Wondersoft provides innovative biometric and business management solutions for retail and distribution sectors. It offers WhoIsIn, an attendance and leave management software that uses fingerprint biometrics to track employee movement across locations. Major brands have implemented WhoIsIn to accurately monitor attendance. It provides features like random checks, live reports, leave management, and alerts employees of late attendance via SMS. Wondersoft aims to support customers throughout their growth with dedicated support and training.
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
The 10 most trusted biometric companies
1. WONDERSOFTInnovating Electronic Security solutions for Retail and Distribution Sector
Mobile Sector
Implementing Biometric
Security Authentication
in Mobile Phones
www.insightssuccess.in
August 2018
Advance security
process
Biometric Technology
Solutions Aiding the
World to be Secure
THE10MOST
trustedtrusted
Biometric
Companies
Sabhari Shankar
CEO
2.
3.
4. iometrics nowadays is differentiating itself as the most applicable
Btechnology for classifying and verifying people swiftly & steadfastly.
The outcomes of a research conducted revealed that around 60 percent of
the world’s businesses have connected biometric technology to advance
substantiation and enhance the security of key resources.
At its core, biometrics is one of the convenient solution that can suffice the
conditions as well as provide a great deal of interaction to its user. This
technological pitch works by authenticating individuals based on their behavioral
recognition like fingerprints, gait and more.
In recent years, solution providers in biometric are presenting new, reliable and
attractive security solutions for users. It does not only offer a more rigid security
but also effortlessly overcomes the promptness task recurrently practiced by
various establishments with code word authentication.
Biometric security is usually completed with devices that capture & record some
human traits such as vocal sound and fingerprints for use in following personal
credentials. In further words, users must be genuine through anyone of behaviors
above before they can be fixed access to electronic assets. This technique is more
steadfast because the data it provisions for each user is exclusive and so
identification and access is complex enough to prevent the third-party entrée.
As the IoT landscape gets more complex, addressing security challenges also
become sophisticated. Considering recent events, it’s obvious physical &
password tokens are no longer sufficient to stop hackers and other unofficial
access to user information.
It’s clear that because of the unique link to an individual, biometric is particularly
sensitive when compared to secure. However, when protected on-device secure
storage is achieved, we can see the truly great potential. Providing users sense
secure and that biometric authentication remains rapid and active, it’s more than
likely biometric will become the foremost way for users to authenticate with
passwords.
As our lives increasingly exist on technology, it is imperative we can trust the
devices and services we use every day. Therefore, Biometric solution providers
are preparing and supporting multiple security frameworks, both at the software
and hardware level, to deliver best-in-class digital security and facilitate service
deployment in a fragmented market.
Editorial
Biometrics to Secure
Business Assets
Shweta Priyadarshini
Shweta Priyadarshini
6. CoverStory
c o n
Article
Quick Heal:
The Trusted Global
Leader in Securing
the Digital World
WhoIsIn:
An Innovative Biometric
Solution Crafted for Retail
and Distribution Sector
Mobile Sector
Implementing Biometric
Security Authentication
in Mobile Phones
22
Security Arena
Strategies for Healthcare
Organizations to Combat
Cybercrime
34
Advance security
process
Biometric Technology
Solutions Aiding the
World to be Secure
44
08
SMART-I
ELECTRONICS
SYSTEMS
Offering Rock-bottom
Biometric Devices
Inteview With Insights Success
18 28
7. t e n t
20
32
38 46
Kanoe Softwares Limited:
Delivering Cutting-edge
IT Services, Software and
Security Solutions via
Optimization of Quality,
Time & Cost
Tapits Technologies:
Innovating the Way of
Payment Options through
Biometrics
Warden Security Systems:
Making Security More
Convenient, Accurate and
Reliable than Ever Before
Zicom
Spearheading Electronic
Security Industry through
Innovative Solutions
20
32
38
46
Cxo Standpoint
CURRENT TRANDS IN
RFID TECHNOLOGY
40
Expert’s View
INDUSRTY 4.0: Future
of Manufacturing
Technology
26
8. ith technology infiltrating every aspect of modern living and our world becoming increasingly
Wdigitized, protecting confidential information becomes all the more difficult. Passwords and keys
were once considered sufficient to provide data security but now they look increasingly feeble in
the face of sophisticated hacker attacks. In fact, passwords are the weakest link in an organization’s security
system. This is because they are shareable and even those with strong entropy can be cracked by a variety of
methods. This has put the focus on biometric security as it is the only effective way to prove an individual’s
identity. Biometric traits are inherent and unique to each individual and comprise physical and behavioral
characteristics such as fingerprints, face, iris, gait, voice etc. Therefore, biometric security systems can verify
an individual’s identity with utmost accuracy and reliability since biometric traits are part of the individual’s
being.
The journey of our magazine begins with Cover story; Wondersoft is a market leader providing business
management for the retail and distribution sectors. The company is offering specialized, high-quality and
cost-effective solutions to their clients. Implementing cutting-edge technologies like on-premise/SaaS, ERP
integrations web, and mobile applications, they are enabling companies to achieve their business goals more
efficiently and professionally.
We have enlisted; Tapits Technologies as a fintech startup company focused towards making technology
easier and accessible to all. Warden Security Systems for its major focus in the distribution of various IT
security products & solutions to system integrator, software developers, and product resellers. Kanoe
Softwares Limited for leading manufacturer, service provider and supplier of biometric devices. Zicom as
the pioneer of electronic security surveillance in India which has evolved into a solution provider platform
by embracing IoT and SaaS services. Also, Adtech systems Ltd, M - Tech India, Mantra Softech,
R.S.Solutions, TRANSLINE TECHNOLOGIES are included.
We have also encompassed some insightful CXO “CURRENT TRANDS IN RFID TECHNOLOGY” by
Abhishek Ramesh Nikam, Director – Marketing & Operations in JMN Infotech.
So, do flip the pages of our magazine to gain the knowledge about the impact of Biometric.
Biometric is the Future of Security
The10Most
trusted Biometric
C o m p a n i e s
11. An Innovative Biometric Solution Crafted
for Retail and Distribution Sector
WHOISIN
‘‘
Our customer relies on us
as a proven solution
provider to operate
a successful business
by embracing innovative
solutions, domain
expertise and a strong
support team
‘‘
12. O
ver the last decade, the biometric market has
evolved immensely due to the rise in real estate
sector, increased customer awareness, and
increasing threat perception. The market is now witnessing
an upsurge from various sectors like BFSI, retail,
manufacturing, infrastructure, along with private and
Government sector participation. Independent researchers
suggest that the Indian biometric market is poised to grow
over two billion USD by 2020 with an estimated CAGR of
over sixteen percent within 2015-2020. This staggering
growth rate has paved the way for industry players to look
out for innovative biometrics technologies and solution to
cater the demand from various sectors.
One such company which has cemented itself as a
prominent player in providing innovative biometric and
business management solutions for retail and distribution
sectors is Wondersoft Private Ltd. Founded in 1996; the
company has built a strong repute over the time in crafting
customized comprehensive solutions as per the requirement
of the clients. Having worked and provided solutions to
more than ten thousand satisfied customers over the past
two decades, Wondersoft has evolved into a matured
and leading provider in the field of biometric
solutions. Along with India, they have a strong
presence in the Middle East either having direct
offices or through partner presence in major cities who
are focused on reselling and supporting the solutions
offered by the company.
Embracing innovative technologies and having a rich
business foundation, it offers specialized, high-quality
and cost-effective solutions to their clients.
Implementing cutting-edge technologies like on-
premise/SaaS, ERP integrations web, and mobile
applications, they are enabling companies to achieve
their business goals more efficiently and
professionally. In the last five years, Wondersoft has
emerged as a leading provider of software products
and solutions for retail and distribution along with
innovative biometric solution provider.
Leading Light of Wondersoft
Mr. Chidambaram and Sabhari Shankar C are the
driving forces of this esteemed organization. Mr.
Chidambaram is a graduate from G.C.T Coimbatore
and also a post-graduate from Anna University. In his
professional career spanning over five decades, he has
an extensive knowledge and valuable experience in
the areas of retailing, distribution, money
management, trading, and finance. By utilizing his
functional knowledge of different software products,
he started developing software by early 1985. Under
his percipient leadership, the company continues to
march ahead on its illustrious journey where he
contributes by providing strategic directions to the
senior leadership team to steer the future growth.
Sabhari Shankar C, a B.Tech from IIT Kharagpur and
also an MS from Minnesota University, USA is the
CEO of Wondersoft. As a visionary, he emphasizes
adopting innovative technologies which can lead to
innovate and offer unique solutions to their clients. His
diverse experience and expertise of over twenty-two
years have helped Wondersoft to attain new heights.
WhoIsIn - Innovative Biometric Solution
The Biometric attendance system has become an
‘‘We do not just make
innovative products
and solutions, we
believe in supporting
customers throughout
the journey of
their growth
13. indispensable part of business organizations. A
comprehensive market study and analysis led to the
innovation of the attendance and leave management
software – WhoIsIn. The time tracking application records
the details in the central database using a USB biometric
fingerprint reader device which is connected to a PC at the
workplace. The USB device can either be connected to the
system or can be wall-mounted anywhere. This
technology helps the management to keep a record of
every employee movement in the organization. Prominent
brands such as Bombay Dyeing, StyleSPA, Aditya Birla,
Wildcraft, and Siyaram’s and others brands have
implemented the application which has showcased
Wondersoft as a matured biometric solution provider in
the industry. Some of the mentionable features integrated
with the application are:
Track Presence
This application is able to collect and consolidate the
attendance data of all the employees located at multiple
locations. This feature helps the HR department to keep a
virtual check on the employees located within or outside
the office premises.
Random Checks
This innovative suite provides the organization to do
random checks on the employees, who are in the
premises. By sending an SMS alert as well as a message
on the system to an individual or a group, the system can
track the time taken to respond to the alert. The system
can collate the data of the report on answered and
unanswered requests and forward to the HR.
Live Consolidated Reports
The application offers customized reports based on
offices, area, region, zone and enterprise levels. These
reports are updated on the web and can be fetched by the
administration as per their requirement.
Roaming Profile
This feature helps to track the detailed movement of the
employee across stores and is quite effective for area
managers, supervisors, drivers, delivery team and others
who often have to officially visit various locations of the
organization.
Late Attendance Alerts
This web-enabled application tracks ‘late’ attendance by
sending an SMS to an employee within thirty minutes of
arriving late, beyond a certain number of such late
occurrences. Additionally, it triggers an SMS alert to the
Manager of the employee escalating the late attendance.
Leave Management
An Employee can initiate leave request by validating his
fingerprint and choosing appropriate dates. An email
notification is sent to his Manager for approval and a
response SMS is sent to the employee. An SMS is sent to
the Manager, from a couple of days prior to the date of
leave, to remind them of the approved absence.
WhoIsIn Mobile App
It captures the GPS coordinates of the location and
employees can mark their attendance on the mobile from
the captured location. Leave management (requests and
approvals) too is handled in the mobile app.
SMS to Employee
For any reasons, if an employee has failed to punch their
attendance or has missed the ‘out’ punch, an SMS alert is
sent to the employee next day. Additionally, SMS alerts
are also sent for birthdays and anniversaries.
Other mentionable products like eShopAid and
Shopaid.Net are available as a web and cloud-based
platforms. Built on the SaaS model, these solutions are
quite effective with retail chains and have been
implemented by major brands like Adidas.
Unique Features of WhoIsIn
Wondersoft launched this unique solution ‘WhoIsIn’ in
2009 and has pioneered in offering the biometric solution
on a SaaS model in India. The solution was implemented
first at StyleSpa – a retail furniture outlet chain. This
solution is specifically designed for retail chains to give
14. them comprehensive information on employee presence
and movement across the entire chain. Other than tracking
attendance, it has features like the central control panel on
the web, payroll integration, overtime calculations etc.
Showcasing Expertise and Competency – Case Study
With more than 120 stores managed by their
professionals, Wildcraft is a market leader in travel
accessories segment. Earlier they had a manual attendance
system which gave a very limited scope for the HR team
based out of Bangalore. As the business spread, they
decided to opt for a technology-driven solution to track
the leave or absence of their employees across all
locations. They adopted WhoIsIn software which provides
data to their HR team and the area managers every day
enabling them to accurately track employee attendance.
WhoIsIn software is implemented at all locations and
ensures employee discipline and productivity.
Achieving Long-Term Success
Supporting the customers throughout their journey of
growth is the USP of Wondersoft. This key philosophy
has assisted the team to deliver an innovative biometric
product like ‘WhoIsIn’ and other prominent business
solutions over the years. The company has drafted key
policies and invested their time and efforts to develop a
cohesive environment which acknowledges the needs of
the clients. They have dedicated customer helpdesk
facility in Chennai which helps to report and resolve the
issues of their clients within stipulated timelines. Training
and refresher sessions for the employees are conducted at
periodic intervals to keep them abreast of the latest
developments and share updates about the product
implementations. The ‘customer-centric’ approach has
driven the group to initiate a long-term professional
relationship with the clients as they motivate the firm to
pursue their innovative practices.
Current Trends in Biometric Industry
Rising data security concerns are resulting in increased
demand for biometrics in various sectors. It has evolved
as a key tool in identity management, assisting multiple
sectors to reduce frauds and integrity concerns. The
increased demand from Government and private players is
driving the biometric companies to develop innovative
authentication technologies that are capable to manage the
extreme level of risks and threats. In today’s world,
biometric technology is leading the electronic security
market as it plays a pivotal role in securing and attaining
data from the users. The major factor enabling the shift
from traditional authentication techniques to biometrics is
the ever-growing need for unique credentials to recognize
individuals that are also less susceptible to theft or loss.
Attributes to success
In a business environment, there are various key elements
which attribute to the success and growth of the company.
Analyzing the requirements, challenges, and feedback
from the customers, it has clearly interpreted the actual
needs and the concerns of the clients. Embracing
innovative technologies, domain expertise and backed by
a dedicated support team, Wondersoft has managed to
cement themselves as a major industry player with a
strong vision for the future.
‘‘‘‘‘ ‘‘‘‘‘The growing need for unique credentials to identify
individuals is the primary factor facilitating the shift
from conventional authentication methods to
innovative biometrics technology
15.
16. Read it FirstRead it First
Subscribe today
Global Subscription
Address :
Country :City : State : Zip :
Date :
CORPORATE OFFICE
Name :
Telephone :
Email :
Insights Success Media and Technology Pvt. Ltd.
Off No. 513 & 510, 5th Flr, Rainbow Plaza, Shivar Chowk,
Pimple Saudagar, Pune, Maharashtra 411017.
Phone - India: 020- 7410079881/ 82/ 83/ 84/ 85
USA: 302-319-9947
Email: info@insightssuccess.in
1 Year.......... Rs. 2500(12 Issues) .... 6 Months ..... (06 Issues) .... Rs. 1300
3 Months .... (03 Issues) .... Rs. 700 1 Month ...... (01 Issue) ..... Rs. 250
Yes I would like to subscribe to Insights Success Magazine.
Cheque should be drawn in favour of : INSIGHTS SUCCESS MEDIA AND TECH PVT. LTD.
17. Management BriefCompany Name
Adtech systems Ltd
adtechindia.com
Adtech Systems Limited is a specialist company in Integrated
Electronic Security Systems started in the year 1992.
M.R. Narayanan
Chairman
Kanoe Softwares Limited
kanoe.com
Kanoe Softwares Limited is a leading manufacturer, service
provider and supplier of biometric devices.
Debjyoti Ray
Founder, Chairman
& Managing Director
M - Tech India
m-techindia.com
M Tech Innovations Ltd, accredited as a leading and certified
RuPay, Visa and Master Card manufacturer from India, offers
high tech and end-to-end solutions.
VM Gandhi
President
Mantra Softech
mantratec.com
Mantra focus is to produce innovative products and provide
services with some salt of innovations.
Hiren K Bhandari
Director
R.S.Solutions.
rssolutionsindia.com
R.S.Solutions is a leading contributor of unique finger
impression center innovation. Its innovative work has
dependably been the key part of Biometrical methodology.
Ravendra singh
CEO
Tapits Technologies
Pvt. Ltd.
tapits.in
Tapits Technologies is a fintech startup company focused
towards making technology easier and accessible to all.
Pratyush Halen
CEO
TRANSLINE
TECHNOLOGIES
(P) LTD.
translineindia.com
Transline has established itself as a market leader in a very
short span of time in various segments of the Enterprise
Solutions. Today it is an IT hub with interests in Human
Identification, Human Safety & Security, IT Infrastructure,
Solar , Software , Education etc.
Arun Gupta
Chairman & MD
Warden Security
Systems Pvt Ltd
wardenindia.com
Warden Security Systems has its major focus in the distribution
of various IT security products & solutions to system
integrator, software developers, and product resellers.
Varun Sachdev
CEO
Wondersoft Private Ltd
wondersoft.in
Wondersoft is a market leader providing business management
for the retail and distribution sectors.
Mr. Chidambaram
Founder
Zicom Electronic
Security Systems Ltd
zicom.com
Zicom is the pioneer of electronic security surveillance in India
which has evolved into a solution provider platform by
embracing IoT and SaaS services.
Pramoud Rao
Managing Director
The10Most
trusted Biometric
C o m p a n i e s
18.
19.
20. The Trusted Global Leader in Securing the Digital World
Kailash Katkar
MD & CEO
|August 201818
Interview With Insights Success
21. IT security in India has advanced to reflect changes in
the wider business environments, including new
products, technology, and regulatory requirements.
While this adds to the complexity, it also provides the
opportunity to re-think and transforms processes, making
them more reliable and trustworthy. To identify future IT
risk possibilities along with effective solutions to keep your
IT security assets safe and secure, QuickHeal is right here
for you.
In an interview with Insights Success, Kailash Katkar,
Managing Director and Chief Executive Officer of Quick
Heal Technologies Limited gave some insightful answers
highlighting the influences made by his company to take IT
security assets to a new level.
Ÿ Brief us about Quick Heal:
Founded in 1995, Quick Heal Technologies Limited is an
Indian company pioneering in IT security software products
and solutions. The co-founders Mr. Kailash Katkar and Mr.
Sanjay Katkar are one of the early pioneers in the Indian
software products industry. Under their leadership, Quick
Heal Technologies began offering anti-virus solutions to a
market that was still new to the term Computer Viruses.
Since its inception, Quick Heal Technologies Limited has
set the industry benchmark for computer security standards
and established itself as one of the leaders in IT security
solutions in India.
Our portfolio includes solutions under the widely
recognized brand names ‘Quick Heal’and ‘Seqrite’across
various operating systems and devices. Quick Heal
currently has over 8.0 million active licenses spread across
more than 80 countries.
Ÿ What kind of Tech Services does Quick Heal provide
that makes you stand out from the competitors?
We provide IT security solutions under two
brands:
Ÿ Quick Heal for retail customers
Ÿ Seqrite for enterprise customers
Ÿ Briefly, tell us about the CEO/Founder of the Quick
Heal
Kailash Katkar is the Managing Director and Chief
Executive Officer of Quick Heal Technologies Limited,
India's leading IT Security Solutions Company. He
transformed Quick Heal from a small one-room,
boot-strapped electrical device repair station to a security
solution empire spread over 80 countries worldwide.
A first generation entrepreneur, Kailash Katkar started his
computer maintenance and hardware peripherals company-
CAT Computer Services in 1991. Along with his brother, he
diversified his core business capabilities into the creation
and development of antivirus solutions and formed Quick
Heal Technologies in 1995. Today, Quick Heal is one of the
leading security solutions in the consumer and SOHO
segments. In 2015, the Katkar brothers rearranged their
brand preference in the enterprise segment and launched
Seqrite - Quick Heal’s Enterprise Security brand.
Under his leadership, Quick Heal has been recognized
among India’s most globally competitive SME, with
business practices at par with global giants, with the
Emerging India Award 2009, organized by ICICI Bank and
CNBC TV 18. The company has stood out as the most
preferred antivirus brand in the Consumer and SOHO
category bagging the CRN Channel Champions award for
six consecutive years, from 2009-2014 and as the most
preferred security solutions in the Enterprise segment for
three consecutive years.
Ÿ Kindly brief us about the unique tactics and
solutions that used in Quick Heal
Each product is designed to simplify IT security
management across the length and depth of devices and on
multiple platforms. They are customized to suit consumers,
small businesses, Government establishments and corporate
houses. Over a span of 22 years the company’s R&D has
focused on computer and network security solutions. The
current portfolio of cloud-based security and advanced
machine learning enabled solutions stop threats, attacks and
malicious traffic before it strikes.
Ÿ How do you work on your long term relationships
with your clients?
At Quick Heal Technologies, customers are at the heart of
everything we do. We strongly believe that the key to
success is building relationships that provide value on a
consistent basis and exceed customer expectations.
Ÿ What are the future advancements of QuickHeal,
and how well equipped are you?
We are at the pivot at the next stage of growth as we
continue to build resilience and increase our competitive
advantages. We are making the right investments in the
building our R&D capabilities and investing in
infrastructure, systems, technology and new products. We
will continue to tap new opportunities in the domestic
market and expand our presence in international market
through consistent brand building initiatives.
preferred security solutions in the Enterprise segment for
three consecutive years.
Ÿ Kindly brief us about the unique tactics and
solutions that used in Quick Heal
Each product is designed to simplify IT
management across the length and depth of devices and on
multiple platforms. They are customized to suit consumers,
small businesses, Government establishments and corporate
houses. Over a span of 22 years the company’
focused on computer and network security solutions.
current portfolio of cloud-based security and advanced
machine learning enabled solutions stop threats, attacks and
various operating systems and devices. Quick Heal
currently has over 8.0 million active licenses spread across
ech Services does Quick Heal provide
om the competitors?
security solutions under two
of the Quick
At Quick Heal
everything we do.
success is building relationships that provide value on a
consistent basis and exceed customer expectations.
echnologies Limited is an
security software products
The co-founders Mr. Kailash Katkar and Mr
Sanjay Katkar are one of the early pioneers in the Indian
software products industry. Under their leadership, Quick
echnologies began offering anti-virus solutions to a
market that was still new to the term Computer Viruses.Viruses.V
Since its inception, Quick Heal Technologies Limited hasTechnologies Limited hasTSince its inception, Quick Heal Technologies Limited hasTechnologies Limited hasT
set the industry benchmark for computer security standards
and established itself as one of the leaders in IT security
Our portfolio includes solutions under the widely
‘Quick Heal’and ‘Seqrite‘Quick Heal’and ‘Seqrite‘Quick Heal’
various operating systems and devices. Quick Heal
currently has over 8.0 million active licenses spread across
ech Services does Quick Heal pr
They are customized to suit consumers,
small businesses, Government establishments and corporate
houses. Over a span of 22 years the company’
focused on computer and network security solutions.
current portfolio of cloud-based security and advanced
machine learning enabled solutions stop threats, attacks and
malicious traffic before it strikes.
Ÿ How do you work on your
with your clients?with your clients?with your
At Quick Heal
everything we do.
set the industry benchmark for computer security standards
security
and ‘Seqrite’across
various operating systems and devices. Quick Heal
houses. Over a span of 22 years the company’
focused on computer and network security solutions.
current portfolio of cloud-based security and advanced
machine learning enabled solutions stop threats, attacks and
malicious traffic before it strikes.
is an
security software products
. Kailash Katkar and Mr.
Sanjay Katkar are one of the early pioneers in the Indian
. Under their leadership, Quick
echnologies began offering anti-virus solutions to a
iruses.
echnologies Limited has
Each product is designed to simplify IT
management across the length and depth of devices and on
security
’across
August 2018| 19
22. Kanoe Softwares Limited:
Delivering Cutting-edge IT Services,
Software and Security Solutions via
Optimization of Quality, Time & Cost
Today there is a global need for security given the
rising instances of security breaches, identity theft
and data hacking. Governments and business alike
are looking for authentication technologies that not only
provide reliable security, but are also extremely difficult to
fake. Biometrics is one such solution that fulfills all these
conditions as well as provides a great deal of convenience
to the users. This technology authenticates individuals
based on their bodily or behavioral characteristics such as
fingerprints, iris, gait etc. and therefore it is extremely
unlikely that intruders can fake the user’s identity.
Founded in 1999, the Kanoe Softwares Limited (KSL) is
a recognized leader in the provision of software solutions
and services with more than 17 years of professional
experience and practical engagement. It is guided by the
philosophy that ensures efficient delivery of cutting-edge IT
services, software and security solutions via Optimization
of Quality, Time & Cost.
With their prominent presence in India as well as a strong
representation in Nairobi-Kenya Wanchai-Hong Kong and
London-UK, KSL has established a strong constellation of
companies with large, diverse customers operating in over
30 countries around the world. Together with the unique
combination of their expertise and premier technologies,
KSL efficiently designs software solutions of any scale and
complexity, while maintaining a customer-centric approach
to delivering quality services in time, every time.
Kanoe is an ISO 9001-2015 certified organization and their
processes are nurtured in the safe hands of highly trained
SIX-SIGMA, ITIL V3, Scrum Master (CSM) Professionals.
They follow CMM Level 3 in their practice and it is their
endeavor to create a working environment where motivated
employees communicate freely and innovations are
encouraged. With Kanoe Softwares, the companies can
optimize productivity and gain a competitive edge needed
to succeed in today’s business environment. They seek to
create value for their Customers.
A Leader with Excellence
Debjyoti Ray (Chairman & Managing Director)
founded Kanoe Softwares in the year 1999. As a first
generation Entrepreneur dealing with IoT and ICT, he
successfully placed his business and its products &
solutions over various sectors and verticals. His aim is to
simplify day-to-day operations and to save time in all
processes by designing tools and platforms optimized for
quality, time and cost.
Debjyoti Ray
Founder, Chairman & MD
20
The10Most
trusted Biometric
C o m p a n i e s
|August 2018
23. Under his expert
guidance, KSL has
designed various
hardware, sensors and
software dashboards to cater
the IT & Security Infrastructure
needs of small and large corporates
organization alike. KSL has also
catered to government organizations,
Defense system of the country,
factories and e-governance platform
for urban and rural setups. He aims to
make the system and processes
controlled which will eventually make
the system profitable to sustain and
improve.
Debjyoti has an in-depth engineering
knowledge of developing a techno-
commercial product & solution. He has
hands-on experience running a small to
mid-size organization and has worked
closely with his management team in
planning, budgeting, product
development, execution, escalation of
entire business ecosystem and in
decision making activities in the
processes like sales & marketing,
business development, risk
management, & quality compliance for
any business to sustain and stand out in
the crowd.
KSL’s Innovative Solutions and
Services
KSL’s solutions and services can be
aggregated into two distinct yet
interrelated categories; Turnkey Project
Management, which covers the entire
project lifecycle from design and
scoping to onsite testing and
implementation, and Professional
Services, which include strategic and
operational technology consultant
support, facilities management, as well
as network and data center
management.
To provide strategic planning for a
robust and cost-effective IT
infrastructure, Kanoe Softwares
Limited offers a bundle of IT solutions
and services based on IoT that can help
design a cost-effective combination of
hardware and software solutions,
systems and process automation,
security policies and procedures. These
solutions are tailored to effectively
meet the requirements of any company
or institution.
Kanoe Softwares has developed
various solutions and systems, out of
which a few are mentioned below:
Ÿ CRMS integrated with Biometric,
AI, Cloud computing and mobile
apps.
Ÿ HRMS integrated with Biometric
and mobile apps.
Ÿ Office Access Control System
integrated with Biometric and
mobile apps.
Ÿ Parking lot management system
integrated with Biometric and
mobile apps.
Ÿ Aadhar Biometric Based office
attendance system
Ÿ USB Biometric based lock &
password system for files, folders,
JPEG, MPEG in PC and online
applications and accounts like
Google, bank, Facebook or any
accounts that require a password to
access.
Ÿ Biometric-based criminal tracking
system, Airmen tracking system for
Airforce integrated with Cloud and
Oracle Golden Gate.
Ÿ Biometric, GPRS & GPS based
Garbage management, Vehicle
management and worker tracking
system integrated with mobile apps.
Ÿ Biometric-based Panchayat
Information Kiosk systems for
Villagers integrated with cloud and
mobile apps.
Ÿ Biometric and CV based driver ‘fit
to drive’ apps integrated with
mobile apps and cloud.
Ÿ Biometric-based fishermen tracking
system for seashore areas.
Ÿ Biometric-based employee
information system integrated with
other allied facilities for a large
campus.
Ÿ Biometric-based self-vending kiosk
for Defense canteen integrated with
payment gateway and cash
accepting modules.
Ÿ Biometric-based ATM and bank
Currency chest-strong room
–access control system.
Ÿ Biometric-based prisoner
information system integrated with
cloud and mobile apps.
Future Advancements
KSL is trying to create a single device
to authenticate your identity by
scanning your finger and identifying
your DNA sequence using your blood
cells. Since the DNA sequence of a
person, obtained from under their skin
is unique, it can be inferred that
duplication of identification
documents, credit card frauds and
identity theft would be virtually
impossible.
We attempt to
achieve Optimization
in all processes by
optimizing the three
parameters that are
crucial for the success
of any company,
viz. Quality, T
ime and Cost
‘‘
‘‘
21August 2018|
25. BIOMETRIC SECURITY
AUTHENTICATION IN MOBILE PHONES
e have to get control of our borders. You can
Wonly do that if you make companies obey the law
and not hire undocumented or illegals. They can
only do that is if they have a social security card that has
biometrics so they know whether the person is legal or
not.”
- Michael Bloomberg, master of business administration
of Cornell Tech.
Today, the world has become more connected with digital
technology with the increasing usage of smart devices
which has given rise to cybercrime and cyber security is
acting predominantly to protect the digitized world from
hackers. These days, the hackers can decode the passwords
and get access over the user’s private information. Further
even the user has to remember the difficult and different
passwords which are set for various accounts to prevent
breach. Biometric technology is used as an identity
authentication and access privilege for almost all security
purposes ranging from the government, military
standpoints, private organizations, healthcare, and telecom
sector.
Nowadays, biometric technology is playing a significant
role in replacing the traditional methods of entering
passwords. This is done with the help of individual
authentication based on the physiological characteristics
like fingerprint, palm veins, face, DNA, palm print, hand
geometry, iris identification, retina and odour/scent. The
identity authentication of the user can also be done with the
behavioral characteristics of typing rhythm, gait, and voice.
Biometric security is the best authentication solutions to
raise the bar of security in the mobile environment. There
are various methods of biometric authentication in the
mobile phones which can ensure high level security to its
users.
Fingerprint Recognition
The process of fingerprint recognition in biometric
authentication has become the most successful trend all
over the globe. The finger patterns are recorded by the
impressions left on the fingerprint reader pad for
verification. Fingerprint attendance has been adopted in
various sectors like hospitals, airports, border security
control, banks, schools, colleges and offices.
Today, several companies are working with new technology
and methods on fingerprint readers to make fingerprint
identification process easier and hassle free. Even certain
hospitals use the scanning and analysis of the sub-thermal
palm vein patterns of their employees which assures
accurate identification, even if there are cuts or abrasions on
the skin. Under any circumstances, the advanced
technology can identify a clear and distortion-free image of
a finger irrespective of whether it is scarred, moist or aged
skin.
Facial Recognition
The facial recognition technology is undergoing a tough
phase in differentiating a photograph and human face. This
flaw is getting recovered with the usage of deep learning
algorithm in artificial intelligence which is a new way of
facial recognition in camera-enabled mobile phones to
compromise on security purposes. This technology is being
implemented by the companies across diverse industries
including healthcare and banking.
Voice Recognition
Voice recognition biometrics can provide a quick response
”
Mobile Sector
23August 2018|
26. to the clients to ensure the persons identification within a fraction of seconds. This process is also cost-effective which
can be integrated into existence Interactive Voice Response Systems (IVRs). In addition to this, the mobile voice
biometric systems also offers a seamless user experience by assuring reliability and security as it can handle the voice
composition which is unique to each customer.
Presently, private sector banks are expanding the usage of voice recognition biometrics which authenticates the customer
based on their speech patterns and allows them to perform transactions through the call center.
Signature Recognition
Signature recognition is a widely put into practice for the authentication of an individual. The process of on-line
signature recognition has been successfully implemented to achieve approx. 80% of accuracy of a user, whereas the off-
line signature recognition contributes very less accuracy identification. It has been decided to implement biometric
signature in the mobile devices through various approaches such as dynamic time warping (DTW), Bayesian Learning,
Hidden Markov model (HMM), Neural Networks and Support Vector Machine (SVM).
This dynamic signature feature is analyzed by the way a particular signature is written instead of the physical appearance
of the signature. The personal digital assistant (PDA) user’s sign in multiple times, their pressure, direction, velocity and
other attributes will be recorded during the approval process.
Iris Recognition
The iris recognition biometrics has been developed to implement in smart devices. A unique pattern of the iris is used
for identifying an individual through a snapshot of his eye which is used as a password for ensuring the security.
The mobile applications for biometric devices are set to revolutionize the cyber security world. At present, plenty of
industries such as healthcare, telecommunication, banking, private companies, institution and military standpoints are
implementing fingerprint recognition to enhance security.
However, the fingerprint recognition has become common and hackers are rapidly finding a path to breach this
technology with the advanced hacking mechanisms. Hence, it is necessary to invest more in research and development of
advanced mobile solutions for biometric devices. The security can be increased by adding the fingerprint recognition
feature with the measurement of blood characteristics and body temperature of the users. Also advancements like
matching the image of the person with the voice modulation to increase the security level of cyber security which can
surely shield the world from cyber threats.
24 |August 2018
27.
28. INDUSRTY 4.0:INDUSRTY 4.0:
Future of Manufacturing Technology
We stand on the brink of a technological
revolution that will fundamentally alter the way
we live, work, and relate to one another. In its
scale, scope, and complexity, the transformation will be
unlike anything humankind has experienced before. We do
not yet know just how it will unfold, but one thing is clear:
the response to it must be integrated and comprehensive,
involving all stakeholders of the global polity, from the
public and private sectors to academia and civil society. The
First Industrial Revolution (1.0) used water and steam
power to mechanize production. The Second (2.0) used
electric power to create mass production. The Third (3.0)
used electronics and information technology to automate
production. Now a Fourth Industrial Revolution (4.0) is
building on the Third, the digital revolution that has been
occurring since the middle of the last century.
It is a term that originated in Germany around 2011. It
describes the next generation of industrial production based
on cyber-physical systems. What exactly does factory 4.0
promise us? Imagine not only fully robotized production
lines, but also very connected. In these so-called “smart
factories”, the production will be flexible enough to
manufacture each part differently according to the need, and
thus to adapt the production in real time according to the
demand. In the 21st century, Industry 4.0 connects the
internet of things (IOT) with manufacturing techniques to
enable systems to share information, analyze it and use it to
guide intelligent actions. It also incorporates cutting-edge
technologies including additive manufacturing (3D
Printing), robotics, artificial intelligence and other cognitive
technologies, advanced materials, and augmented reality.
Make no mistake: the manufacturing sector is in the midst
of a sea change, though its final outcome is far from certain.
Right now, there are still more questions than answers:
What is Industry 4.0 has to do with Manufacturing
Industry? What’s the difference between a “smart” factory
and a dumb one? Is the fourth industrial revolution only for
large original equipment manufacturers (OEMs), or can
small or medium-sized enterprises (SMEs) also benefit?
How will this affect the skills gap? And, most important of
all: When does the revolution begin? The smart factory, also
sometimes called “the factory of the future” is the keystone
of the fourth industrial revolution. Indeed, it’s often
represented as the aggregate of all the Industry 4.0
technologies: cyber-physical systems—physical assets
connected to digital twins—the Industrial Internet of Things
(IIoT), data analytics, additive manufacturing and artificial
intelligence. But what does that actually look like? How
will the smart factories of Industry 4.0 differ from the
“Currently Smart” factories of Industry 3.0? Coming to the
question of what differentiates smart factories from “current
Smart” ones, the answer on a case-by-base basis seems to
be, “Not much.” That’s because the biggest difference
between the current smart factories of today and the smart
factories of tomorrow isn’t what’s inside them, but rather
the network that connects them. If a factory is producing a
quality product, the processes are tuned, the supplier
channel is correctly monitored and everything is running
like a well-oiled machine. I think that factory today and the
factory of the future are, quite frankly, going to look very
similar. This goes back to the point about Industry 4.0 being
more about optimization than invention. Hence,
Optimization is the watchword for Industry 4.0,
emphasizing the role that big data analytics will play. If you
think about it in the medical industry,a doctor gets really
skilled by seeing many patients over a long time. That
enables them to build a strong mental model about what
symptoms lead to what medical condition. And that’s what
we’re doing: trying to increase the number of patients we’re
seeing. However, rather than increasing instrumentation
inside individual facilities, the key is to improve the
interconnections between separate facilities.
We have pretty significant instrumentation already, given
the first wave of technology that was introduced with digital
control systems, but the problem was that the data was
always encapsulated within the four walls of a plant.
Allowing that data to come to a central repository—in a
cloud environment, for instance—where it can be shared
across many plants is what gives us an advantage. That, to
me, is what Industry 4.0 is all about.
New Developments in Manufacturing Nothing defines an
industrial revolution better than the technology involved, so
it’s worth considering what to expect from the machinery
and software of Industry 4.0. Given the sheer scope of
technological change entailed by an industrial revolution,
covering every new development in a single article is
impossible. Instead, let's focus on two areas in particular:
26 |August 2018
29. additive manufacturing and the IIoT. Once again, the fourth
industrial revolution proves to be more about optimization
than innovation. In the case of additive manufacturing, it’s a
matter of improving production and post-production
processes—like heat treatments—and materials, or more
accurately, material selection.
Challenges and opportunities Like the revolutions that
preceded it, the Fourth Industrial Revolution has the
potential to raise global income levels and improve the
quality of life for populations around the world. To date,
those who have gained the most from it have been
consumers able to afford and access the digital world;
technology has made possible new products and services
that increase the efficiency and pleasure of our personal
lives. Ordering a cab, booking a flight, buying a product,
making a payment, listening to music, watching a film, or
playing a game—any of these can now be done remotely. In
the future, technological innovation will also lead to a
supply-side miracle, with long-term gains in efficiency and
productivity. Transportation and communication costs will
drop, logistics and global supply chains will become more
effective, and the cost of trade will diminish, all of which
will open new markets and drive economic growth.
So, when does the revolution 4.0 begin? Unfortunately, if
you’re hoping for something like a date to plug into your
calendar, you’re going to be sorely disappointed. It helps to
remember that the dates for previous industrial revolutions
are merely approximations—it’s not as though on Jan. 1,
1760, there was some official declaration that the industrial
revolution had begun. Revolutions on this scale are never so
simple. Rather than worrying about when Industry 4.0
begins, consider asking yourself a different question: If the
fourth industrial revolution begins tomorrow, will I be
ready? And as you read this article, we already would be at
horizon of Industry 4.0 waiting for big picture to unfold and
experience.
Charudatta M Bodhe
Director
PARAMETRIC TECHNOSOFT
Expert’s View
27August 2018|
30. SMART-I
ELECTRONICS SYSTEMS
Offering Rock-bottom Biometric Devices
As the technology world is
evolving there are more and
more trends and demand in
the field of identity management. All
these trends and demands are
generated from one basic need – the
need for a more accurate and secure
way of identifying an individual.
Biometric technologies can provide a
means for uniquely recognizing
humans based upon one or more
physical or behavioural characteristics
and can be used to establish or verify
personal identity of individuals
previously enrolled.
In an interview with Insights Success,
Ganpat Shinde, CEO/Founder of
Smart-i Electronic Systems Pvt Ltd
gave some insightful answers
highlighting the influences made by
her company to take wellness
programs to a new level.
1. Kindly tell us about your
company.
Founded in year 2006 Mumbai based
Smart-i Electronics Systems Pvt. Ltd.
has been engaged in Development,
Manufacturing and Marketing of
Electronics security systems in B2B
Market in India. From design &
manufacturing to maintenance &
support Smart-i provides total solutions
for Access control, Time Attendance &
Integrated security solutions to meet
the enterprise needs of today’s
organizations. smart-i is one of the
quality providers of biometric security
systems offering core fingerprint
identification solutions. Today,
Biometric is not mere a wordplay it is
considered to be the best and one of the
most secured authentication methods
amongst the other access control
credentials. Keeping this in mind &
with over a decade of experience
smart-i has holistically designed
solutions, comprehensive software
which are been seamlessly
incorporated into various existing
security environments of our clients.
2. What kind of services and
solutions does your company provide
that makes you stand out from the
competitors?
With a strong product development of
more than 12 years we have traveled a
long way in understanding industry
specific needs and enhancing our
solutions. This has helped us to focus
on Physical access control and
Biometric systems as prominent
product verticals for end-to-end
specialised solutions. Smart-i is
catering to various sectors prominent
among them are BFSI,
Pharmaceuticals, Datacentre’s,
Retail/Warehousing with new focus on
Education, Corporates and
Government. Our in-house
development, constant innovations,
stringent quality controls for
manufacturing, advanced machinery &
sound technical resources gives us a
distinctive edge against our
competitors. Not to mention our
healthy network of distribution
partners, system integrators, presales
query redressal & post-sales support
dept. has helped us to expand our reach
and penetrate the marketplace better in
short span of time.
3. What are the current trends
followed by the Biometric
Companies?
With advancements in the field of
biometric technology thanks to UIDAI
Aadhar initiative, India has topped
globally in adoption of biometrics
techniques. The accelerated adoption
of fingerprint recognition in the East, a
widespread consumer technology,
highlights the contrasting perspectives.
Interview With Insights Success
28 |August 2018
31. People in China (40 per cent) are the highest
adopters of fingerprint technology, followed
by India (31 per cent) and then UAE (25 per
cent). But with the advent of online banking
and e-government processes, criminals are
increasingly utilizing sophisticated
technology to counter established security
measures and are becoming harder to track
and contain. Organized crime is now
focusing on data theft, as evidenced in the
numerous scams where important data was
compromised. This is where the current
trends in cutting-edge biometrics could play
an important role. For instance, dummy
fingers with copied fingerprints can bypass a
system with ease. Employee identification
and workforce management becomes faster,
accurate and more efficient with fingerprint
technology. Fingerprint biometrics can
provide both physical access to company
buildings and logical access to internal
resources such as enterprise computers and
systems. On other hand Iris recognition
utilizes the same technology as cameras
coupled with subtle infrared illumination to
reduce the specular reflection from the
convex cornea. This creates detail-rich
images of the intricate structures of the iris.
Nowadays, many fingerprint and iris sensors
come with active quality-control
mechanisms.
4. Briefly, tell us about the
CEO/Founder of the company.
Mr. Ganpat Shinde, CEO/Founder of Smart-i
Electronic Systems Pvt Ltd after doing B.E
in Industrial Electronics from Mumbai
University was actively involved in product
development of various industrial electronic
products. But from 1995, the year ZICOM
Electronic Security Systems Ltd was
founded, Mr. Ganpat Shinde was part of
ZICOM Team, one of the first Indian
Electronic Security product development
and manufacturing company in India. In
year 2000, Mr. Shinde formed an
independent company to manufacture
Access Control products for ZICOM, which subsequently evolved in 2006
as Smart-i Electronics Systems Pvt. Ltd. with in-house product
development and manufacturing setup to serve entire Security System
Integration industry. In Smart-i Mr. Ganpat Shinde spearheads strategic
leadership with focus on key accounts, product management, marketing,
business development, team management as well as sales and business
policy. While Mr. Ganpat Shinde actively takes charge business activities
within Smart-I, Mr. Pankaj Zanwar holds the responsibility as Technical
director consequently being the core brain after every product innovation
in Smart-i, a thorough Versatilist & Technocrat Mr. Pankaj Zanwar is also
Ganpat Shinde
CEO & Founder
29August 2018|
32. the Founder/CEO of iAM Pvt. Ltd the service oriented
group company of which Mr. Ganpat Shinde is also
Director.
5. Kindly brief us about the unique strategies that you
use in your company.
First “Value added innovation” is one of the two major
paths Smart-i Group has adopted at the beginning and is
continuing to strengthen the same. With hoards of
organizations offering rock-bottom bargaining biometric
devices smart-i stringently believed that we will always
indulge “value” over “volume” business. With this strategy
in our mind Smart-i has established state-of-art R&D at
Electronic Estate in Pune. Security needs of each continent
is different, while following global guidelines of
standardization on product level, the solution needs are
going to be customized for “Indian” continent, that is where
precisely Smart-i is going to make difference in future with
our second path which is “Make in India” initiative - a
roadmap by Government of India to encourage indigenous
manufacturing of products. With this in hindsight Smart-i is
expanding its manufacturing capacity with addition of
15000 sq. feet of manufacturing setup at Bhumi World,
Pimplas Thane which is an infrastructure project thanks to
“Make in India” initiative, a smart Industrial Complex
supported by Maharashtra Government. iAM (Integrated
Active Monitoring Pvt. Ltd.) has setup a state-of-art 24x7
Monitoring services Command and Control Room at
Electronic Estate in Pune. With the renewed infrastructure
expansion and quality workforce Smart-i will make deeper
inroads in electronic security market.
6. Kindly brief us about the most satisfactory
experience with a client. What kind of game-changing
services have you provided them?
There are many but the service which we provided to IDFC
bank is the most promising endeavor taken so far. The
IDFC Bank is an Indian banking company with
headquarters in Mumbai that forms part of IDFC, an
integrated infrastructure finance company. With its rising
branches it was integral for them to install a holistic time &
attendance solution. Smart-I therefore installed fingerprint
biometric system with GPRS facility. The objective of using
Biometric Fingerprint Attendance and GPRS System
enabled to monitor the workforce management in 200
remote multi-locations branches/offices of IDFC bank.
7. How do you work on your long-term relationship
with your clients?
Promptness, Trust & Accuracy are core values which smart-
i cherish in providing services to its clients. ZERO
downtime is a buzzword which is not easy to adhere to &
smart-i makes sure that all its systems are constantly
running with precise efficiency as committed to the
costumer. Intelligent integrations, user friendly interfaces,
top notch products are some of the things smart-i works
continuously to maintain harmonious long-term relationship
with its clients. With real time resolution, on ground
support & strong professional ethics Smart-i definitely
creates a niche over other companies.
8. What are the values and factors that you attribute
your success to? Also, suggest the one quote which
adorns your company very well.
Turn customer input into innovation – We are proud of our
methodology for capturing customer input that focuses on
outcomes which has objectively contributed to our majority
success. Mary Barra, CEO of General Motors has said and
we quote “My metric for success can be summed up in one
phrase: earn customers for life.” What we have understood
is that customer teaches you everything, we have to just
listen to him carefully, both what he intends to say and what
he doesn’t. Focusing on Innovations that will help
customers address their concern areas and make them free
to focus on their core Business is what Smart-i believes and
strongly adheres.
9. What are the future advancements of your company
and how well equipped are you?
Smart-I and iAM (Integrated Monitoring services) together
is gearing up to provide both security products and services
to Indian Market. By achieving the synergies of iAM
services & Smart-i product portfolio customers can expect
the best business efficiency that will free them from hassles
and help increase profitability. With emergence of IoT &
continuous software evolution in hindsight Smart-i has
understood the trend that enterprises will be keener on
investing in solutions that can finely integrate and
communicate with each other thus providing ease of
operations and essential scalability. The unique need for
industry specific solutions have enabled Smart-i has to
identify, weave and develop solutions coherent to specific
business security of that particular industry.
30 |August 2018
33.
34. Tapits Technologies:
Innovating the Way of Payment
Options through Biometrics
In the ever-evolving payments industry, advancements
made in the name of added convenience and consumer
preferences typically call for new and improved
security measures. Unfortunately, the enhancements in
cyber security and fraud prevention typically mean less
convenience for consumers making payments and the
businesses accepting them. Now, there’s an authentication
technology that’s transforming the way payments are
processed and improving security at the same time.
Biometrics are changing the game.
Biometrics could add a very valuable layer of security to
the payments we make every day. By using the completely
unique identifiers of the human body, authentication is
much harder to fake. Other great benefits of this technology
include the elimination of need for pins and passwords that
can be easily forgotten and a much faster authentication
process. This new technology even eliminates the need for
an actual card or to be present or physically used.
Leveraging this upcoming technology, Tapits Technologies
has come up with an innovative and disruptive point-of-sale
(POS) device, Fingpay, which allows you to make
payments card-less, cashless and mobile-less.
Tapits is the first company to enable IRIS based biometric
payments. Last year, Tapits successfully completed a pilot
with ICICI Bank at the experience center where employees
did payments authentication using Iris. Now it has been
launched for all clients of Tapits and is running
successfully.
The Company is an expert in providing a cost effective and
secure payment collection solution to their corporate client,
which helped them leverage their existing infrastructure.
They enabled their executives to convert 30% of their cash
collection operations to digital. Cash collection is the most
crucial part for the BFSI companies and Tapits has
contributed significantly to it bringing the ease, speed and
simplicity to it.
Tapits is currently working with various State Governments
to roll out biometric-based payment and banking solutions
across that state’s collection centers. Moreover, they are
Pratyush Halen
CEO
32
The10Most
trusted Biometric
C o m p a n i e s
|August 2018
35. working with an external
organization, leveraging on
their connections and the
shared vision to integrate their
solutions with the state’s system.
The Leading Force
Pratyush Halen, CEO of Tapits
Technologies, has a Bachelor’s in
Computer Science. He started his
career with Amdocs as a software
designer. At Amdocs his team won the
Amdocs Innovation Contest for
developing a USSD based solutions for
the rural sectors in India. This win
fueled his desire to start his own
venture and work in the direction of
servicing the rural sector of India. In
April of 2016, along with Anuraag
Agarwal, he co-founded Tapits
Technologies Pvt Ltd, a biometric
based payments application.
Since then, Pratyush has come a long
way in creating a suite of banking
products and services while juggling
the expectations of multiple Banks. As
the team grew to 22+ members, the
daunting responsibility of creating
internal growth has been a major role
in his profile.
After working incessantly on the
strategic level decisions, the essentials
tasks such as compliance audits bogs
down Pratyush, who ends up working
most Sundays!
Exceptional Services
Tapits technologies was founded with a
mission to bring about digital and
financial inclusion in India. Their
group has come together after personal
stints in digital payments, banking
technology and telecommunications, to
build an innovative, simple and secure
mechanism to enable digital payments
and documentation for the rural India.
Riding on the Aadhaar wave they have
built a suite of products and services to
achieve the mission.
They provide biometric enabled
products like Aadhaar Pay, eSign,
eNACH, AEPS- Cash at POS,
Withdrawal, Deposit, Balance Inquiry
and Mini Statement. They also provide
services like Fund Transfers, Corporate
collection solution, and Merchant
management services.
Their solution provides retail market
customers to make payments bare
pockets. Along with providing
biometric POS devices and complete
solution to accept payments which are
more convenient, fast, simple and
secure.
Their most innovative product,
Fingpay, enables making payments
card less, cashless and mobile-less.
Tapits also does technology consulting
in the FinTech domain, providing
innovative solutions to Banks and
Insurance Companies. It also does
custom solution development based on
the needs of the industry.
Challenges Faced and Opportunities
Gained
The Indian government is increasing
their efforts to push Digital economy
and transactions. The spillover from
their campaigns has increased the
awareness for allied products. Over
1.12 Billion Indians hold an Aadhaar
card and more than 600 Million have
linked their bank accounts with
Aadhaar. These developments have put
Tapits, through its brand Fingpay, in a
favorable position to scale up the
operations in the rural markets.
Though, the major challenge remains
to be consumer education and capacity
building, Tapits is currently evaluating
various partners to help counter this
challenge.
Tapits is the first fintech startup to
receive seed funding from the India’s
top private lender ICICI Bank in
February 2018. Tapits has also
received a grant funding from Catalyst
through USAID for working in the
Financial Inclusion significantly
making an impact in the life of rural
people bringing them access to
banking services.
Future Endeavors
At Tapits, they are venturing into
creating an end-to-end unique solution
for BFSI companies based on
Blockchain and Artificial Intelligence
technology, which will solve the
payment and collection difficulties in
an efficient and a cost effective manner
benefitting the companies as well their
customers.
We are driven
by a passion to help
our clients build
stronger, more agile
and more innovative
businesses
‘‘
‘‘
33August 2018|
36. ver the past few years, the magnitude of threat against healthcare organizations is growing exponentially.
OCurrently, the healthcare industry is striving hard to target the cyber breaches. The Chief Information
Security Officers (CISOs) are becoming smarter and sophisticated to outmaneuver the cybercriminals.
The healthcare organizations are acutely focusing on their IT functions and effectively correlating information to
mitigate the risks of cybercrime. They are consolidating this information from the various vulnerability scanners
to effectively manage and aid their business context. Various foremost healthcare organizations are adopting
cutting-edge cyber security approach, where the senior board arrays the tenor for the organizational operations to
successfully respond to the cyber risks.
Categorizing the Assets
There is a major necessity for the healthcare organizations to understand the cyber security risks for smooth
management of their business context. They need to establish a specific data security team to classify data assets
in association with their business significance. Managing the patient records and keeping in mind the
susceptibilities existing in a client’s desktop would be far less than those present on an acute database server is
very imperative. The healthcare organizations should prioritize the most critical assets which can lead to effective
threat mitigation efforts backing the cyber security. The traditional and upcoming healthcare organizations need to
conceptualize and take firm measures safeguarding the patient data and classifying the assets to certify complete
network security.
Security Arena
34 |August 2018
37. Strategiesfor
HEALTHCAREOrganizations to Combat Cybercrime
Staying Updated to the Latest Threats
The developing world is witnessing severe cyber security threats. This budding cyber security landscape
influences the IT and security squads to stay updated to the latest threats and their respective agents. They need to
successfully predict the attack vectors by educating their staff about the recent scams and threats. The healthcare
organizations should provide their employees with the training based on the security risks in accessing links and
attachments in the email. The healthcare organizations need to abandon the obsolete technology and replace it
with modernized technology that is highly resistant to cybercrime. They need to tremendously engage with the
smart and quick Big Data Analytics to secure gigantic computerized data and converting the unstructured SIEM
data to a specific format for making strategic decision to reduce cybercrime.
Involve Business Acquaintances
The healthcare organizations need to pitch in with additional resources, to ensure information security. These
organizations need to engage the various business associates and merchants for accountable and secured health
information under the Health Insurance Portability and Accountability Act (HIPAA). The business associates can
face direct civil liability for a breach of this act. However, it is the responsibility of the healthcare organization to
confirm that their business associates are maintaining Protected Health Information (PHI) effectively.
35August 2018|
38. Establishing a strong persistent program to monitor business associates gives the health organizations the
threat intelligence they need to guard their business against duplicitous transactions. The affiliation of the
healthcare organizations with the business associates will help them to monitor the new risks, controls, and
the emerging vulnerabilities of the cybercrime.
Implementing Appropriate Controls
The healthcare organizations should implement strict measures to confront and terminate the Bring-your-own-
device (BYOD) programs. They should focus on the execution of the suitable controls around data segregation
and infrastructure security. Constant monitoring practices are required to ensure that the controls are active
and functioning in a desirable manner. The healthcare organizations should influence certain security incident
recognition and response programs to mitigate the cyber security risks. Additionally, operations regarding
crisis management must be integrated into the flexible business strategies. The healthcare organizations need
to implement adaptive technologies to manage identities and to regulate the information being accessed. They
should undertake operations to detect the loopholes and vulnerabilities in the mobile apps that would surely
reduce and support the high grounds of the cyber security.
Monitoring Internal Systems & Logs
The healthcare organizations need to invest in the evolving technologies that enable them to spontaneously
scan and secure data, log data modification activities as they arise, and instantly alert their IT teams about the
fraudulent behavior. These teams must focus on detecting the loopholes with the help of an automated bot or a
specific process that intermittently run through the system, combating the threats. This will help the
organization to spot the vulnerabilities and save time, resolving it before enough damage. Monitoring the logs
is a key component of an organization’s compliance initiatives. This would help the healthcare organizations
to properly audit and prepare a report on the file access which can detect illegal activity by the users and other
major cyber threats.
The Future Innovations
The increasing complexities of IT landscape in the healthcare organizations, the future is critical for the
security teams to choose the exact processes and tools to defend the organization from budding breaches. The
healthcare organizations in the upcoming future are planning to design robust systems and stronger encryption
algorithms to successfully safeguard the cybercrime in the healthcare sector. Soon there will be an
introduction to the new General Data Protection Regulation (GDPR) to replace the age-old Data Protection
Act, which would increase the security of the personal data and also its exploration.
36 |August 2018
39.
40. Warden Security Systems:
Making Security More Convenient, Accurate
and Reliable than Ever Before
With technology infiltrating every aspect of
modern living and our world becoming
increasingly digitized, protecting confidential
information is becoming all the more difficult. Passwords
and keys were once considered sufficient to provide data
security but now they look increasingly feeble in the face of
sophisticated hacker attacks. In fact, passwords are the
weakest link in an organization’s security system. This is
mainly because they are shareable and even those with
strong entropy can be cracked by a variety of methods and
combinations.
The recent reports of network security breaches and identity
thefts further affirm the fact that a strong authentication
method is the need of today’s time. This has put the focus
on biometric security as it is the only effective way to prove
an individual’s identity. Biometric traits are inherent and
unique to each individual and comprise of physical and
behavioral characteristics such as fingerprints, face, iris,
gait, voice etc. Therefore, biometric security systems can
verify an individual’s identity with utmost accuracy and
reliability since biometric traits are part of the individual’s
being.
Cognizant of this fact, Warden Security Systems Pvt Ltd.,
an ISO 9001-2008 certified organization has its major focus
in the distribution of various IT security products &
solutions to system integrator, software developers, and
product resellers.
With an experience of more than a decade, Warden Security
Systems establishes the availability of the same with
customized ready-to-use applications on various platforms
and multiple technologies for security and convenience. As
an independent supplier of Smart Cards, Tags, Labels,
Readers, Biometric Scanners, locks, Firmware devices and
integrated solutions for various applications, the company
has been working in close association with world leaders of
the technology to provide the best and cost-effective
products to their customers.
The Inspirational Force behind Warden
Varun Sachdev, CEO of Warden Security Systems, has
helped the company to grow from a start-up to a leader in
biometric technology and the entry automation system’s
industry. As a CEO, he has spearheaded many strategic
partnership initiatives and played a crucial role in the
Varun Sachdev
CEO
38
The10Most
trusted Biometric
C o m p a n i e s
|August 2018
41. company’s product
development roadmap.
Varun is responsible for
overseeing business development
and marketing activities, building
partnerships, government outreach
and providing senior leadership on
business and policy issues.
His vision is to develop an insightful
and technology-driven business matrix
where success is a process and their
esteemed clients are partners in
growth. “No customer is small to us
and we have a product or a solution
for everyone. We have been constantly
adding new products and on latest
available technology to further
enhance our product portfolio,” says
Varun.
Innovative Services and Solutions
Warden Security Systems is an identity
& security management company that
makes security more convenient,
accurate and reliable than ever before.
Using biometric technology, Warden
enables businesses, global
organizations, and borders to simplify
identity management, resulting in
improved safety and protection.
Providing ready stocks of various
smart cards, readers, scanners, and
accessories for testing, evaluation,
satisfactory pre-sales and post-sales
support have been the key to their
success. This has enabled system
integrator, software developers &
product re-sellers to successfully
integrate the emerging technology
products with their solutions to provide
timely delivery to their clients saving
both time, effort, and in turn gaining a
satisfied client to their ever-growing
client list.
At Warden, each customer and every
project is catered to with utmost care to
meet their requirements at each level of
the project. Warden happens to be a
biometric master when it comes to
protecting your privacy from others.
They use fingerprint, iris, and
behavioural biometrics. Moreover, they
provide a wide range of products to
their customers such as biometric
fingerprint enabled time attendance
system, Access Control Systems, entry
automation systems, Aadhaar enabled
devices, etc.
At Warden, they acknowledge each of
the client’s issues and do a thorough
research and provide a solution, which
can serve their purpose for years to
come and thereby cutting down on
their cost in various sectors of Human
Resource Management across the
company.
They design & develop innovative
products based on complex set of
technologies. This has given Warden
an experience to work on wide range
of platform like Web, Mobile, Desktop
& Embedded. They are possibly the
only company worldwide with the
ability to understand your requirements
and then Design both Hardware &
Software on a wide range of platforms
for Identification, Automation &
Tracking applications.
With almost twelve years of experience
and millions of end users across the
globe, Warden Security Systems
delivers innovative, scalable, and
practical identity management
solutions that increase security and
convenience while saving money,
building accountability and
establishing a trust for governments
and businesses around the world. The
company continues to innovate, build,
and deliver leading-edge enterprise
biometric solutions that transform the
industry and expand the applicability
of biometric technology in the
marketplace.
Upcoming Endeavours
Warden Security Systems Pvt. Ltd is an
MSME Registered organization, which
has its prime focus in manufacturing
and distribution of entry automation
systems and various IT security
products & solutions. Keeping in
consideration the price-sensitive
markets, proper use of technology and
application to support the requirement
of the customer, Warden has developed
cost-effective applications on latest
emerging technology products with
options for upward scalability. It aims
to continue this work and offer quality
products with revolutionary pricing
while leading the way for the socially
conscious business and thereby serving
mankind.
No customer is
small to us
and we have a
product or a
solution
for everyone
‘‘
‘‘
39August 2018|
42. Current Trands In
Rfid
TECHNOLOGY
Abhishek Ramesh Nikam, Director –
Marketing & Operations in JMN Infotech
Pvt. Ltd. He completed his MBA - Marketing
from Mumbai University, having sound
experience in IT Industry, especially in the
arena of Smart Card and RFID Sales. He
has worked with a leading Manufacturers
and System integrator companies of Smart
Cards and RFID during his career. He has
done a quite good work in education,
healthcare and automobile sectors as well
as in a diamond industry with a very unique
solution. He is expert in working as an end
to end solution provider, as well as his skill
set includes project management and
delivery, CRM and account management.
He has successfully marketed, launched
and sold indigenously developed RFID and
Smart Card projects in industry. He has
represented and deployed the solutions on
domestic as well as on international
platforms in different countries across the
globe.
About the Author
Abhishek Nikam
Director – Marketing
& Operations
40 |August 2018
43. hen we talk about an IT sector, RFID (Radio
WFrequency Identification) is an emerging
technology in India & all over the world
now-a-days, especially in education & manufacturing
sectors. AIDC (Automatic Identification & Data capture)
domain is an emerging concept for the era now, which
focuses on identification of each & every item, including
a raw material, finished goods, manufacturing machine,
or an asset of the company – admin assets & IT / non-IT
assets in manufacturing plants.
RFID works on the principal of RFID tag, which has a
memory chip, a reader & antenna, which helps in reading
the tag & the software where it is sent for further
processing. All these mechanism shows the results for
automation on the line of identification.
RFID is broadly categorized in 3 different frequencies –
1. LF – Low frequency OR proximity. This works on a
smaller read range of 2-5 cm distance and 125 Khz.
2. HF – High frequency OR mifare. This works on
13.56 MHz on a same read distance like LF i.e. 2-5
cm. The only difference in LF & HF is that HF chip
has a memory for information writing, whereas LF
chip has no memory.
3. UHF – Ultrahigh frequency. This has a memory in
tag, as well as it works on larger read distance,
starting from 3 meters to 15 meters according to
the tags & readers used.
The actors affecting RFID read range are – metal, water
& human body. Hence, there are special tags are being
manufactured by companies to be used on metal objects.
These tags are either the hard tags which create some
insulation between metal surface & tag chip & help them
give a good read range. Beauty of the metal tags is they
make the entire metal object as their antenna to give a
fantastic read range.
Industries which are adopting RFID in all their processes
are Automobile, Education, Health care & Retail sectors.
Aviation is also using RFID with certain norms of the
industry.
Some of the popular applications of RFID are –
Access control system, Parking management system,
Visitor management system, Asset management system,
Guard patrolling management, RFID based Toll
collection, Library management system, Retail theft
control system, Vehicle tracking system, Supply chain
management, Jewelery management System, Document
management system, Hospital management system,
School management System, E – Certificate, Automobile
industry, RFID yard management, student tracking &
attendance management.
In addition to this, RFID is used across construction,
engineering, the chemical industries, manufacturing,
sugar factories, retail, logistics, and the public sector as
well as many others. However, the value of the various
benefits of RFID is often different in different sectors.
Lower Cost & Higher Productivity
RFID applications can automate the collection of
information about the movement and location of assets,
components, stock or other items; doing this more
quickly, whilst reducing costs and with greater accuracy
and reliability than is possible with manual methods and
with more detail than can be obtained from techniques
such as bar-coding. Data collection can be a by-product
of other activities, eliminating the need for effort in form
filling. Identifying products using RFID is quicker than
barcode scanning or manual entry of product details.
Improved Quality for Data Capture
Using an RFID approach means data can be captured
Cxo Standpoint
41August 2018|
44. rapidly and accurately. Electronic data collection with RFID avoids data transcription errors and avoids
“missed items” when used to collect data on large numbers of items at once.
Reduced Capital Costs
RFID technologies help to lower costs by providing better control of stocks or assets. They can help keep
track of business assets such as test equipment, transport packing, computing technology and other
portable devices.
Better Security
Access control systems using RFID contribute to improved security of business premises. RFID tagging
of stock and assets makes it easier to track inventory “shrinkage” and tags can be used to fight against
product counterfeiting.
Increased Revenues
By reducing stock-outs, by avoiding the credibility gap between notional stock available for orders and
actual stock present in the warehouse, and by offering improved information on product movements to
customers, organizations using RFID can provide a service that creates competitive differentiation and
promotes increased customer satisfaction with the opportunities for higher sales and better margins.
Shorter Processes
Because RFID technologies can be integrated with other manufacturing or supply chain technologies
(automated pallet handling, stock picking systems, etc) the time from order to despatch and delivery can
be reduced.
Improved Regulatory Compliance
Using RFID to control when devices have been inspected or to restrict their movement can form part of a
strategy to address health and safety issues or to satisfy insurers or regulatory bodies that processes are
being followed.
Looking at the above benefits, Indian government as well as private companies is sanctioning separate
budgets for this technology, & even it is being made mandatory in some places. The time is closer, when
every company will be using some or the other application of RFID.
42 |August 2018
47. ike every form of technologies that are known to the
Lhumans, the innovation of the biometric technology
is a boost to the secured world. Currently, these
technologies and their applications are providing a means
for unique recognition of the humans based on their
physical or behavioral characteristics. They also provide
with the advanced degrees of security than other
technologies which are engaged alone. Over the past
decade, the open market for biometrics solutions has
broadened ominously and today, it includes the involvement
of the public and private sector applications worldwide.
Besides, the biometric technologies are predominantly used
in the law enforcement applications, and they are still a
vibrant component of these important applications.
Advancement in Security through Logical Access
Control
The entire security systems are being enhanced with this
emergence of the biometric technology. Logical Access
Control is an application that refers to gain access to a
computer system which may be in the business workspace
or via a secured remote connection from a distant locality.
This application has changed the basic use of traditional
username and password. It also provides the organizations
and its personnel to emplace long and complex passwords.
This also includes the modalities based on recognition
mainly the Fingerprint and the Iris. Secured identity and
swift logging can be attained within seconds with this
application. These applications are easy to handle and can
be connected to the workspace of an organization via a
USB connection, or the sensor can be fixed into the
computer or wireless device itself.
Mitigating Security Weaknesses through Physical Access
Entry
The invention of the Biometric technology has introduced
its application on Physical Access Entry. It refers to giving
an employer access of a corporation or a business access to
secure infrastructure, or even a secure workspace from
within. It has introduced the world with the innovation of
the Smart Cards that are used to mitigate the weaknesses
regarding security. Hand Geometry Recognition and Vein
Pattern Recognition are used in association with the client-
server model to an electromagnetic lock strike. The
Physical Access Entry has a greater capacity to hold
template storage. Such type of technological emergence can
serve the large applications much better. It allows the
efficient processing and verification of the data storing it to
a central server.
Managing the Time and Attendance
Organizations and businesses, serving at any level have to
keep a track on their employees depending upon the hours
they have functioned. However, using manual based
approaches provide a gigantic organizational annoyance.
This is where the use of Biometric technology can play a
vital role in Time and Attendance based applications. This
technology offers centralized control and administrative
operations from within one setting, and the respective tasks
associated with the treating, the workforce can be fully
automated. Also, the electronic recording of the entire clock
in and clock out times of every employee is obtained. This
resolves the issues of the definite swing in the work. The
Biometric technology has eliminated the security threat
modeled by the Buddy Punching. Recognitions based on the
finger, hand geometry, vein pattern are being used in a time
and attendance application.
Upgrading Law Implementation
The only way to strictly identify the dubious is by taking
their fingerprint and circulating that image through a
gigantic catalog. This approach is being satisfied by the
emergence of the Biometric technology including the
Automated Fingerprint Identification System, or also known
as AFIS. To confirm the identity of any suspects or wanted
criminals, the law enforcement organizations across all
stages of the Federal Government are using this technology.
This leads to transfer results of the criminal pursuits to the
requesting law enforcement organizations in less than 24
hours. Dormant fingerprint images can be collected from a
crime sight that can even be stored into the upgraded AFIS
process called the Integrated Automated Fingerprint
Identification System or the IAFIS databases that also
support the remote connectivity via a secured Wi-Fi
connection.
Techniques Enhancing the Surveillance
An established baseline is needed to determine any
abnormal behavior from a particular person or a large group
of people. This base is created by the Biometric technology
by introducing certain techniques that are positively
identifying any known criminal activity. These techniques
include the Overt and Covert type of surveillance, where
the businesses and organizations can know that they are
being observed. These surveillance techniques are used to
prevent the public settings with the deployment of facial
recognition. The Biometric technology enables finding an
individual whose identity can be confirmed, but his/her
locality is unknown through a micro or macro level
surveillance. The innovation of Biometric technology has
integrated the facial recognition technology with the CCTV
camera upgrading the level of surveillance and security
practices.
The future of Biometric technology will lead the world
towards using non-contactless modalities. Further, there
will be development in the common models and metrics for
identity management, critical standards, and interoperability
of electronic traits. The global biometrics market will surely
grow at a rapid pace with the need for improved security
and to mitigate the emerging instances of security breaches,
identify burglary and information hacking.
Advance security process
45August 2018|
48. Zicom
Spearheading Electronic Security
Industry through Innovative Solutions
The Indian security and surveillance market is
witnessing robust growth in the recent years and is
expected to accelerate in the near future. New-age
security systems have become a norm rather than an
exception in today’s environment. As the scope of security
and surveillance has widened, the new-age market has
evolved from analog to digital systems. The emergence of
advanced applications in security products, surveillance has
now also evolved as a tool for gathering business
intelligence and other applications. Independent researchers
suggest that in the last five years, the Indian security
equipment industry has witnessed strong growth of over
twenty-five percent and is expected to grow at eighteen
percent in the forthcoming years.
One such influential name in the field of electronic security
market is Zicom Electronic Security System Ltd.
Founded in 1994; Zicom is the pioneer in offering and
promoting electronic security surveillance in India. The
company has been on the forefront in providing latest
security equipment backed by cutting-edge technology and
innovative services. Rather than selling individual services,
Zicom focuses to offer complete solution to their clients.
This approach has yielded positive results as they have
expanded their reach to four countries and 1023 cities
across India. Over the years, Zicom has evolved as a key
player in the industry with a vast range of premier products
designed with the precision of quality and reliability. Their
wide range of services includes – ‘CCTV Surveillance
System’, ‘Access Control System’, ‘Fire Alarm System’,
‘Fingerprint Locks’, and ‘Remote Managed Services’.
Insightful Leader at Zicom
With over twenty-two years of business acumen, Pramoud
Rao is an exemplary entrepreneur who is leading the
organized electronic security movement as the Managing
Director of Zicom. A chemistry graduate, Pramoud
possesses the qualities of a true business leader and has
always inspired people with his vast experience and
unmatched leadership skills. In his professional career
spanning over two decades, he has always aimed for
success despite facing hurdles, trials, and tribulations in his
journey.
Pramoud Rao
Managing Director
46
The10Most
trusted Biometric
C o m p a n i e s
|August 2018
49. With his wit and
exuberance, he has
succeeded to create a dominant
stature in the security industry. As
a former National President of Fire
and Security Association of India, his
commitment towards fostering value-
based leadership to encourage the
members has been commendable. In
one of the interviews, Pramoud
proudly asserted that “Building an
empire from scratch in a segment
which was non-existent at the time of
inception” was his biggest achievement
of his life.
Innovative Products and Services
Zicom has successfully transformed
from a physical security entity to a
comprehensive IoT and SaaS IT
services business model. From
innovating host of services like
‘eAttend’, ‘eWatch’, ‘eSenseetc’ Zicom
has also pioneered in the vehicle
segment by launching ‘Street Smart’ –
a holistic passenger safety solution.
They are also among the first
companies to foray in providing
‘Aadhar’ based solutions to their
clients. The transformation from a
seller to a ‘customer-centric’ solution
provider has assisted Zicom in multiple
ways. This paradigm shift in their
ideology is the USP of their business as
this culture gets reflected in their
products, services, customer
engagements, and the solutions they
implement.
The Next Big Change
The BFSI sector is witnessing an
enormous demand for security and
surveillance products; however the
suppliers are unable to deliver the high
level of innovative solutions required
by the sector. Zicom has partnered with
key players in this segment to develop
the right set of services and solutions.
This strategy provides value for money
to the clients as well as delivers a high
rate of ROI in terms of productivity.
Zicom emphasizes to build the right
ecosystem of partners, customers and
technology to deliver quality services
in the industry.
Analyzing the Current Trends
With the advent of technology, usage
of biometric solutions has changed
over the last few years. The various
forms of biometrics that’s slated to be
trending are fingerprint, facial
recognition, iris recognition and voice
recognition to name a few. The process
of Aadhar-based biometric
authentication has opened up new
opportunities for the industry. To
minimize unauthenticated access,
sectors like BFSI, consumer
electronics, home security, banks,
attendance management for private and
public offices are embracing biometric
solutions. The Government is also
playing a very dominant role by
implementing the iris biometric
solution in the public distribution
schemes. This helps to reduce the
misuse or loss of subsidy given by
government to a great extent.
Shaping the Future
The electronic security industry is at a
state of proliferation and this is an
interesting period for innovation and
adoption. Witnessing this upsurge in
the market, Zicom is quite optimistic
about the future. The company has
designed aggressive plans of exploring
untouched territories by expanding its
range of products and services. New
growth areas will be the key focus of
Zicom in the upcoming years. They
have identified the industry verticals
with whom they intend to tie up to
extend their dominance in the
electronic security market. Zicom is
already in the process of nurturing
partner ecosystems to replicate the
processes in the market and amplify
the same to a wider base of audience.
Zicom is committed to be the driving
force in the transformation of the
industry.
Zicom has always
been recognized by
the industry for
introducing new
solutions and services
to the customers
‘‘
‘‘
47August 2018|