Indias Leading Cyber Security Company2022
Insights Success sheds the spotlight on AKS Information Technology Services, one of the most reliable and trusted cyber security company in India, in its latest edition, ‘India's Leading Cyber Security Company-2022.’
Insights Success sheds the spotlight on AKS Information Technology Services, one of the most reliable and trusted cyber security company in India, in its latest edition, ‘India's Leading Cyber Security Company-2022.’
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
VOL. 07
ISSUE 05
2022
India's
Leading
Cyber Security
Company
2022
Anshul Saxena,
CEO
Aks
Information
Technology Services
The Invincible Shield of the Cyberworld
How do you protect our co
Start by protecting
untry from cyber-attacks?
your own network
Ameliorating Perpetual Innovations, securely!
n this modern era of advancements,
Ipeople can probably feel overwhelmed by
the number of cybersecurity options that
came into existence due to the emerging trends
of technology. Moreover, due to the pandemic,
businesses shifted their working protocols,
shifting to online operations.
These companies/organizations are
maintaining an online presence through
websites, social media channels and pages.
However, one cybersecurity breach is enough
to turn the tables!
A lot of companies operate their business
through the internet; moreover, the outbreak of
the pandemic has enabled the people of the
working class to work from home through
newly developed platforms, software, or
traditional online applications.
In the world of advancements, these activities
also increase the chances of breaching these
operational systems, virtually as data security
is a pivotal entity for every firm, whether it is
healthcare, finance, or any business that
conducts its secondary operations in the online
world.
Every business/organization has its unique set
of standards, regulations, practices, and data
information compliances that they collect, like
customer data, addresses, and transaction
details. On the other hand, regulatory
compliance is also adherence to laws, precise
specs and guidelines concerning business
protocols. The essence of cybersecurity can
help save such assets and vital information that
a business needs to scale its progress
eventually.
The professional services of trusted
cybersecurity companies are helping many
organizations by providing the backend brain
of various security systems with a wide array
of tools created for analytics and threatsaving
intelligence.
The security professionals' expertise helps in
the aggregation of endpoint monitoring for
enhancing security infused with Machine
Learning to rectify the breaching patterns. It
also improves the scanning for all-inclusive
purposes. This is undoubtedly a matter of fact
that the prominent cybersecurity companies
provide a complete panacea of enhanced
solutions that help in the prevention of
diverse cyberattacks.
Such comprehensive invulnerability prevents
the system from diverse adversities and
assists in ensuring confidentiality along with
data security, which turns over a new leaf of
reliability.
Embracing the journey of one such prominent
cybersecurity company that empowers
exceptional services in the cybersecurity
niche, Insights Success sheds the spotlight on
AKS Information Technology Services, one
of the most reliable and trusted cyber security
company in India, in its latest edition,
‘India's Leading Cyber Security Company-
2022.’
Flip through the pages and delve into the
contractual journey of this reliable company
in the modern industry. Have a Delightful
Read!
Abhishek Joshi
Deputy Editor
abhishek.joshi@insightssuccess.com
2022
AKS Information
Technology Services
is recognized by
Insights Success as
India's
Leading
Cyber Security
Company
2022
for its innovative solutions that empower exceptional
reliability in the ever-evolving cyber security niche.
Insights Success
Media and Technology Pvt. Ltd.
Pooja M. Bansal
Editor-in-Chief
Editor-in-Chief Pooja M. Bansal
Deputy Editor Abhishek Joshi
Managing Editor Gaurav PR Wankhade
sales@insightssuccess.com
JULY, 2022
Art and Design Head Rashmi Singh
Associate Designer Revati Badkas
Sr. Vice President Megha Mishra
Sr. Sales Manager Tejaswini Whaval
Business Development Lead Neha Bhilare
Sr. Business Development Executive Pratiksha Jagtap
Technical Head Prachi Mokashi
Technical Specialist Amar Sawant
Digital Marketing Manager Renuka Kulkarni
SME-SMO Executive Nikita Khadalkar
Circulation Manager Tanaji
Corporate Offices:
Insights Success Media and Technology Pvt. Ltd.
Off. No. 22, Rainbow Plaza, Shivar Chowk,
Pimple Saudagar, Pune, Maharashtra 411017
Phone - India: +91 7410079881/ 82/ 83/ 84/ 85
Email: info@insightssuccess.in
For Subscription: www.insightssuccess.in
Insights Success Media Tech LLC
555 Metro Place North, Suite 100,
Dublin, OH 43017, United States
Phone - (614)-602-1754
Email: info@insightssuccess.com
For Subscription: www.insightssuccess.com
Cover Price : RS. 200/-
Follow us on : www.facebook.com/insightssuccess/ https://twitter.com/insightssuccess
We are also available on
Copyright © 2022 Insights Success Media and Technology Pvt. Ltd., All rights reserved. The content and images used in this magazine should not be reproduced or
transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior permission from Insights Success Media and Technology Pvt. Ltd.
Reprint rights remain solely with Insights Success. Printed and Published by Insights Success Media and Technology Pvt. Ltd.
RNI NUMBER: MAHENG/2018/75953
Subscribe Today
Stay in touch.
Subscribe to Insightssuccess Get Insightssuccess
Magazine in print, & digital on www.insightssuccess.in
www.insightssuccess.in
Cheque should be drawn in favour of : INSIGHTS SUCCESS MEDIA AND TECH PVT. LTD.
CORPORATE OFFICE
Insights Success Media and Technology Pvt. Ltd.
Off No. 22, Rainbow Plaza, Shivar Chowk,
Pimple Saudagar, Pune, Maharashtra 411017.
Phone - India: 020- 7410079881/ 82/ 83/ 84/ 85
USA: 302-319-9947
Email: info@insightssuccess.in
For Subscription : www.insightssuccess.in
Aks
Information
Technology Services
The Invincible Shield of the Cyberworld
AKS IT has
achieved the
utmost loyalty
from their clients
by providing
quality service
and ensuring the
secrecy of client’s
data.
C o v e r S t o r y
Anshul Saxena
CEO
India's Leading Cyber Security Company-2022
AKS Information Technology Services (AKS IT) is
one of the most reliable and trusted cyber security
company in India. It is an ISO 9001:2015 and ISO
27001:2013 compliant mid-sized Indian Company. It
provides Consultancy, Auditing, Compliance to various
regulatory and security standards, computer Forensics and
Training services. In cyber security product segment, it has
developed AKS Forensic Workstation and DDoS mitigation
solution, Web Application Firewall (WAF), Anti Bot
solution, Link Load Balancer, Server Load Balancer, DNS
Security solution in all the three platforms, Appliance
based, on VM and Multi-Cloud Security as a Service. It is
also the premier 'Innovation Hub' in Cyber Security which
is spearheading the best in-class technological products for
Domestic and Global markets. The company has been at the
forefront of delivering excellence in the domain of
Information Security products and services ever since it was
established in 2006.
AKS IT is an all-in-one Security Service provider which
covers all the aspects of enterprise security including
mobile apps and website audits, network audit, ICS audit,
Telecom audit, Banks audit as per RBI requirements,
SOC-1 and SOC-2 audit, Computer forensics, setting up
and managing Security operations Center (SoC) for
providing real-time monitoring and management,
emergency response and round-the-clock protection against
any cyber-attack. Backed by its comprehensive cyber
security training program, AKS IT educates its customers
while also implementing and enforcing security and
auditing IT infrastructure.
The company's customers span across various industry
sectors from IT, BFSI, Telecom, Transport, Manufacturing
and the Government, both in India and abroad.
About CEO:
Anshul Saxena, an alumnus of Netaji Subhash Institute of
Technology (NSIT) Delhi and Georgia Institute of
Technology, USA, has worked in Microsoft and
Amazon.com. He has eleven years of work experience in
Software Development and Cyber Security. He came back
to India on our Prime Minister's call given in NASSCOM's
Silver Jubilee - 2015.
" ा मेरे िहंदु ान का नौजवान, दुिनया को चैन की नीदं
सोने के िलए, साइबर िस ू रटी के िलए, फु ल ूफ इनोवेशन
लेकर आ सकता है ा?"
- भारत के धान मं ी
ी नर मोदी
Innovated DDoS mitigation technology which is patented in
India (Patent No. 353365). Received National Technology
Award 2020 by the Government of India, Most Innovative
Micro Enterprise Award by The Economic Times and many
more. The tenets of strategies incorporated by Anshul are
Uncompromised Quality of service, Innovation, Good
Ethical values and healthy culture.
What was your inspiration behind venturing into Cyber
Security niche?
I was very keen in Cyber Security domain and did my MS
in Information Security from Georgia Tech, USA and joined
the family business, AKS IT Services, founded by my
parents.
What are the USPs that highlight your brand/company
as a leading name in Cyber Security Industry?
The most important thing, we believe in is building Trust.
This was achieved by providing Quality services and
quality products and being available 24x7 for providing any
support. AKS has achieved the utmost loyalty from our
clients and successfully undertaken application security
audits of more than 12000 applications. Our customercentric
approach and focus on quality has helped us to beat
the competition.
What are the immersive benefits of the services/solutions
that you provide to your clients?
Our services/solutions provide security against various
types of cyber-attacks which assures clients to continue
their core business without bothering about cyber-attacks.
Cyber-attacks increased many folds during the last two
years due to pandemic and work from home. Attack on
websites, Ransomware attack, DDoS attacks became very
common. Even before these attacks came into mainstream,
AKS IT had predicted and developed DDoS mitigation
solution, Web Application Firewall.
AKS Forensic Workstation was effectively utilized by Law
Enforcement Agencies for investigation of Cyber Crime
cases. AKS IT continues to invest in research and
indigenous development of Cyber Security Products for our
customers. Backed by our services, our company wants to
become one-stop security partner to our customers.
Aces of AKS IT
Veteran Wg Cdr Ashish Kumar Saxena, the Founder and MD of AKS IT is B.Sc. Engineering (Electrical) from HBTI
Kanpur and M.Tech. in Computer Technology from IIT Delhi, CISSP, CISA, MBCI and Fellow of the Institution of
Electronics and Telecommunication Engineers; Ashish has been trained in Sweden, France and the USA with over 40 years
of work experience.
Anshul Saxena, CEO, is a Bachelor of Engineering from Netaji Subhash Institute of Technology. He did MS in
Information Security from Georgia Institute of Technology, Atlanta, USA. He has eleven years of work experience in
Software Development and Security.
Archana Saxena, Director HR and Admin, is one of the founding directors and looking after HR and Administration. She
has more than 30 years of experience. She is also managing Akash Memorial Charitable Trust.
Vivek Verma, AVP Projects, is a Bachelor of Technology in Computer Science from IP University Delhi. He has more
than 14 years of client management experience.
Rajesh Sharma, AVP Compliance and Forensics, is MBA, CISA and ISO 27001:2013 LA. He has more than 34 years of
work experience.
Mukesh Saxena, AVP Finance, is Graduate in Commerce and having more than 16 years of work experience.
Shreshta Mittal, Sr. Manager Projects, is Bachelor of Technology in Computer Science and MBA IT. She has more than
ten years of work experience.
What were the initial challenges after venturing into the
field of Cyber Security and what are the challenges
now?
Initial challenges were mainly capital infusion. Even banks
were reluctant to give funding. There was a lack of
awareness in understanding cyber threats and vulnerabilities
in the system. We started conducting training for our clients
to make them aware of the importance of cyber security.
Present challenges are getting skilled resources and delay in
payment realization.
Being an experienced leader, share with us your opinion
on how Cyber Security is crucial today, and what
advancements can we expect in the future?
Information technology has penetrated in all verticals for
ease of doing business, automation, faster communication,
and quick access of data. This has necessitated the need of
Cyber Security for safeguarding Critical Information
Infrastructure, Data and personal information. Nowadays,
data breaches, online data/info/records heists, identity
thefts, accounts hijacking, hacktivism, website
defacements, DDoS attacks, ransomware, malware attacks
and other social media attacks are common. Cloud services
are also being used by attackers e.g., Ransomware as a
Service (RAAS).
Advancement in future is automation of attacks, automatic
defense mechanism and majority of data would be in Cloud.
This will also be the preferred way of fighting War, known
as ‘Cyber War.’ As evident in the current war between
Russia and Ukraine, cyber attacks are also being carried out
from both the sides and DDoS attack is used as a deadly
cyber weapon.
What would be your advice to the aspirants who are
willing to venture into the field of Cyber Security
services?
Cyber Security is a serious business. Knowledge in the
Cyber security domain and quality of service/product are
paramount for the success. There are no shortcuts in
ensuring cybersecurity; minor slippage may lead to a
disaster. In security, no one recognizes you for the 99/100
attacks you mitigate. They only blame you for 1/100 attack
you couldn't mitigate. That is why one has to give his 200%
to hit 100/100 every single time.
Where do you envision AKS IT eventually, and what are
your future goals? How do you plan to embrace the
changes happening in your industry?
The AKS IT Group today consists of AKS IT Services,
Haltdos.com and, AKS Institute of Cyber Technology.
While AKS IT Services is committed to providing Cyber
Security services to mitigate current and futuristic Cyber
risk, Haltdos.com aims at innovating and developing AIbased
cyber security solutions to protect IT/OT/IOT Infra
against current and futuristic threats. On the other hand,
AKS Institute of Cyber Technology bolsters our threedimensional
approach by providing training on new attack
surfaces created by advancement in technology,
policy/practices needed to mitigate the cyber risk and how
to investigate high-tech crimes.
The tri-pronged war on Cyber Threats thus extended by our
group is backed by strong credentials in India.
Confident, Positive and Determined, we are now expanding
to other geographical locations where our visions, products
and services will be needed.
What is your opinion on 'Safest ways to ensure data
integrity'?
Data Integrity means data is not corrupted. This is presently
being done by using Digital Signature and it's safe until the
private key not leaked out or shared.
It's very difficult to ensure data integrity in social media
where images are forged/morphed and text and voice can
also be altered. It can only be done by social media service
agencies like Facebook, WhatsApp, Twitter, Instagram etc
by taking hash value of each message which can be used to
find out any changes in the photograph/video/other media
on any complaints.
16 | July 2022 | www.insightssuccess.in
T e c h D r i v e
The
Evolution
of
Cyber
I
Security
Solutions
WWhat
began as a harmless joke in 1970 soon became the world's first cyberattack!
It gave crime-world its new niche, cyber-criminality. Since then,
cyber-attacks have evolved by using threats such as phishing attacks,
malware, ransomware etc.
Or according to a security magazine, hackers (cyber-criminals) attack every thirtynine
seconds on average. In short, cyber-crime is outnumbering other crimes in this
regard. Thus, the world, too, learned that the greater cyber-connectivity needs the
greatest cybersecurity.
And the cybersecurity industry had been evolved alongside the cybercrime industry.
Now, it is essential to understand their origin and history together as they race into
the future, to outpace each other.
The Origin and Brief History of Cyber-Criminality
In early 1970, a BBN Technology's engineer, Bob Thomas, created Creeper Code, a
software program that moved across the computers while displaying the message 'I
am the creeper: catch me if you can!'
It was a joke countered humorously by Bob's colleague Ray Tomlinson who created
Reaper Code, a program that would duplicate itself while travelling from one
computer to another. Soon Reaper Code eliminated Creeper
Code, and the joke and its counter joke began the annoying
history of cybercrimes.
Nineteen years later, in 1989, Robert Morris created Morris
Worm to gauge the internet's dimension. The worm, the first
of its kind of DoS (Denial-of-Service) attack, slowed down
each computer it infected by attacking it as many times as
required to make it crash.
Morris Worm nearly closed down the internet but was saved
by Computer Emergency Response Teams (CERTs)
developed in response. Robert was convicted under the
already created Computer Fraud and Abuse Act of 1986.
Mainly concentrated on strategic cyber-warfare and
financial skullduggery, the post-1990s virus era saw the I
Love You and Melissa viruses that infected over ten million
PCs globally, crashed email systems, and cost millions of
dollars to the world.
The Birth and Rise of Cyberworld Protectors
The foundation for cyberworld security was laid down by
the originator of the internet or the ARPANET (Advanced
Research Projects Agency Network), combining its forces
with the U.S. Airforce and other institutions and developing
an advanced operating system.
Expanded from the Honeywell Multics Computer System's
security kernel, the new OS could detect, secure, protect,
and automate tools and techniques which would thwart the
possible security breaches and attacks.
With increasing cyber threats across the globe, the race to
develop cyber-security solutions known as Antiviruses
began. Thus, 1987 saw the coming of Ultimate Virus Killer
(UVK), antivirus NOD Version 1.0, and VirusScan.
Though the packets unmatching were termed viruses and
blocked. This simple yet effective solution soon became the
first security and defence line with highly technological
features. It has been extended since to the millions of
networks around the globe.
Race to the Safe Mountain
And as cybercriminals kept advancing in their techniques,
outsmarting the infantile antivirus solutions and firewall
weaknesses, the world felt the need for more advanced
security, detection and prevention solutions.
Businesses soon found out that recruiting IRTs (incident
response teams) was costly, and they needed better longterm
solutions which could safeguard their ever-increasing
mountain of data. It paved the way for enhanced
cybersecurity solutions.
As a strategy, cybersecurity's continuous monitoring helps
as a threat detection technique to maintain, comply with,
and support business norms and growth. Adopting this
strategy will allow greater threat identification and
detection of weaknesses within a system, network, devices,
gadgets, and software.
IDS or intrusion detection system is a highly effective way.
It is a software application designed to monitor networks,
constantly searching for threats, breaches, malicious
activities and policy violations. It collects all these
incidences and reports them using event management and
information security systems.
Managed cybersecurity solutions extend a company's IT
reach to non-IT departments using network security
processes. Frequent security threat assessment and audits,
IT protocol trainings, and strategic solution adoption are
some of the critical features of this service.
These antivirus programs were simple scanners that
detected the sequence of the viruses' codes by executing
context searches. Many of these antivirus scanners
contained immunisers that would modify their code to make
believe viruses that the host they are going to attack is
already compromised.
However, as the army of viruses increased in their numbers
and number of attacks, the immunisers solution soon
became ineffective.
In 1988, alongside the antivirus, a firewall began to take
shape. It was termed packet filter firewalls, and it could
inspect the packets of data transferred across the internet.
The packets it found matching its rules will be rejected or
dropped.
A Cyber-Secured Future
18 | July 2022 | www.insightssuccess.in
Cybersecurity frameworks are also being developed,
evolved, adapted, and implemented to identify, detect,
protect, respond, and recover the information or data lost.
The cyber-security expert should also leverage emerging
technologies like artificial intelligence, machine learning,
and blockchain to expose the cybercriminals' playbooks and
outmatch them.
This way, we can safeguard the corporate and industry
future from future cyber-attacks and cyber-warfares.
– Gaurav PR Wankhade
Security is a state of mind.
Are you in ?