Keka HR plans to achieve $14m ARR with 110% growth for FY 22-23 Express Computer Aug 1, 2022 The HR management platform is doubling its customer base with a 25% QoQ growth.
Trellix Appoints Vicki Batka to Lead APJ Business Express Computer Aug 1, 2022 Trellix, the cybersecurity company delivering the future of extended detection and response (XDR), has appointed technology…
Why are Ransomware Attacks Increasing these Days? Express Computer Aug 1, 2022 The striking rise in ransomware attacks around the world has raised security concerns for many companies and prominent…
ValueFirst partners with LeadSquared to offer seamless customer conversations through SMS and… Express Computer Aug 1, 2022 ValueFirst has partnered with LeadSquared to help brands across the globe offer seamless and joyful customer experiences while…
SaaS platform Roadcast secures $ 2 Million USD funding from Jubilant FoodWorks Express Computer Aug 1, 2022 Roadcast, an end-to-end supply chain management solutions provider closed its latest round of funding with an investment of USD 2…
Santhosh TG set to become Global Chief Digital Officer at Switch Mobility Srikanth RP Jul 30, 2022 Santhosh TG who was working with Ashok Leyland as Head - IT Infra & Op. Services - Ashok Leyland, has now been chosen to…
Deloitte India and Palo Alto Networks collaborate to help organisations timely respond to… Express Computer Jul 29, 2022 The collaboration combines Palo Alto Networks’ Cortex XDR® solution with Deloitte’s cyber incident response services
Birlasoft Adopts RISE With SAP to Migrate their Digital Core to Cloud Express Computer Jul 29, 2022 Increases focus on cloud adoption to help enterprises in their digital transformation journeys
Google announces local partnerships to build a more helpful Maps experience in India Express Computer Jul 29, 2022 Google Maps announced a slate of new partnerships in India with local authorities and organizations aimed at bringing more helpful…
The Rise of Botnet and DDoS Attacks Express Computer Jul 29, 2022 Using a variety of techniques, a wide range of threat actors from lone hackers, criminal gangs, and hacktivists, to nation-states…