You are on page 1of 25

siliconindia

In My Opinion: Sajan Pillai, UST Global VC Talk: Bijul Somaia, Lightspeed Venture Partners Enterprise Security Special

PUBLISHED SINCE 1997

BUSINESS & TECHNOLOGY IN THE U.S. & INDIA JANUARY - 2011 SILICONINDIA.COM

Karl Mehta, CEO


siliconindia JANUARY - 2011
Contents January 2011
Editorial
Publisher

T
Harvi Sachar

Swipe or Wave? A Dilemma!


Editor-in-Chief
Pradeep Shankar
Cover Story

Leading
Managing Editor
ill now, we swiped our credit or debit cards to make a purchase.
14 playspan

Innovation
Christo Jacob
In the coming years, this concept may disrupt and we will see
Deputy Editor consumers waving their mobile phones for the same purchase.
Jaya Smitha Menon Mobile payment platform is busting with activities and Near Field Com-
munication (NFC), a short range wireless technology is opening new
avenues for service providers, banks and new players for commercial-
in the Global Payment Industry
Editorial Staff
Eureka Bharali ization of new technology. What is clear is that the market is still in flux By Vimali Swamy
Hari Anil as users are doubtful about how secure this might be.
Vimali Swamy But those developing this technology confidently vouch about the
security since consumers will be able to instantly lock all the mobile wal- Karl Mehta, CEO
Sr.Visualizer Raghu Koppal let services on their phone if the device is lost or stolen and then have the
Subscription Manager P Magendran services automatically transferred onto a new phone. They will also be
able to use their phone to make payments even when the battery is flat. 04 [In My Opinion] 22 [Management] 34 Securing the Cloud
In Korea and Japan, the potential of these services have already been re- Beyond the Metros: Bringing Managing Compliance Through Phys- By Ravi Shankar, Navales
Mailing Address alized and is already available for commercial use. One in every 15 today IT Opportunities to Tier II and ical Identity and Access Management
there makes a purchase using NFC enabled phones. III Cities By Ajay Jain, Quantum Secure 36 [Technology]
SiliconIndia Inc Just how digitization of content earlier leveraged credit card and on- Successful Integration of
By Sajan Pillai, UST Global
44790 S. Grimmer Blvd line payment usage, mobile phone penetration is sure to give a similar 24 [Technology] Technology in Schools- Op-
Suite 202, push to the rapid adoption of NFC enabled phones as a mode of payment Evolution of Mobile Devices
in the coming years. Moreover, it is expected that the worldwide ship- 06 [Infocus] portunities and Challenges
Fremont, CA 94538 and Services
ments of mobile phones with built-in NFC capability will rise to 220.1 By Sanjiv Pande, NIIT
million units in 2014, up by a factor of four from 52.6 million in 2010. 10 [VC Chakra] By Arun Samudrala,
T:510.440.8249, F:510.440.8276 Appnomic Systems Receive United Mobile Apps
In 2014, 13 percent of phones shipped will integrate NFC, up from just
$ 2.5 Million in Series B Funding 38 IPR Issues in Cloud
4.1 percent in 2010. While Nokia has declared that all the new smart Computing
phones that will be introduced in 2011 will support NFC, Google has
iYogi Raises $30 Million 25 [Business]
Verismo Networks Secures Indian Startup Founders Are By Rahul Chaudhry,
announced support for NFC in Android 2.3. However, a bigger push
$17 Million Funding Lall Lahiri & Salhotra
could come from Apple as it has been pouching the NFC experts and They Serious on Sales?
siliconindia has already filed several NFC related patents since early last year. Apart
SnapLogic with $10 Million in Series By Eureka Bharali
January 2011, volume 14-01 (ISSN 1091-9503)
from these bigwigs, there are a lot of startups experimenting on creating
B Funding 40 Open Source ERP is Ready
Published monthly by siliconindia, Inc.
new modes of payment platform. RiseSmart Raised $3 Million in Equity
26 [Technology] Willing & Able
Santa Clara based PlaySpan is one such company. In an era where Security Challenges in Using By Tom Rodgers, CIGNEX
the global payment industry is morphing rapidly especially going digi- 12 [CEO Spotlight] Social Media
tal with all the new devices, PlaySpan has made the much alluded mi- Desktop Virtualization & Cloud By Gary Bahadur, KRAA Security 42 ERP Implementation for
cropayment services digital and versatile over a myriad of devices by Computing: Building blocks of Nex Midsize companies
leveraging on social network. Today, the four year old company has gen Technology
To subscribe to siliconindia
28 Enterprise Level SAN Features Necessary Expense or Strate-
Visit www.siliconindia.com or send email to made much headway in this industry and is competing almost neck to It is the Social Era for Internet
gic Investment?
subscription@siliconindia.com neck with Golaiths like Google, Adobe, Yahoo and more, who are try- Dynamic content sparks growth of new and Solutions at SMB Prices
By Tad Lebeck, Huawei Symantec By Vinay Singh, Vital Wires Consulting
Copyright © 2009 siliconindia, Inc. All rights reserved. Reproduction ing to grab a large chunk of the pie. tools and technology
While this digitization of payment industry is a good news for the
44 Secure Cloud Computing The
in whole or part of any text, photography or illustrations without writ-
ten permission from the publisher is prohibited.The publisher assumes
Goliaths of the industry, the scope of commercialization of new tech- 30 The State of the Cyberstate
no responsibility for unsolicited manuscripts, photographs or illustra-
20 [VC Talk] By Amit Yoran, NetWitness future of Information Tech-
tions. Views and opinions expressed in this publication are not neces- nologies like NFC will also give a platform for the Davids to be the new Financial Services & Education Po-
Goliaths of this emerging industry in the coming years. nology Management
sarily those of the magazine and accordingly, no liability is assumed by
tential Areas for Startups
32 Mobile Data Growth in Indiaan
the publisher thereof.
By Kartik Shahani, RSA
siliconindia’s circulation is audited and certified By Bejul Somaia, Lightspeed
by BPA International. siliconindia is available through Wish you all Happy New Year!
Venture Partners
Opportunity and a Challenge
mainstream retail outlets such as Barnes & Noble, Borders, and By Anjan Ghosal, IntelliNet Technologies 46 [SI 20 Profile]
Please do share your thoughts with us.
Tower Records. It is also available at ethnic Asian Indian stores in
major Indian hot spots across the U.S.The magazine is also dis-
tributed at major trade shows and conferences, including Comdex, Internet
Christo Jacob
|3|
World and PC Expo.
Managing Editor siliconindia January 2011

editor@siliconindia.com
By Sajan Pillai
The author is CEO, UST Global
displacement—the need for people to For sustained commercialization skills right from that level. If the ba-
immigrate to find work. The Tier I and confident investment, we need an sics are in place, the skills and con-
cities were becoming saturated with amalgamation of four fundamental cepts required in professional life can
Beyond the Metros: Bringing IT people and were nearing the limits of
their infrastructures. It became very
aspects: government support, re-
sources, quality talent input, and fa-
be learned from the employer organ-
izations. We at UST Global have spe-
apparent that these limits would have cilities. There is no substitute for any cial career development programs,
Opportunities to Tier II and III Cities
in my
an adverse impact on our ability to re- of these, but investors should be many of which focus on the new gen-
duce costs while operating in these made aware that these are available eration. We believe in giving our as-
opinion locations.
Tier II and III cities were a re-
together in one place. This calls for
solid marketing on behalf of the gov-
sociates the gift of lifetime
employability.
freshing alternative, once the model ernment. While a beautiful country- The government, for its part,
was seen to work. Suddenly, there side is nice to have, it is hardly should ensure that we have the right
were a whole lot of them to invest in. enough. Investors need to be con- kind of infrastructure to showcase to
Competition among these cities is in- vinced of the commercial advantages potential investors. Although we do
tense, and this is where key differen- they can expect from investing in a have some infrastructure, it is not
tiators can come into play to help country like India. I can speak from enough to support the amount of busi-
with cost reductions. In terms of so- UST Global’s experience of expand- ness that can potentially come to our
cial displacement, the use of Tier II ing operations into Manila, Philip- shores. What I mean by “infrastruc-
and III cities makes use of what you pines and Chile. In both cities, the ture” in this context goes beyond of-
might call an IT “necklace strategy” governments welcomed us with open fice buildings and telecom facilities
that builds mega-centers offering em- arms. They promised us the best re- to include aspects such as a decent
ployment opportunities to the masses sources, and most importantly, deliv- way of life, civic amenities, enter-

W
in more dispersed areas around, ered on their promises with prompt tainment options, and security. Em-
rather than in the country’s biggest follow ups. These are the kind of ployees must be confident that there
cities. Eliminating much of the social cities that are competing with India is a sufficient supportive infrastruc-
displacement in this way is one of the for investments. ture in town to justify bringing their
biggest social benefits of Information families to live there.
Sajan Pillai Technology. And being a service in- Traditionally, businesses In fact, some of our clients, after
dustry, there are no environmental
have tried to speak the they have seen Kerala while visiting
concerns to worry about, either. our facilities, are so impressed that
hen we started our opera- the potential of a service economy. We de-
Attrition is a costly affair in most language of “employee they want to bring their own busi-
tions in 1999, we were cided: Kerala had to be the right place.
looking for the perfect loca- Today, we have grown to 500 times our organizations—the cost of replacing satisfaction,” which is now nesses here. Unfortunately, a bit of re-
tion for our offshore devel- original strength, largely because about 60 per- an employee is estimated to be 1.5 being replaced in favor of search into the geographical,
times the employee’s annual compen- political, and economic climate of the
opment centers. Our choice cent of our workforce is located in Kerala.
sation. UST Global has been success- “employee engagement” state reveals an unattractive side as
surprised everyone around us. “Why would When we looked at the big cities—what we
you choose Kerala?” asked our well-wishers. now call Tier I, at least in the Indian context— ful in keeping attrition to a level well well. While we might have convinced
Kerala’s industrialization in 1999 below industry standards, primarily Most cities in South East Asia them in earlier times that the advan-
included ER&DC, Keltron, and a Attrition is a costly affair in most due to efficient employee engage- have a rich culture and heritage like tages we have to offer easily out-
ment practices. Since employment the one we often boast of. Cities like weigh the disadvantages, there are so
few small private companies pep-
organizations—the cost of replacing an must have consequences more far- Thailand and Shanghai offer the same many options available today that
pered over Technopark. No global
company had a significant presence employee is estimated to be 1.5 times reaching than simple contentment or even better cost advantages than they just don’t have to take the risk.
in the state, and prospects were hes- the employee’s annual compensation with a job well done, a well-engaged India does. So these two points will What we do have in our favor is
itant to take the plunge. workforce results in happy employ- no longer set us apart from the crowd. the abundance of skilled talent and
We decided to look at the facts ees, which in turn reduces attrition. India still needs to work on a few crit- the cost factor. If the government
rather than believe the propaganda. The qual- we saw the advent of a whole lot of industrial Traditionally, businesses have tried to ical aspects like education, industry steps in at the right time, bringing in-
ity of education in Kerala is among the best in clusters, corridors, estates, hubs, and other speak the language of “employee sat- regulations, and communication. vestment to our cities will be a cake-
this part of the world. The people, too, are sur- business units. When looking at possible target isfaction,” but that is being rapidly re- When I speak of education in Tier walk. But we cannot afford to wait
prisingly cosmopolitan from years of exposure sites, we envisioned a model that took two placed in favor of “employee II and III cities, I should emphasize another decade for the effects to
to different cultures and from considerable mi- basic elements into consideration. First, that engagement.” In this context, en- that important personality develop- trickle down. We must strike while
gration to and from the state. The workforce is the concept of outsourcing was primarily gaged employees are an essential fac- ment is taking place during high the iron is hot. India has many prom-
highly stable and productive, while the gov- driven by the desire for cheaper talent and re- tor for any business, but the school. Schooling should be more ising locales for an IT destination.
ernment at the time was slowly waking up to duced operational costs. There was also social requirements don’t end there. oriented towards communication Let’s make it work! si

siliconindia
|4| January 2010 siliconindia
|5|
January 2011
in

I
Indian Companies Adapting Best Global Practices
ndian companies are keen in cially those associated to corporate
adapting best global practices governance, should be framed after
and are increasingly doing so, taking into account the view points
says an expert, though he warns that of all market participants. He also
these companies need to have regu- suggested that there should be an
lar evaluation at all levels to sustain annual evaluation process in place
good corporate governance. “Cor- to assess the effectiveness of the
porate governance has evolved enor- board as well as the corporate gov-
mously in India and many big ernance in companies.
companies in the country are com- cial numbers while just having good “Entities should anticipate and be
mitted to embrace global best prac- names on the (firms’) board need more prepared to tackle risks and
tices for their business,” said not ensure the same,” he said. It was shocks, mainly since the world is
Stephen Wagner, Chairman Emeri- the `14,000 crore accounting fraud getting more interconnected that is
tus of global consultancy Deloitte’s of Satyam by its founder-chairman also resulting in connectivity of
Global Centre for Corporate Ramalinga Raju that brought the shocks,” Wagner said while talking
Governance. issue of corporate governance into about the change in taking and man-
“Good governance at companies sharp focus in India. Wagner aging risk by the companies in the
usually translates into good finan- pointed out that regulations, espe- recent years.

A
Diamond Studded Planet Discovered by U.S. Indian
Astronomer Led Team
stronomers led by an Indian made largely of gas and only its core
American have discovered a contains carbon-based minerals such
giant planet with an atmos- as diamonds and graphite. This planet
phere and a core dominated by carbon. was discovered in 2009 by re-
Nikku Madhusudan, a Banaras Hindu searchers in the UK-based consor-
University (BHU) alumnus who tium called Wide Angle Search for
works at Princeton University, New Planets (WASP).
Jersey, and his colleagues have ob- He also added that the structure of
served that an extremely hot planet this planet might make us rethink our
discovered last year has a never before long-ingrained ideas of planetary for-
seen characteristic of having more car- mation and that with much hotness
bon than oxygen. They said that this and no solid surface the planet could
actually raised the prospect that dia- not support life. “If life exists on such
mond-studded stars may exist. planets, it has to sustain low oxygen,
A computational technique devel- perature of this planet, named WASP- low water and lots of methane and
oped two years ago by Madhusudan, 12b, seems to be 2300°C, which other hydrocarbons that would be in
while he was at the Massachusetts In- makes it hot enough to melt stainless the atmosphere,” Madhusudhan said.
stitute of Technology (MIT), used to steel. Madhusudhan, who is now a Scientists used U.S. space agency
analyze the atmosphere of the planet postdoctoral scientist in the depart- NASA’s Spitzer Space Telescope to
which orbits a star about 1,200 light- ment of astrophysical sciences at observe light emitted by the planet
years from Earth. The surface tem- Princeton, said that WASP-12b is WASP-12b. si

siliconindia
|6|
January 2010
in in

T
ICT Can Reduce GHG Emission by 10 Percent
e-Waste Recycling nformation, Communication and The report by the Digital Energy the adoption of ICT in buildings,
Technology (ICT) solutions have Solutions Consortium India (DESC) transport and nine sectors under PAT
Startups-VCs Confident, Yet Too Many Loopholes the potential to reduce India’s total and CII-ICT Centre of Excellence for (Perform, Achieve and Trade). This
By Eureka Bharali
greenhouse gas (GHG) emissions by Sustainable De- contributes to about 30 percent of the
10 percent by 2030. According velopment in- overall reduction. “Till date, no report
to a report this will result in vestigated the in India has quantified the specific
he green statement has ganized e-waste recycling is achieved the products once it reaches the unor-
energy cost savings of possible savings possible using ICT solutions.
been luring a lot of then there is no looking back for any ganized scrap dealers’ hands. Herein,
around Rs 137,000 crore GHG reduc- The report allows industries to quan-
startup to grab a pie of the firm in this sector. the work of the organized recycling
per annum. India is tion opportu- tify their potential energy as well as
huge e-waste market. The The biggest snag is the lack of companies comes. We, for instance,
presently the third largest nities via ICT monetary savings by adopting ICT-
computing devices, elec- awareness and the urge to socially use a specific technology to re-format
emitter of GHG after China solutions in based solutions,” said Rahul Bedi,
tronic garbage that piles up within come to a conclusion. “One is paid for the hard-disks to ensure no data can
and the U.S. The report named three mitiga- DESC Chairman.
every company, have always been a giving out the garbage to an unorgan- be retrieved from the product. Also
‘ICT Contribution to India’s tion-related The high technology costs, inade-
source of the quick cash, thanks to the ized recycler. Even if being socially the hazardous bi-products are dis-
National Action Plan on Cli- missions of quate energy benchmarks, weak regu-
scrap dealers, and currently, just five conscious about pollution is kept on posed safely,” says Rohan Gupta, Co-
mate Change (NAPCC)’, at- NAPCC - National latory norms on carbon emission
percent gets recycled in an organized founder of Attero Recycling. It serves
tributed the maximum potential Mission on En- standard and low research and devel-
way. In such a scenario, how would a more than 200 clients which include
of saving of carbon dioxide emission hanced Energy Efficiency opment support are the main factors
company venturing into the realm Wipro, HCL, Tata Tele Services, and
to the construction industry with a (NMEEE), National Mis- that are preventing the country from
bring in a better return on invest- Google among others. To some
whooping 42 percentage, followed by sion on Sustainable Habitat ICT adoption. The report recommends
ment? Sachin Maheshwari, extent even electronic manu-
road transport with 30 percent while (NMSH) and National Solar to create a platform for green jobs, un-
who has recently joined facturing firms have started
power sector came third with 16 per- Mission (NSM). dertake steps to develop ICT adop-
the boards of Zephyr Pea- taking a notice of the re-usabil-
cent. The NAPCC was released by NMEEE has set targets to reduce 100 tions, rationalization of direct and
cock as its Director ity part. For instance, Nokia
Prime Minister Manmohan Singh in million tonnes of carbon dioxide emis- indirect taxes, funds allocation, and to
quickly pinpoints, “The claims that 65-80 percent of the
2008 as part of the nation’s strategy to sion by 2015, of which 31 million encourage research and development,
amount of recycled goods materials in their mobile phones
manage GHG emission. tonnes reduction comes as a result of as remedies to these ailments.
that comes out of a product cov- can now be recycled and given a
ers all the recycling cost. second life. Best practices can even
Whether it’s metal or gold, the recover 100 percent of the materi-

I
open market has a good price for als - partly as energy. The market is
it.” During his stints in Draper huge, yet till a complete agreement India Third Largest Cloud Service User
Fisher Jurvetson Maheshwari from every nook of the society
himself was a part of one of the re- comes it may not grow big. ndia is the third largest cloud The study assessed how IT managers
cycling startups. A sneak view of the recent laws service user in world and is are evolving their data centers and
There are 58 million television show that the government has intro- ahead of U.S. The ranking is taking advantage of new technolo-
units in India which is expected to duced legal compliance whereby based on Cisco Connected World gies, at the same time working to ac-
reach 234 million by 2015. On the every company will have to give out Report, a new study commissioned commodate new trends in the
other side, there are 75 million com- the goods to the authorized recyclers. by network equipment vendor Cisco. workplace like social media, device The study conducted in 13 coun-
puters in India since the life cycle of a Yet till 2012, the law will not be im- The study was conducted by the U.S. proliferation, video and an increas- tries also revealed that just about 18
PC has come down to 3-4 years from plemented on a full force. As per At- market-research firm InsightEx- ingly mobile workforce. It maintains percent of respondents are using cloud
7-8 years a few years back. Similarly, tero’s Founder, Nitin Gupta, the press. The countries that lead the list that globally 52 percent of the IT computing today, while an additional
the Indian mobile handset market is the sidelines for a minute, there are country may also be seen as a hub for by taking maximum advantage from professionals have stated that they 34 percent plan to use the cloud. Also
set to zoom across the 100 million also issues on security. For instance, e-waste management considering the cloud computing today are Brazil use or plan to use cloud computing. a large majority (88 percent) of IT re-
mark soon. E-waste management recently, many of the U.S. companies’ fact that it takes $2 to recycle a single (27 percent) and Germany (27 per- Higher cloud adoption rates are pre- spondents expect to store some per-
firms claim that now it is possible to crucial data were found openly dis- PC in India compared to $20 in U.S. cent); followed by India (26 per- dicted in Brazil (70 percent), China centage of their company’s data and
recycle around 98 percent of a cell- tributed on an online site of Nigeria. But will it happen before 2012, cent), U.S. (23 percent) and Mexico (69 percent) and India (76 percent) applications in private or public clouds
phone. If a general consensus on or- This happens as there is no track of chances seem to be meek. si (22 percent). in the near future. in the next three years. si

siliconindia
|8|
January 2010 siliconindia
|9|
January 2011
$ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $$ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $
ter, the cloud based firm trying to sell devices in retail. Logic also
Appnomic Systems version of their so- Verismo Verismo has healthy revenues and the SnapLogic with runs an app

A
lution, has been technology risk is eliminated since store that pro-

S
Receives $2.5 Million Networks $10 Million in Series
featured on the the product is already deployed by vides connec-
Rackspace and many customers,” says Satish t i v i t y
Secures

V
in Series B Funding B Funding
ppnomic Systems, a provider of Amazon cloud for $17 Million Mugulavalli, Co-founder and Chief software for
monitoring trans- Architect, Verismo Networks. The napLogic, a San Mateo based various cloud
D Padmanabhan
application aware IT infrastruc- Satish Mugulavalli Funding
ture management solutions to action performance of cloud-based ap- connected devices market is very cloud integration company, applications.
large and growing enterprises, has closed plications. Their existing clients include erismo Networks, an Internet large and is expected to grow to 140 has raised $10 million in Se- It helps in the
a $2.5 million Series B round of funding Rediff.com, Tata Business Support Serv- TV Platform headquartered million units by 2014. The company ries B funding led by existing in- transfer of
led by existing investor Norwest Venture ices Ltd, Tata Sky, Yatra.com, Ramco, in California and with devel- has built a platform for such devices vestor Ben Horowitz of data effec-
Partners (NVP). NVP had previously in- DataCore Software, Everest Bank Ltd, opment centre in Bangalore, India, and the demand for the same is Andreessen-Horowitz. In accord Gaurav Dhillon tively be-
vested $4 million in the company. “NVP and Karnataka Bank. They have also ac- has raised a funding of $17 million in worldwide. with the funding, Ben Horowitz has tween those
has been very supportive of Appnomic’s quired key U.S. customers such as Cy- a round led by Intel Capital. Verismo Mugulavalli adds, “We offer a joined the company’s board of di- cloud applica-
growth and we are happy to be extend- press Semiconductor, Stratus ASP, one will use these funds to accelerate its complete solution as opposed to rectors. The funds will be used to tions and makes sure definitions are
ing our relationship with them with this of the leading hosting and cloud compa- growth and expand operations to con- many companies that develop just expand internationally, for product the same across multiple applica-
round of funding,” said D Padmanabhan, nies, and continue to experience high de- tinue to deliver its technology to its middleware or set top devices. How- development and help expand the tions.
CEO of Appnomic. The company’s total mand for its services offering. customers and channel partners ever, our customer devices will com- team’s marketing branch. The ex- The developer community has
financing to date stands at $6.5 million. The company headquartered in Palo worldwide. The company will expand pete with boxes made by Boxee, pansion plans particularly involves strength of about 50 developers who
The company plans to use this series B Alto also has its presence in India with its research and development (R&D) Roku and others.” Unlike Boxee and expansion into European territories. publish applications to SnapLogic’s
funds to further enhance its sales pres- offices in Bangalore, Chennai, Hyder- and sales efforts and has plans to de- Roku whose focus is on creating con- Floodgate also took part in the fund app store. The revenue sharing
ence in the U.S., launch operations in abad and Mumbai; Europe and Middle velop its next generation product fo- sumer devices, Verismo is focused on raising round just behind An- model is the same as other app
Europe and enhance the application East. “We believe Appnomic continues cused on service providers and Multi service provider market helping them dreessen-Horowitz. stores with 70 percent reaching the
aware IT infrastructure management to be well positioned to address IT man- System Operators (MSO) both in the deliver triple-play services. He be- Founded in 2006, the company is developers and 30 percent remain-
platform. agement requirements of growing enter- U.S. and international markets. lieves their main differentiating fac- led by Gaurav Dhillon who was the ing with SnapLogic.
Appnomic’s Application Aware In- prises that are working with both “The digital media landscape is tor is Verismo’s service platform, to former CEO of data integration The company previously raised
frastructure Performance Management on-premise and hosted/cloud-based very big. The VCs are interested in which the Verismo powered set-tops giant Informatica (now a public $4.8 million in funding from several
solution has been adopted by many cus- technologies. We look forward to part- large markets. Verismo is a platform connects to and separates content company with market cap of $4.1 high-profile investors, including
tomers including one of the largest banks nering with Appnomic to help grow the company and thus plays in a lot of quickly without programming the de- billion). Like Salesforce’s customer Andreessen-Horowitz and Flood-
in India, a leading travel portal and a company further.” said Promod Haque, digital media verticals. VCs love this vice. The company presently runs relationship management (CRM) gate. The company presently runs
mid-sized bank in West Africa. Appme- managing partner, NVP. as opposed to a consumer electronic with 90 employees. software and Google Apps, Snap- with 30 employees.

i R
300 percent growth dard for tech support and related services superior results for our angel investors. “RiseSmart has developed
iYogi Raises $30 Million for its premium an- through a consistent user experience. Our RiseSmart Raised clients’ recruitment and recruitment and outplacement solutions
nual subscription planned expansion includes making our $3 Million in Equity outplacement pro- that are truly unique in the talent manage-
Yogi, the first consumer service brand service alone, and services available in any geography, grams,” said Sanjay ment space – utilizing its proprietary tech-
from India, has raised $30 million in solved more than across any platform, for any device, and iseSmart, a San Jose based out- Sathe, founder and nology which leverages Web 2.0 and social
a new round of funding lead by Se- two million tech at affordable price-points,” said Uday placement and recruitment process Sanjay Sathe CEO, RiseSmart. networking features and capabilities to
quoia Capital. With this investment iYogi Uday Challu problems for con- Challu, Co-founder and CEO of iYogi. outsourcing (RPO) company has “Through our provide a richer and more compelling so-
will expand services outside the existing sumers since its in- “I believe that iYogi will be cited completed a $3 million equity financing methodology, we have consistently re- lution to its growing roster of Fortune 500
consumer market and the Windows Op- ception. The company’s existing market amongst case studies of disruptive busi- round. The company plans to use this fund duced time-to-hire for our recruitment enterprise clients,” said Venkat Mohan,
erating System platform. It will provide includes North America, Canada, the ness models delivering world-class to continue its expansion into new markets clients and time-to-placement for our out- General Partner at NVP.
the company with the capability to ex- United Kingdom and Australia, and with service to global consumers from and further the development of its technol- placement clients. This is ultimately the Founded in 2006, the company cur-
tend its platform to the global SME mar- the funding the company has plans to in- India,” said Shailendra Singh, Manag- ogy platform for bi-directional matching of key to our continued growth and success. rently deals in three solutions, Transition
ket and also aggressively address the creases its services to other countries in ing Director of Sequoia Capital India. jobs and job candidates. “RiseSmart pro- We are grateful for the support of NVP and Concierge, an outplacement service to help
growing need for supporting mobile con- the Europe, Middle East and India. “We Apart from Sequoia Capital, iYogi’s ex- vides talent management solutions at the Storm Ventures as we work aggressively exiting employees find new positions, Re-
sumer devices. have invested significantly in extending isting investors Canaan, SVB Capital two most critical talent transition points: to expand our market position,” added cruit Concierge, a recruitment process out-
iYogi is the world’s largest inde- our game changing platform-as-a- Partners, SAP Ventures and Draper joining and leaving an organization. We Sathe. Formerly, in 2007, the firm had sourcing (RPO) solution for finding new
pendent remote consumer tech support service delivery model and believe that Fisher Jurvetson, also took part in this leverage a common technology platform raised $ 11.85 million from Norwest Ven- talent and SmartRedeploy which is a Soft-
company which has driven an impressive we have established the new market stan- round of fund raising. si to ensure next-generation efficiency and ture Partners (NVP), Storm Ventures and ware-as-a-Service solution. si

siliconindia
|10| January 2010 siliconindia
|11|
January 2011
CEO SPOTLIGHT

Android as well. These apps leverage


Desktop Virtualization & Cloud Computing: both the Web and the social graph. Dynamic Content Sparks

D
Building blocks of Nex gen Technology More people are now on the Web all the
Rao Cherukuri, Founder & CEO, DeskStream time, with the mobile device becoming
the main way we stay connected.
Growth of New Tools and
esktop Virtualization (DV) is the ing blocks for delivering secure corpo- Another significant trend is the
hottest trend in the field of vir- rate applications on-demand to a new emergence of rich online media. Video Technology

C
tualization. According to indus- generation of ultra-thin mobile devices has taken the Web by storm, stemming
Vijay Srivastava, President & CEO, Coaxial Network
try analysts, the market for DV in 2011 is designed for standard desktop applica- primarily from the rise of YouTube.
expected to outpace the market for the tions. One example is Intel’s Mobile In- Video is an increasing part of our lives,
hugely successful server virtualization ternet Device line running the Atom creating changes in communication (for able technology has evolved cable infrastructure will emerge as
market. DV holds the promise of en- processor, providing a quantum leap in example, Apple’s FaceTime) and enter- in the last decade many social media and over the top appli-
abling any user to have their desktop the utility of mobile computing. tainment (for example, Hulu). We are folds. Adoption of digital cations such as Facebook and Net-
anytime, anywhere, on any device – in- Funding and personnel will always going to see continued innovation as technology has provided Multi Sys- flix drive away customer from
Gautam Godhwani
cluding mobile devices — without com- be critical challenges for entrepreneurs. video production and distribution be- tem Operators (MSO) and cable op- traditional cable.
promising on the user experience. From While building an app for a Smartphone come easier and more cost-effective. erators to deliver services that
a corporate perspective, DV dramatically does not require much capital, building a It is the Social Era This is a very exciting time for traditionally only Telecommunica-
lowers the total cost of ownership as well product for corporate use is vastly differ- entrepreneurs because innovations tion companies could provide. With
as power requirements, while enhancing ent. Venture capital is not as readily avail- for Internet are occurring at every level. Cloud this digitization of the cable spec-

O
the security and provisioning of corpo- able as it used to be, so entrepreneurs Gautam Godhwani, Co-founder computing is reaching scale with trum and adoption of DOCSIS 3.0
rate desktops. with a great idea for technical innovation and Chief Executive Officer, the significant adoption of both its cable operators can deliver band-
must work harder than ever to secure fi- SimplyHired.com infrastructure and related applica- width upwards of 150 Mbps along
nancing capital from a variety of sources. ver the last two decades, we tions. It’s easier than ever to create with hundreds of standard and on
Once initial funding is obtained, the have seen first the emergence a Web company with an array of demand video on the same cable in-
product or service must demonstrate of the Internet as a commer- tools and open source offerings. So- frastructure that earlier delivered
early proof points with successful beta cial medium, followed by the advent cial media continues to revolution- few operator defined programming.
deployments or early customers. And, of Web 2.0 after the dot-com bust. ize the distribution of online As MSO’s and cable operators
since no product or service can stand Now we are entering a new era of the applications, using payment sys- increase download speeds, new so-
alone, startup companies need to estab- Web, which will be shaped by the sig- tems, advertising revenue, and ac- cial networks and over the top video
lish meaningful partnerships with an nificant new trends we have seen in cess to a large, engaged audience. in return will gain momentum. It
Rao Cherukuri ecosystem of companies that offer com- recent years. Entrepreneurs have a wealth of op- will be challenging for the MSO and
plementary technologies and go-to- The Web is no longer just about portunity right now. The economy is cable operators and interesting to
market capability. connections between websites, but has just regaining strength, and entrepre- see how they maintain their ARPU
There is a continued push from cus- Building an organization that is for- become centered on connections be- neurs that get started now will have a and also invest in infrastructure up-
tomers to reduce Desktop Management midable and self sustained is especially tween people. This new era, often re- running start as the economy gets trac- grade. It is a dual edge sword, up- Vijay Srivastava
costs, support new mobile devices, and difficult if you don’t have the right peo- ferred to as the social web, will redefine tion. Raising capital is still a challenge grading to provide faster download
at the same time, deliver desktop soft- ple. Everyone in Silicon Valley, from the online landscape both by changing in this environment, and businesses are speeds which in turn enables Changing dynamics of the mar-
ware on-demand and improve user pro- small start-ups to giant companies such how we communicate, and by facilitat- tentative about making large invest- providers and media giants to push ket creates more challenges for en-
ductivity. The latest trend is to leverage as Google, is scrambling to fill critical ing the creation of applications that ments. Entrepreneurs must ensure that contents directly to the subscribers. trepreneurs. As user habits remain
DV and cloud-based delivery models to jobs, mostly in engineering, with a talent leverage these new social connec- they create offerings with a degree of But ultimately the winner is one unpredictable in a dynamic market,
provide Software as a Service (SaaS) or war underway for the most in-demand tions. Facebook, LinkedIn and Twitter, longevity to carry them through what who controls and owns the masses entrepreneurs have to react quickly
Desktop as a Service (DaaS). specialties. Companies are on the hunt for example, all have different social may be a very slow economic recovery. eager for entertainment. and bring newer products to life
The challenge for enterprise comput- for those with the right skills, especially graphs and create interconnections be- Each day, more people are on the Access to content is no longer within a shorter time span. Products
ing is to deliver legacy and corporate ap- programmers, mobile Internet specialists tween people in unique ways. Internet from more places around the static, you want your content to fol- have to be timed very well as prod-
plications to end users with the same and social media experts. Having com- In addition to its changing focus, world than ever before, a growth that low you and move with you. This ucts that are both early and late can
level of flexibility and rich user experi- petent team players on staff is essential the Web is now accessed in many more will ramp up as global adoption of the shift will spur the growth of new fail in the market. As leaders and en-
ence as Apple has brought to consumers to the success of any startup. But with the ways. Mobile is dramatically changing Internet continues to rise. It’s important technologies and products. Coaxial trepreneurs in our R&D process we
with its iTunes, iPad and the App Store. proper funding, the right products, the how we access information online, not to recognize how early a stage of de- Networks’ products help in enabling have to keep developing key com-
Mobile computing is the future. DV right partners, and the right people, the just with mobile browsers, but with ap- velopment, the Web is really in. We are and delivering this paradigm shift. ponents that we can quickly produc-
and cloud computing will be the build- future is indeed bright for entrepreneurs. plications on platforms like iOS and just getting started. Newer methods of monetizing the tize and bring it to market. si

siliconindia
|12| January 2010 siliconindia
|13| January 2011
Cover Story

Quick Facts:
Founded: 2007
CEO: Karl Mehta
Headquarters: Santa Clara, CA
playspan Other Offices: Charlottesville (Virginia),
Mumbai (India)

Leading
Customers: 27 million consumers and

Innovation
1000 plus enterprises
Employees: 135+
Investment: $43 Million (in the 3 rounds
of series funding)
Investors: Easton Capital,
Menlo Ventures, STIC Investments,
Novel TMT Ventures, Vodafone and
SoftBank
Website: www.playspan.com
www.corp.playspan.com

in the Global Payment Industry

T
By Vimali Swamy

he headquarters of Santa Clara based PlaySpan


is bustling with activity and everyone including
the CEO of the company, Karl Mehta seems to
be on their toes. And why not? Within four years
of its humble beginning in 2007, the company
has raised three rounds of venture funding from leading
investors in the valley and large mobile operators, the lat-
est being in August 2010 for $18 million. And today it is on
its way to disrupt the 50 year old global payment industry
with its payment platform — UltimatePay™. With this the
company is also in the path of revolutionizing the e-com-
merce industry by leveraging both online/mobile gaming
and social networks on its platform.

Karl Mehta

siliconindia
|14| January 2010
Today, with over 28 million users file capabilities that is needed by needs in an out of the box PCI com- PlaySpan has built and emerged as a
globally (growing at over 100 per- both consumers and merchants. pliant hosted infrastructure. Be it a global leader in a complex industry..
cent annual rate) and hundreds of Hence, it is this gap PlaySpan hoped startup or a billion dollar enterprise, For years, several large payment
millions of audience across its mer- to bridge by developing a next-gen- any one can use this Application Pro- companies have been spending bil-
chant networks, PlaySpan has em- eration payment platform. gramming Interface (API) based pay- lions of dollars to build this infra-
powered merchants and consumers ment platform and transact across structure internally but PlaySpan
across 180 countries with over 90 Developing a Disruptive Product million users globally. The service built the platform over the past four
different payment options with multi- So how does PlaySpan make this shows that the software-as-a-service years with an agile culture and
channel devices. Its clientele varies happen? The company’s payment in-
from small businesses to globally frastructure has two sides to it.
recognized brands including Face- Firstly it offers a wallet infrastruc-
book, Warner Bros., Nexon, Perfect ture, a next gen PayPal type platform
World, Hello Kitty Online, Disney, where both consumers have in-app
Adobe, Revision3 and Nickelodeon access to accounts in virtual currency
to name a few. and merchants have easy to integrate
SaaS based monetization platform to
The Technology Gap in Payments monetize their mobile or online sites
The company originally started with across multi-channel. With one click,
a simple idea to provide an easy to this virtual currency can be spent on
use single-account of virtual cur- various content across multiple de-
rency based on aggregation of multi- vices. Since the wallet is also
ple in-game accounts and currencies. portable, it is placed right with an ap-
The idea caught on especially with plication/content so that the user trend — which started with enter- proven engineering teams working in
younger users who needed one ac- need not navigate away from the web prise companies such as Sales- 24 hour cycle (US/India plus inte-
count that they can be funded by page she is in. “Usually while mak- force.com — can be extended to the grating two payment companies it
their parents and can be used at mul- ing an online transaction, users gets business of providing services for had acquired over the past three
tiple games. The lack of a secured diverted to a new webpage by the online games. years. Mehta made bold moves to

With digital content going cross-plat-


wallet or a digital vault that enables payment gateway thereby causing a The greatest feat amongst follow an aggressive M&A strategy
an in-app/ in-game purchase that disconnect in the users mind. We PlaySpan many technological to build out the platform, team and

form from open web to social web,


works fast and across all profiles/ have observed that since lots of these achievements is the speed at which market traction rapidly, to maintain
avatars was simply not available purchases are im- its first mover advantage against es-
from any existing payment providers.
mobile devices, console and web TV pulsive, this dis- tablish players.

now, e-commerce is in the way of


Upon further research, they found joint in usage tends Today, apart from traditional pay-
out that game developers were strug- to make the user ment gateways, PlaySpan’s biggest

getting a makeover.
gling to keep users engaged and re-evaluate one’s competitors are the internal engi-
complete a purchase without friction, decision. This neering teams at large merchants. Ul-
but the chargebacks associated with could lead to a loss timatePay has gained considerable
digital goods and existing out-of- of revenue. Our UltimatePay traction as users in 180 countries use
the past few years. There has been a digital goods space by offering Face-
game ecommerce flows were some lightbox technology was designed it to pay for their virtual goods in
significant increase in the consump- book Credits, Game Cash, Game
of the biggest technical challenges. to ensure that a gamer/user does games. The company also brings
tion of interactive media like online/ coins, and other online accessories
These pain-points were big enough not have to navigate away from services such as fraud prevention,
mobile games and social networking. for one’s virtual gaming profile.
to convert the idea into a real solu- the app and complete the entire merchandising, and promotion to
With digital content going cross-plat- Players today are wiling to pay for
tion and PlaySpan was founded as a transaction within the applica- game companies, helping them to op-
form across open web to social web virtual currencies to buy virtual
platform where developers and users tion,” explains Mehta. timize more Conversion (Paid Users)
to mobile devices, console and web goods. But these goods cost as low as
could enable a secured in-app pay- Secondly, it took the complex- and ARPU (Average Revenue Per
TV now, there has been tremendous 25 cents to 99 cents. Since, tradi-
ment. But eventually, Mehta saw a ity of managing payment for en- user) out of their games.
interest amongst developers, pub- tional payment gateways like credit
much bigger opportunity envision- terprises/merchants by creating But this success, though quick,
lishers and merchants to sell digital card charge anywhere between 3-4
ing that this solution will be needed a monetization platform known as was not an easy one for Playspan.
goods,” says Mehta. percent access fee per transaction
for all digital content or physical MaaS (monetization as a serv- About four years ago, there was al-
From social network biggie Face- which are cost prohibitive for a sub
goods and across all devices. ice™) platform, with all the com- most no interest in the platform.
book to online gaming publishers $2 transaction, and lacks the in-app,
“The entire digital space has been ponents of both online and mobile “Being a startup, the greatest chal-
like Zynga, all have ventured into cross-platform portable wallet/ pro-
undergoing a remarkable change in payment solution that a merchant lenge for us was we were entering a

siliconindia
|16| January 2010 siliconindia
|17|
January 2011
market that no one had treaded. entire new arena. The challenge lies payment system that allows compa- Millions of gamers are using the
There was no company that previ- Karl Mehta: A global CEO driving entrepreneurial culture in anticipating the market need be- nies to offer a fast, in-app and se- Ultimate Game Card and PlaySpan’s
ously attempted to create a platform fore even the users themselves real- cured transaction system. And it own PlaySpan.com marketplace.
like this, thus we did not have any ize it. “With consumers shifting sells Ultimate Game Card gift cards Revenues have grown more than
model we could emulate,” explains across platform, we too have contin- at 50,000+ retailers so that users 100 percent a year in the past three
Mehta. The 50 year old traditional uously evolved our wallet platform who don’t have credit cards can pay years with 50 percent from U.S., 25
payment industry too has been secre- both in terms of its in-app capability cash for the cards at stores and then percent Asia and the rest from Eu-
tive about its operations and to break and portability. Also the payment in- enter a code to get virtual currency rope, Middle East and South Amer-
their business model with micropay- dustry is the most targeted sector in in a game. ica. Keeping up with its business
ment platform was a challenging cyber space. Thus the challenge is expansion, the company has made
task. Along with this, also came the also to continuously evolve our plat-
The mobile phone two acquisitions till date, adding to

is the new wallet


challenge of being accepted in the form’s security threshold,” says its technological prowess and has
market by both the consumers and Mehta. raised a total of $43 million in three

and that will


merchants. For Playspan it was a typ- To conquer this continuous chal- rounds of funding. Its investors
ical ‘chicken and egg cycle’. But lenge of anticipating and evolving today include Easton Capital, Menlo

change everything
with persistence, the company con- with market demands while keeping Ventures, STIC Investments, Novel
tinuously worked in close quarters user confidence intact, the company TMT Ventures, Vodafone and Soft-

in the 50 years of
with both customers and merchants; has invested heavily in the technol- Bank.
evangelizing them about their prod- ogy and compliances (PCI Level 1 Karl believes that the global pay-
uct and also improving it with their and SAS-70 certifications). The com-
payment industry ment industry is up for a whirlwind

Building a
pany prides in the fact that it has the transformation in the next three
It is very rare to catch Karl Mehta not juggling multiple tasks a time. At any latest and best state of the security years and this will be a crucial time

world-class team
given time, he is flitting between customer and product development meet- processes in place. Also, to gain a for every player, especially
ings. But the few minutes one manages to catch up with him, one can see leadership edge, it has recruited the “Also, executives at our mer- PlaySpan. With the advent of NFC,

and an agile, the passion that is filled in him. Ask him of his ambition, and he states the best of minds in the payment indus- chant partners can use PlaySpan to the physical plastic card is expected
try. Its management at present is tune their sites in real time, figuring to become obsolete; the mobile will
entrepreneurial
desire to break open the decades old traditional payment industry and take
PlaySpan to dizzying heights that perhaps no one has yet reached. But this filled with technology team who ear- out how to raise average revenues be the new wallet. It is no wonder

style risk-taking
jet set CEO, is aware of the challenge and the risk that lies in the way for lier worked with PayPal, Visa, Ora- from paying users and get more that Vodafone and Softbank, re-
he is not perturbed that to maintain the numero uno position he has to cle, Yodlee, Nextag, and others. The non-paying customers to pay. How? cently joined the company’s invest-

culture are the keys


continue to partner with majors like AMEX, Master Card, Visa and Pay Pal company also has a strong team of A one-percent increase in conver- ment round.
who ruled the roost till date and giants like global mobile operators who 135+ across its two offices in the sion of non-paying customers to Also TV is going to become the

to success in a fast
are trying to make a dent in this industry too. U.S. and one in Mumbai, India. paying customers can result in a 25 next big internet device. This opens
A true entrepreneur, Mehta has over 18 years of experience to percent increase in revenue. Simi- up a lot more opportunity for con-

growing space, PlaySpan in founding, building and funding technology start-ups in the U.S. The Present and the Future larly, reducing the rate of credit card tent developers and aggregators, in
Today, apart from its monetization fraud can yield big profits,” explains return shaping up the e-commerce
besides great
and international markets. Prior to founding PlaySpan, he was part of the
founding team at MobileAria Inc. (acquired by Wireless Matrix) based in platform PlaySpan has several capa- Mehta. industry. Hence, it is no surprise that

technology and
Mountain View and co-founder/ CEO of OmniLabs Inc., based in Singapore bilities layered on top of each other What is different now is that game all major credit card companies,
and India. Prior to that, he held executive positions at Hughes, leading new in a “multi-layer architecture”. It publishers should be able to imple- large mobile operators and Internet

market-traction
business and technology development. provides merchants with one-stop ment features such as a virtual goods giants like Google, Adobe, Apple,
Apart from his other accomplishments, the latest feather in his cap is service when it comes to introduc- store, a payment system that works and , Facebook are trying to grab a
the ‘Entrepreneur of the Year 2010’ Award from Ernst & Young for North- ing their own virtual currency, sub- around the world, anti-fraud systems, piece of this pie.
feedback. “We have built a great ern California. scriptions and microtransactions. and other features that online games But what keeps Mehta optimistic
team and more importantly a com- The company has prospered as pub- need in just a matter of days. about this situation is its first mover
pany culture that works on each and ness has skyrocketed. Today, try, Mehta feels, the real opportunity lishers flock to the free-to-play busi- PlaySpan doesn’t have to babysit the advantage. “To develop a robust
every feedback we get from our users PlaySpan has bagged over 28 million for the company lies in the next few ness model, where users can play customers as they implement it man- payment platform takes a minimum
in a super-iterative mode to respond wallet accounts as against PayPal’s years. The digital space is an ever games for free but pay real money ually over a period of weeks. Rather, of three years in a super-agile envi-
in 24 hour cycle with a new release,” 80 million accounts that it bagged in changing one. The gaming industry for virtual goods such as better the process is automatic. Customers ronment and we are already three
he adds. a decade; and enjoys 1000 plus de- especially has journeyed from open weapons. PlaySpan provides virtual can login to a web service and just get years ahead of the new entrants,”
With the success of virtual goods velopers and 2-3 million transactions browser to portable and connected currency and virtual goods platform, it all done. CEOs and game designers explains Mehta. In short, he is look-
and micro-transactions in Asia and a day. devices like smart phones and Inter- offloading the task of creating this alike can use the dashboard to see ing to continue to lead the ‘moneti-
with the impact of the recession on Despite the company’s quick run net TV and consoles like Xbox, infrastructure from game develop- how their games or videos are doing zation platform’ category that he
U.S. gamers, the virtual goods busi- to the top echelon in payment indus- PlayStation and Wii; opening up an ers. It also provides the UltimatePay at any given moment. created in the payment industry. si

siliconindia
|18| January 2010 siliconindia
|19| January 2011
VC Talk: By Bejul Somaia
The author is Managing Director, Lightspeed Venture Partners

ferent ways, unlike a sector that sets a preneur has to find the right way to
single target market. It is still at the serve those needs.
ground floor in terms of innovation, There are opportunities for real in-
products and services that are pro- novations across the board. The power
vided and so the number of businesses related sectors are going through a lot
that are going to grow out of this sec- of changes now. One of our recent in-
tor will be significant. novations is in Power Exchange. This

Financial Services & Education Entrepreneurs need to make sure that


they are solving a large painful problem.
Potential Areas
Startups
When a financial recession comes is a company that is now a couple of
there is generally nowhere to hide, but years old so it is essentially a start up
what an entrepreneur must to do is and it is being a transparent competi-

for stay focused as if there is a large tive market for electricity. That is

T
Bejul Somaia unmet consumer need. If you are solv- something that India needs, to create
ing it well, then over time you will be the right kind of incentives for invest-
look at education sector, one can see a
able to build a business that can sur- ments and price signals. Now this is
lot of companies trying to leverage the
vive recession. Financial services were an innovation in a very large, very ma-
current teaching or school infrastruc-
quite badly hit by the recession but it ture market but still it is a disruptive
ture to improve the quality of educa-
also recovered very strongly and fun- innovation that has a significant im-
tion. So curriculum services,
damentally whether you look at credit pact on the industry.
curriculum products and technology
he areas we invest in India are fairly cards or home loans or insurance prod- In India where ever you look there
products would be distributed through
broad. Currently we focus on four in- ucts the penetration is tiny compared are opportunities to innovate and
the existing school infrastructure
vestments— power sector, financial to any other markets including other apply technologies in interesting ways.
rather than trying to create an all to-
services, education and media. These emerging markets. This means that the The limitations are only by the entre-
gether new infrastructure. This is an
sectors seem to be reflective of the op- head room is significant and an entre- preneur’s imagination and knowledge
area of new trend.
portunities set in India. Even though these sectors of a sector, so it is not fair to say that
In financial services, we are see-
sound like traditional sectors we have actually in- there are only limited ways to inno-
ing increasing opportunity for niche or
vested in the non-traditional segments of these sec- vate.
specialized lending businesses. For ex-
tors. In these large traditional sectors there are Entrepreneurs need to make sure
ample, the banks typically lend to the
pockets of emerging subsectors that create a lot of that they are solving a large painful
cream of the crop in any particular
opportunity for entrepreneurs. For example, in Research firm, Gartner, problem. Sometimes we see solutions
area, and a shift from housing finance
power we are investing in the Power Exchange and predicts a strong double- looking for problems and sometimes
or construction finance or student fi-
in the financial segment we have invested in a pre- digit growth in revenue for we see really interesting technologies
nance to microfinance is being seen
paid card company. Then there is technology and the enterprise Software-as- or ideas that no one is willing to pay
and at the same time specialized
technology enabled sectors like the internet and e- a-Service (SAAS) applica- for. In India the willingness to pay is
lenders are coming to the market as
commerce, which are seeing a revival of activity. tions market soon. often a challenge. That is why it is im-
well. The same trend is beginning to
The same is the case with mobile sector with 3G Worldwide revenues for en- portant to solve a large and painful
be seen in the Indian market too. Fi-
and BWA rollouts. terprise applications will problem, because if it is painful then
nancial service to me is very exciting I
This is a growing trend. A lot of activities are reach $10.7 billion in 2011. people will pay. Another thing is to
read an article recently according to
being registered around the cloud, though it is not In 2010 it is expected to have a great team. This helps to in-
which from $15 billion seven years
generally focused on the domestic market. Areas generate $9.2 billion.As the crease your chances of success. Build-
ago, the bank consumer credit out-
that are gaining speed more than others would be "SAAS model matures and ing businesses are not easy, it is an
standing had become $100 billion a
Internet and e-commerce. converges with cloud serv- unnatural act to build something from
couple of years ago. An increase of
We are also witnessing a lot of activity in the ices models," the break- nothing and so the human capitol that
this magnitude in five years! and we
education sector, not just schools but in IP related down could exceed 90 you assemble is the most prudent
are just at the beginning. Financial
businesses and content driven businesses. Take a percent by 2014. weapon you have. And finally the
services touch every one’s lives in dif-
focus should be on execution. si

siliconindia
|20|
January 2010 siliconindia
|21|January 2011
Technology: By Ajay Jain
The author is President and CEO of Quantum Secure
Using a unified approach involves entire lifecycle of internal policies If infractions occur against pre-de-
centrally managing the following as- and external regulations, including: fined policies, SAFE Compliance and
pects of physical security:  Centrally managing all the regu- Risk Management solutions provide the
 Identities through various lations and associated controls capability for an organization to log any
stages of their lifecycle including and automating assessment, reme- type of security policy infraction
Managing Compliance Through Physical on-/off-boarding, access provi- diation and reporting as per de- against managed identities, triggering
sioning, badging fined review cycle notifications or automating access priv-

T
 Integrations with all types of ex-  Defining, auditing and enforcing ilege changes. This level of automation
Identity and Access Management ternal systems (logical and phys- Segregation of Duty (SOD) poli- is especially important with regards to
Save Time, Money While Streamlining Global Compliance Management ical) for ensuring one identity cies across your physical security internal governance, as many organiza-
definition infrastructure tions need to enforce global policies
 Policies which are rules govern-  Enabling physical security change across a diverse employee, contractor
ing relationships of identities management based on regulatory and vendor base.
across different systems, with dif- policies SAFE Compliance and Risk Manage-
he turn of events at the entry that can lead to duplication and process which means that an em- ferent stakeholders (like IT, facil-  Automatically triggering compli- ment solutions also include customized
beginning of this millen- erroneous identity information within ployee can still have physical access ity, physical security) and with ance-based actions based on phys- assessment reports, whereas deviation
nium will be etched in the the system. despite having the logical access ter- physical security events ical access events to deployed policies can be reported
memory of global secu- As most security processes are minated. Delay in removal of physi-  Compliance and reporting as it  Managing infractions/violations across global locations to a single Web
rity practitioners for the manual, security practitioners often cal access for a terminated employee relates to physical security and rule-based generation of ac- console. Additionally, daily, weekly and
next few decades. While 9/11 ush- need to spend additional efforts to en- can lead to compliance exceptions. Specifically related to compliance, tions/penalties monthly operational reports can be au-
ered in a spate of changes in physical sure that compliance-related controls Similarly, access management is a this unified approach should allow se- Managing internal watch list of iden- tomatically generated and sent to re-
security management at government are operating effectively. They are manual process which can be error- curity practitioners to enforce gover- tities who pose threat to the organiza- spective individuals within the
institutions and airports, it has also also expected to prepare reports as- prone and lead to compliance viola- nance across diverse systems, and to tion along with their risk profile and organization, providing security practi-
prompted businesses to assess their serting their compliance. All these ef- tions. create a transparent, traceable, and re- historical details tioners with the information needed to
own risk exposure as they operate forts spent may go waste if due to In this environment, physical se- peatable real-time unified compliance optimize staffing, budging and other re-
multiple locations spread throughout some oversight, compliance excep- curity practitioners need a centralized process. The solution should allow Detailed reporting and risk analysis lated resources.
the world. Internal threats such as tions are reported by third-party agen- and streamlined approach to manag- users to centrally define controls as SAFE Compliance and Risk Manage-
employee pilferage and collusion cies. These exceptions can not only ing compliance and risk—on a more per external regulations and internal ment solutions allow organizations to Smarter Compliance Control With a
pose even a greater threat for corpo- result in fines and penalties for the or- holistic level—to assess and deal with policies. It should subsequently auto- automate compliance initiatives in Very Clear ROI
rate entities, educational institutions ganization but they can also dent the risk in a more proactive and corpo- mate the measurement, remediation real time. By quickly identifying and SAFE makes physical security compli-
and other non-government entities, rate-wide fashion and meet govern- and reporting actions against these mitigating compliance concerns — ance a real-time, repeatable, sustainable
creating new elements of cost and ing, organizational and industry controls. such as ensuring that cardholder ac- and cost-effective process. Since it
risk. regulations. At Quantum Secure, we have cre- cess is driven by policy, that change eliminates manual compliance initia-
For organizations in today’s ated the industry’s first and most history is always available and dor- tives, it helps organizations avoid any
global economy, compliance has be- The SAFE Approach to Managing comprehensive physical security mant/orphaned accounts are reliably penalties and ensures that the organiza-
come much more than a simple buzz- Compliance and Risk management software: the SAFE deactivated — physical security prac- tion does not face any embarrassment
word; it has become a way of life. One thing is certain: the traditional suite. SAFE is designed to connect titioners can create a robust security because of compliance exceptions.
Regulations such as Sarbanes-Oxley way of solving physical security disparate physical security and IT and infrastructure that keeps pace with As a software-based solution for
(SOX), ISO 27000, NERC/FERC, problems simply will not suffice. Ad- operational systems, automate manual today’s ever-increasing compliance Physical Identity & Access Manage-
CFATS, GLBA, SAS 70, Basel II, ditional hardware, standalone soft- security processes and reduce both regulations. ment, SAFE also enables physical se-
U.S. government-mandated FIPS- ware solutions and adding more costs and risks. Additionally, SAFE Compliance curity department to ensure a more
201/HSPD-12 and numerous interna- manpower will only compound the Quantum Secure SAFE Compli- and Risk Management solutions can secure and risk-free workplace. Au-
tional and EU privacy laws have all issue. ance and Risk Management solutions enable security practitioners to define tomating policies using SAFE elimi-
driven the need to regularly enforce These challenges can be ad- allow security practitioners to enforce both traditional and electronic corre- nates human-led errors and delays.
strict governance in financial report- dressed by a unified approach to- governance across diverse and dis- spondence (letters, emails, faxes, etc.) Dashboards showing consolidated and
ing and security controls, across both wards physical security management jointed physical access control sys- to be distributed by policies, process correlated events reduce time and im-
physical and IT infrastructures. using policy-driven software that can tems (PACS), creating a transparent, workflows and access events. For ex- prove quality of response from security
To compound these challenges, organization’s reputation. seamlessly manage identities, their traceable and repeatable real-time ample, if a manual signature is needed staff. SAFE delivers security practi-
many physical security policies and Today, there are few means by physical access, and their correlation global compliance process. to satisfy internal governance or ex- tioners unprecedented control over a
various administrative tasks are exe- which to ensure that compliance-re- with physical security events in a SAFE Compliance and Risk Man- ternal reporting regulations, that sig- scattered infrastructure, creating real-
cuted manually by the security staff, lated exceptions are not allowed in the multi-stakeholder environment while agement solutions provide a compre- nature may be easily captured as part time benefits for the entire organiza-
leading to costly, error-prone data first place. Off-boarding is a manual providing real-time compliance. hensive range of functions across the of the automated process. tion and a measureable ROI. si

siliconindia
|22|
January 2010 siliconindia
|23|
January 2011
Technology: By Arun Samudrala BUSINESS By Eureka Bharali
The author is President & Co-Founder, United Mobile Apps

software platforms, each vying to be


the market leader – Google Android,
Apple, Symbian, Qualcomm Brew,
Blackberry, Windows Mobile just to
name a few. In order to present a
comprehensive solution, each com-
pany has its own suite of software
that’ll enable Users to backup and
share content. Video call with Face-
time is limited to iPhone 4, Ovi is for
Nokia devices alone, Mobile Me is
Indian Startup Founders

“I
for Apple devices.
Seamless data and media sharing
across devices of any make (of course
limited by their hardware capabili-
Are They Serious on Sales?
ties) is still not available. At United
Mobile Apps, we solve precisely this
problem. Our cross platform software
Unify combines a rich set of features
that leverage the native device capa- f a product can not be get full with the other core activities

T
bilities and present application devel- sold by the makers they tend to sideline the sale proposi-
opers with simple interfaces to themselves, no sales tion.
develop innovative information shar- team perhaps can And of course, a look at product
Evolution of Mobile Devices ing and distribution software that cuts make the sale,” says companies, we would see more of out much loopholes instead of moving
across this device-data barrier. Bharat Goenka, the Tally Chief. technocrats towing the entrepreneurial across the market and making the sales
and Services Unify enables individuals to not Goenka jumpstarted the accounting line. “In terms of sales and marketing, pitches. “When we as VCs look to-
only share their content across Mo- software firm by selling the first 700 the CEO doesn’t handle any of it he is wards investing, the company needs to
bile devices, but also across desktops, products on his own, before passing on a core IT person,” says an Associate have an amiable CEO. Look at every
he rapid growth of Mobile instantly share them with my friends
laptops and ipads. Some salient com- the league to a set of sales managers. VP of a learning solution provider. In big product firm, Sony, LG and you
usage in India is indeed all over the world. mobile phones have
ponents of Unify are – a module that But how far are today’s startup such a scenario, they are more oriented can see CEOs with significant sales
remarkable. In the past emerged as gateways to create, share
syncs data on multiple devices and founders and CEOs in India willing to towards building a taut product with- experience, who have also contributed
few years, mobiles have and consume personal content.
keeps them all up to date, a module put their hands on sales? immensely. So, for a startup it’s im-
penetrated the most re- Two parallel developments have
that provides an intuitive interface to “One has to sell the vision of the portant that they do look at the sales
mote sections of our country where contributed to the transformation of
share content, a module that enables company at every point. Whether it is proposition of the CEOs. However,
getting a landline used to be a distant mobiles into all-in-one information
remote management of devices. to the employees or to the investors, only if the CEO has unmatched tech
dream. This phenomenon is a reflec- sharing and storing devices. While the
While the industry waits to herald the selling does happen. In direct sell- knowledge, sometimes sales might be
tion of the global ubiquity of mobile capabilities of the devices themselves Computer shipments to
a leader with a steadily increasing ing of the products, at times CEOs are compensated by bringing in an ex-
phones. This decade has witnessed not have improved on the one hand, ad- India are expected to in-
share in the platform space, there ex- not ready and rely on a more business- pert,” says Gaurav Saraf of Epipheny
only strong proliferation of mobile vances in the deployment of faster crease by 24.7 percent to
ists a significant opportunity to im- experienced person,” says an ex-busi- Ventures.
technology, but also phenomenal ad- data transfer Technologies such as 3G total 13.2 million units in
prove user experience in leveraging ness developer of a loan startup. However, there are also founders
vances in innovation. and 4G have considerably enhanced 2011 over 2010, driven by
cross platform capabilities and share What is not realized, if one has a who have plunked their hands on
From being a voice only device, user experience on the other hand. increasing demand from
content regardless of the recipients company, one is in some way or the every possible domain. Gautam Rage,
the ‘mobile’ is now a personal data and However, this convenience of personal smaller cities in the coun-
phone make. other involved in selling whether in a Founder and Director of Josh Software
media repository. It is hard to find a content creation and sharing is not try, according to research
Mobile phones have transformed conventional or in an unconventional quickly pinpoints, “We make sure that
device in the market that does not have without limitations. firm Gartner. The desk-
how we communicate. Now the sec- way. The deterring factor is always either me or the other co-founder are
a high resolution camera, and a pow- Race to grab the biggest market based PC market will grow
ond wave of innovation using Mobile about doing for the first time. “They the only ones who become the face of
erful processor. Being a convenient share, has led device manufacturers five percent totalling 7.2
phone as platform will transform are initially hesitant as it takes time to the company while doing sales. Infact,
handheld device with such capabili- to focus on improving networking million units year-on-year,
how we use computational abilities move out of their comfort zone,” says at times, we tend to work on the prod-
ties, the mobile has ushered in an era and data sharing among their own de- while mobile PC shipments
in our day-to-day activities. The Abhishek Goyal, Associate at Accel uct development, do the coding and at
of information and content creation vices, while inter-platform data shar- will grow 61 percent with
scope of innovation in this space ap- Partners. They move forward with a the same time make time for proper re-
and sharing such as never before. I can ing remains unaddressed. The 5.9 million units.
pears limit-less. si better goal in mind and as their hands search to pitch in for sales”. si
snap pictures on my holiday trip and industry has several hardware and

siliconindia
|24|
January 2010 siliconindia
|25|January 2011
Technology: By Gary Bahadur
The author is CEO, KRAA Security
to read it, so when using social media defamation. Employees have to be 2. Information Classification – You
sites, do not let your employees post in- made aware of the polices on the cor- have to explicitly define what informa-
formation that is confidential. In order to porate brand image, intellectual prop- tion can be shared and what information
block them from doing that, you have to erty, who they friend, who they should not be Tweeted or FaceBooked.
have social media monitoring tools in endorse, customer information, and If your employees do not know how
place to actually know what information other confidential information. Human valuable information is then you cannot
employees are posting on the Internet resource monitoring should be strictly blame them for inadvertently being
Another thing one should not do is post controlled. It can go wrong as was the sucked into the blogosphere.

S
Security Challenges in Using his or her own identifying information case in 2006 when Hewlett Packard il- 3 Keep It professional – If you allow
publicly, such as date of birth, his or her legally used pretexting to gain infor- your employees to Socialize information

Social Media social security number, or an employee


ID number. If a site requires this infor-
mation, 1) it is most likely not a rep-
utable site, and/or 2) one could make
something up or ensure that it is not
mation on employees. A number of
senior managers were in trouble over
the poor judgment in how to manage
employee monitoring.
Social media usage is being retro-
about your company, you have to give
them standards to follow. Things like
cursing, grammar mistakes, casual con-
versation style discussions might not be
the image you want to portray when dis-
ocial media sites have ment. While these applications can open all of one’s accounts if they know the going to be displayed in a profile that fitted into the corporate environment. cussing anything related to your com-
gained popularity in the past up a great many doors for communica- one password. A security breach of one will be public. If your employees post But the consumer is already used to pany.
ten years as a medium to tion, some form of guidance or gover- account could snowball. Passwords too much personal information about using social media in an insecure, “in- 4. Tracking and Monitoring – If you
keep in contact with loved nance is necessary. Because banning the should be complex and change every 90 themselves and your company, this formation must be free” manner. Em- are going to have a policy, you have to
ones, business associates use of such sites is most likely unen- days. Accessing social media sites could entice an attacker to try and gain ployees who have been used to giving have a mechanism for tracking compli-
and friends. However, there can be forceable or impractical, a hospital or should be over SSL and only from access to your company with the infor- up all their information in places such ance, reporting on activity and have con-
drawbacks to the usage of the said media other such entity that must shield private trusted network connections, not coffee mation the employee has posted. as Facebook and Twitter must now be sequences for breaking that policy.
when one is employed in certain career information should at least ask or force shops especially for business purposes! Some information may not be con- retrained to use social media in a whole
fields, such as the healthcare industry. their employees to adhere to some So- When looking at confidential infor- sidered confidential; yet not posting different manner to meet corporate Conclusion
Utilizing social media networks can in- cial Media Policy guidelines. mation, apply the same security require- these items to public social media sites is standards. (Assuming we have a corpo- A baseline set of requirements has to be
advertently give way to the sharing of We can take a lot of security re- ments. A company would let an probably a good idea. This can include rate standard for social media security) agreed upon between IT and HR and
confidential patient information with quirement from traditional IT secu- employee send out confi- anything from rumors, to purchases the But what is a corporate standard for Legal departments to implement a se-
people that may not have a need to know rity practices. For instance, when dential information to company plans on making, anything using social media in an appropriate cure social media strategy. This list of
which would then cause the company to utilizing social networking someone who didn’t about the technology one’s company fashion that does not put the company requirements can include:
violate HIPAA Security Rule compli- sites, one should use separate have authority uses or will use, and any projects the in- at risk? Corporations have not made a  Defining the necessity for monitor-
ance. The compliance risks increase with passwords for the different dividual may be working on. Develop concerted effort to define that secure ing community managers and em-
uncontrolled social media utilization. sites, as an individual and follow practical posting guidelines social media strategy, or even a strategy ployees use of social media
Social Media has become part of the can easily hack and do not share more information than for training their employees in the “cor-  Understand and update security
user community several years ago. is necessary in corporate social media rect” use of social media. A social threats to social media platforms
Today we have social media in the cor- activities. media policy is required to address all used by the company and monitor
porate environment. The main prob- If an employee’s personal posting the concerns about employee posting, employee activity on affected plat-
lem we have is how social media has about the company can be considered training in appropriate usage and mon- forms
evolved. It has evolved to become a defamation or are targeting a customer itoring and reporting of social media  Monitor reaction and change in be-
bottom up approach. By bottom up I or competitor, HR has to know to take activity. havior based on training
mean that the consumer has determined action even if it’s difficult to measure  Monitor sites mentioning the com-
how to use a technology and the corpo- the value of defamation. Laws already Social Media Policy Infrastructure pany
ration is playing catch up. But the social cover the social media posts of em- What is a good starting point for im-  Track tools used by employees in
norms that are appropriate for a con- ployees when it comes to things like plementing a social media policy? Here social media usage
sumer “product” are not appropriate in defamation, confidentiality and intel- is a basic guideline.  Monitor activity of other organiza-
a corporate environment. lectual property theft. There should be 1. Define a policy – You cannot assume tions in your industry
Social media applications are not some level of monitoring off hours employees will do the right thing with-  Monitor and report on what online
just a part of one’s personal lifestyle; postings by employees. out guidance. You already have things communities are saying about your
this has also become incorporated in Employees should be made aware like Expense Policies, Acceptable Use company
the corporate climate. Many places through training and written social Policies, and Internet Use Policies.  Track the influencers in your indus-
use social media applications for media policies that the company will be Write a basic guideline. What’s in that try and those specific to your brand
marketing, file sharing, commu- monitoring for confidential and propri- guideline will vary from company to  Monitor your competitor’s use of
nication, and employee recruit- etary information and activities such as company. social media si

siliconindia
|26|
January 2010 siliconindia
|27|
January 2011
TECHNOLOGY By Tad Lebeck
The author is CTO, Huawei Symantec
With limited resources, many SMBs are who rely on manual methods to access is now attainable; the barriers have in-
forced to be very cost-conscious and it. In addition, many SMBs are scattered deed come down.
might not even have someone on staff across multiple locales, and trying to or- Vendors now recognize that SMBs
dedicated to IT backup. Additionally, IT ganize and access data in multiple loca- constitute a significant constituency,
staff at SMBs may not be able to keep tions and jurisdictions can be a doubly and have therefore scaled their wares
up with the increasing flow of data. impossible task without the right tools. accordingly. The S2600, for instance,
Given the limited resources, many Fourth, SMBs need to utilize re- is both scaled down and scalable, and
SMBs may not have developed system- sources efficiently to squeeze, what they can accommodate between 12 and 96
atic ways to handle backups. Disk space can, out of their investments. This is a SAS or SATA disks. In addition, it of-
is relatively cheap so many SMBs sim- key point in the context of data storage. fers multiple options of host interfaces,
ply buy more disk space on an ad hoc Preventive care is essential in order to including fiber channel (FC), iSCSI, or
basis and neglect to consider the mo- minimize total cost of ownership. Fail- a combination of both. This means that
ment when they might need to perform ure to address storage and recovery is- a SMB can attach multiple servers—
a comprehensive backup. Those who sues with foresight can mean that an mail servers, database servers, file
have had the misfortune of having to re- SMB is one catastrophe away from en- servers, backup servers—and provide
cover data are exposed to the nightmare during a devastating loss of valuable hierarchical storage using either the FC
caused by haphazard backups and the business information. Preventive care is or the iSCSI networking mode.
existence of fragmented information lo- not only prudent, but it is an effective This type of next generation SAN
cated across multiple servers and stor- use of resources that will maximize re- aligns itself perfectly with both the re-
age elements. Lucky SMBs would have turn on investment. sources available to and the needs of
been able to recover data after spending SMBs. The future is now for SMBs:
an excruciating amount of time, while Enterprise level features and solu- enterprise-level data protection that is
many more are confronted with the re- tions at SMB prices cost effective, secure, scalable, energy-
ality that their inadequate backups have Look around the marketplace today, saving, economical, and easy to use,
caused them to permanently lose im- and you will see that a large number of install, and maintain is well within
portant business data. vendors now offer middle-range and reach.
Second, as the amount of data entry-level SANs that are both priced
grows, data protection becomes crucial. and scaled for SMBs. SANs have be- Entry-level SAN solution for SMBs
Backups, as noted above, are vitally im- come commoditized and plummeted Growth of data continues at an expo-
portant, but additional redundancy in- in price while their feature sets have nential rate. Certainly, in the near fu-

A
frastructure is now a necessity, given the gone better and better. It is to the ben- ture, there will be seismic shifts in the
constant inflow of data. It is crucial to efit of SMBs that they learn as much way SMBs approach data storage,
Enterprise Level SAN Features keep the amount of time it takes to re- as they can about the options available management, and protection in order to
cover data in case of a failure (a concept in the market. deal with this reality. SMBs will begin
called “recovery time objective” or Huawei Symantec, for instance, of- to explore virtualization strategies and
and Solutions at SMB Prices RTO) as short as possible so that down- fers the Oceanspace S2600, a next gen- will try to control the tide of data
time is minimal. In addition, it is im- eration storage solution for SMBs that growth using data deduplication. In ad-
storage area network changed the storage landscape and have will balloon to 35 zettabytes or, in other portant to do backups frequently in was designed with the intention of al- dition, cloud computing will play a role
(SAN) comprises the made SANs more important and acces- words, 35 trillion gigabytes. order to minimize the amount of data lowing SMBs to have access to enter- in data storage, as online storage serv-
most powerful technol- sible to SMBs. The first is the recent ex- As a result of this massive growth in that could be lost (commonly known as prise-level technology in one small ices will become more prevalent and
ogy available for block- plosion of digital data, and the second is data, SMBs will face a number of chal- “recovery point objective” or RPO). If a box. It allows SMBs to reduce total affordable going forth.
level storage and has the increasing availability of entry-level, lenges in the coming years as they try to SMB performs a backup at the end of a cost of ownership by buying a piece of That said, it is vitally important that
been used by enterprises for years. For feature-packed SANs that are specially deal with the increasing flow of infor- business day but its system fails in the consolidated equipment that will keep SMBs do not get too lost in the big pic-
many small to medium sized businesses priced and designed for SMBs. mation. middle of the next day, a half day’s both long-term capital expenditures ture or in hypothetical scenarios. SMBs
(SMBs) though, SANs were long out of First, SMBs do not necessarily have worth of valuable data is lost. and operating costs low. Most impor- simply need to look at their data stor-
reach due predominately to their high Managing storage in an age of data standardized data storage, backup, re- Third, data does not necessarily tantly, the S2600 provides superior age, management, and protection situ-
cost. In addition, many SMBs simply explosion covery, or archiving methods. This is equate to useable information unless it data protection with value-added, cost- ations here and now, and ascertain
did not have the need for large amounts According to research firm IDC, the due in part to cost constraints, and due can be easily sorted and readily ac- effective features such as an advanced what is necessary and viable to grow
of scalable storage space and were amount of digital information created, in part to existing behavioral norms. cessed. Without the means to catalog the snapshot interface that enables SMBs their businesses in an efficient manner
therefore able to function adequately captured, or replicated in 2010 will While there is more digital content to growing amount of data, it merely be- to keep RPO and RTO extremely tight. today. The answer lies not in some
using direct-attached storage. amount to 1.2 zettabytes (1.2 trillion gi- handle now more than ever, resources at comes a steadily growing collection of This level of data protection was never complex solution but instead, in an
Two underlying factors have gabytes). By 2020, IDC estimates this SMBs have stayed at the same levels. bits and bytes that can suffocate SMBs before even considered by SMBs, but entry-level, next generation SAN. si

siliconindia
|28|
January 2010 siliconindia
|29|
January 2011
Technology: By Amit Yoran
The author is CEO of NetWitness
 46 percent took one month or Kneber used competing botnet tech- forward-leaning cyber security strategy
longer to detect an advanced nologies – Zeus and Waledac – to pro- must include a comprehensive tech-
threat vide “backup” redundancy. nology architecture committed to net-
 45 percent discovered these The anonymity, flexibility, and work analysis and visibility.
The State of the Cyberstate threats “by accident” complexity of the Internet and the cur-
rent technology landscape favor the ag-
Achieve defense in depth, not pro-
tection in pieces. There must be an ex-
How have organizations found them- gressor and severely challenge the ecutive level commitment within all
2010 In Perspective They remained entrenched in these com- selves in this untenable position, and defender. Unfortunately, the combina- organizations to mapping, understand-
Cybercrime and other politically and eco- panies for more than 18 months, and in why has this evolution of powerful ad- tion of conventional wisdom, designer ing and addressing global business
nomically motivated attacks on public one month alone managed a massive data versaries and unstoppable malware malware, fear mongering, and margin risk, not knee jerk threat protection
and private networks have crossed the theft totaling 75GB of sensitive data. But, seemingly taken them by surprise? Ul- protection has perpetuated a security through point security solutions. Or-
line from a looming threat to a cost of for all that was said to be average about timately, the answer lies in the fact that model that has long been rendered ob- ganizations must deploy solutions that
doing business. The infamous Aurora at- the malware involved in Kneber, and Au- attackers live in an unbounded and rap- solete. are robust, and that offer the agility to
tack on Google, Intel and other compa- rora, these attacks on corporations are idly innovating environment, while adapt and respond to any threat on the
nies underscored both the potency of data representative of new “offensive-in- many security programs have based The Way Forward horizon. The goal is real-time situa-
theft and the acknowledgement by corpo- depth” methodologies that are multilay- success on the inadequate requirements Apart from discussions of specific tional awareness and the variety of an-
rate America that, for now, the battle is ered, multifaceted, advanced threats. of compliance programs or have im- technologies, there are three critical alytics required to detect and thwart
being lost. Recent SEC filings – from plemented security paradigms lacking areas both government and commer- new attacks as they occur.
Google to Northrop Grumman – are now Gaps In Effectiveness agility and headroom for new threat cial organizations must address to Continue to patch the human vul-
including shareholder risk language to Surveys by Verizon and the Ponemon In- vectors. achieve a deeper level in cyber defense nerabilities. All staff must understand
protect corporations in an environment stitute provide insight into what organi- Born in the days of slow moving footing: the true nature of current threat land-
where cyber defense is an inexact science, zations are seeing and doing, in terms of viruses and “inconvenience attacks,” Understand the criticality of detec- scape and be engaged in the process of
and where online pillaging presents ex- the state of cyber security. The survey re- such as distributed denial of service tion in enterprise cyber security strate- identifying real risks to the enterprise,
plosive growth opportunities for adver- sults highlight systemic failures in people, (DDOS) and web site defacements, gies. It would be great if organizations at both policy and technical level. Or-
saries with little upfront investment. process and technology that are too stark many security programs have pro- could implement a silver bullet pre- ganizations must decrease their re-
In 2010 the Kneber botnet, provided a to ignore. Among the most prominent ceeded along a simple, response-stim- vention technology that would kill all liance on blinking lights as an indicator
perfect representation of the state of the findings are: ulus mentality. The goal has been to malware, data leakage, and other un- of a problem and empower everyone
cyberstate. A medium sized instance of  The need for change is compelling attempt to keep pace with attack and wanted network communications. But on the front lines to be an analyst con-
the well-known ZeuS botnet, the opera- (Ponemon Survey): exploit development – an approach that such technologies clearly do not exist tributing to the collective cyber intelli-
tors behind Kneber  81 percent felt that their leadership from inception has relied on tolerance today and will likely never be 100 per- gence of the organization.
slipped past what lacked awareness of the serious- for acceptable losses and collateral cent effective due to the problems
should have been more- ness of advanced threats. damage. In the current doctrine, an at- stated previously in this article. Any Conclusion
than-adequate defenses  Only 32 percent report that their tack had to occur before cyber-defend- The state of the cyberstate became
within over 2,500 current security-enabling tech- ers could conceive of a proper defense, more challenging in 2010, due to an
companies. nologies are adequate to deal with and there was no allowance in this par- increase in better-equipped adver-
the growing threat from unde- adigm for the geometric increases in saries and the lowering limits of pre-
tected malware attack velocity and complexity. ventive technologies. But all is not
 Only 26 percent report that the At the same time, attackers have lost for cyber defenders in govern-
training of their security personnel become more sophisticated, targeted, Indian companies will in- ment and commercial organizations
is adequate to deal with advanced and better financed. Adversary net- crease their budget on infor- in 2011. By making detection a fun-
threats. works are intelligent enough to typi- mation security this year, damental and well-funded security
 Insider threat is compelling too (Ver- cally fly below the detection radar and according to an Ernst & strategy, and leveraging the vast
izon Survey): make effective use of common tech- Young report.The top five amount of network data that can be
 48 percent of data breaches are nology advances – multilayer attacks, priorities for all organisa- recorded, fused, and analyzed in real
caused by insiders redundancy, and both peer to peer and tions, both in India and time, organizations can find every-
 48 percent are the result of privi- cloud computing concepts. Attackers abroad, are business continu- thing from unwanted data leakage by
lege misuse also continue to prey on the weakest ity, data leakage, information misbehaving employees or external
 61 percent were discovered by a link – human nature and good will – to security risk management, attackers, to the kind of zero day mal-
third party versus the victim or- circumvent even the best enterprise compliance with regulatory ware that was previously believed to
ganization defenses. Cases in point, Aurora ini- requirements, and corporate be undetectable. The answers are in
 Detection of advanced threats is low tially breached defenses through a policies. the network – organizations just have
(Ponemon Survey) phishing attack via webmail, and to ask the right questions. si

siliconindia
|30| January 2010 siliconindia
|31| January 2011
Technology: By Anjan Ghosal
The author is President, CEO and Founder, IntelliNet Technologies
player high-definition gaming and
videoconferencing which can become
Levels Description

technology. Both these technologies a major revenue generator for them.


Unmanaged Offload Cellular devices (i.e. phones, dongles) detect the presence of available carrier or

allow data to be moved at a fraction of Another important factor that is


partner hotspots and automatically connect to them after authentication against
the operator’s subscriber database. Traffic is routed directly to the Internet using

the cost – though Wi-Fi can be an order likely to drive up data traffic is India is
the Wi-Fi operator’s infrastructure.

of magnitude cheaper than deploying general internet access from mobile de-
Managed Offload Post authentication, the traffic is routed via an ‘edge’ device that is managed by the

femtocells. vices. While India has a rapidly growing


operator. This edge device allows the operator to ‘control’ the subscriber’s internet
traffic without having to route the traffic back to the core networks. It allows

India has been late to the 3G party mobile subscriber base, the low penetra-
operators to implement volume based billing, enable prepaid subscribers, perform

but is fast catching up. Earlier this year, tion of laptops and personal computers
legal intercept, enforce traffic shaping and policy controls, etc.

seven private operators paid a whop- means that the primary source of internet
Converged Offload In addition to the above establish seamless connectivity with the core network – so
that as required traffic can flow between the two. The enables carriers to deliver

ping $14.6 billion to buy 3G spectrum. access are likely to be mobile devices.
premium content and walled garden services to their subscribers via the Wi-Fi

A number of operators like Reliance Whatever be the driver, the focus on mo- In parallel with the 3G roll out, al- Service (QoS) for mobile data sub-
interface. This is extended to provide seamless handoff between the two networks.

and Tata have already launched their bile data is likely to become a double ternative wireless services are being de- scribers
3G services. As of end of September edged sword, quickly outstripping net- ployed to address the demand for  Seamless transition between 3G and
2010, the wireless subscriber base in work capacity. These factors, coupled wireless Internet services. Companies Wi-Fi – no need for subscribers to
India stood at 687.71 million, second with the limited spectrum allocated to like Tikona, a recent startup, are build- manually register or log in to use the
only to China. However, iSuppli fore- operators in India, may lead to a ‘perfect ing all-IP wireless networks using unli- network
casted that 3G will garner 250 million storm’ where the networks get over- cenced spectrum. The technology,  Utilization of the existing mobile
subscribers by 2012. whelmed. referred to as WI-BRO - a variation of billing and charging infrastructure
While there are similarities be- Operators are already aware of this WiMAX, is built on meshed networking  Subscriber access to secure content
tween India and other 3G enabled na- problem and are actively seeking solu- routes traffic over wired and wirelessly provided by the mobile operators –
tions, there are some very significant tions to this problem using offload tech- meshed access points. The iSuppli study known as “walled garden” services
differences. Due to fierce competition, niques. Femtocells are a valid forecasted a subscriber base for such
voice tariffs in India are one of the low- proposition for them but they are pricey services to reach 19 million by 2012. However, some work must be done
est in the world. The Telecom Regula- and are still not proven in the current de- By deploying a Wi-Fi data offload to implement this functionality. Based
tory Authority of India recently ployments. A more appropriate solution solution, mobile network operators can on the operators’ requirements we have

M
reported a year-over-year decline in for the Indian market is data traffic of- provide: classified them into the following three
Average Revenue per User (ARPU) fload to Wi-Fi networks.  Improved coverage and Quality of categories.
per month of 33.9 percent for GSM With this in mind operators are looking The 3GPP and 3GPP2 standards
Mobile Data Growth in India subscribers and 19.6 percent for at developing Wi-Fi zones of their own bodies have published specifications for
CDMA subscribers. As of June 2010 or partnering with Wi-Fi operators and these techniques and some companies
an Opportunity and a Challenge the ARPU for GSM was Rs. 122 aggregators to see if some of the data have developed products to enable seam-
($2.71) and for CDMA INR 74 can be offloaded to these networks. less integration of Wi-Fi and Cellular net-
($1.64). This can be compared to an Both, Tata Communications and Bharti works. IntelliNet has been actively
obile data continues tions. A recent survey conducted by
ARPU of more than $50.00 for post Airtel have been actively deploying involved in a commercial trial with a
to grow at a phe- One such solution is a ‘small cell’ CA Technologies found that
paid service in the U.S. Hence, to re- hundreds of Wi-Fi hotspots across the leading edge operator in India and the
nomenal rate in approach where operators deploy fem- businesses are losing more
cover their huge investments in 3G, In- country as a service to their broadband initial results are promising.
countries that have tocells in locations with poor cellular than a quarter billion dollars
dian operators will have to increasingly subscribers. BSNL, Reliance and Spec- However, successful deployment of this
already deployed coverage. The data is backhauled via annually due to IT system
look at data services to drive revenue tranet are also offering Wi-Fi Internet solution will require the vendors and the
data centric 3G networks. AT&T for the existing broadband network using downtime with small compa-
growth. access. operators to work closely to implement
example has noted a data growth of standard IP providing a more cost ef- nies suffering the most. North
Indian operators do have a great Vikas Singh, CMO for Telemedia a complete end-to-end solution which
over 5000 percent in just three years. fective data coverage. The alternative American businesses alone re-
track record in generating significant Services at Bharti Airtel was quoted as will not only address the technological
Most of this growth is attributed to solution that is gaining favor is to en- ported a loss of $26.5 billion in
revenue from VAS services like ring saying: “Airtel Wi-Fi hotspots will be aspects but also all the operational issues
high bandwidth video related services able the Wi-Fi radio on the user’s smart revenue each year from IT sys-
back tones, music downloads, SMS strategically located at leading premium in deploying this service such as the in-
like video chat, IP TV and access to phone and deoliver data over that in- tem downtime with the biggest
and a variety of downloadable applica- hotels, hospitals, chains of restaurants, tegration with the backend OSS systems.
video content over sites like YouTube terface rather than over licenced spec- impact on SMBs. Financial
tions. Most of these services are of- coffee shops and corporate buildings This technology will not only assist
on the Internet access. The continued trum like UMTS/3G. Data in this case services are impacted the most
fered through a strong web portal as that are the hub of corporate, commu- operators with 3G licenses offload their
price pressure on data rates together is also backhauled via the pubic Inter- by downtime, with the average
‘premium services’. So it is reasonable nity and social activities. For us, this is excess traffic but also will help operators
with an unprecedented growth in de- net. Studies have shown that the ma- company losing $224,000 or
to assume that as 3G gains momentum, an initiative to increase customer stick- with 2G licenses to provide their sub-
mand has created a major challenge for jority of mobile data is generated by more in revenue each year.
a lot of these services will be supple- iness and enhance average revenue per scribers a 3G-like experience - and do so
operators around the world forcing smart phones in indoor settings which Public-sector organizations are
mented by high bandwidth services user (ARPU) of our broadband cus- at a fraction of the cost of deploying 3G
them to seek ‘unconventional’ solu- make Wi-Fi an excellent data offload impacted the least.
like video sharing, mobile TV, multi- tomer base.” infrastructure. si

siliconindia
|32| January 2010 siliconindia
|33| January 2011
Technology: By Ravi Shankar
The author is Co-Founder & CEO, Navales
SMB owners need to focus on how owners in the near to medium term, The Cloud Security Alliance
to secure their assets and resources given the investments in this space (CSA) was commissioned by HP to
which connect with the cloud and continue to be significant and that conduct a research to detail the po-
are within their control, as a first customers will be made very attrac- tential threats surrounding the use of
step. This will ensure that they have tive offers at throwaway price cloud services. This resulted in the
a more efficient network to securely points. A first step to this will be for research paper, ‘Top Threats to
leverage benefits of the Cloud. the SMB to ensure his connectivity Cloud Computing Report,” where
There is still some distance to go be- with the cloud. information security experts across
fore Cloud is recognized for safety,

SMB owners need to focus on how


till then SMB owners must focus on
taking the first step of securing the
access points at their end to the
to secure their assets and resources
which connect with the cloud and are
cloud.
One of the compelling reasons

within their control

Cloud
that vendors have been using to get
their customers to shift their
processes to a cloud is the freedom
from managing the security of their
data assets. When a customer sub-
scribes to a cloud service, the onus One of the reasons why cloud 29 enterprises, solution providers,
of ensuring the security of this data computing is throwing up challenges and consulting firms shared their

Securing the
gets transferred automatically to the for security is because the data re- feedback about cloud environments.
service provider. sides on a single service provider’s This survey highlighted the follow-
At a time when IT budgets are cloud and can be accessed through ing as the leading threats for cloud
dissolving, this will come as music various shared computing sources. computing:
to the ears of IT managers and CIOs.  Abuse and nefarious use of
But before they pop the champagne cloud computing
they need to bear in mind one fact –  Insecure application program-
just because the service provider is ming interfaces
taking the charge for the security of  Malicious insiders
the data on the cloud, it does not  Shared technology vulnerabili-
mean that they will also take the re- The Indian online advertis- ties

T
sponsibility that the data complies ing market comprising of  Data loss/leakage
to various international regulations. text and display advertising  Account, service and traffic hi-
will grow to 993 crore in jacking
How secure is a cloud? this fiscal from Rs 785 crore  Unknown risk profile
There is no denying that cloud com- in the financial year 2009- In the end, to be able to fully
puting security is considered to be 10, a study says.The total leverage on the benefits of cloud
an issue and vendors of all hues are online display advertising computing it is essential that organ-
he term cloud computing a cloud as it can be hacked into. Oth- trying their best to come up with market is expected to grow izations invest the right resources to
has become ubiquitous in ers feel that the cloud service can act ways to make it completely secure. by 28 percent to touch Rs appropriately secure their data as-
the tech world and even as a wormhole for hackers to attack For instance, Nevales provides 534 crore in 2010-2011 from sets. The cloud service providers
SMB companies are lead- their own networks. SMB owners a security services Rs417 crore in 2009-2010. will definitely do their bit to ensure
ing the pack to opt for But here’s a newsflash for them. platform which is on demand to Banking, Financial Services that the right levels of security is
cloud services. Of course they are con- The cloud can’t be secured. And if you connect securely and access the and Insurance (BFSI) built into their service models. But
cerned about the security implications stop to think about it, is there a need benefits of the cloud. By doing so, emerges as the leader in customers too need to realize the se-
of making the transition to cloud com- to secure it? For a SMB business the SMB company can protect its both text and display adver- curity implications associated to
puting. owner cloud computing is attractive own assets and better leverage tising spends with 24 per- cloud services before they shift the
In fact the perception of threats for from a cost point of view. But on the cloud services. cent in each category. Travel processes to it. After all, it is always
cloud computing is diverse. Some flipside, its security is yet to be proven We believe that the services de- is close behind and FMCG a better to be safe than sorry, espe-
CIOs worry that the data is not safe on convincingly. livered from the cloud will be ex- new entrant to this space. cially where data security is
tremely compelling for SMB concerned. si

siliconindia
|35| January 2011
Technology: By Sanjiv Pande
The author is President - School Learning Solutions, NIIT
and half-baked solutions, at the click which can address the needs of all the has obvious issues of irrelevance to the
of a button. Well meaning and well in- stake holders like students, teachers, curriculum being followed by the
schooling system have shown limited tentioned schools who really want to management etc with a single solu- school.
results. India’s 75000 odd private make a difference to the learning tion. A school as a result has to either
schools account for 7 percent of total ecosystem for their students unfortu- deal with multiple vendors for differ- IT skilling and Change management
institutions but enroll 40 percent of nately end up burning their fingers. It ent solutions or at times develop in- These are perhaps most critical factors
country’s 219 million students. About is therefore extremely important for house solutions. This leaves the school for successfully integrating technol-
142 million children are not in the any institution to be very careful in se- management with the trauma of inte- ogy in the learning ecosystem of a
schooling system. lecting the right technology and con- grating the piecemeal solutions into school. It is easier to get children used

There is a severe
sider its consequences in detail. They their system and sub-optimal utiliza- to technology however the bigger
may not only end up wasting huge tion of resources. challenge is to impact the mindset of
problem of lack of sums of money but also playing with teachers and support staff. A simple

an integrated
the lives of hundreds of young minds Lack of right pedagogy in learning hardware support does not work.
whose future is trusted to a school by solutions Teachers need a specific type of sup-

solution which can


parents. For technology to make sense to its port which may be more academic
users in educational institutions, it is than technical. While office staff may

address the needs of Challenges in successfully integrat-


ing technology solutions in schools:
imperative to have a strong pedagogi-
cal framework. After all it is not about
need detailed training and re-training
on features of a solution. One size
all the stake holders ‘Wonders of technology’ is a theme
For technology to make sense to its users
like students,
that every teacher and every student
would have spent reams of paper writ-
in educational institutions, it is imperative
teachers, manage-
ing on. However we need to under-
stand that technology in itself in to have a strong pedagogical framework
ment etc with a

I
neither a genie nor a master. It is what-

single solution
ever we make out of it. NIIT has been
Successful Integration of Technology in involved in bringing up people and technology but about education. It has does not fit all is the mantra here.
computers together successfully for been observed that off-the shelf tech-
Schools- Opportunities and Challenges over 27 years now. Our work in tech- nology solutions end up impacting the Total Cost of Ownership
Other major business opportunity nology in K-12 education space in learning ecosystem negatively by cre- Many times a school, while going
t is very rightly said that ‘Nothing is permanent but change’. However if exists in the form of tutoring and many India over the past decade has given us ating a passive learning environment. ahead to adopt a solution, overlooks
we look at how the world has changed around us in the last few
mom and pop stores are making merry. some rare insights into kind of chal- Technology over-shadows the real the total cost of owning a solution.
decades, it would be right to say that more than change, the pace at
which change happens, is fascinating to watch. One of the most impor- How much does this appeal to the con- lenges that schools faces in integrating purpose of learning. There may be lots of hidden costs in-
tant contributors to this mind-boggling change and its pace has been science of an interested corporate technology successfully: volved in use of a solution. Sometimes
technology. As in other spheres of human life, the impact of technology in player has to be seen since tutoring is Hardware focus without emphasiz- even if it is considered, the cost is
how we educate our kids or how they educate themselves is also of great sig- looked down upon by many. Lots of Lack of integrated solutions ing on content highly underestimated. These costs
nificance. In this write up we shall dwell a bit on the challenges we face as players are also operating in areas like Schools as a rule always fail to see the Generally schools like to believe that can include hidden costs like higher
well as opportunities that lie ahead of us in integrating technology successfully pre-schooling, school ERP, text- bigger picture while trying to integrate more the hardware, the better is the so- electricity bills, consumables, security
into our learning ecosystem in schools. The focus will be on private schools of books/stationery items and provision ICT into their system. Their approach lution. Nothing can be farther from etc.
India since the govt. K-12 education institutions are still in the infancy stage of other technology enabled learning at best is piecemeal. Normally a truth. Be it in classrooms or in labora-
as far as integrating technology is concerned.
solutions etc. Other business opportu- school spends on setting up a com- tories, the content, is the key to the ef- Obsolescence of technology
nities have just opened up and many puter lab and creates a small computer fectiveness of a solution. Even in the Technology gets outdated very fast. It
School education market in India: a bit deeper we shall know that this players are entering these segments department that takes care of computer case of content schools are led to be- is very important for a school to con-
Opportunity paradox sector may show lots of promise but every day. Technology enabled learn- education program of the school. lieve that more the content the better sider before purchase, which is an ap-
There have been so many studies and challenges over-shadow the hope and ing solutions space has seen a lot of When it comes to automating the it is. This happens to push aggregated propriate technology to invest in.
estimates which have painted a very opportunities that exist. Education excitement in the past few years. More back-office operations, it is seen as a content to un-suspecting schools under Newer technologies are being rolled
rosy picture of India’s School Educa- continues to be a Not-for-Profit in- and more schools are experimenting separate activity and without fail some the garb of covering entire syllabus out which reduce the impact of obso-
tion market. It is currently pegged at dustry in India which makes many with technology solutions to make use local player holds the key to their ad- and all topics. Customers also tend to lescence. It is better if a school goes
more than $40 billion promising a genuinely interested private players of tools that positively impact learning ministration engine. If it comes to in- get carried away by look and feel. One through an extensive exercise of defin-
double digit annual growth rate. So stay away from the core business op- in schools. However, as happens with tegrating technology in classroom needs to understand that quantity of ing the vision and scope of IT integra-
far so good, however anyone who portunity of setting-up and running any great business opportunity, lots of there will be another vendor vying hardware and content in a learning so- tion program and involve other parties
gets smitten by this side of story, brick and mortar schools. At the same small and big entrants try to make a their attention. There is a severe prob- lution is the last thing that a school who can help them in coming up with
needs to be highly careful. If we look time, efforts by Govt. through its quick buck by churning out unmindful lem of lack of an integrated solution should look for. Aggregated content a well defined plan. si

siliconindia
|36| January 2010 siliconindia
|37|
January 2011
Technology: By Rahul Chaudhry
The author is Partner, Lall Lahiri & Salhotra

with certain basic guidelines on data pro- cannot exercise more control over it can go a long way to establish the lia-
tection as provided for under the Euro- than to merely access and manipulate bility of the vendor at the time of a trial

IPR Issues
Cloud Computing
pean Union’s Data Protection Directive. and process the data. or discovery process. Contractual nego-
However, such considerations are not es- tiations also play a vital part in deter-

C
sential for data stored in India and nei- Contractual negotiations mining liability of the parties for
ther is the service provider bound by inter-parte faults and resultant losses.
such regulation. Another question that may be trou-
with a cloud computing
in The question that arises here is how
service provider are impor- blesome for intellectual property own-
does one ensure compliance with the tant in protecting data and ers is related to jurisdiction. Any data
myriad legislative and regulatory stored in a cloud, by its very definition,
frameworks? A form of ‘hybrid system’ is on the Internet and accessible at any
intellectual property. Clari-
loud Computing is the derstood by a business and that steps be ity. Would it be possible, in the event of is required to be formulated and imple- location in any part of the world. How-
fying these issues is the first
new buzzword for busi- taken to overcome the challenges and discontinuation of relationship between mented wherein the regulatory require- step towards establishing a ever, the proprietor of the information is
nesses. While it is not an mitigate the risks presented by it. the vendor and the business or in case of ments of all jurisdictions are taken into relationship with the vendor at one location and so is the server of the
entirely new concept, its The legal issues arising out of cloud technical, financial or other difficulties, account and this can be the best evalua- service provider. Questions of jurisdic-
application to businesses computing can be broadly categorized as for the business to access its information tion and implemented at the stage of tion are bound to arise in such a sce-
in new and unique modes along with the operational, legislative or regulatory, se- through other applications or service contractual negotiations. In certain situations, there exists no nario. Here too, the myriad rules of
scale of adoption of new techniques have curity, third party contractual limitations, providers? It is essential for businesses Security is probably the biggest doubt, such as a cloud computing serv- various jurisdictions have to be taken
made it a fairly current subject. Consider risk allocation or mitigation, and those to consider such a scenario, since there concern for any business. When opera- ice provider owns the infrastructure and into account. The parties can, through
your regular email and social network- relating to jurisdiction. have been several instances of data being tional data is stored online on an out- any applications being run on it, while contract, determine the governing law
ing sites; these are all examples of cloud Operational legal issues concern lost due to technical hitches or due to the sourced server that is accessible in a the user owns the content, data, and re- and jurisdictions. However, in certain
computing in their simplest manner. legal issues that arise from the use of vendor closing up shop. Such contin- controlled manner or otherwise, to mul- sults obtained from using those applica- cases, even this agreement may not be
However, today we see a proliferation of cloud computing services on a day-to- gencies, if provided for and dealt with in tiple users, there is bound to be anxiety tions. However, in cases where results able to oust the jurisdiction of multiple
new tools of cloud computing that have day basis and include concerns such as the contract between the parties can go a among data owners of its safety and are obtained by converging software or courts, especially when legislation in
made businesses turn around and take access to information of the business and long way in eliminating risks and also al- protection from manipulation. For In- by multiple users working on segments this respect specifically provides for ju-
notice of the immense advantages that manner of storage of the said informa- locating liability in case of loss. tellectual Property owners, the anxiety of a work, the questions of ownership of risdiction.
cloud computing has to offer. A range of is greater with respect to the protection IP in the work may become worrisome. Contractual negotiations with a
operations can now be performed on the of valuable data and trade secrets. In ad- While no straitjacketed rule may be pre- cloud computing service provider are of
cloud without the need for capital in-
Cloud computing is an unregulated field with a patchwork dition, legislative and regulatory poli- scribed and it depends on each case, it is immense importance in protecting data
vestments in purchasing, setting up, op- of legislation here and there. Data concerning individuals cies in some cases require certain types important that every business must first and intellectual property over the cloud.
erating, and managing systems within of data to be protected with certain pre- obtain clarity on these issues before data These issues must be clarified, with pro-
the business. scribed standards. In such cases, re- is made available to the vendor. fessional assistance if necessary, as the
of a certain jurisdiction may warrant certain standards that
Cloud computing covers a gamut of
may not be necessary at the jurisdiction where the data is gardless of the location of the server or Risk allocations and mitigation is an first step towards establishing a rela-
services and can broadly be categorized being stored or processed or accessed the service provider, it is essential that important consideration that can mean tionship with the vendor. How much li-
as Software as a Service (SaaS), Infra- the business ensures that these guide- the difference between advantageous ability a vendor accepts for the data and
structure as a Service (IaaS), and Plat- tion. It is imperative that such issues be Legislative and regulatory issues are lines are met. However, every user must use of the cloud computing model or its protection shall be a question of vital
form as a Service (PaaS) modes. All of addressed prior to availing services of a another aspect of cloud computing that ensure that their service provider is reli- disadvantageous. Certain questions of importance in case of breach in the data
these services require storage of infor- service provider and be adequately dealt present an area of considerable ambigu- able and would ensure safety of the risk allocation, such as liability in case or service.
mation, at times of a sensitive nature, in with in the contractual negotiations. ity. Cloud computing as such is an un- data. Here the rule of ‘Caveat Emptor’ of breach of security by a third party, However, it must also be stated that
the ‘cloud’. Businesses have readily em- Also, included in operational issues are regulated field with a patchwork of would prevail. may present difficulties for the business. while cloud computing does in fact
braced these modes of services. As a those of upgrade and vendor lock-in. legislation and regulation in limited ju- Another question that arises is re- The question of who would be liable in present challenges to the business
consequence, an immense quantum of This would imply that the business must risdictions. The problem presented by lated to the ownership of the intellectual such a case, despite adequate safety world, the advantages that it provides
business in innumerable industries and consider as to whether, while perform- this is that data concerning individuals of property in the information. The man- measures by the vendor, is a question are many. The issues concerning intel-
various business operations, from the ing its operations, it would be able to up- a certain jurisdiction may warrant certain ner of storing information and databases that remains unanswered and depends lectual property that arise and the risks
day-to-day mundane tasks to collabora- grade to newer operating procedures and standards that may not be necessary at themselves are copyright protected in upon the law in various countries. It is that emerge for intellectual property
tion and operative tasks, are being per- systems and who, and to what extent, the jurisdiction where the data is being most jurisdictions. The challenge that also essential, for both the business and owners, while being serious, are no
formed ‘in the cloud’. In such a scenario, shall be responsible for the process. stored or processed or accessed. For ex- cloud computing presents is that the the service provider, to ensure that ade- more greater or challenging than those
it is imperative that the legal implications Another operational concern that a ample, any data that relates to nationals data is stored on the service provider’s quate safety measures are taken by it posed by use of the Internet even prior
of using cloud computing services be un- business must consider is data portabil- of the European Union must comply system and the owner of the material and to be transparent about them. This to cloud computing.

siliconindia
|38| January 2010 siliconindia
|39| January 2011
Technology: By Tom Rodgers
nizational hierarchy structures that nies based on a range of variables, in-
can support most organization’s busi- cluding size, influence and growth of
ness requirements. However, it is im- their partner programs. As for Adop-

ERP
portant to mention that most products tion, look to the universe of people
available do not dive deep into the and companies that have downloaded
pool of functionality such as true ca- software:
pacity planning for manufacturers.
Commercial Versions Generally
Integrating with Other Software Payoff

OpenSource
As most Open Source ERPs are built To ensure peace-of-mind, we recom-
on modern and mature Open Source mend the adoption of Commercial
architecture, the services they employ Open Source ERP (or Enterprise Edi-

is Ready
for integrating with other software is tion), as opposed to the Community
both open and flexible. Whether a Edition (CE). For a nominal annual
company requires additional features subscription, you would be entitled to
and functionality to support Customer the latest functionality, tested well be-

Willing & Able


Relationship Management and E- fore release and supported by the
Commerce or requires comprehen- company or a representative partner.

F
sive reporting tools, there are robust Adopting commercial Open Source
Open Source options that can be eas- ERP has yielded reduced TCO in ex-
ily, and cost-effectively, integrated cess of 90 percent - truly a com-
with the chosen Open Source ERP, a pelling case for its adoption.
utopian dream with most proprietary
ERPs. You get the Code
Open Source ERPs provide you ac-
or many years Open revenues with multi-location and other ERP Open Source projects such a consistent product that works and a Adoption and Partner Programs cess to the source code. We have all
Source ERP has been qui- country presence and these providers as OpenBravo and ADempiere. Then methodology and toolset that can sup- By definition, Open Source software experienced situations where propri-
etly maturing. With a do a good job of meeting the majority there is OFBiz an Apache project port new functionality when it is re- is a community effort and in many etary ERP companies have been ac-
large following from im- of the functionality requirements with a much different architecture but leased. Not all Open Source cases free. Increasing Enterprise quired with the sole intention of
partial sites like Source- across most industries. Then there strong to those who desire the spe- providers are able to pass this test and adoption of Open Source systems has killing competition or have filed for
Forge.net and Open Source ERP are several Tiers of ERP that accom- cific benefits. Each project or com- this is one of the most important fac- created a niche for Commercial Open Chapter 11, leaving customers with
Guru as well as the sites sponsored by modate the needs of smaller compa- pany has its own approach and focus, tors in Open Source ERP evaluation. Source – Open Source software with no support or an upgrade path! Ac-
Open Source ERP integrators and nies and certain industry niches. but all have a common theme - an Next focus would be on the sta- the support levels and commitments cess to source code ensures that you
commercial Open Source companies, They typically focus on user experi- open technology stack that is easily bility of the technical tools the ERP is that enterprises need, but at a fraction are in control of your ERP system.
the information and collaboration is ence but have the same traits as the accessible and modifiable. While built on. All the software mentioned of the cost associated with proprietary Well, if that isn’t an important differ-
remarkable. The key to ERP is matu- Tier 1 providers – closed systems functionality is broad, typically, it is pass that test, but the approach may tools. Open Source ERP also comes entiator we don’t know what is.
rity and stability. While not all avail- built on proprietary development not as deep as Tier 1 ERP. Is that re- be different in how they have crafted in several flavors from free to com- In summary, Open Source ERP is
able Open Source ERPs are mature, toolkits. That is not to say they can- ally important? It depends, but for their architecture. mercial subscription programs. The ready for thousands of companies
many are and it is those that deserve not be integrated with other software, thousands of companies world-wide, subscription programs are typically world-wide. We would recommend
a serious consideration. they can and are every day but it is including SMBs and large Distribu- Functionality managed on behalf of the ERP you do your homework and involve
The world of ERP has been dom- more difficult and requires special- tors, the answer is a resounding NO If you are one of the thousands of provider by partners or VARs (Value a partner that can help you identify,
inated for years by the likes of SAP, ized functional and technical knowl- (it is not that important). companies world-wide that distrib- Added Resellers). The VAR Guy roll out and support the Open Source
Oracle, PeopleSoft and Baan. These edge, all of which adds to the Total Why do we believe Open Source utes or manufactures products and (www.thevarguy.com) ranks Open ERP that is the right fit for your or-
ERP systems are broad and deep in Cost of Ownership (TCO). ERP Is Ready, Willing and Able? services then there are stable and ma- Source software in general and sev- ganization.
functionality, but as we all know, are About 11 years ago an early ture Open Source ERP products that eral of the Open Source ERP products Open Source ERP has come of age
difficult to implement and often ex- adopter of Open Source technology Stability meet your functionality needs. Gen- mentioned earlier in this article make and is Ready, Willing and Able to meet
pensive to support. For the sake of within the ERP space began a jour- First, let’s focus on overall stability. erally speaking you will see all of the the list for the second year. Compiere your business needs. Are you? si
argument we can say these are the ney. Who would have known what For the most part, all of the Open Open Source ERP provide the core and OpenBravo both made the top 25
Order to Cash, Supply Chain and Fi- in a strong group of Open Source About Author
1,000-pound gorillas and are com- would spring from this start. Started Source ERP products mentioned
monly known as Tier 1 ERP. Tier 1 by an ex-Oracle employee, Compiere above are stable. But stability comes nancial functionality in an integrated companies that includes RedHat, Al- Tom Rodgers is Director
software is meant typically for com- ERP began a journey that included in several flavors. Stability means manner. Some, like Compiere, pro- fresco and SugarCRM. The annual of ERP Sales and Services
for CIGNEX
panies that have over $200 million in splits in the road that brought life to that the project or company provides vide robust multi-national and orga- survey tracks Open Source compa-

siliconindia
|40|
January 2010 siliconindia
|41|
January 2011
Technology: By Vinay Singh
The author is CEO, Vital Wires Consulting
from the investment. Implementing an 2. A clear solution strategy and imple- ensuring compliance and manage-
ERP system and fine tuning it to be a mentation plan ment time.
business enabler over a well defined 3. Buy-in and support from company  Control on intended inefficiency –
roadmap requires that the product cho- leadership As the organization grows, visibility
sen by you does not exhaust itself as you 4. Buy-in on the solution features from and transparency is sacrificed. Trust
go beyond operational execution and all function leaders based system leads to scope of mis-
look to enable your strategic insight, 5. Communication strategy for every management. A good ERP system
competitive edges and USPs. Just as it is section of ERP user brings a huge deterrent of audit trail
well understood today that developing a 6. Commitment of right resources to and traceability into the system. This
software system from scratch as your the project leads to crores of money saved over
own ERP is a big waste of energy, choos- 7. Single minded pursuit to finish the a period in material handling itself.
ing a product that covers 75 percent of project on original schedule
your operational execution is similarly 8. A project control procedure that Dr. Mahesh Taneja, AVP- Finance and
imprudent. leaves no room for lack of account- Information Technology at Munjal
Explosive growth and high returns ability and has the ability to incen- Showa and a doctorate in Inventory Op-
come from your ERP system when you tivize everyone involved timization says – “For a company that is
are able to take beyond operational exe- past `50 crores turnover, cost of the best
cution and use for one of following: Where do you get the return on in- ERP solution can be recovered from the
 Operational Excellence vestment from? material handling efficiency itself”.
 Strategic Decision Making  Lower Cost of Operation – Higher Apart from tangible benefits there
 Competitive advantage productivity and efficiency leads to are plenty of intangible benefits. Can we

E
 Scalability Enabler lower cost of operation across the really think of implementing vendor
organization. evaluation or distributor management if
It’s important for the product that you  Higher Serviceability to Customers we can’t measure a few key result areas
choose as your ERP system to be able to – A company that operated at 85 per- accurately in real time. Can we possibly
ERP Implementation for Midsize companies
enable all of the above over a period of cent serviceability ratio to its cus- incentivize our dealer network if our
Necessary Expense or Strategic Investment? time. Most immature ERP products ex- tomers can operate at 95 percent of marketing department’s vision of a re-
haust themselves at the level of Opera- serviceability as a result of collabo- bate system cannot be automated
nterprise Resource Planning for large companies, but a critical enabler quirement is limited while the product tional Execution itself, and leave no rative efficiency between sales, pro- through our ERP system. Is it going to
(ERP) has become quite an for midsize companies as well. For every offered exceeds their specifications in all scope for growing to subsequent steps of duction, quality check and logistics. be possible to sell to an OEM in Europe
established term over last midsize company, not enabling itself ways (including the costs).The gap be- evolution. This translates to 10 percent more if our ERP system does not help us in
couple of decades. For most with a good ERP system today is like try- tween these two needs to be analyzed by revenue collection and proportion- tracing the component supplier in case
of us it means a tool that ing to conduct business without using the companies and SMEs. It is not possi- Implementing the Product well is as im- ate profits year after year. our client had to unfortunately recall its
helps an organization run various func- basic technological tools like emails. ble for the vendor to bring down their portant as the product itself: Implemen-  Higher Throughput – Getting more product. What if my USP is fastest
tions of its day to day operations and also To clarify for the uninitiated, Enter- standards for the sake of the company tation is a crucial exercise in ensuring out of your installed capacity could order-to-delivery, if I cannot make it
help drive strategic decisions. ERP Sys- prise Resource Planning (ERP) is an in- neither is it feasible for the later to up- the success of an ERP initiative. Imple- mean crores of saved capital invest- happen through my ERP system. Can I
tems have the potential to cover a wide tegrated system which facilitates the grade for the sake of the former. So, for mentation process does not mean just ment. With a good ERP product and ever ignore the fact that a core of well
arena from functions as Human Re- required collaborative effort for various a proper management their should be a setting up the transactional parameters a well implemented solution one can defined processes that is embedded into
sources, Supply Chain Management, departments of an organization such as balance between the two. The company and master data for a product so that it optimize its production capacities my ERP system can free my manage-
Customer Relations Management, Fi- marketing, sales, production, quality should discuss with the vendor to analyze can function for a specific company. It’s and coordinate with sales to achieve ment to drive the company to a growth
nancials, Manufacturing functions and management, materials management, lo- the pros and cons of every possibility to a purely business driven exercise of higher throughput. target in four years time that was other-
Warehouse Management functions. gistics, financial accounting and financial match their requirements. bringing about a change and taking the  Faster Inventory Turns – Most man- wise to be achieved in five years time.
Evolution of ERP followed the gen- control. At the very basic level, integra- organization along with it. It’s too elab- ufacturing companies have 70 per- The list of ROI elements goes on. On
eral evolutionary trend of Information tion of such a system helps in ensuring Basics of guaranteeing on the invest- orate a topic to address in a few para- cent of their cost in the raw material. one hand ERP is as necessary to a busi-
Technology (IT). Long ago organizations accuracy of information, productivity, ef- ment graphs but just as a word of caution, Faster inventory turns means signif- ness as an email system. On the other
worldwide started realizing how adop- ficiency, scalability and above all relia- Not every collection of features is an like any other change initiative all the icantly lower amount of working hand a good ERP system can be source
tion of an ERP system makes some of bility. This system unleashes possibility ERP product: ERP is a software prod- following are critical success factors – capital and its cost. of sustainable competitive advantage,
them distinctly competitive and others an of implementing management practices uct. ERP product market has evolved 1. Selection of a worthy partner who  Lower Cost of Compliance – Accu- higher profits and scalability. For an In-
exact opposite. On the other hand ERP that make one organization fundamen- over last two decades to have clear mar- can bring definitiveness to your rate and demonstrable operational dian manufacturer growing beyond
product development over last three tally different from another. ket leaders and a host of other products. project in terms of time lines and execution means higher statutory about `50 crores turnover, having a good
decades has ensured that ERP products The main problem faced by SMEs Choosing the right product is very basic ability to give you the best solution compliance. This translates into sav- ERP solution is a must. The great news is
are not just a competitive differentiator when it comes to ERP is that their re- to ensuring that one gets highest return for your business ing significant amount of money on that it is actually a wealth creator. si

siliconindia
|42|
January 2010 siliconindia
|43|
January 2011
Technology: By Kartik Shahani
The author is Country Manager – India & SAARC, RSA
providers, they effectively give up tally alters the way business and IT parency at the bottom-most layers of the
some control over their information systems function. Creating secure cloud by developing the standards, tools
infrastructure and processes, even partitions between co-resident and linkages to monitor and prove that
while they are required to bear VMs has proven challenging for the cloud’s physical and virtual ma-
greater responsibility for data con- many cloud providers. Challenges chines are actually performing as they
fidentiality and compliance. Many range from the unintentional – such should. Verifying what’s happening at
times, the consumer is carried as when a VM’s activities consume the foundational levels of the cloud is
away with the generic statements so much processing power and important for the simple reason that if
of compliance to industry standards memory that it starves co-resident organizations can’t trust the safety of
by the cloud service provider. To VMs of resources – to the deliber- their computing infrastructure, the
satisfy requirements, a generic ately malicious, such as when mal- security of all the data, software and
statement of control compliance ware is injected into the services running on top of that infra-
may not be sufficient. Given that virtualization layer, enabling hos- structure falls into doubt.
organizations have little option but tile parties to monitor and control There’s currently no easy way for
to go by the word of the service all the VMs residing on a system. organizations to monitor actual con-
providers or the service level  Finally, cloud services are typically ditions and operating states within
agreements (SLAs), accountability virtualized, which adds a hypervi- the hardware, hypervisors and vir-
needs to be affixed on all members sor layer to the traditional IT serv- tual machines comprising their
to the contract to ensure there is no ices stack. Any new layer in the clouds. However, cloud providers
breach or lapse of processes services stack introduces new op- and members of the IT Industry are

The next frontier


 Organizations running private collaborating on a conceptual IT
clouds need to factor their cloud framework to integrate the secure

in cloud security
providers’ practices into their over- measurements provided by a hard-
all security and compliance assess- ware root of trust into adjoining hy-

and compliance
ments. For these assessments to be pervisors and virtualization
thorough and reliable, organiza- management software. The resulting

will be to create

C
tions need to learn as much as pos- infrastructure stack would be tied
sible about their cloud providers’ into data analysis tools and a gover-
Secure Cloud Computing security policies, procedures, sys-
transparency at nance, risk & compliance (GRC)

the bottom-most
tems and controls, some of which console, which would contextualize
may be different from or incom- conditions in the cloud’s hardware

layers of the
The future of Information Technology Management patible with their own. Access to and virtualization layers to present a
certain transactions, events and reliable assessment of an organiza-

cloud
loud computing delivers infrastructure, it also makes mitigating Moving to the Cloud audit logs may be crucial for audi- tion’s overall security and compli-
convenient, on-demand risk more complex as it erases the tradi- In order for organizations to move their tors. In a cloud, the accessibility of ance posture. This type of integrated
access to software appli- tional, physical boundaries that help de- high-value business processes and reg- a company to audit security con- hardware-software framework
cations, and services. The fine and protect an organization’s data. ulated data into the cloud, the following trols is low. In many cases, one would make the lowest levels of the
cloud computing para- However, at RSA, we believe that points need to be tackled appropriately may need to rely on the results of cloud’s infrastructure as inspectable,
digm—made possible by sophisticated Cloud Computing will turn the way we and adequately by service providers and an audit performed by an inde- portunities for improving security analyzable and reportable for com-
automation, provisioning and virtual- deliver security inside out. And infor- cloud developers pendent third-party auditor, which and compliance, as well as new pliance as the cloud’s top-most ap-
ization technologies—differs dramati- mation security will enable cloud com-  Organizations have the onus of are made available to all customers. planes of exposure to risks. Organ- plication services layer.
cally from today’s IT model because it puting to take full advantage of the proving, on a continuous and reli-  The cloud introduces new risks re- izations must evaluate the new With this unprecedented level of
decouples data and software from the Internet turning current IT models in- able basis, that the infrastructure sulting from co-residency, which is monitoring opportunities and the visibility, we believe clouds can de-
servers and storage systems running side out as well. This means we can de- supporting their data and processes when different users within a cloud evolving risks presented by the hy- velop the infrastructure-level policy
them and allows IT resources to be dy- liver new waves of efficiency, agility is secure. For this, the IT industry share the same physical equipment pervisor layer and learn to account controls and the end-to-end security
namically allocated and delivered as a and collaboration for organizations of and cloud providers need to de- to run their virtual machines. The for them in policy-setting and com- attestations to handle even the most
service, either in component parts or as all sizes since many of the physical op- velop real-time monitoring solu- adoption of cloud-based services pliance reporting. demanding security requirements for
an integrated whole. erations and roles will converge with tions that provide configurable affects the level of control that an applications and data. Ultimately,
While the cloud provides organiza- virtual machine administrators playing reports of actual conditions within organization has on data security Cloud Security and Compliance – this will enable organizations to take
tions with a more efficient, flexible, the roles of network, storage and server the cloud. within the cloud. The shift toward What the future holds advantage of the cloud’s benefits in
convenient and cost-effective alterna- administrator simultaneously.  When companies outsource parts cloud services is more than just a The next frontier in cloud security and supporting a much broader range of
tive to owning and operating their own of their IT infrastructure to cloud shift in technology. It fundamen- compliance will be to create trans- business processes. si

siliconindia
|44|
January 2010 siliconindia
|45|
January 2011
siTech20 siliconindia
U.S INDEX
Index of the top tech public companies in U.S founded
Stock Price
(US$)Closing
52 Week
HIGH
52 Week
LOW
% CHANGE IN PRICE
4 Weeks 52 Weeks
CAPITALIZATION
In $ Millions
and managed by Indians 11.29.2010
RANK COMPANY
1 Cognizant Tech. CTSH 73 73 42 11 59 22200 From high profile columnists to Innovations in busi-
2 Syntel SYNT 48 53 31 -1 26 1990
3 Juniper Networks JNPR 37 38 22 32 37
ness siliconindia gives you relevant information that
19360
4 SanDisk Corporation SNDK 50 52 25 11 67 11760 truly matters to you.
5 Microchip Tech MCHP 34 36 26 0 17 6430
6 Tibco Software TIBX 20 22 9 0 102 3290
7 Aruba Networks ARUN 21 22 10 -9 91 2080 It also presents bold, forthright and objective views of
8 Isilon Systems* ISLN 34 34 6 21 240 2240
9 Qlogic Corporation QLGC 17 22 14 -6 -11
the trends in the Indian industry.
1790
10 Cavium Networks CAVM 38 40 21 4 57 1690
11 Netezza^ NZAF 19 - - 6 0 1720
12 iGate IGTE 20 25 9 -18 101 1130
13 Ixia XXIA 17 18 7 8 135 1130 We bring you information, ideas and insights to help you
14 NetScout NTCT 23 24 12 9 58 982 pe.
navigate through today's changing business landscape.
15 Infinera Corporation INFN 10 10 6 24 15 1040
16 Magma Design LAVA 5 5 2 21 113 331
17 Sycamore Networks SCMR 21 34 16 -32 -1 593
18 OSI Systems OSIS 37 37 23 5 50 687 With its presence in the tech industry for over a
19 EXL Service holdings EXLS 21 22 15 3 19 629
20 Keynote Systems KEYN 15 9 19 36 136
decade, siliconindia is the most powerful medium to
reach out to the CIOs, CXOs, CEOs, VCs etc. This is why
* Isilon Systems has been acquired by EMC2
^ Netezza has been acquired by IBM and will trade on NYSE henceforth
readers rely on siliconindia. And make sure your

INDIA INDEX
brand catches their eyes, there is no better way to
Stock Price 52 Week 52 Week % CHANGE IN PRICE CAPITALIZATION
secure your future than siliconindia.
Index of the top tech public companies in India INR Closing HIGH LOW 4 Weeks 52 Weeks In Rs. Crore
27.09.2010
RANK COMPANY

1 Infosys Technologies 3033 2070 1040 12 32 173376


2 Tata Consultancy Services 928 943 358 7 52 181493
By subscribing 3 Wipro Ltd 445
now, you'll join the 639 197 12 -24 108893
4 Techwho
elite group of readers Mahindra
receive unbeatable, 776 860 205 18 -16 9715 The only magazine that covers
5
top-quality venture capital news every day. 418
HCL Technologies 352 87 2 25 28444 business, technology, career, and entrepreneurship
ip
6 Mahindra Satyam 96 299 6 19 -20 11347
7 Mphasis 641 732 138 4 -4 13445
for Indian professionals in the U.S.
8 Financial Technologies 1231 1895 382 -11 -7 5670
9 Patni Comp 446 510 94 -18 0 5760
10 GTL Ltd 417 343 187 -1 30 4034 $50 for 12 issues
11 Rolta India 169 206 32 2 -4 2730
12 HCL Infosystems 118 189 63 -5 -24 2582
13 Mindtree 509 641 181 -1 -18 2018
Please send us your cheque to
14 Moser Baer 71 115 40 13 -28 1192 siliconindia Inc, 44790,S Grimmer Blvd, # 202 Fremont, CA - 94538
15 CMC Ltd 1924 1320 257 17 71 2903
16 Polaris Software 171 181 25 1 15 1688 You may call us at 510-440-8249
17 NIIT Ltd 70 78 14 3 0 1148
18 Sasken Communications Technology 192 162 35 -1 20 524
19 Sonata Software 49 35 13 11 34 517 Write to us at: subscription@siliconindia.com
m
20 Subex Systems 52 96 19 0 -44 341

siliconindia
|46| January 2010
Log on to: http://www.siliconindia.com/magazine/subscribe.php
cribe

You might also like