In my previous entry (“Turn of the Year”), I mentioned that we were working to provide services that would help fill massive gaps in the local IT landscape. If you have engaged with us recently, you probably would already have known about these offerings.
In case you haven’t, you might have noticed a button on our front page that says “CS INOKS”. Clicking on it takes you to a separate website (https://cs.inoks.com/) that is dedicated to our Cybersecurity services.
That’s what we have been working hard on.
Cybersecurity seems like a crowded marketplace to do business in, and in many ways it is. There is a plethora of companies and products out there, covering areas from Identity and Access Management to Endpoint Security, from Threat Intelligence to Incident Response. And if we include the Value-Added Resellers and System Integrators, it is clear that the ecosystem is truly teeming.
To take the ecological analogy further, we need to find a niche in order to thrive. From the outset, it was clear that we could best leverage our expertise in the provision of consultancy services, rather than pushing products that can be easily procured in the market.
Led by the immensely experienced Vivek Gullapalli (https://www.linkedin.com/in/vivekgullapalli/), our Cybersecurity team delivers services according to three pillars: Fortification, Immunity and Talent (FIT). “Fortification” broadly refers to what organizations can do to strengthen themselves against attack. First and foremost, this would mean having frameworks and strategies in place. Secondly, a mindset change is often required, as we are no longer talking about buying products to plug the gaps where they arise in a scattershot matter, but adopting a more proactive and structured approach instead. Where we can come in is to perform maturity and compliance assessments, as well as help build roadmaps, and thereby identifying the gaps where suitable tools can address.
The second pillar “Immunity” corresponds to the ability of organizations to resist, respond and recover from incursions. There are a wide range of services that we can deliver to build an organization’s initial resistance and response “muscle memory”, ranging from threat intelligence to cyber war-gaming. The last pillar “Training” is self-explanatory: we offer both workshops and standard online courses catering to all levels from end user to C-suite. Any security setup is only as strong as its weak link: People. We are acutely aware of the challenges involved in up-skilling and changing mindsets, so our training are specifically designed to address them.
If you currently have problems addressing cybersecurity concerns, or are simply curious about the services we provide, please feel free to drop us a note at email@example.com. Hope to hear from you soon!