Cybercriminals are continually changing attack tactics: Sneha Katkar, Quick Heal

Data from the Indian Computer Emergency Response Team (CERT-In) reveals that India witnessed a 300% rise in cyber-attacks in 2020. Rapid proliferation of endpoints, cloud apps, and smartphones with the growth of distributed workspaces and a diminishing enterprise perimeter has exposed organizations to newer threat vectors and risks. To discuss more about the emerging threat landscape, Express Computer spoke to Sneha Katkar, Lead Product Manager, Quick Heal, who shares her perspective on some of the latest security threats and the approach that organizations must take.

Some edited excerpts:

What are some of the latest security threats that Indian enterprises must be wary of?
The threat landscape In India is continuously evolving, with cybercriminals continually changing attack tactics. Over the last six months, SolarWinds attacks to DDoS assaults, cybersecurity exploits resulting in a data breach, and cyber-attacks have escalated in India and worldwide. Lack of essential cyber hygiene practices amongst employees enhances the threat vectors present in the distributed workspace landscape. The rise in mobile and cloud application adoption for business operations has further put an organization’s sensitive data at risk.

What are the challenges for CISOs when it comes to handling multiple security products?
As cloud adoption, mobile, and distributed workspaces continue to grow and drive the cybersecurity threats and risks landscape, CISOs have had to rely on several cybersecurity point products as bolt-in solutions, creating security silos. Most often than not, these point products track only a particular type of risk coming in from devices, apps, networks, or users. A growing concern amongst CISO and security leaders in the organization’s security response strategy is to correlate and respond to risks and threats that spread across adhoc cybersecurity silos. With numerous security point products across the organization, it becomes difficult for CISOs to derive actionable insights from the scattered but numerous alerts and notifications. Moreover, with cyber-attacks becoming more nuanced, CISOs and security leaders want to protect their organization’s assets and data.

Can you talk about your solution, HawkkEye, and share how does it help in addressing some of the above mentioned challenges?
A security solution that can consolidate alerts from existing security products and correlate threat data into incident response will enable security teams to stay ahead of a breach. HawkkEye addresses this challenge by empowering organizations to build a centralized security posture. Delivered as a comprehensive platform, HawkkEye provides 360-degree visibility into the threat landscape, coordinates information flow between different security layers (and products), integrates cybersecurity silos into a single pane of truth, and manages security posture across the enterprise.

Currently, HawkkEye deploys with Seqrite EPS, Seqrite DLP, and Seqrite mSuite. Deployed from a centralized platform, organizations have complete visibility and control over all endpoints accessing sensitive data. Keeping the rising complexity of cyberattacks in mind, Seqrite has a range of Zero-trust and holistic security solutions lined up for the HawkkEye platform. Through HawkkEye, security analysts and CISOs can analyze the organization’s security posture from diverse perspectives.

As we advance, Seqrite intends to add an Endpoint Detection and Response (HawkkHunt) solution, Zero-trust user access solutions (HawkkProtect), and a data privacy solution (HawkkScan) on the HawkkEye platform.

Quick HealSneha Katkar
Comments (0)
Add Comment