07.10.2022 Views

Indias Leading Cyber Security Company2022

Insights Success sheds the spotlight on AKS Information Technology Services, one of the most reliable and trusted cyber security company in India, in its latest edition, ‘India's Leading Cyber Security Company-2022.’

Insights Success sheds the spotlight on AKS Information Technology Services, one of the most reliable and trusted cyber security company in India, in its latest edition, ‘India's Leading Cyber Security Company-2022.’

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

VOL. 07

ISSUE 05

2022

India's

Leading

Cyber Security

Company

2022

Anshul Saxena,

CEO

Aks

Information

Technology Services

The Invincible Shield of the Cyberworld


How do you protect our co

Start by protecting


untry from cyber-attacks?

your own network


Ameliorating Perpetual Innovations, securely!

n this modern era of advancements,

Ipeople can probably feel overwhelmed by

the number of cybersecurity options that

came into existence due to the emerging trends

of technology. Moreover, due to the pandemic,

businesses shifted their working protocols,

shifting to online operations.

These companies/organizations are

maintaining an online presence through

websites, social media channels and pages.

However, one cybersecurity breach is enough

to turn the tables!

A lot of companies operate their business

through the internet; moreover, the outbreak of

the pandemic has enabled the people of the

working class to work from home through

newly developed platforms, software, or

traditional online applications.

In the world of advancements, these activities

also increase the chances of breaching these

operational systems, virtually as data security

is a pivotal entity for every firm, whether it is

healthcare, finance, or any business that

conducts its secondary operations in the online

world.

Every business/organization has its unique set

of standards, regulations, practices, and data

information compliances that they collect, like

customer data, addresses, and transaction

details. On the other hand, regulatory

compliance is also adherence to laws, precise

specs and guidelines concerning business

protocols. The essence of cybersecurity can

help save such assets and vital information that

a business needs to scale its progress

eventually.

The professional services of trusted

cybersecurity companies are helping many

organizations by providing the backend brain

of various security systems with a wide array

of tools created for analytics and threatsaving

intelligence.

The security professionals' expertise helps in

the aggregation of endpoint monitoring for

enhancing security infused with Machine

Learning to rectify the breaching patterns. It

also improves the scanning for all-inclusive

purposes. This is undoubtedly a matter of fact

that the prominent cybersecurity companies

provide a complete panacea of enhanced

solutions that help in the prevention of

diverse cyberattacks.

Such comprehensive invulnerability prevents

the system from diverse adversities and

assists in ensuring confidentiality along with

data security, which turns over a new leaf of

reliability.

Embracing the journey of one such prominent

cybersecurity company that empowers

exceptional services in the cybersecurity

niche, Insights Success sheds the spotlight on

AKS Information Technology Services, one

of the most reliable and trusted cyber security

company in India, in its latest edition,

‘India's Leading Cyber Security Company-

2022.’

Flip through the pages and delve into the

contractual journey of this reliable company

in the modern industry. Have a Delightful

Read!

Abhishek Joshi

Deputy Editor

abhishek.joshi@insightssuccess.com


2022

AKS Information

Technology Services

is recognized by

Insights Success as

India's

Leading

Cyber Security

Company

2022

for its innovative solutions that empower exceptional

reliability in the ever-evolving cyber security niche.

Insights Success

Media and Technology Pvt. Ltd.

Pooja M. Bansal

Editor-in-Chief


Editor-in-Chief Pooja M. Bansal

Deputy Editor Abhishek Joshi

Managing Editor Gaurav PR Wankhade

sales@insightssuccess.com

JULY, 2022

Art and Design Head Rashmi Singh

Associate Designer Revati Badkas

Sr. Vice President Megha Mishra

Sr. Sales Manager Tejaswini Whaval

Business Development Lead Neha Bhilare

Sr. Business Development Executive Pratiksha Jagtap

Technical Head Prachi Mokashi

Technical Specialist Amar Sawant

Digital Marketing Manager Renuka Kulkarni

SME-SMO Executive Nikita Khadalkar

Circulation Manager Tanaji

Corporate Offices:

Insights Success Media and Technology Pvt. Ltd.

Off. No. 22, Rainbow Plaza, Shivar Chowk,

Pimple Saudagar, Pune, Maharashtra 411017

Phone - India: +91 7410079881/ 82/ 83/ 84/ 85

Email: info@insightssuccess.in

For Subscription: www.insightssuccess.in

Insights Success Media Tech LLC

555 Metro Place North, Suite 100,

Dublin, OH 43017, United States

Phone - (614)-602-1754

Email: info@insightssuccess.com

For Subscription: www.insightssuccess.com

Cover Price : RS. 200/-

Follow us on : www.facebook.com/insightssuccess/ https://twitter.com/insightssuccess

We are also available on

Copyright © 2022 Insights Success Media and Technology Pvt. Ltd., All rights reserved. The content and images used in this magazine should not be reproduced or

transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior permission from Insights Success Media and Technology Pvt. Ltd.

Reprint rights remain solely with Insights Success. Printed and Published by Insights Success Media and Technology Pvt. Ltd.

RNI NUMBER: MAHENG/2018/75953


Subscribe Today

Stay in touch.

Subscribe to Insightssuccess Get Insightssuccess

Magazine in print, & digital on www.insightssuccess.in

www.insightssuccess.in

Cheque should be drawn in favour of : INSIGHTS SUCCESS MEDIA AND TECH PVT. LTD.

CORPORATE OFFICE

Insights Success Media and Technology Pvt. Ltd.

Off No. 22, Rainbow Plaza, Shivar Chowk,

Pimple Saudagar, Pune, Maharashtra 411017.

Phone - India: 020- 7410079881/ 82/ 83/ 84/ 85

USA: 302-319-9947

Email: info@insightssuccess.in

For Subscription : www.insightssuccess.in




Aks

Information

Technology Services

The Invincible Shield of the Cyberworld

AKS IT has

achieved the

utmost loyalty

from their clients

by providing

quality service

and ensuring the

secrecy of client’s

data.


C o v e r S t o r y

Anshul Saxena

CEO


India's Leading Cyber Security Company-2022

AKS Information Technology Services (AKS IT) is

one of the most reliable and trusted cyber security

company in India. It is an ISO 9001:2015 and ISO

27001:2013 compliant mid-sized Indian Company. It

provides Consultancy, Auditing, Compliance to various

regulatory and security standards, computer Forensics and

Training services. In cyber security product segment, it has

developed AKS Forensic Workstation and DDoS mitigation

solution, Web Application Firewall (WAF), Anti Bot

solution, Link Load Balancer, Server Load Balancer, DNS

Security solution in all the three platforms, Appliance

based, on VM and Multi-Cloud Security as a Service. It is

also the premier 'Innovation Hub' in Cyber Security which

is spearheading the best in-class technological products for

Domestic and Global markets. The company has been at the

forefront of delivering excellence in the domain of

Information Security products and services ever since it was

established in 2006.

AKS IT is an all-in-one Security Service provider which

covers all the aspects of enterprise security including

mobile apps and website audits, network audit, ICS audit,

Telecom audit, Banks audit as per RBI requirements,

SOC-1 and SOC-2 audit, Computer forensics, setting up

and managing Security operations Center (SoC) for

providing real-time monitoring and management,

emergency response and round-the-clock protection against

any cyber-attack. Backed by its comprehensive cyber

security training program, AKS IT educates its customers

while also implementing and enforcing security and

auditing IT infrastructure.

The company's customers span across various industry

sectors from IT, BFSI, Telecom, Transport, Manufacturing

and the Government, both in India and abroad.

About CEO:

Anshul Saxena, an alumnus of Netaji Subhash Institute of

Technology (NSIT) Delhi and Georgia Institute of

Technology, USA, has worked in Microsoft and

Amazon.com. He has eleven years of work experience in

Software Development and Cyber Security. He came back

to India on our Prime Minister's call given in NASSCOM's

Silver Jubilee - 2015.


" ा मेरे िहंदु ान का नौजवान, दुिनया को चैन की नीदं

सोने के िलए, साइबर िस ू रटी के िलए, फु ल ूफ इनोवेशन

लेकर आ सकता है ा?"

- भारत के धान मं ी

ी नर मोदी

Innovated DDoS mitigation technology which is patented in

India (Patent No. 353365). Received National Technology

Award 2020 by the Government of India, Most Innovative

Micro Enterprise Award by The Economic Times and many

more. The tenets of strategies incorporated by Anshul are

Uncompromised Quality of service, Innovation, Good

Ethical values and healthy culture.

What was your inspiration behind venturing into Cyber

Security niche?

I was very keen in Cyber Security domain and did my MS

in Information Security from Georgia Tech, USA and joined

the family business, AKS IT Services, founded by my

parents.

What are the USPs that highlight your brand/company

as a leading name in Cyber Security Industry?

The most important thing, we believe in is building Trust.

This was achieved by providing Quality services and

quality products and being available 24x7 for providing any

support. AKS has achieved the utmost loyalty from our

clients and successfully undertaken application security

audits of more than 12000 applications. Our customercentric

approach and focus on quality has helped us to beat

the competition.

What are the immersive benefits of the services/solutions

that you provide to your clients?

Our services/solutions provide security against various

types of cyber-attacks which assures clients to continue

their core business without bothering about cyber-attacks.

Cyber-attacks increased many folds during the last two

years due to pandemic and work from home. Attack on

websites, Ransomware attack, DDoS attacks became very

common. Even before these attacks came into mainstream,

AKS IT had predicted and developed DDoS mitigation

solution, Web Application Firewall.

AKS Forensic Workstation was effectively utilized by Law

Enforcement Agencies for investigation of Cyber Crime

cases. AKS IT continues to invest in research and

indigenous development of Cyber Security Products for our

customers. Backed by our services, our company wants to

become one-stop security partner to our customers.


Aces of AKS IT

Veteran Wg Cdr Ashish Kumar Saxena, the Founder and MD of AKS IT is B.Sc. Engineering (Electrical) from HBTI

Kanpur and M.Tech. in Computer Technology from IIT Delhi, CISSP, CISA, MBCI and Fellow of the Institution of

Electronics and Telecommunication Engineers; Ashish has been trained in Sweden, France and the USA with over 40 years

of work experience.

Anshul Saxena, CEO, is a Bachelor of Engineering from Netaji Subhash Institute of Technology. He did MS in

Information Security from Georgia Institute of Technology, Atlanta, USA. He has eleven years of work experience in

Software Development and Security.

Archana Saxena, Director HR and Admin, is one of the founding directors and looking after HR and Administration. She

has more than 30 years of experience. She is also managing Akash Memorial Charitable Trust.

Vivek Verma, AVP Projects, is a Bachelor of Technology in Computer Science from IP University Delhi. He has more

than 14 years of client management experience.

Rajesh Sharma, AVP Compliance and Forensics, is MBA, CISA and ISO 27001:2013 LA. He has more than 34 years of

work experience.

Mukesh Saxena, AVP Finance, is Graduate in Commerce and having more than 16 years of work experience.

Shreshta Mittal, Sr. Manager Projects, is Bachelor of Technology in Computer Science and MBA IT. She has more than

ten years of work experience.


What were the initial challenges after venturing into the

field of Cyber Security and what are the challenges

now?

Initial challenges were mainly capital infusion. Even banks

were reluctant to give funding. There was a lack of

awareness in understanding cyber threats and vulnerabilities

in the system. We started conducting training for our clients

to make them aware of the importance of cyber security.

Present challenges are getting skilled resources and delay in

payment realization.

Being an experienced leader, share with us your opinion

on how Cyber Security is crucial today, and what

advancements can we expect in the future?

Information technology has penetrated in all verticals for

ease of doing business, automation, faster communication,

and quick access of data. This has necessitated the need of

Cyber Security for safeguarding Critical Information

Infrastructure, Data and personal information. Nowadays,

data breaches, online data/info/records heists, identity

thefts, accounts hijacking, hacktivism, website

defacements, DDoS attacks, ransomware, malware attacks

and other social media attacks are common. Cloud services

are also being used by attackers e.g., Ransomware as a

Service (RAAS).

Advancement in future is automation of attacks, automatic

defense mechanism and majority of data would be in Cloud.

This will also be the preferred way of fighting War, known

as ‘Cyber War.’ As evident in the current war between

Russia and Ukraine, cyber attacks are also being carried out

from both the sides and DDoS attack is used as a deadly

cyber weapon.

What would be your advice to the aspirants who are

willing to venture into the field of Cyber Security

services?

Cyber Security is a serious business. Knowledge in the

Cyber security domain and quality of service/product are

paramount for the success. There are no shortcuts in

ensuring cybersecurity; minor slippage may lead to a

disaster. In security, no one recognizes you for the 99/100

attacks you mitigate. They only blame you for 1/100 attack

you couldn't mitigate. That is why one has to give his 200%

to hit 100/100 every single time.


Where do you envision AKS IT eventually, and what are

your future goals? How do you plan to embrace the

changes happening in your industry?

The AKS IT Group today consists of AKS IT Services,

Haltdos.com and, AKS Institute of Cyber Technology.

While AKS IT Services is committed to providing Cyber

Security services to mitigate current and futuristic Cyber

risk, Haltdos.com aims at innovating and developing AIbased

cyber security solutions to protect IT/OT/IOT Infra

against current and futuristic threats. On the other hand,

AKS Institute of Cyber Technology bolsters our threedimensional

approach by providing training on new attack

surfaces created by advancement in technology,

policy/practices needed to mitigate the cyber risk and how

to investigate high-tech crimes.

The tri-pronged war on Cyber Threats thus extended by our

group is backed by strong credentials in India.

Confident, Positive and Determined, we are now expanding

to other geographical locations where our visions, products

and services will be needed.

What is your opinion on 'Safest ways to ensure data

integrity'?

Data Integrity means data is not corrupted. This is presently

being done by using Digital Signature and it's safe until the

private key not leaked out or shared.

It's very difficult to ensure data integrity in social media

where images are forged/morphed and text and voice can

also be altered. It can only be done by social media service

agencies like Facebook, WhatsApp, Twitter, Instagram etc

by taking hash value of each message which can be used to

find out any changes in the photograph/video/other media

on any complaints.



16 | July 2022 | www.insightssuccess.in


T e c h D r i v e

The

Evolution

of

Cyber

I

Security

Solutions

WWhat

began as a harmless joke in 1970 soon became the world's first cyberattack!

It gave crime-world its new niche, cyber-criminality. Since then,

cyber-attacks have evolved by using threats such as phishing attacks,

malware, ransomware etc.

Or according to a security magazine, hackers (cyber-criminals) attack every thirtynine

seconds on average. In short, cyber-crime is outnumbering other crimes in this

regard. Thus, the world, too, learned that the greater cyber-connectivity needs the

greatest cybersecurity.

And the cybersecurity industry had been evolved alongside the cybercrime industry.

Now, it is essential to understand their origin and history together as they race into

the future, to outpace each other.

The Origin and Brief History of Cyber-Criminality

In early 1970, a BBN Technology's engineer, Bob Thomas, created Creeper Code, a

software program that moved across the computers while displaying the message 'I

am the creeper: catch me if you can!'

It was a joke countered humorously by Bob's colleague Ray Tomlinson who created

Reaper Code, a program that would duplicate itself while travelling from one


computer to another. Soon Reaper Code eliminated Creeper

Code, and the joke and its counter joke began the annoying

history of cybercrimes.

Nineteen years later, in 1989, Robert Morris created Morris

Worm to gauge the internet's dimension. The worm, the first

of its kind of DoS (Denial-of-Service) attack, slowed down

each computer it infected by attacking it as many times as

required to make it crash.

Morris Worm nearly closed down the internet but was saved

by Computer Emergency Response Teams (CERTs)

developed in response. Robert was convicted under the

already created Computer Fraud and Abuse Act of 1986.

Mainly concentrated on strategic cyber-warfare and

financial skullduggery, the post-1990s virus era saw the I

Love You and Melissa viruses that infected over ten million

PCs globally, crashed email systems, and cost millions of

dollars to the world.

The Birth and Rise of Cyberworld Protectors

The foundation for cyberworld security was laid down by

the originator of the internet or the ARPANET (Advanced

Research Projects Agency Network), combining its forces

with the U.S. Airforce and other institutions and developing

an advanced operating system.

Expanded from the Honeywell Multics Computer System's

security kernel, the new OS could detect, secure, protect,

and automate tools and techniques which would thwart the

possible security breaches and attacks.

With increasing cyber threats across the globe, the race to

develop cyber-security solutions known as Antiviruses

began. Thus, 1987 saw the coming of Ultimate Virus Killer

(UVK), antivirus NOD Version 1.0, and VirusScan.

Though the packets unmatching were termed viruses and

blocked. This simple yet effective solution soon became the

first security and defence line with highly technological

features. It has been extended since to the millions of

networks around the globe.

Race to the Safe Mountain

And as cybercriminals kept advancing in their techniques,

outsmarting the infantile antivirus solutions and firewall

weaknesses, the world felt the need for more advanced

security, detection and prevention solutions.

Businesses soon found out that recruiting IRTs (incident

response teams) was costly, and they needed better longterm

solutions which could safeguard their ever-increasing

mountain of data. It paved the way for enhanced

cybersecurity solutions.

As a strategy, cybersecurity's continuous monitoring helps

as a threat detection technique to maintain, comply with,

and support business norms and growth. Adopting this

strategy will allow greater threat identification and

detection of weaknesses within a system, network, devices,

gadgets, and software.

IDS or intrusion detection system is a highly effective way.

It is a software application designed to monitor networks,

constantly searching for threats, breaches, malicious

activities and policy violations. It collects all these

incidences and reports them using event management and

information security systems.

Managed cybersecurity solutions extend a company's IT

reach to non-IT departments using network security

processes. Frequent security threat assessment and audits,

IT protocol trainings, and strategic solution adoption are

some of the critical features of this service.

These antivirus programs were simple scanners that

detected the sequence of the viruses' codes by executing

context searches. Many of these antivirus scanners

contained immunisers that would modify their code to make

believe viruses that the host they are going to attack is

already compromised.

However, as the army of viruses increased in their numbers

and number of attacks, the immunisers solution soon

became ineffective.

In 1988, alongside the antivirus, a firewall began to take

shape. It was termed packet filter firewalls, and it could

inspect the packets of data transferred across the internet.

The packets it found matching its rules will be rejected or

dropped.

A Cyber-Secured Future

18 | July 2022 | www.insightssuccess.in

Cybersecurity frameworks are also being developed,

evolved, adapted, and implemented to identify, detect,

protect, respond, and recover the information or data lost.

The cyber-security expert should also leverage emerging

technologies like artificial intelligence, machine learning,

and blockchain to expose the cybercriminals' playbooks and

outmatch them.

This way, we can safeguard the corporate and industry

future from future cyber-attacks and cyber-warfares.

– Gaurav PR Wankhade





Security is a state of mind.

Are you in ?

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!