Market Updates

Apple launched AC Wellness
August, 2018

Apple launched its own primary care health clinics called AC Wellness in February 2018, following Amazon and Warren Buffett’s push into healthcare. Through Apple subsidiary AC Wellness, the tech giant will offer primary-care clinics around Santa Clara County. The clinics will initially serve Apple employees and their families, and one will be at the Apple Park campus in Cupertino, California.

Read More

Digital Transformation driving the Product Engineering Services Market
August, 2018

Evolution of Product Engineering ServicesIn the last 5 years, Product engineering services have witnessed the shift from in-house to outsourcing of various development activities in hardware, embedded,

Read More

Localization of Data Centers
August, 2018

The aggressive push towards a Digital Economy requires a robust governance framework which is steering Indian lawmakers to introduce and revise existing policies, enabling better monitoring and control over perceived risks. With over a quarter of the population using connected devices consuming and generating massive amounts of data, it is paramount to regulate the ownership of data to prevent unauthorized access and loss in the event of a security breach. Recent developments including RBI’s move to make payment system operators to store [...]

Read More

October - National Cyber Security Awareness Month
August, 2018

National Cyber Security Awareness Month (NCSAM) is an annual campaign, which is a collaboration between US Department of Homeland Security and National Cyber Security Alliance launched in October 2004. It’s been 15 years of NCSAM and from the time of inception this effort between the government and industry has grown exponentially. These efforts were made to create awareness about cyber security and focus on American citizen’s needs regarding safety and cybersecurity.Themes for NCSAM 2018&l [...]

Read More

Advanced Persistent Threat - New Threat Landscape
August, 2018

DefinitionIT systems are now facing much more complex threats which are difficult to manage. An advanced persistent threat (APT) is a type of network attack in which an unauthorized person gains access to a network and stays there undetected for a long period of time. APT’s are a combination of multiple types of attack vectors such as malwares, spear phishing, social engineering etc. The origin of the term “advanced persistent threat” emerged from the US government sector in 200 [...]

Read More

Wireless Charging
August, 2018

Expanding battery functioned consumer electronics devices coupled with growing preference for hassle free charging solutions are accelerating the demand for wireless charging solutions.  Wireless power transfer, popularly known as wireless charging, is as technology that enables transmits electromagnetic energy from power source to an electrical load through air gap, Wireless charging is user friendly technology that finds applications ranging from mobile devices to electric car.Inductive coupling and coupled magnetic r [...]

Read More

Network Traffic Analytics - For Identifying Bottlenecks Within Network
August, 2018

DefinitionNetwork traffic analytics utilises data collected from network nodes to generate network traffic reports based on real-time updates. These reports can be further analysed to identify meaningful and actionable network traffic patterns using machine learning models.The collected data is primarily used for 2 routines Behaviour MonitoringNetwork traff [...]

Read More

Identity and Access Management - With Biometrics
August, 2018

Identity and Access Management (IAM) tools, define and manage the access rights of internal and external entities to an organization, thereby creating a secure environment which minimizes the risk of any fraudulent transactions. These tools are enhanced with provisions of multi-tier biometric authentications solutions which include face, fingerprint, voice, iris, and/or other physiological quotient indicators. Additionally, the latest IAM tools are being further enabled with machine learning based behavioural pattern recognition capabilities, t [...]

Read More

Growing Risks of Distributed Denial of Service (DDoS) Attacks
August, 2018

Distributed Denial of Service (DDoS) is a form of cyber-attack in which multiple systems are used to interrupt normal traffic of a targeted network or server and makes it impossible to deliver a service. DDoS attacks had grown at a CAGR of more than 65% over past 5 years and is still expected to grow for next few years. Number of DDoS attacks which were observed were higher in Europe and APAC as compared to other regions.DDoS Attacks can be majorly divided into 3 categories< [...]

Read More

AkzoNobel acquires Polinox
August, 2018

AkzoNobel finalised the acquiring of Brazilian ketone peroxide producer Polinox. The acquisition will be completed in the forth quarter of this year. The presence of AkzoNobel will expand in South America making it one of the leading producer for curing system which is utilized for polyester thermostat resin.AkzoNobel has invested €180 million in past three years to serve their customer base better through constant innovation, technology update, increasing capacity. The deal says the production know how and the cus [...]

Read More