5 Minutes Read

Understanding the Attack Chain Helps to Counter Threats

KV Prasad Jun 13, 2022, 06:35 AM IST (Published)

 Listen to the Article (6 Minutes)

Summary

Security teams are struggling to keep pace with the changes in their networks. Hybrid work, multi-cloud, the explosion of IoT and BYOD devices, and 5G. Meanwhile, cybercriminals have been undergoing their digital transformation. Machine learning and agile development, new sophisticated attacks, combined with Dark Web crime-as-a-service offerings mean that attacks are faster, harder to detect, and …

Security teams are struggling to keep pace with the changes in their networks. Hybrid work, multi-cloud, the explosion of IoT and BYOD devices, and 5G. Meanwhile, cybercriminals have been undergoing their digital transformation. Machine learning and agile development, new sophisticated attacks, combined with Dark Web crime-as-a-service offerings mean that attacks are faster, harder to detect, and better at finding and exploiting vulnerabilities. A recent FortiGuard Labs threat report demonstrated that ransomware increased tenfold in the last year. Threat trends over the year continued to evolve and it is not slowing down.

Understanding the MITRE Attack Chain

Effectively defending against cyberattacks today requires security teams to work smarter rather than harder. Cybercriminal strategies target every link in an attack chain, from gathering information and gaining access, to moving laterally across the network to discover resources to target, to evading detection while exfiltrating data. Traditional security strategies, however, tend to only focus on a handful of attack components, which gives criminals a significant advantage.

To address today’s challenges, security teams need a combination of tools, strategy, automation, and skilled professionals to monitor the entire attack chain and automate as much of the process as possible so that human resources can be focused on higher order analysis and response. Choosing such tools, however, requires understanding the entire length of the attack chain and how vulnerabilities in each of its links can compromise the security of your network.

To assist with this, MITRE has mapped the attack chain into fourteen discrete links, along with examples of the types of attacks that target each link in that chain. To effectively counter today’s advanced threats, security teams need to familiarize themselves with each link in the chain and map them directly to functional areas and tools within their networks.

Understanding the Attack Chain Helps to Counter Threats

Understanding and Implementing The Fourteen Discrete “Links”

    1. Reconnaissance: This is the adversary’s planning phase for future attacks.  The activities focus on information gathering which could be performed actively or passively depending on the requirement. Specifically, the actor is looking to learn more about the organization including its infrastructure and employees. The more information the adversary knows about the target the better chance of a successful attack.
    2. Resource Development: Before an attacker can start their cyber mission, they need to make sure they have the right resources to execute the mission.  The attacker will need to determine whether they will create, purchase, steal or compromise the right resources to support the mission. Examples could be things like domains, web services, VPNs, infrastructure, accounts/emails, malware, and exploits.
    3. Initial Access: Exploiting known vulnerabilities in servers, compromising websites or applications, or taking advantage of successful spearphishing attacks allow attackers to wedge a foothold into the edge of the network.
    4. Execution: This is the point where an attacker executes a binary, command, or script to begin their network reconnaissance and exploitation process.
    5. Persistence: Once an attacker has established a foothold, the next goal is to avoid detection. Creating or manipulating accounts, applying rootkits, using run keys, or exploiting tools like application shimming enable attackers to persist in place while they explore the network for potential targets.
    6. Privilege Escalation: Basic access does not allow an attacker much opportunity to explore the network. To move around the network and access resources worth stealing, an attacker needs higher network privileges.
    7. Defense Evasion: To move through a network undetected, especially when exfiltrating data, attacks need to avoid detection by things like behavioral analytics and IPS tools. Techniques such as clearing files, learning and mimicking normal traffic behaviors, or disabling security tools are just a few of the full range of tools available to today’s hackers.
    8. Credential Access: In many organizations, critical data and other resources are protected behind a wall of security that require appropriate credentials for access. Unfortunately, gaining access to credentials isn’t always that difficult. They are stored in files or in a registry that attackers can exploit, techniques like hooking allow cybercriminals to intercept traffic to uncover credentials, and account manipulation can involve things like adding or modifying the permissions to the account being used to access the network.
    9. Discovery: Not all data exists in the segment of the network that was broken into. Many of the same techniques used to this point are used again to determine where valuable resources exist.
    10. Lateral Movement: and to Then, allow an attacker to can move laterally between network segments, whether they are local to the breach or at some remote physical or virtual data center.
    11. Collection: Once an attacker has identified a payload, they need to collect that data needs and extract it from the network without being detected. This is often the trickiest part of the process, as this may involve massive amounts of data.
    12. Exfiltration: But if Once a cybercriminal has carefully crafted each attack element to this point, they are often able to remain inside a compromised network for months, slowly moving data to other resources that are under less scrutiny, and eventually out of the network.
    13. Command and Control: The final step is for attackers to cover their tracks completely. Multi-hop proxies, data obfuscation, and multi-stage exfiltration are just a few of the techniques cybercriminals use to ensure that stolen data cannot be tracked and traced back to them.

Work Smarter by Utilizing the MITRE Attack Chain

Addressing the entire attack chain needs to be combined with understanding how the network functions, including the impact that future business requirements will have on the network. Mapping those functions to the attack chain allows security teams to think comprehensively about security threats.

Breaking security down into the fourteen MITRE attack chain links has two goals.

  • The first is to engineer as much risk out of the network as possible by addressing weaknesses inherent in each link of the attack chain before an attack occurs. This may include hardening protocols to prevent their exploitation, turning off unused ports, and baselining all known traffic so that new applications or escalating privileges can be identified. Each of these activities can be mapped to multiple attack chain links. So can behavioral analytics, which can identify when a device begins behaving strangely, such as FTPing data out of the network. Even activities such as patching or replacing vulnerable devices, and subscribing to threat intelligence feeds so you are tuned to current attack methodologies and malware can be mapped to multiple links in the attack chain.
  • The second goal is to apply security strategically so that fewer security tools can address more challenges. This allows you to keep the number of management and orchestration consoles you need to monitor under control. It also enhances your ability to implement AI and machine learning such as Endpoint detection and Response technologies to address challenges at digital speeds. Tools like Network Access Control and zero trust network access ensure that you are aware of every device on your network, while SIEM devices ensure that threat intelligence is dynamically collected and correlated from every devices deployed in every corner of your network. Keep in mind that once you have chosen the right technologies and have the proper configurations and logging its equally as important to you have the right people and processes in place to ensure the return on investment with those technologies.  Remember a strong cyber defense is comprised of People, Processes and Technologies.

At the same time, consistency in security policy implementation and enforcement across different network ecosystems is critical. For example, you should deploy the same NGFW solution in every part of your network, whether physical or virtual. This ensures that security protocols and enforcement are applied consistently and that you can monitor and manage your systems through a single central console.

Approaching Security Strategically

Of course, this strategic approach may require radically rethinking your security deployment. Tools have to be fully integrated so that the network can identify and address security threats as a unified system. A self-healing network requires security devices to share and correlate threat intelligence to identify and monitor every device, track applications, detect malware, isolate infected devices, and coordinate responses across a wide variety of network ecosystems, —from multi-cloud infrastructures, platforms, and applications, to remote workers and IoT devices, to next-gen branch offices connected to the cloud and physical resources through Secure SD-WAN. Threat intelligence and response also needs to be driven into each link in the MITRE attack chain. And where possible, AI and machine learning need to be applied so that your integrated security fabric can respond to threats at digital speeds and human resources can provide critical supervision.

The MITRE Attack Chain to Shift Proactive Thinking

A breach resulting in the loss of data can occur in minutes or hours. And yet, it can take weeks or months for most security breaches to be detected. By that time, the perpetrators and your data are long gone. The only way to get out in front of this challenge is to change from a traditional tactical approach that relies on isolated legacy security tools to an integrated strategy that enables you to see and control your entire networked environment, link by link, to identify anomalous behavior and automatically thwart attackers before they have managed to escalate themselves up the attack chain.

This is a partnered post. 

Elon Musk forms several ‘X Holdings’ companies to fund potential Twitter buyout

3 Mins Read

Thursday’s filing dispelled some doubts, though Musk still has work to do. He and his advisers will spend the coming days vetting potential investors for the equity portion of his offer, according to people familiar with the matter

 Daily Newsletter

KV Prasad Journo follow politics, process in Parliament and US Congress. Former Congressional APSA-Fulbright Fellow

Previous Article

Oil Fluctuates as Traders Assess China’s Vow, Unrest in Libya

Next Article

Shanghai residents turn to NFTs to record COVID lockdown, combat censorship

LIVE TV

today's market

index Price Change
nifty 50 ₹16,986.00 -72.15
sensex ₹1,882.60 +28.30
nifty IT ₹2,206.80 +30.85
nifty bank ₹1,318.95 -14.95
index Price Change
nifty 50 ₹16,986.00 -7.15
sensex ₹1,882.60 +8.30
nifty IT ₹2,206.80 +3.85
nifty bank ₹1,318.95 -1.95
index Price Change
nifty 50 ₹16,986.00 -72.15
sensex ₹1,882.60 +28.30
nifty IT ₹2,206.80 +30.85
nifty bank ₹1,318.95 -14.95
index Price Change
nifty 50 ₹16,986.00 -7.15
sensex ₹1,882.60 +8.30
nifty IT ₹2,206.80 +3.85
nifty bank ₹1,318.95 -1.95
index Price Change
nifty 50 ₹16,986.00 -7.15
sensex ₹1,882.60 +8.30
nifty IT ₹2,206.80 +3.85
nifty bank ₹1,318.95 -1.95

Currency

Company Price Chng %Chng
Dollar-Rupee 73.3500 0.0000 0.00
Euro-Rupee 89.0980 0.0100 0.01
Pound-Rupee 103.6360 -0.0750 -0.07
Rupee-100 Yen 0.6734 -0.0003 -0.05
Quiz
Powered by
Are you a Crypto Head? It’s time to prove it!
10 Questions · 5 Minutes
Start Quiz Now
Win WRX (WazirX token) worth Rs. 1500.
Question 1 of 5

What coins do you think will be valuable over next 3 years?

Answer Anonymously

Should Elon Musk be able to buy Twitter?

 5 Minutes Read

The World’s #1 Network Firewall Also Delivers Powerful Networking Solutions

KV Prasad Jun 13, 2022, 06:35 AM IST (Published)

 Listen to the Article (6 Minutes)

Summary

Fortinet has been the driving force in the evolution of cybersecurity for over 20 years. Central to that is FortiGate, the industry’s most-deployed, patented, and validated firewall. With over 8.4 million cumulative units shipped, representing over one-third of all firewall shipments, and performance numbers that average 15x better than competitive offerings, it’s no secret that FortiGate is …

Fortinet has been the driving force in the evolution of cybersecurity for over 20 years. Central to that is FortiGate, the industry’s most-deployed, patented, and validated firewall. With over 8.4 million cumulative units shipped, representing over one-third of all firewall shipments, and performance numbers that average 15x better than competitive offerings, it’s no secret that FortiGate is the #1 firewall in the world.

Less well-known is that FortiGate also serves as the foundation of the only true converged networking and security platform available today. Here are just a few of the robust networking solutions delivered via FortiGate.

Graphic of FortiGate's various solutions, including network firewall and SD-WAN

FortiGate delivers one of the top Secure SD-WAN solutions on the market

In addition to the suite of market-leading security solutions built into FortiGate, it also delivers one of the market’s top-rated Secure SD-WAN solutions at no extra cost. Fortinet Secure SD-WAN is the only solution to ensure optimal user experience with maximum threat protection at any scale. That’s due to the FortiGate patented security processing unit (SPU) architecture, which extends across the entire product line. It ensures the highest price-performance in the industry, enabling superior security and inspection services for advanced traffic management.

And because it was built using the same operating system, FortiOS, as Fortinet’s portfolio of market-leading security solutions, IT teams can seamlessly connect and route branch networks while simultaneously applying a full stack of integrated security, eliminating the expensive and time-consuming need to add overlay security. The FortiOS operating system spans all WAN and security functions, simplifying management, increasing visibility, and ensuring consistent policy deployment and enforcement. Its unique ability to orchestrate consistent networking and security policies enables IT teams to implement end-to-end automation that’s easy to set up and manage, combined with deep analytics and self-healing WAN links to optimize operational efficiency.

These advantages allow Fortinet Secure SD-WAN to deliver on three critical issues every IT team must address: 1) delivering application SLAs no matter where an application resides, 2) delivering WAN resiliency to ensure continuous operations and business uptime, and 3) delivering end-to-end visibility, orchestration, and customized reporting to ensure efficient operations.

FortiGate can also provide centralized configuration and management for wireless WAN using FortiExtender LTE/5G cellular gateways. Whether you need to add cellular WAN links as backup, enable out-of-band management (OOB), or leverage LTE/5G for primary edge connectivity at a branch location, FortiGate makes it easy to add wireless WAN as another simple and secure link.

FortiGate includes a powerful LAN edge controller

In addition to its advanced WAN capabilities, FortiGate includes a fully functional set of LAN controls. For example, FortiGate can act as the wireless controller for FortiAP Wi-Fi access points, with all the features you’d expect from a wireless controller. Onboard maps allow for easy correlation of events to locations within the site, with detailed spectrum analysis for in-depth RF analysis when needed. Fortinet’s Ethernet switches (FortiSwitch) can also be controlled by the FortiGate, with onboard switch control down to the port and configuration of MC-LAG (multi-chassis link aggregation group) topologies. And following through on our vision of Security-Driven Networking, all firewall security features integrate natively with the LAN layer, allowing you to set consistent security policies to the LAN using the same screen you use to manage firewall ports.

FortiGate enables the industry’s only universal ZTNA enforcement

FortiGate is the only firewall product to natively integrate zero- trust network access (ZTNA) policy enforcement points. Because it can be deployed anywhere in the network (on-premises and in the cloud), FortiGate can establish universal application access enforcement protected by encrypted tunnels for a consistent user experience, which is now critical for securing today’s hybrid workforce. FortiOS can automatically trigger user verification and device risk assessment for each application session, providing the foundation for building a Zero Trust Edge strategy that enables a hybrid workforce to connect to applications while maintaining consistent security wherever users and applications reside.

Converging NOC & SOC starts with FortiGate

One of the biggest challenges facing NOC and SOC systems is addressing the convergence of networking and security. The Fortinet Security Fabric is the first platform designed specifically to enable this convergence. And its unique design, where all systems are built on the same FortiOS operating system with FortiGate as the foundation, enables centralized management, removing the traditional complexity of managing each architecture individually, especially at scale across a dispersed network.

Fortinet’s single pane of glass approach with FortiManager allows both NOC and SOC teams to manage the entire Fortinet estate through a single console. This enables security and network policy integration, ensures consistent security policy distribution and enforcement, and reduces risks due to misconfigurations. In addition, its advanced zero-touch provisioning capabilities simplify solution distribution to remote locations, so organizations can quickly build out a unified security architecture across their distributed ecosystem. FortiOS includes a wide range of open APIs and common standards to enable NOC and SOC teams to automate workflows and increase operational efficiency through FortiManager with solutions from Fortinet’s open ecosystem tech alliance partners.

FortiGate can also be augmented with advanced services from FortiGuard Labs, such as IoC (Indicators of Compromise)-as-a-Service and FortiGuard security ratings. These and other services provide increased visibility into security posture, deeper insight into network traffic anomalies, and enhance the ability of NOC and SOC teams to gather and act on threat intelligence.

The Fortinet Difference

The power behind FortiGate starts with FortiOS everywhere, the common operating system for all FortiGate advanced network and security functions spanning on-premises and cloud environments. And because every solution running on the FortiGate platform runs on FortiOS, they are not simply integrated. They are the same product.

This common codebase enables true convergence across all solutions and form factors (appliance, virtual machine, container, and cloud). And Fortinet’s unique ASIC acceleration, designed for both physical and virtual devices, is the only custom-built performance-enhancement technology in the industry, delivering an average of 15x more performance than competitively priced solutions. This technology convergence also enables broad automation across the distributed network, enabling advanced services, powered by Fortinet’s patented AI and ML technology from FortiGuard Labs, to coordinate the detection and prevention of threats across on-premises and multi-cloud deployments at scale.

While it’s a significant achievement to be recognized as the world’s most-shipped network firewall, that’s just the beginning. We invite you to explore the edge networking capabilities in your FortiGate that move it beyond simply a core security platform to one that can be deployed everywhere your network touches. Its unique capabilities provide secure networking, zero-trust access, cloud security, and integrated network and security operations to ensure consistent visibility and control, enabling your organization to confidently amplify your digital acceleration efforts.

This is a partnered post. 

Elon Musk forms several ‘X Holdings’ companies to fund potential Twitter buyout

3 Mins Read

Thursday’s filing dispelled some doubts, though Musk still has work to do. He and his advisers will spend the coming days vetting potential investors for the equity portion of his offer, according to people familiar with the matter

 Daily Newsletter

KV Prasad Journo follow politics, process in Parliament and US Congress. Former Congressional APSA-Fulbright Fellow

Previous Article

Oil Fluctuates as Traders Assess China’s Vow, Unrest in Libya

Next Article

Shanghai residents turn to NFTs to record COVID lockdown, combat censorship

LIVE TV

today's market

index Price Change
nifty 50 ₹16,986.00 -72.15
sensex ₹1,882.60 +28.30
nifty IT ₹2,206.80 +30.85
nifty bank ₹1,318.95 -14.95
index Price Change
nifty 50 ₹16,986.00 -7.15
sensex ₹1,882.60 +8.30
nifty IT ₹2,206.80 +3.85
nifty bank ₹1,318.95 -1.95
index Price Change
nifty 50 ₹16,986.00 -72.15
sensex ₹1,882.60 +28.30
nifty IT ₹2,206.80 +30.85
nifty bank ₹1,318.95 -14.95
index Price Change
nifty 50 ₹16,986.00 -7.15
sensex ₹1,882.60 +8.30
nifty IT ₹2,206.80 +3.85
nifty bank ₹1,318.95 -1.95
index Price Change
nifty 50 ₹16,986.00 -7.15
sensex ₹1,882.60 +8.30
nifty IT ₹2,206.80 +3.85
nifty bank ₹1,318.95 -1.95

Currency

Company Price Chng %Chng
Dollar-Rupee 73.3500 0.0000 0.00
Euro-Rupee 89.0980 0.0100 0.01
Pound-Rupee 103.6360 -0.0750 -0.07
Rupee-100 Yen 0.6734 -0.0003 -0.05
Quiz
Powered by
Are you a Crypto Head? It’s time to prove it!
10 Questions · 5 Minutes
Start Quiz Now
Win WRX (WazirX token) worth Rs. 1500.
Question 1 of 5

What coins do you think will be valuable over next 3 years?

Answer Anonymously

Should Elon Musk be able to buy Twitter?

 5 Minutes Read

Fortinet Recognized as a Gartner® Peer Insights™ Customers’ Choice For Enterprise Wired and Wireless LAN Infrastructure

KV Prasad Jun 13, 2022, 06:35 AM IST (Published)

 Listen to the Article (6 Minutes)

Summary

It’s well known that Fortinet delivers the most-deployed network security solution on the market, representing over one-third of all firewall shipments. But Fortinet is also a serious networking vendor with technology in SD-WAN, Ethernet switching, Wi-Fi access points, and more. We believe our position as a networking leader is further exemplified by Fortinet being named a …

It’s well known that Fortinet delivers the most-deployed network security solution on the market, representing over one-third of all firewall shipments. But Fortinet is also a serious networking vendor with technology in SD-WAN, Ethernet switching, Wi-Fi access points, and more. We believe our position as a networking leader is further exemplified by Fortinet being named a Gartner® Peer Insights™ Customers’ Choice for Enterprise Wired and Wireless LAN Infrastructure for the fourth year in a row.

The Importance of Security-Driven Networking

Organizations value Fortinet’s network offerings because they bridge the gap between networking and security—breaking down silos that have existed for years—to offer a better experience both for the groups running the network and the users who rely on it to get their jobs done.

Fortinet offers a robust portfolio of switching and wireless solutions that deliver Security-Driven Networking, which converges both networking and security functions into a single fabric architecture, one centered on our industry-leading network firewallFortiGate. This gives the network a central location for all security and networking configuration to take place. This also allows for consolidation of vendors by bringing key security functions and key networking functions home to a single topology. The Fortinet solution gives several benefits for our customers, namely: better security, simpler networks, and better total cost of ownership.

By merging the two technologies, Fortinet can offer a more secure networking experience because Fortinet’s network equipment (Ethernet and Wi-Fi) is a direct extension of the network firewall. Rather than have security settings spread across multiple locations (a recipe for misconfiguration and configuration drift), Fortinet’s LAN edge solution allows for a single configuration that covers all network aspects. A more-secure network results in greater overall reliability, less downtime, and better business functions all around.

For our customers, this simplifies the network (one interface to learn, one configuration file to administer) and the time spent managing it, which equates to a lower overall cost of ownership.

As digital acceleration continues to tax the resources available to IT groups, having a converged and consolidated offering with intelligence built in means more time spent on important strategic corporate initiatives.

It’s no wonder that as people learn and experience how Security-Driven Networking can improve their deployments, they share on Gartner Peer Insights the benefits they have seen from this convergence.

Fortinet Is a Recognized Choice of Customers Worldwide

We’re proud to once again be recognized with the Customers’ Choice distinction from Gartner Peer Insights for Enterprise Wired and Wireless LAN Infrastructure. We think customers of all sizes and industries can leverage Fortinet to optimize their digital acceleration by deploying a converged Security-Driven Network.

In addition to receiving the Gartner Peer Insights Customers’ Choice distinction, Fortinet has again been placed in the top-right quadrant of the Voice of the Customer report. In fact, over 90% of customers stated their willingness to recommend Fortinet’s switching and wireless solution to others. Fortinet believes that this level of advocacy and support of our solution from the users who have implemented it and use it daily to run their business is the most powerful statement that can be made about the value our solution provides.

Here is a sample of reviews provided by customers:

FortiSwitch And FortiAP Provide A Secure Converged Solution

“The FortiSwitch and FortiAP products provide a secure and reliable solution. Our organization has hundreds of these deployed they work as promised and we have no issues.”

FortiAP/FortiSwitch Provides Secure High Performance Access

“FortiSwitch and FortiAP are solid hardware to provide secure high performance access. FortiNet has large product family to meet any needs you have. Additional products are required to meet needs using FortiAuthenticator, and FortiNAC.”

Robust And Secure Wi-Fi

“It is a very reliable solution. we have over 100 of these deployed and all work working extremely well.”

Satisfied With The Perfect Service And Product

“We are using this product for the last 6 years and the centralization and performance are excellent and great. Both the service and products are well executed and high satisfactory. Highly recommended to all the organizations.”

Great AP Structure For A Warehouse Environment

“We bought FortiAP to replace our aging Motorola solution and installing and getting the access points setup was a breeze. The gui interface was awesome and easy to use.”

To learn more about Gartner Peer Insights Customers’ Choice or to read the reviews written about our products by IT professionals, please see the Enterprise Wired and Wireless LAN Infrastructure page on Gartner Peer Insights. 

To all of our customers who submitted reviews, thank you! These reviews mold our products and our customer journey, and we look forward to building on the experience that earned us this distinction. If you have a Fortinet story to share, we encourage you to weigh in on Gartner Peer Insights. 

To learn more about Fortinet’s switching and wireless solutions, visit our website.

Gartner Peer Insights ‘Voice of the Customer’: Enterprise Wired and Wireless LAN Infrastructure, Peer Contributors, 31 May 2022.

GARTNER  is a registered trademark and service mark, and PEER INSIGHTS and GARTNER PEER INSIGHTS CUSTOMERS’ CHOICE BADGE are trademarks and service marks, of Gartner, Inc. and/or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved.

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences with the vendors listed on the platform, should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This is a partnered post. 

Elon Musk forms several ‘X Holdings’ companies to fund potential Twitter buyout

3 Mins Read

Thursday’s filing dispelled some doubts, though Musk still has work to do. He and his advisers will spend the coming days vetting potential investors for the equity portion of his offer, according to people familiar with the matter

 Daily Newsletter

KV Prasad Journo follow politics, process in Parliament and US Congress. Former Congressional APSA-Fulbright Fellow

Previous Article

Oil Fluctuates as Traders Assess China’s Vow, Unrest in Libya

Next Article

Shanghai residents turn to NFTs to record COVID lockdown, combat censorship

LIVE TV

today's market

index Price Change
nifty 50 ₹16,986.00 -72.15
sensex ₹1,882.60 +28.30
nifty IT ₹2,206.80 +30.85
nifty bank ₹1,318.95 -14.95
index Price Change
nifty 50 ₹16,986.00 -7.15
sensex ₹1,882.60 +8.30
nifty IT ₹2,206.80 +3.85
nifty bank ₹1,318.95 -1.95
index Price Change
nifty 50 ₹16,986.00 -72.15
sensex ₹1,882.60 +28.30
nifty IT ₹2,206.80 +30.85
nifty bank ₹1,318.95 -14.95
index Price Change
nifty 50 ₹16,986.00 -7.15
sensex ₹1,882.60 +8.30
nifty IT ₹2,206.80 +3.85
nifty bank ₹1,318.95 -1.95
index Price Change
nifty 50 ₹16,986.00 -7.15
sensex ₹1,882.60 +8.30
nifty IT ₹2,206.80 +3.85
nifty bank ₹1,318.95 -1.95

Currency

Company Price Chng %Chng
Dollar-Rupee 73.3500 0.0000 0.00
Euro-Rupee 89.0980 0.0100 0.01
Pound-Rupee 103.6360 -0.0750 -0.07
Rupee-100 Yen 0.6734 -0.0003 -0.05
Quiz
Powered by
Are you a Crypto Head? It’s time to prove it!
10 Questions · 5 Minutes
Start Quiz Now
Win WRX (WazirX token) worth Rs. 1500.
Question 1 of 5

What coins do you think will be valuable over next 3 years?

Answer Anonymously

Should Elon Musk be able to buy Twitter?

 5 Minutes Read

Secure SD-WAN: The Foundation for Network Transformation

KV Prasad Jun 13, 2022, 06:35 AM IST (Published)

 Listen to the Article (6 Minutes)

Summary

Over the past several years, virtualization and cloud adoption has led to a massive migration of applications and resources to cloud environments. Today, nearly every organization has some portion of its resources in the cloud, with 89% of organizations having a multi-cloud strategy in place. And Gartner estimates that by 2025 over 95% of new digital workloads will be …

Over the past several years, virtualization and cloud adoption has led to a massive migration of applications and resources to cloud environments. Today, nearly every organization has some portion of its resources in the cloud, with 89% of organizations having a multi-cloud strategy in place. And Gartner estimates that by 2025 over 95% of new digital workloads will be deployed on cloud-native platforms.

SD-WAN has played a pivotal role in enabling the global digital transformation of organizations. At first, it simply provided a more flexible way for branch offices to quickly connect to cloud-based applications. But as networks continued to evolve, SD-WAN became essential, providing fast and secure access between clouds, clouds and data centers, and as the centerpiece of SASE solutions that extend that same access coupled with security to home and mobile workers. Today, new SD-WAN platforms serve as essential building blocks for highly dynamic and broadly distributed networks. Here’s a look at the evolution of SD-WAN over the past 8 years:

Graphic depicts the timeline of SD-WAN evolution, starting with SD-WAN and ending with Secure SD-WAN as a Platform

1.0 – SD-WAN

Competing in the digital marketplace forced organizations to transition to an application-centric business model. As a result, existing fixed WAN infrastructures couldn’t keep up. Fixed MPLS connections at branch offices forced all application traffic to route through the core network, bogging down the network and impacting user experience—the productivity—of remote workers. SD-WAN innovations like accelerated cloud on-ramp, application-aware routing, self-healing connections, and failback ensured consistent, flexible access to critical business applications for branch offices that MPLS couldn’t provide.

1.5 – Secure SD-WAN for secure branch access

However, it turned out that one of the biggest challenges was securing those connections. SD-WAN connections, by their nature, are highly dynamic and responsive. Legacy security systems were simply not designed to dynamically adapt to rapidly evolving networks. So, as IT teams struggled to build and maintain an overlay security solution, security gaps inevitably developed that could be easily targeted.

Fortinet was the first vendor to address this issue by pioneering the concept of Security-driven Networking, where security and network functions are built together so they function as a single system. We delivered the industry’s first security-driven networking solution by building our Secure SD-WAN solution inside the FortiGate platform. Advanced SD-WAN functions—including connection failover, accelerated cloud on-ramp, application identification and acceleration, and self-healing connections—were built using the same OS as the FortiGate’s portfolio of enterprise-grade security and advanced switching and access control solutions, including built-in support for LTE and 5G connections. Because they are literally the same product, Fortinet Secure SD-WAN provides a level of interoperability, management, automation, and orchestration between networking and security functions that is simply not possible using technologies designed as discrete solutions.

Because these systems were designed to natively interoperate, we were also able to tie Secure SD-WAN connectivity to the branch LAN, known as SD-Branch. FortiGate’s secure wired and wireless network access control, network switching, traffic inspection, and enterprise-grade security solutions deployed in the branch work seamlessly with Secure SD-WAN, ensuring consistent, end-to-end monitoring and protection of every device, workflow, and application.

2.0 – Secure SD-WAN everywhere

This unified approach also allowed Fortinet to be the first vendor to seamlessly extend Secure SD-WAN connectivity and controls beyond the branch. Fortinet Secure SD-WAN enables organizations to create a seamless, secure, and on-demand network experience across all enterprise resources. Because Fortinet Secure SD-WAN is delivered via FortiOS, Fortinet’s flagship operating system, it can be deployed anywhere in any form factor—from appliances to VMs to cloud-native solutions to containers. This universal deployment strategy enables organizations to build a single infrastructure that can span clouds, data centers, mobility, and “as-a-service” technologies, creating reliable, flexible, adaptive, and secure connections end-to-end.

3.0 – Secure SD-WAN as a platform

But that is just the start. Today, Fortinet Secure SD-WAN does more than simply address security and connectivity needs between disparate parts of the distributed network. New advanced functionality now enables it to operate as a foundational platform, providing the advanced networking services today’s complex and rapidly evolving networks, including hybrid and multi-cloud environments, require.

Multi-cloud SD-WAN

Fortinet Secure SD-WAN integrates with security services on major cloud providers to establish and maintain secure, high-performance connectivity to applications running on hybrid and multi-cloud networks. This also reduces IT overhead by consolidating a distributed infrastructure’s security and networking functions—including orchestration, automation, and management. This unified strategy enables centralized network security, uniform segmentation policies, and consistent enforcement across on-premises, private cloud, and multi-cloud deployments. And the prioritization of critical application traffic, combined with reliable connection resiliency, ensures consistent cloud on-ramp and optimal user experience.

ZTNA for Secure SD-WAN

Quickly and securely connecting users from different locations to widely distributed applications and resources, especially across multiple clouds, can be challenging. To address the challenge of ensuring secure and authenticated access to critical resources, Fortinet Secure SD-WAN now includes ZTNA (zero-trust network access) to enforce zero-trust access policies. Explicit per-application/per-session controls and granular monitoring detect activities that can impact performance and impact security.

To ensure optimal user experience, built-in ZTNA Access Proxy functions provide advanced security and deep visibility across all users, applications, and devices, whether on or off the network. This enables a single policy to be consistently enforced across all edges, eliminating device sprawl while simplifying solution management.

Fortinet ZTNA ensures that users and systems only have access to those resources to which they are explicitly entitled, regardless of where they are deployed or the path across the network required to reach them. And because it is built directly into the Security Fabric, it ensures that every connection is fully and consistently secured, inspected, and monitored across every network segment, end-to-end. This unique approach ensures consistent quality of experience and scalable protection as users move between work environments.

SASE plus SD-WAN for remote workers

With more companies embracing a hybrid work-from-anywhere strategy, providing secure connectivity requires extending SD-WAN functionality to every remote worker. Adding SD-WAN to cloud-based security ensures that every worker enjoys the benefits of enterprise-grade security and an optimized user-to-application experience regardless of their location.

AIOps

As SD-WAN is deployed more extensively across the network, management can quickly become an issue. Adding FortiAIOps to Secure SD-WAN empowers network admins to identify, manage, and remediate Fortinet Secure SD-WAN connections. It pulls information from the LAN, WAN, and security layers to identify issues faster, accelerate troubleshooting, optimize network performance and resiliency, and maintain operational efficiency.

And its centralized monitoring and management of the distributed Fortinet wired, wireless, and SD-WAN estate—whether on-prem, in the cloud, or across the WAN—enables it to detect and respond to unusual events, monitor SLAs, and generate tickets with recommended remediations if an SLA begins to fail. 

Secure SD-WAN is the most flexible and secure foundation for ongoing network transformation

As networks continue to evolve, one concept will remain true: users and devices will need fast, accurate, reliable, and secure access to critical applications and resources. Whether deployed on-prem, in the cloud, as a cloud-based service, or even as part of a larger solution, Secure SD-WAN will continue to securely connect users, devices, and networks with critical applications and resources regardless of where they are deployed.

This is a partnered post. 

Elon Musk forms several ‘X Holdings’ companies to fund potential Twitter buyout

3 Mins Read

Thursday’s filing dispelled some doubts, though Musk still has work to do. He and his advisers will spend the coming days vetting potential investors for the equity portion of his offer, according to people familiar with the matter

 Daily Newsletter

KV Prasad Journo follow politics, process in Parliament and US Congress. Former Congressional APSA-Fulbright Fellow

Previous Article

Oil Fluctuates as Traders Assess China’s Vow, Unrest in Libya

Next Article

Shanghai residents turn to NFTs to record COVID lockdown, combat censorship

LIVE TV

today's market

index Price Change
nifty 50 ₹16,986.00 -72.15
sensex ₹1,882.60 +28.30
nifty IT ₹2,206.80 +30.85
nifty bank ₹1,318.95 -14.95
index Price Change
nifty 50 ₹16,986.00 -7.15
sensex ₹1,882.60 +8.30
nifty IT ₹2,206.80 +3.85
nifty bank ₹1,318.95 -1.95
index Price Change
nifty 50 ₹16,986.00 -72.15
sensex ₹1,882.60 +28.30
nifty IT ₹2,206.80 +30.85
nifty bank ₹1,318.95 -14.95
index Price Change
nifty 50 ₹16,986.00 -7.15
sensex ₹1,882.60 +8.30
nifty IT ₹2,206.80 +3.85
nifty bank ₹1,318.95 -1.95
index Price Change
nifty 50 ₹16,986.00 -7.15
sensex ₹1,882.60 +8.30
nifty IT ₹2,206.80 +3.85
nifty bank ₹1,318.95 -1.95

Currency

Company Price Chng %Chng
Dollar-Rupee 73.3500 0.0000 0.00
Euro-Rupee 89.0980 0.0100 0.01
Pound-Rupee 103.6360 -0.0750 -0.07
Rupee-100 Yen 0.6734 -0.0003 -0.05
Quiz
Powered by
Are you a Crypto Head? It’s time to prove it!
10 Questions · 5 Minutes
Start Quiz Now
Win WRX (WazirX token) worth Rs. 1500.
Question 1 of 5

What coins do you think will be valuable over next 3 years?

Answer Anonymously

Should Elon Musk be able to buy Twitter?

 5 Minutes Read

Tax Planning With Mutual Funds

KV Prasad Jun 13, 2022, 06:35 AM IST (Published)

 Listen to the Article (6 Minutes)

Summary

If tax planning is on your mind, then head over to this special webinar with our expert Pankaj Mathpal, MD & CEO – Optima Money Managers as he speaks to Sumaira Abidi on ICICI Prudential & CNBCTV18.com present Smart Investor

If tax planning is on your mind, then head over to this special webinar with our expert Pankaj Mathpal, MD & CEO – Optima Money Managers as he speaks to Sumaira Abidi on ICICI Prudential & CNBCTV18.com present Smart Investor

Elon Musk forms several ‘X Holdings’ companies to fund potential Twitter buyout

3 Mins Read

Thursday’s filing dispelled some doubts, though Musk still has work to do. He and his advisers will spend the coming days vetting potential investors for the equity portion of his offer, according to people familiar with the matter

 Daily Newsletter

KV Prasad Journo follow politics, process in Parliament and US Congress. Former Congressional APSA-Fulbright Fellow

Previous Article

Oil Fluctuates as Traders Assess China’s Vow, Unrest in Libya

Next Article

Shanghai residents turn to NFTs to record COVID lockdown, combat censorship

LIVE TV

today's market

index Price Change
nifty 50 ₹16,986.00 -72.15
sensex ₹1,882.60 +28.30
nifty IT ₹2,206.80 +30.85
nifty bank ₹1,318.95 -14.95
index Price Change
nifty 50 ₹16,986.00 -7.15
sensex ₹1,882.60 +8.30
nifty IT ₹2,206.80 +3.85
nifty bank ₹1,318.95 -1.95
index Price Change
nifty 50 ₹16,986.00 -72.15
sensex ₹1,882.60 +28.30
nifty IT ₹2,206.80 +30.85
nifty bank ₹1,318.95 -14.95
index Price Change
nifty 50 ₹16,986.00 -7.15
sensex ₹1,882.60 +8.30
nifty IT ₹2,206.80 +3.85
nifty bank ₹1,318.95 -1.95
index Price Change
nifty 50 ₹16,986.00 -7.15
sensex ₹1,882.60 +8.30
nifty IT ₹2,206.80 +3.85
nifty bank ₹1,318.95 -1.95

Currency

Company Price Chng %Chng
Dollar-Rupee 73.3500 0.0000 0.00
Euro-Rupee 89.0980 0.0100 0.01
Pound-Rupee 103.6360 -0.0750 -0.07
Rupee-100 Yen 0.6734 -0.0003 -0.05
Quiz
Powered by
Are you a Crypto Head? It’s time to prove it!
10 Questions · 5 Minutes
Start Quiz Now
Win WRX (WazirX token) worth Rs. 1500.
Question 1 of 5

What coins do you think will be valuable over next 3 years?

Answer Anonymously

Should Elon Musk be able to buy Twitter?

 5 Minutes Read

How AgriTech is Disrupting Traditional Indian Farming Methodologies

KV Prasad Jun 13, 2022, 06:35 AM IST (Published)

 Listen to the Article (6 Minutes)

Summary

With an overall value of $370 billion, the Indian agricultural sector contributes 19.9% of the nation’s GDP. What does it mean for AgriTech? Read on to find out!

What comes to your mind when you hear the word Digitization? Developments in cellular infrastructures? Remote connectivity? Or cashless payment? While the Digital India Initiative has disrupted the majority of these sectors and brought technological advancements to nearly every citizen, one area still relatively untouched is Agriculture.

As per Statista, agriculture’s contribution to India’s GDP soared merely from $81.36 billion to $83.43 billion between Q1 2021 and Q1 2022. While some may suggest that it surged 63% from Q4 2021, it’s worth noting that agricultural cycles are annual where periodic surges can be seen every quarter, depending on seasonal conditions.

However, when we observe that 42.6% of the employed workforce is in agriculture, its economic imbalance is quite evident! Despite recent crop production developments, this industry has significant technological barriers. Since agriculture depends on the climate, the hour of the need is to have an innovative approach with AgriTech solutions.

The Current Pain Points of Indian Agriculture

1.      Lack of knowledge about innovative methodologies: Nearly half of the Indian farmers are smallholders relying on traditional, labour-intensive methods. That, too, with limited access to modern machinery, logistics, and analytical data such as soil composition and climate patterns, puts them against uncertainty.

2.      Unpredictable climate: Crop yields are directly vulnerable to adverse weather and natural processes such as soil degradation and pest attacks, not to forget droughts and floods. Recent reports by the Indian Council of Agricultural Research predict that climatic changes could reduce yields by up to 9% in the next 25-30 years.

3.      Logistics and supply chain: India’s supply chain and pricing of agricultural products are just unregulated. The lack of transparency is generally caused by stakeholders, which fuels the suffering of Indian farmers with inconsistent pricing and a lack of accountability. This has a direct effect on market price and customer trust.

How AgriTech Is Changing The Narrative

AgriTech collectively describes adopting technological innovations like Big Data Analytics, Machine Learning, and Cloud Computing applications to offer more excellent climate resiliency, higher crop yield, seasonal predictions, and a regulated pricing system. As the Indian agricultural industry will continue to leverage innovative solutions, AgriTech firms will assist with precision farming techniques to aid every step of the farming process, including crop protection, nutrition, cultivation, harvest, and logistics. Such innovation will only be possible with thoughtful investments in AgriTech firms.

Alongside computational solutions to aid AgriTech, Biotechnology will also enhance genetic engineering, molecular diagnostics, and genomics-assisted breeding to develop crop varieties with higher nutrition and tolerance to abiotic stresses. While agricultural researchers are optimistic about the scalability of AgriTech, administrative logjams must be kept transparent to assist its broader adoption. This further emphasises improving the income of Indian farmers, which technology alone cannot solve. However, amid Digital India Initiative, the solution isn’t far-fetched.

The State of AgriTech Amid Digital India Initiatives

The demand for AgriTech is gradually becoming well-acknowledged with no small contribution from the Digital India initiative. Under the Digital Agriculture Mission 2021-2025, the Union Minister of Agriculture & Farmers Welfare, Mr Narendra Singh Tomar, has signed five Memorandum of Understanding (MoU) with Cisco, NCDEX, Jio Platforms Pvt Ltd, ITC, and Ninjacart to accelerate AgriTech projects leveraging technologies like Machine Learning, Big Data Analytics, and even Blockchain. This has been coupled with remote sensing and GIS technologies to enhance farming methodologies.

Interventions built around remote sensing, aerial surveying, and market insights are a few approaches that permit farmers to gather, visualise, and asses crop health conditions efficiently and cost-effectively. These data act as an initial indicator to further identify potential challenges and promptly provide actionable outputs to deal with agricultural roadblocks. Cisco’s Agricultural Digital Infrastructure (ADI), Jio Platforms’ JioKrishi, and ITC’s Site-Specific Crop Advisory (SSCA) are collectively implementing technological advancements that enable:

·       Increased agricultural yields at a lowered production cost

·       Lessen chemical applications to inhibit soil degradation

·       Efficient use of resources like water and fertilisers

·       Price safety to improve socio-economic statuses of farmers

·       Reduction of agricultural waste to lessen ecological impacts

The Future of Indian Agriculture

With the current state of agriculture in India, local and foreign AgriTech players need to deploy solutions at an unprecedented rate to cater to over 267 million Indian farmers. However, despite the rapid adoption of modern technologies, ease of access, affordability, and governance policies remain influential factors. Integrating this ecosystem into Indian agriculture won’t be easy since multi-stakeholder approaches will be necessary for a scalable impact on the farming landscape, with the government playing a pivotal role in enabling the possibilities.

This is a partnered post. 

Elon Musk forms several ‘X Holdings’ companies to fund potential Twitter buyout

3 Mins Read

Thursday’s filing dispelled some doubts, though Musk still has work to do. He and his advisers will spend the coming days vetting potential investors for the equity portion of his offer, according to people familiar with the matter

 Daily Newsletter

KV Prasad Journo follow politics, process in Parliament and US Congress. Former Congressional APSA-Fulbright Fellow

Previous Article

Oil Fluctuates as Traders Assess China’s Vow, Unrest in Libya

Next Article

Shanghai residents turn to NFTs to record COVID lockdown, combat censorship

LIVE TV

today's market

index Price Change
nifty 50 ₹16,986.00 -72.15
sensex ₹1,882.60 +28.30
nifty IT ₹2,206.80 +30.85
nifty bank ₹1,318.95 -14.95
index Price Change
nifty 50 ₹16,986.00 -7.15
sensex ₹1,882.60 +8.30
nifty IT ₹2,206.80 +3.85
nifty bank ₹1,318.95 -1.95
index Price Change
nifty 50 ₹16,986.00 -72.15
sensex ₹1,882.60 +28.30
nifty IT ₹2,206.80 +30.85
nifty bank ₹1,318.95 -14.95
index Price Change
nifty 50 ₹16,986.00 -7.15
sensex ₹1,882.60 +8.30
nifty IT ₹2,206.80 +3.85
nifty bank ₹1,318.95 -1.95
index Price Change
nifty 50 ₹16,986.00 -7.15
sensex ₹1,882.60 +8.30
nifty IT ₹2,206.80 +3.85
nifty bank ₹1,318.95 -1.95

Currency

Company Price Chng %Chng
Dollar-Rupee 73.3500 0.0000 0.00
Euro-Rupee 89.0980 0.0100 0.01
Pound-Rupee 103.6360 -0.0750 -0.07
Rupee-100 Yen 0.6734 -0.0003 -0.05
Quiz
Powered by
Are you a Crypto Head? It’s time to prove it!
10 Questions · 5 Minutes
Start Quiz Now
Win WRX (WazirX token) worth Rs. 1500.
Question 1 of 5

What coins do you think will be valuable over next 3 years?

Answer Anonymously

Should Elon Musk be able to buy Twitter?

 5 Minutes Read

Crypto investing vs trading: What suits you better

KV Prasad Jun 13, 2022, 06:35 AM IST (Published)

 Listen to the Article (6 Minutes)

Summary

If you’re considering getting into crypto but not sure what to do and how to do it, you’ve landed in the perfect place. There are two diverse ways of creating wealth from cryptos: investing and trading. Both offer lucrative returns but entail very different methodologies. So, tag along as we discuss these strategies and help you decide which is better for your needs.

Every day we hear stories of miraculous gains coming from the crypto market. Therefore, it is quite natural that you might want to try your luck with these digital assets as well. However, if you’re considering getting into crypto but not sure what to do and how to do it, you’ve landed in the perfect place.

Firstly, there are two diverse ways of creating wealth from cryptos: investing and trading. Both offer lucrative returns but entail very different methodologies. So, tag along as we discuss these strategies and help you decide which is better for your needs. Let’s go!

Investing vs Trading

Trading and investing are essentially the buying and selling of various cryptocurrencies. However, the duration between the purchase and sale of these assets differs immensely in investing and trading.

With trading, you hold on to assets for short periods based on certain indicators and sell them for a profit soon. Whereas with investing, you buy assets that you think will grow exponentially in the coming months or years, without a predetermined precise selling price.

While there are many other differences between investing and trading (as noted below), perhaps the only commonality between the two is the importance of a good crypto exchange. In this regard, WazirX offers low transaction fees, super-fast processing, and best-in-class security.

This ensures that, as long as you have your research and planning in place, you have nothing else to worry about. With WazirX, you can trade/invest in crypto with complete ease. Now, back to the differences between crypto investing and trading.

Research

With investing, you need to know about the crypto projects, their vision, long-term goals, the leadership team and more. This information gives you an idea about the possibilities of success for a particular project or token. These are known as the fundamentals of the project.

With trading, you need to be updated about the trading volumes, price charts, market conditions, several different ratios and many dynamic variables that can help you bet on the rise or fall of a token. These aspects are known as the technical indicators of the project.

While the parameters may differ, both trading and investing require thorough research. Putting your money on the line without proper knowledge and understanding is never a good idea. It could lead to unsuccessful trades/investments and heavy losses.

Time horizon

Time horizon refers to the timeline you’ve set for your goals. When it comes to investing, the time horizon is usually years, and it requires patience. With trading, you’re taking money in and out of the markets depending on fluctuations. And, in most cases, trading positions can last for as little as a few hours.

An active or passive approach

As an investor, you do not need to be actively involved in the day-to-day happenings of the markets. This is because short-term volatility will not affect your long investment horizon.

On the other hand, traders have the task of tracking short-term market fluctuations to make money. Every rise and fall in the market can signal where the market is headed next, providing clues to profitable trades.

Considering the above factors, the choice between trading and investing comes down to what you expect, an active or a passive income?

Risk Appetite

Both investing and trading carry risk. However, investors can overcome short-term volatility as the project’s merit should help it tide over market fluctuations.

On the other hand, trading requires a good read of market volatility. You need to make trades after studying multiple signals and technical indicators. Get your predictions wrong, and you could lose a lot of money in very little time. Get your projections right, and you can make bank very quickly.

Cost

Another factor you must consider is cost. Traders often make multiple transactions, resulting in higher fees paid to a platform. However, if your trades are profitable, you should be able to cover these transaction fees with ease. However, investing involves fewer charges as you make less frequent transactions.

Conclusion

In the cryptosphere, there are excellent traders and excellent investors too. But traders and investors who get lucky repeatedly? They do not exist. This is because both strategies require time and effort to pull off. So, no matter which one you choose, rooting your activity in deep research and market understanding is essential. You can buy your favourite crypto on WazirX.

THIS IS A PARTNERED POST.

Elon Musk forms several ‘X Holdings’ companies to fund potential Twitter buyout

3 Mins Read

Thursday’s filing dispelled some doubts, though Musk still has work to do. He and his advisers will spend the coming days vetting potential investors for the equity portion of his offer, according to people familiar with the matter

 Daily Newsletter

KV Prasad Journo follow politics, process in Parliament and US Congress. Former Congressional APSA-Fulbright Fellow

Previous Article

Oil Fluctuates as Traders Assess China’s Vow, Unrest in Libya

Next Article

Shanghai residents turn to NFTs to record COVID lockdown, combat censorship

LIVE TV

today's market

index Price Change
nifty 50 ₹16,986.00 -72.15
sensex ₹1,882.60 +28.30
nifty IT ₹2,206.80 +30.85
nifty bank ₹1,318.95 -14.95
index Price Change
nifty 50 ₹16,986.00 -7.15
sensex ₹1,882.60 +8.30
nifty IT ₹2,206.80 +3.85
nifty bank ₹1,318.95 -1.95
index Price Change
nifty 50 ₹16,986.00 -72.15
sensex ₹1,882.60 +28.30
nifty IT ₹2,206.80 +30.85
nifty bank ₹1,318.95 -14.95
index Price Change
nifty 50 ₹16,986.00 -7.15
sensex ₹1,882.60 +8.30
nifty IT ₹2,206.80 +3.85
nifty bank ₹1,318.95 -1.95
index Price Change
nifty 50 ₹16,986.00 -7.15
sensex ₹1,882.60 +8.30
nifty IT ₹2,206.80 +3.85
nifty bank ₹1,318.95 -1.95

Currency

Company Price Chng %Chng
Dollar-Rupee 73.3500 0.0000 0.00
Euro-Rupee 89.0980 0.0100 0.01
Pound-Rupee 103.6360 -0.0750 -0.07
Rupee-100 Yen 0.6734 -0.0003 -0.05
Quiz
Powered by
Are you a Crypto Head? It’s time to prove it!
10 Questions · 5 Minutes
Start Quiz Now
Win WRX (WazirX token) worth Rs. 1500.
Question 1 of 5

What coins do you think will be valuable over next 3 years?

Answer Anonymously

Should Elon Musk be able to buy Twitter?

 5 Minutes Read

Improving Awareness of Financial Fraud Among Indian Consumers

KV Prasad Jun 13, 2022, 06:35 AM IST (Published)

 Listen to the Article (6 Minutes)

Summary

Today, Indian’s banking sector is celebrating the fact that the total volume of bank fraud cases in the country has decreased from $17.42bn down to $7.62bn. That number, however, must be taken with a grain of salt as financial analysts suggest that most Indian consumers are too embarrassed to report that they have been victims …

Today, Indian’s banking sector is celebrating the fact that the total volume of bank fraud cases in the country has decreased from $17.42bn down to $7.62bn. That number, however, must be taken with a grain of salt as financial analysts suggest that most Indian consumers are too embarrassed to report that they have been victims of fraud. This directly translates to awareness of financial fraud since not reporting such cases can be taken as a sign of financial illiteracy. Unless Indian consumers step up to testify, concrete actions cannot be taken to mitigate financial fraud.

However, although the overall monetary volume of fraud cases has decreased, in the financial year 2022, the Reserve Bank of India has reported 9,103 fraud cases in the banking sector so far. This number is backed by a survey conducted in 2018, which revealed that 25% of respondents aged 27 to 37 had experienced fraudulent activities in the banking sector that year. The majority of these cases were attributed to fraudulent ATM and bank transactions; these were estimated to number around 12,000 cases in the financial year 2016, a steep 36% increase from the financial year 2013.

The more pressing concern now is that the targets of these scams are usually retired senior citizens who are most likely to have substantial savings. Other targets include emotionally vulnerable citizens, people with cognitive impairment, and widows. Therefore, the misuse of trust can quickly become a major contributor to financial fraud.

Common means of financial fraud in India

Scamsters may show up at any time in any disguise. However, all people need to know is how to instantly recognise and avoid them. Here are some steps on how to raise awareness of financial fraud, which will help enterprises as well as their customers guard against banking fraud:

  • Assess risk of fraud

The first step towards reducing the risk of fraud is, of course, conducting an assessment. Whether conducted by an analyst or independently, assessing risks will help locate vulnerabilities that could be exploited by fraudsters.

Working on an outdated personal computer, or having a contact number that is publicly accessible are potential entry points for hackers and phishing scammers looking to gain access to private banking information. Securing personal devices may require some investment, but it is a definite step closer to achieving financial security.

  • Educate employees

Knowledge is essential, regardless of the size of the financial institution involved. Employees working in an organisation need to understand the risks of fraud and the many ways it can occur. Conducting training sessions, maintaining up-to-date software, and employing an efficient cybersecurity team that can provide layers of digital protection are essential for companies in today’s world. Employees must be continuously trained every 6 to 12 months, which will ensure the idea of ​​fraud detection and prevention is kept fresh in their minds.

  • Implementing cybersecurity practices

Nowadays, many people use the cloud to access their banking information. This presents fresh challenges for financial institutions. Operating systems must be set up to ensure that data is not only protected from attackers but that the people accessing the data are properly identifying themselves. Many institutions use a combination of improved cybersecurity and traditional methods to contact a client in the event of unusual activity on their account. The increasing adoption of the Internet of Things (IoT) has also paved the way for more focus on cybersecurity measures.

  • Enforcement by Office Of Foreign Assets

When new customers – whether individuals or companies – open accounts, they must always go through an Office Of Foreign Assets (OFAC) exam to verify the validity. This should also be combined with OFAC reviews of the entire database for existing names and addresses.

  • Providing customer education

Financial institutions can use robust software, conduct audits, and use cutting-edge cybersecurity tools to reduce fraud and protect their customers. However, their customers must also be careful on their part, or they could become victims of fraud. The activities of consumers could inadvertently endanger financial institutions, so they should be given tips to avoid falling prey to financial fraud. Companies can educate clients by publishing guides on their websites, sending newsletters to clients, or publishing brochures for distribution.

Working to stop financial fraud

If a person suspects that they or someone else has fallen prey to fraudulent banking activities, they can visit the Digital India website to receive support on what actions to take. The Digital India website was created by the Indian government to support its citizens and transform the country into a digitally empowered nation.

This is a partnered post. 

Elon Musk forms several ‘X Holdings’ companies to fund potential Twitter buyout

3 Mins Read

Thursday’s filing dispelled some doubts, though Musk still has work to do. He and his advisers will spend the coming days vetting potential investors for the equity portion of his offer, according to people familiar with the matter

 Daily Newsletter

KV Prasad Journo follow politics, process in Parliament and US Congress. Former Congressional APSA-Fulbright Fellow

Previous Article

Oil Fluctuates as Traders Assess China’s Vow, Unrest in Libya

Next Article

Shanghai residents turn to NFTs to record COVID lockdown, combat censorship

LIVE TV

today's market

index Price Change
nifty 50 ₹16,986.00 -72.15
sensex ₹1,882.60 +28.30
nifty IT ₹2,206.80 +30.85
nifty bank ₹1,318.95 -14.95
index Price Change
nifty 50 ₹16,986.00 -7.15
sensex ₹1,882.60 +8.30
nifty IT ₹2,206.80 +3.85
nifty bank ₹1,318.95 -1.95
index Price Change
nifty 50 ₹16,986.00 -72.15
sensex ₹1,882.60 +28.30
nifty IT ₹2,206.80 +30.85
nifty bank ₹1,318.95 -14.95
index Price Change
nifty 50 ₹16,986.00 -7.15
sensex ₹1,882.60 +8.30
nifty IT ₹2,206.80 +3.85
nifty bank ₹1,318.95 -1.95
index Price Change
nifty 50 ₹16,986.00 -7.15
sensex ₹1,882.60 +8.30
nifty IT ₹2,206.80 +3.85
nifty bank ₹1,318.95 -1.95

Currency

Company Price Chng %Chng
Dollar-Rupee 73.3500 0.0000 0.00
Euro-Rupee 89.0980 0.0100 0.01
Pound-Rupee 103.6360 -0.0750 -0.07
Rupee-100 Yen 0.6734 -0.0003 -0.05
Quiz
Powered by
Are you a Crypto Head? It’s time to prove it!
10 Questions · 5 Minutes
Start Quiz Now
Win WRX (WazirX token) worth Rs. 1500.
Question 1 of 5

What coins do you think will be valuable over next 3 years?

Answer Anonymously

Should Elon Musk be able to buy Twitter?

 5 Minutes Read

Reimagining Cloud Strategies For The Indian Data-Driven Economy

KV Prasad Jun 13, 2022, 06:35 AM IST (Published)

 Listen to the Article (6 Minutes)

Summary

The shift from legacy infrastructure to an efficient and balanced cloud-based approach is relatively new and correlates directly to the COVID-19 pandemic. The phenomenon is particularly applicable to an economy with an “If it works, don’t fix it” mindset; adopting this change wasn’t easy in terms of shredding the current infrastructure and the deployment costs …

The shift from legacy infrastructure to an efficient and balanced cloud-based approach is relatively new and correlates directly to the COVID-19 pandemic.

The phenomenon is particularly applicable to an economy with an “If it works, don’t fix it” mindset; adopting this change wasn’t easy in terms of shredding the current infrastructure and the deployment costs of embracing the new one.

However, the crisis has paved the way for the Indian economy to finally formulate an efficient approach that collaboratively crunches through and activates massive volumes of information.

The current legacy system cannot keep pace with an approach that excels in managing vast data on the cloud or on-premises.

The parallel shift to digitalisation has also been experiencing exponential growth while managing business complexities, operational change, security and compliance risks, and the misalignment between IT and business.

However, this is just the tip of the iceberg, and the hyper-converged system’s backend is handling even more. The data will continue to expand, requiring an equally augmented data-driven cloud security.

Statistics That Predict An Upcoming Shift Towards Cloud Strategies

The COVID-19 pandemic’s negative impacts are evident and still in effect against adopting a hyper-converged infrastructure for the Indian economy.

However, one thing is clear: it has also raised the concerns of financial organisations now preparing to deploy hybrid cloud strategies to respond quickly to customer needs. Why hybrid, you might ask?

While hybrid cloud solutions are advantageous for delivering extended flexibility, more deployment options, security, and compliance, they also extract more value from the existing legacy infrastructures.

The public cloud in the Indian economic space is projected to reach $11.64 billion by 2027, with an impressive CAGR of 18%. In addition, public and hybrid cloud strategies in the Indian economy can be the critical factors that have increased awareness about cloud-based solutions, with the healthcare industry emerging as the strongest.

On the other hand, end-user spending on public cloud services is also estimated to reach $4.4 billion, an increase of 30% from $3.4 billion in 2020.

The leading cloud solutions segment is application services, with an estimated $1.1 billion in user spending in 2020. So, it’s safe to say that the pandemic has undoubtedly accelerated the economy.

The Concerns With The Current Infrastructure

The general misconception about “legacy systems” is that they are outdated. In reality, even if the modern system fails to meet the current standard in finance or any other industry, it can be defined as a legacy system.

Here are the key considerations which can quickly transform seemingly modern infrastructures into legacy systems:

·       The inability to process multiple data types

·       Lack of data transparency and data flow

·       Potential data security risks in data centres

·       Higher operational costs and lower efficiency

·       The inability to quickly remote collaboration

The Indian economy will benefit from AI, Big Data, and enhanced performance by upgrading legacy systems and financial industries. The economy will also benefit from the agility and better scalability that can be adopted and integrated into data strategies.

Why Does The Indian Economy Need To Embrace Cloud Strategies?

With fast digitisation and an expanding financial database, now is the perfect time for the Indian economy to migrate to cloud strategies. Thus, cloud solutions enable economic sectors to keep evolving their services while improving their compliance and regulations.

The phenomenon will further strengthen the data security of data centres and legacy systems against potential cybersecurity risks.

State-of-the-art cloud technology has matured appreciably, overcoming all odds against its wide adaptation in the Indian economy.

Addressing Security and Compliance Challenges with Cloud Computing

Dramatic improvements in agility, efficiency, and performance are an obvious benefit of hybrid cloud migration and rapid adaptation.

However, industry leaders and authorities won’t immediately praise its sustainability unless they ensure that customer experience and data security are uncompromised.

66% of leaders in the Information Technology space prioritise the data security of their IoT systems over operating costs or business continuity.

Modern cloud-based computing, storage, and analytic solutions are highly secure for well-regulated industries.

Notably, for the financial landscape, authorities must understand that data is just as secure in cloud servers as in legacy systems.

To have complete trust in this evolving environment, economists, leaders, and end-users need to understand which security layers have been deployed and see where the data flows.

Even before the cloud was integrated with its operations, the financial sector was well-known for its reliance on outdated centralised systems. Still, an updated ecosystem of cloud services will surely help them tackle issues more effectively.

Conclusion

The future operations of the Indian economy will be executed primarily through cloud strategies where data security compliance may become an ultimate trusting factor.

However, the rapid evolution of cloud computing and IT will provide actionable insights into security events, help avoid cloud disasters, and bridge the gap between financial services and end customers.

Additionally, data security, agility, operating costs, and business continuity of operations will be cited by economic leaders to embrace a data-driven economy more often than other sectors.

This is a partnered post. 

Elon Musk forms several ‘X Holdings’ companies to fund potential Twitter buyout

3 Mins Read

Thursday’s filing dispelled some doubts, though Musk still has work to do. He and his advisers will spend the coming days vetting potential investors for the equity portion of his offer, according to people familiar with the matter

 Daily Newsletter

KV Prasad Journo follow politics, process in Parliament and US Congress. Former Congressional APSA-Fulbright Fellow

Previous Article

Oil Fluctuates as Traders Assess China’s Vow, Unrest in Libya

Next Article

Shanghai residents turn to NFTs to record COVID lockdown, combat censorship

LIVE TV

today's market

index Price Change
nifty 50 ₹16,986.00 -72.15
sensex ₹1,882.60 +28.30
nifty IT ₹2,206.80 +30.85
nifty bank ₹1,318.95 -14.95
index Price Change
nifty 50 ₹16,986.00 -7.15
sensex ₹1,882.60 +8.30
nifty IT ₹2,206.80 +3.85
nifty bank ₹1,318.95 -1.95
index Price Change
nifty 50 ₹16,986.00 -72.15
sensex ₹1,882.60 +28.30
nifty IT ₹2,206.80 +30.85
nifty bank ₹1,318.95 -14.95
index Price Change
nifty 50 ₹16,986.00 -7.15
sensex ₹1,882.60 +8.30
nifty IT ₹2,206.80 +3.85
nifty bank ₹1,318.95 -1.95
index Price Change
nifty 50 ₹16,986.00 -7.15
sensex ₹1,882.60 +8.30
nifty IT ₹2,206.80 +3.85
nifty bank ₹1,318.95 -1.95

Currency

Company Price Chng %Chng
Dollar-Rupee 73.3500 0.0000 0.00
Euro-Rupee 89.0980 0.0100 0.01
Pound-Rupee 103.6360 -0.0750 -0.07
Rupee-100 Yen 0.6734 -0.0003 -0.05
Quiz
Powered by
Are you a Crypto Head? It’s time to prove it!
10 Questions · 5 Minutes
Start Quiz Now
Win WRX (WazirX token) worth Rs. 1500.
Question 1 of 5

What coins do you think will be valuable over next 3 years?

Answer Anonymously

Should Elon Musk be able to buy Twitter?

 5 Minutes Read

Swiss Fondue & Raclette In The Town of Zermatt

KV Prasad Jun 13, 2022, 06:35 AM IST (Published)

 Listen to the Article (6 Minutes)

Summary

Fond of fondue? Well, Shibani Gharat visits the beautiful town of Walliser Stube in Zermatt Switzerland to just gorge on the swiss fondue & also the raclette. Swiss fondue & Raclette are communal meals that are easy to make & are the perfect meals for a family get-together. This is a partnered post. 

Fond of fondue? Well, Shibani Gharat visits the beautiful town of Walliser Stube in Zermatt Switzerland to just gorge on the swiss fondue & also the raclette. Swiss fondue & Raclette are communal meals that are easy to make & are the perfect meals for a family get-together.

This is a partnered post. 

Elon Musk forms several ‘X Holdings’ companies to fund potential Twitter buyout

3 Mins Read

Thursday’s filing dispelled some doubts, though Musk still has work to do. He and his advisers will spend the coming days vetting potential investors for the equity portion of his offer, according to people familiar with the matter

 Daily Newsletter

KV Prasad Journo follow politics, process in Parliament and US Congress. Former Congressional APSA-Fulbright Fellow

Previous Article

Oil Fluctuates as Traders Assess China’s Vow, Unrest in Libya

Next Article

Shanghai residents turn to NFTs to record COVID lockdown, combat censorship

LIVE TV

today's market

index Price Change
nifty 50 ₹16,986.00 -72.15
sensex ₹1,882.60 +28.30
nifty IT ₹2,206.80 +30.85
nifty bank ₹1,318.95 -14.95
index Price Change
nifty 50 ₹16,986.00 -7.15
sensex ₹1,882.60 +8.30
nifty IT ₹2,206.80 +3.85
nifty bank ₹1,318.95 -1.95
index Price Change
nifty 50 ₹16,986.00 -72.15
sensex ₹1,882.60 +28.30
nifty IT ₹2,206.80 +30.85
nifty bank ₹1,318.95 -14.95
index Price Change
nifty 50 ₹16,986.00 -7.15
sensex ₹1,882.60 +8.30
nifty IT ₹2,206.80 +3.85
nifty bank ₹1,318.95 -1.95
index Price Change
nifty 50 ₹16,986.00 -7.15
sensex ₹1,882.60 +8.30
nifty IT ₹2,206.80 +3.85
nifty bank ₹1,318.95 -1.95

Currency

Company Price Chng %Chng
Dollar-Rupee 73.3500 0.0000 0.00
Euro-Rupee 89.0980 0.0100 0.01
Pound-Rupee 103.6360 -0.0750 -0.07
Rupee-100 Yen 0.6734 -0.0003 -0.05
Quiz
Powered by
Are you a Crypto Head? It’s time to prove it!
10 Questions · 5 Minutes
Start Quiz Now
Win WRX (WazirX token) worth Rs. 1500.
Question 1 of 5

What coins do you think will be valuable over next 3 years?

Answer Anonymously

Should Elon Musk be able to buy Twitter?