where developers meet development
Friday,October 18,2019


Kaspersky, Quest, Atlassian, Microsoft Vie for India's Top Security Honors

Picture Holder1

It is always difficult to predict the future, but the past and present allows us some insight into trends for the future. Over the last few years, information security has changed and matured, moving out of the shadow of government, the military and academia into a fully fledged commercial field of its own as the commercial importance and economic value of information has multiplied.

Information is reliant on the systems that manage and process it. The future trend for information systems technology is more intelligent information processing (in the form of artificial intelligent bots and agents) and the increased integration and interoperability between systems, languages, and infrastructures. This means a growing reliance on information in society and economy and a subsequent rise in importance of information security.

In the short term, nobody predicts that there will be a termination of information security threats. There will be an escalation of blended combined threats with more destructive payloads—for instance, the development of malware that disables anti-virus software, firewalls, and anti-Trojan horse monitoring programs etc. The measures being taken to protect information will continue to be a cocktail of procedures. Security management must become a core function of IT operations and IT infrastructure management. This is the only way enterprises will transform their security data into actionable business intelligence.

As organisations increasingly rely on the internet for their internal and external business processes, each firm’s security decisions have an impact on the overall security of the information infrastructure for the thousands of suppliers, collaborators, and channel partners that they interact with as part of that firm’s extended enterprise.
Understanding the economics of information security within and across firms will enable us to understand the process by which these enterprises adopt information security mechanisms. This will expose existing drivers and possible incentives to implement a better infrastructure for greater information security. Separately, understanding the risks referred across the extended enterprise is critical to defining a level of information security to minimize those risks, and is a step towards developing a business case for the security needs of the enterprise. Understanding these issues will enable policy makers to make reasoned decisions regarding what policies might be needed for and what policy mechanisms will be effective at promoting an increased level of security in the information infrastructure.

Security Tools Winner at Great Indian Developer Awards 2008: Clemens Utschig, Product Manager for SOA, Oracle Corp, receiving the award from Jesse James Garrett (President, Adaptive Path) and Dilip Thomas (CEO, Saltmarch Media)


Information is now the lifeblood of organisations and businesses—some even argue the economy. In order to grow and thrive, information must be secured. The three most common features of information security that are threatened by both technical and non-technical means are ensuring:

  • Confidentiality: That information is accessible only to those authorised to access it.
  • Integrity: That information is unchanged and in its original format whether it is stored or transmitted, and being able to detect whether information has been tampered with, forged or altered in any way (whether accidentally or intentionally).
  • Authentication: That the source of the information (whether individuals, hardware, or software) can be authenticated as being who they claim to be.
Security Tools Winner at Great Indian Developer Awards 2009: Krishnan Thyagarajan, Managing Director of Quest Software India, receiving the award on behalf of the Quest InTrust team

Saltmarch Media's annual Great Indian Developer Awards honors software products across 12 categories, based on their productivity, innovation excellence, universal usefulness, simplicity, functionality and most importantly on the ground feedback from India’s software developer ecosystem. In the Security Tools category, the final shortlist consists of Microsoft’s Security Essentials, Kaspersky Open Space Security, Microsoft’s Forefront, Quest Software’s In Trust for databases and Atlassian Crowd. Oracle’s SOA Security was the first product to win in this category in 2008 followed by Quest InTrust in the 2009 chapter of the same awards. 

If there is a particular  security tool that you personally endorse to your colleagues or you evangelize about them at the first opportunity you get, here is your chance to vote for it (voting closes April 10 2010) and see it win this prestigious award. Who knows? You could win along with it too. At the end of the voting process, a lucky draw will be conducted and one person will receive a surprise gift from our prize sponsor. So visit the 2010 Great Indian Developer Awards website and cast your vote. It counts!

Register to DeveloperMarch

Be part of DeveloperMarch and get updates on upcoming events. Youcan register with the form below:

Job Title*
Phone Number*
Confirm Password*
E-mail address:*
Your Details:
Your name: *
E-mail address: *
Software Supportby Advanced Millennium Technologies

Advanced Millennium Technologies. Expertise in software development, offering consultancy services, Open source programming, CRM - Customer Relationship Management, CMS - Content Management System , ERP - Enterprise Resource Planning and Ecommerce development, AJAX, PHP, .NET, J2EE, SOA, XSLT, DOJO toolkit development and software testing. A robust onsite-offshore model. A well-defined global delivery model. AMT Outsourcing center. www.amt.inTAROBY - The E-Mail Dashboard for EntrepreneursTaroby is a SaaS based messaging and collaboration suite inbox that enables sharing of email accounts among team members. The unique concept of 'Team Inbox' makes Taroby an excellent enterprise collaboration suite for enterprises. Taroby is an effective tool for CEO's and entrepreneurs to manage multiple departments or manage multiple projects under them. The team inbox gives the entrepreneurs an overview of what is happening their business and give a quick snap shot of the employees who is responcible for handling the tasks/emails. For team members taroby brings in transparency and efficiency in their teams. Taroby improves the internal and external communication in an organization. Using the Taroby's Team Inbox also helps in reducing the usage of disc space and there by helping the enterprises to reduce carbon footprints.