Subex Proffers 35 Per Cent Better Competitive Global Real-Time Intelligence: Sanjeev Ratan, AVP & Regional Head, Subex
Cities like Mumbai, Delhi and Bangalore are highly attacked in the cyber world. But to provide cyber security, Subex has advanced its technology to keep the data intact and secure.
Photo Credit :
With the advent of technology and digitization of data and information in India, there has been an increased threat of data and hacking information. Focusing on this Sanjeev Ratan, AVP & Regional Head, SAARC, Subex, explained the contribution of their company through an industry presentation on “Cyber resilience strategies for securing communication and other critical infrastructure” at BW Businessworld’s 2nd Secure India Conclave held today in New Delhi.
According to recent research, data is mainly being attacked by the Czech Republic, Poland, Slovenia, Mexico and Brazil. Defence, manufacturing, transportation, banking and finance are predominantly targeted by the hackers to retrieve information of the country.
With cities like Mumbai, Delhi and Bangalore, the trends depict the increasing instances of using sophisticated malware along with heightened reconnaissance activity and strong geo-political influence for complex attacks. It has also revealed the development of country-specific malware.
A 25 years old telecom analytics solutions provider, Subex based on BSE/NSE and revenue of 60 million dollars. Currently, they have five offices in various cities with a reach up to 70 countries. They help in fraud detection and provides a solution in basic to complex malware attacks. Subex offers these solutions to industries like telecommunications, government, public sectors, cities and small & medium business enterprises.
“At Subex, we provide 35 per cent better competitive global real-time threat intelligence, agentless operation with low latency, multi-level network surveillance and detection. We also cover all flavours of critical and non-critical infrastructure, devices and communication”, said Ratan.
Subex advances the shielding of the devices, brand and citizens with their five-step process that includes protection, monitoring, responding, recovering and discovering the data and information.