experienced a security breach<br />
aimed at extortion, fraud, or intellectual property theft, most often through various endpoints.<br />
That, in turn, has potential implications for domestic and offshore firms outsourcing from all but<br />
the largest Indian IT services vendors.<br />
Attacks include data theft and manipulation, disruption of business critical services, and damage to<br />
company brand and reputation. These attacks have become increasingly sophisticated, commercially<br />
focused, and multi-staged, initiated by corrupting or duplicating trusted sites of a targeted end<br />
user. A Symantec study released in March 2008 said that the number of distinct, monthly “phishing”<br />
attacks on Indian banks—fraudulent emails and website links aimed at soliciting personal<br />
identification and financial information—grew from 20 in October 2007 to 120 in January 2008<br />
alone. Each potentially reached tens or hundreds of thousands of bank customers.<br />
In April 2007, Symantec opened a Centre of Innovation in Chennai that now employs some 200<br />
staff, making India its second largest engineering site, behind the U.S. (Other global centers include<br />
Australia, New Zealand, Estonia, Poland, the UK and Belgium.) The center is a focal point for<br />
Symantec Research Labs (SRL) and Advanced Concept Group (ACG) projects in India. Chennai<br />
also provides backup redundancy for Symantec India operations and helps broaden the talent pool<br />
from which the company has been hiring. Within its Pune facility, whose workforce is currently<br />
about 2,500, Symantec has set up a Global Security Response (GSR) lab that gathers security threat<br />
information from some 40,000 third-party “sensors” in 180 countries, analyzes threats and the code<br />
running them, and develops signatures to protect clients worldwide.<br />
Symantec executive vice president and chief technology officer Mark Bregman says mid-sized<br />
businesses will be an important market in India itself for integrated security solutions:<br />
Any large enterprise today is already all over security. In the consumer market<br />
there’s some awareness and it’s growing. In the mid-market, which is subject to<br />
all of the same risks, they need security but don’t always know they need it.<br />
What we’re seeing is a consumerization of the enterprise, where consumers<br />
want to use their systems to communicate with the enterprise’s back end and we<br />
don’t know what’s on their computers. At the same time you have employees<br />
131