Interview

UNISYS Stealth Helps Organizations Mitigate Cyber-Attacks From Outside Or Within 

Ravikumar Sreedharan Managing Director Unisys India and Global Delivery Network Head, Unisys
Ravikumar Sreedharan Managing Director Unisys India and Global Delivery Network Head, Unisys

As enterprises shift towards analytics based cyber-security, Unisys India MD Ravikumar Sreedharan talks about India business, innovation, cyber security landscape in the country and what Unisys’ security portfolio has to offer for organizations.

QCan you shed light on Unisys’ India Business?

A. Unisys India is a microcosm of Unisys worldwide. We have a broad suite of services and technology solutions that are developed and delivered out of India for clients globally. We have centers of excellence in different verticals like travel & transportation, security and digital transformation in India. Unisys India caters to all the regions the company is active in, across service lines and our workforce in India accounts for 25 percent of ourglobal workforce. India is a significant contributor in the development and design of these products. We have also identified products based on our vertical strategy to invest in, depending on client demand and maturity of markets. Asignificant part of the development of these products is delivered out of Unisys India.

“We have centers of excellence in different verticals like travel & transportation, security and digital transformation in India.”

Ravikumar Sreedharan
Managing Director
Unisys India and Global Delivery Network Head,
Unisys

We have been pursuing opportunities and chasing specific deals that are of strategic relevance to us. Our focus is to continue driving this momentum by enhancing our global delivery capabilities, driving cost efficiencies, and attracting and retaining top talent to ensure that Unisys India continues to play a key role in driving our growth globally.

Q: How is Unisys driving Innovation in the country?

A: Unisys’ largest engineering lab is based in India and we are actively involved in the development and design of all our core products. India counts for more than 20 per cent of all patents across service lines at the company level. In the last few years, Unisys India has also increasingly contributed to the development of the market, products as well as core software development.

We also partner with the academia to nurture innovation among engineering students in India. One of our key initiatives, Unisys’ Cloud 20/20, has been running for the better part of a decade and is one of India’s largest annual technical project contests. Over the years, we have seen increasingly greater participation from leading universities and a steep incremental curve in the complexity and quality of submissions.

Q: How do you see the Indian security landscape shaping up?​

A:According to Data Security Council of India (DSCI), the cybersecurity market is expected to grow nine-fold to $35 billion by 2025. This growth is primarily due to increase in indigenous security products. India has an active Computer Emergency Response Team (CERT-In) to create awareness about cybersecurity. With an aim to fully secure the country’s cyberspace, the government has initiated the process to set up a National Cyber Security Coordination Centre (NCCC). Organizations are making use of big data analytics to improve security and strengthen the BYOD policies that prevent local storage of secure corporate data on personal devices, and protect data-in-motion with encryption.

Q: What is the USP of Unisys’ Security Solution Portfolio?

A: Unisys security solutions help commercial and government enterprises around the world protect their data and systems from both cyber and physical attacks and as well as accidental breaches. Unisys Stealth is a product that enables organizations to deploy this solution across extended networks with the touch of a button. Unisys Stealth helpsorganizations mitigate cyber-attacks from outside or within the organization by rendering devices, data and end users undetectable on networks. The solution establishes secure micro-segments where only authorized users can access information. Unauthorized users cannot access Stealth-protected endpoints or even see that they exist.We also recently launched a new set of cyber resilience services to help clients plan for crises related to cyberattacks by simulating real-world threats and using them to develop effective avoidance and response policies and procedures.

Related posts

DEP:An Ideal Partner for Product Engineering and Development

enterpriseitworld

The Vision is to Become our Client’s Most Trusted Digital Transformation Partner

enterpriseitworld

Mining Unstructured Data for AI Gold

enterpriseitworld
x