SlideShare una empresa de Scribd logo
1 de 4
Times            May 2012




                                                                                           News
                                                               KEY WINS
                                                               NEC HCL ST
Greetings to everyone!!                                             Collaboration Redefined
Welcome to yet another interesting edition of Progressive
                                                               NEC HCL ST, Noida
Times which we are restarting after a break of few months.
Perhaps the timing is great as we begin the financial year     Progressive has bagged an imperative project from NEC
unveiling our new go to market strategy around                 HCL for Network Reengineering. As part of the project,
Consulting, Solutions and Outsourcing. The entire play has     Progressive will design & implement the complete Network
to be around engaging and adding value and not "selling".      Infrastructure based on CISCO Products.

To begin with we have our focus will on following four
irreversible trends that includes Cloud, Mobility,
Information Management and Outsourcing which stress
the importance for IT to leverage technology and
automation. It's clear we've only scratched the surface        Ericsson, Gurgaon
when it comes to the ability of technology to drive better     Progressive has bagged an imperative projects From
top-and bottom-line growth. However, it will take a high       Ericsson for Bharti Airtel :
discipline and perseverance to get it right.                   1. EIR (Equipment Identity Registry). As part of the project,
Today, technology advances so fast that the potential for      Progressive will implement & support HP Server & storage
improvement is tremendous and ultimately what matters is       across eight locations of Bharti Airtel in India.
only Excellence. We must always remain impatient to do         2. ADC (Advance Device Configuration). As part of the
better for our customers. And to keep this I have              project, Progressive will implement &support HP Server for
reorganized the management team around our core                Bharti Airtel in India.
products to improve responsibility and accountability
across Progressive. Hence emphasis would be more to
                                                               KEY ANNOUNCEMENTS
increase our velocity, improve our execution and focus on
the big bets that will makes a difference.                     As technology continues to
                                                               drive business productivity and
We are delighted to have two experienced campaigners to        competitiveness, the role of the
our Progressive family-Anil Zuitshi (Director Sales-           geek becomes increasingly
Enterprise) and Sheeba Hasnain (Business Development           critical. Organization that
Manager-Middle East). I admire the capabilities of my team     attracts and retains the
and have the confidence that we will reach to the pinnacle     best geeks wins in this
by remaining focused on what we deliver.                       environment. From this quarter, we are delighted to
Last but not least, I would like to give this message to the   announce an award to increase the motivation and
entire Progressive family in these changing economic           enthusiasm of the intricate technological knowledge work
landscape remember two things-Focus on customer                that geeks perform.
experience and execute with financial discipline.
Wishing you a great FY 2012-13!


Prateek Garg
Times


SOLUTIONS
Network Security                                                                  Fig. 2 depicts the financial impact on organizations over
                                                                                  last 12 months.
In today's dynamic environment, network security becomes
a priority for any organization. Network Security is all about                  Cannot determine                                                16%
protecting all the valuable assets to maintain the                        More than $10,000,000         1%
intellectual property of the company and ensure smooth                  $5,000,001 to $10,000,000      0%
operation. Hence it becomes a mandate for any                           $2,500,001 to $5,000,000                 3%
organization to have a sound network security strategy                  $1,000,001 to $2,500,000                                              15%
which will uncover threats and find ways to combat them.                   $500,001 to 1,000,000                                                            22%
                                                                           $250,001 to $500,000                                                              23%
The most reliable way to ensure the safety of a company's
                                                                           $250,001 to $250,000                                                 16%
computers is to refrain from putting them on a network
                                                                            $10,000 to $100,000                  3%
and to keep them behind locked doors.
                                                                               Less than $ 10,000           1%
Why Do We Need Network Security?                                                                  0%              5%       10%          15%           20%         25%
We definitely need secured network in order to protect our                                      Fig. 2 - Source: Ponemon Institute Research Report
information and data. Security flaw can cause huge
financial impact on the businesses as well.                                      Securing your network
 35%
                                                                                  One can secure the network by implementing robust
                              32%
                                                                                  network appliances including firewalls, routers, switches
 30%
                                                                                  and other network security equipments. Security is not only
 25%                                                                              putting firewall and it does not end there, much larger part
                   21%
 20%                                      18%                                     of network security is creating policies and using network
                                                                                  security tools that ensure your network is secured by
 15%
        10%                                           9%          10%             allowing the access to authorized persons only and
 10%
                                                                                  eliminating any threat to network.
 5%
                                                                                 Network security is based on 3 pillars
 0%                                                                              Prevention, Detection & Response. This trinity should
       None       1 time       2-3        4-5     More than Cannot
                                                                                 be the foundation for all security policies and measures
                             times      times      5 times Determine
                                                                                 that organization develops and deploys.
              Fig 1 - Source: Ponemon Institute Research Report


In the recent survey conducted by Computer Security
Institute (CSI), 70% percent of organizations stated that
their network security defenses had been breached.
                                                                                          Detection                                   Response
The chart below shows the successful network security
breaches over past 12 months.
As per the survey report, 59 % of respondents say that their                                                           SECURITY
network security is breached at least twice a year, 10 % do
not even know if they are victim of breach or not? It
predicts that at least 80% of organizations have had at
least one breach even if we don't consider organization                                                               Prevention
who cannot determine it.
Times
Security is all about layers, it depends how many layers you
are using to configure your security.
The layers can be defined in the following manner                 GOOD TO READ
• Properly configuring the firewall                               12 very profound lessons relevant for our lives
• Configuring antivirus with up to date signatures
• Strong password, which are changed regularly
• Proper use of access lists
• Logging and log analysis of security devices
• Following good security practices defined by local IT
Apart from the best practices there are a few other tools to
assist with network security and most of them are shipping
with Linux distribution
• Packet Sniffers
• System Services & tcp_wrappers
• DNS Information
• Identd
• Network Scanners to detect port scans
• Denial of Service Attacks
• Firewalls
• VPNs
It takes all of these elements collectively to constitute good    1. The more we know about ourselves, the more power we
security practices. The above mentioned tools are few to          have to behave better- Humility is underrated. We each have
name which help us to secure the network. Using these             an infinite capacity for self-deception-countless unconscious
practices, manageability of network becomes much easier           ways we protect ourselves from pain, uncertainty, and
with security in place.                                           responsibility-often at the expense of others and of
                                                                  ourselves. Endless introspection can turn into self-
Benefits
                                                                  indulgence, but deepening self-awareness is essential to
Using network monitoring tools one can record all the
                                                                  freeing ourselves from our reactive, habitual behaviour.
traffic and analyze the suspicious behavior & patterns so
that proactive steps can be taken to prevent it.                  2. Notice the good- We each carry an evolutionary
Security protects your network and assets by blocking             predisposition to dwell on what's wrong in our lives. The
suspicious behaviors on real-time basis and alerting the          antidote is to deliberately take time out each day to notice
administrators when high security filters are violated. It also   what's going right, and to feel grateful for what you've got. It's
helps in increasing user productivity by blocking unwanted        probably a lot.
and inappropriate web contents and program usage.                 3. Let go of certainty- The opposite isn't uncertainty. It's
Also, one can save a lot of time and money as well by             openness, curiosity and a willingness to embrace paradox,
keeping users on task and productive, by securing assets          rather than choose up sides. The ultimate challenge is to accept
and preventing data theft on you network.                         ourselves exactly as we are, but never stop trying to learn and
It also removes the need of exhaustive investigations for         grow.
possible troublesome employees as you can monitor every           4. Never seek your value at the expense of someone
bit of you network and can trace the culprit.                     else's- When we're feeling devalued, our reactive instinct is
                                                                  to do anything to restore what we've lost. Devaluing the
                                                                  person who made you feel bad will only prompt more of
                                                                  the same in return.
                                                                  5. Do the most important thing first in the morning and
                                                                  you'll never have an unproductive day- Most of us have
                                                                  the highest energy early in the day, and the fewest
                                                                  distractions. By focusing for a designated period of time,
                                                                  without interruption, on the highest value task for no more
                                                                  than 90 minutes, it's possible to get an extraordinary
                                                                  amount of work accomplished in a short time.
GOOD TO READ                                                                                            Times

 6. It's possible to be excellent at anything, but nothing
 valuable comes easy and discomfort is part of growth
 Getting better at something depends far less on inborn
 talent than it does the willingness to practice the
 activity over and over, and to seek out regular feedback,
 the more precise the better.
 7. The more behaviors you intentionally make
 automatic in your life, the more you'll get done- If you
 have to think about doing something each time you do
 it, you probably won't do it for very long. The trick is to
 get more things done using less energy and conscious
 self-control. How often do you forget to brush your
 teeth?
 8. Slow down- Speed is the enemy of nearly everything
 in life that really matters. It's addictive and it
 undermines quality, compassion, depth, creativity,
 appreciation and real relationship.
 9. The feeling of having enough is magical- It rarely         Progressive's Rewards & Recognitions
 depends on how much you've got. More is rarely better.        Progressive has announced Rewards & Recognition winners
 Too much of anything eventually becomes toxic.                for the fourth quarter (JFM) in different categories as
                                                               mentioned
 10. Do the right thing because it's the right thing to do,
                                                               Star Award
 and don't expect anything in return- Your values are one
                                                               Nilesh Shivaji Jadhav (Mumbai) & Kislay Kumar (Noida)
 of the only possessions you have that no one can take
 away from you. Doing the right thing may not always           Team Player
                                                               Sumant Pandey, Yogesh Dubey &
 get you what you think you want in the moment, but it
                                                               Sumit Bhattacharya (Noida)
 will almost always leave you feeling better about
 yourself in the long run. When in doubt, default to calm      Client Satisfaction
                                                               Anil B. Lavate (Mumbai), Mukund Narayan, Jitandra Kumar,
 and kind.
                                                               Sameer Dayal & Anju Singh (Noida)
 11. Add more value in the world than you're using up-         Team of the Quarter
 We spend down the earth's resources every day. Life's         RPC South IT Support Team-South
 primary challenge is to put more back into the world




                                                               EVENTS
 than we take out.
 12. Savour every moment- Even the difficult ones. It all
 goes so fast.

Más contenido relacionado

La actualidad más candente

"Enterprise Strategy Group, Information Security Brief: The Tape Encryption O...
"Enterprise Strategy Group, Information Security Brief: The Tape Encryption O..."Enterprise Strategy Group, Information Security Brief: The Tape Encryption O...
"Enterprise Strategy Group, Information Security Brief: The Tape Encryption O...
IBM India Smarter Computing
 
BCP Expo Presentation and company overview final ver. 1.0
BCP Expo Presentation and company overview final ver. 1.0BCP Expo Presentation and company overview final ver. 1.0
BCP Expo Presentation and company overview final ver. 1.0
Julian Samuels
 
BCP Expo Presentation and company overview final ver. 1.0
BCP Expo Presentation and company overview final ver. 1.0BCP Expo Presentation and company overview final ver. 1.0
BCP Expo Presentation and company overview final ver. 1.0
Julian Samuels
 

La actualidad más candente (17)

Why managed detection and response is more important now than ever
Why managed detection and response is more important now than everWhy managed detection and response is more important now than ever
Why managed detection and response is more important now than ever
 
Complete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resourcesComplete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resources
 
Datto event master slides
Datto event master slidesDatto event master slides
Datto event master slides
 
Enabling Embedded Business Continuity
Enabling Embedded Business ContinuityEnabling Embedded Business Continuity
Enabling Embedded Business Continuity
 
Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020Edgescan vulnerability stats report 2020
Edgescan vulnerability stats report 2020
 
Symantec cyber-resilience
Symantec cyber-resilienceSymantec cyber-resilience
Symantec cyber-resilience
 
A recommendation for software development responses for future
A recommendation for software development responses for futureA recommendation for software development responses for future
A recommendation for software development responses for future
 
Staying ahead in the cyber security game - Sogeti + IBM
Staying ahead in the cyber security game - Sogeti + IBMStaying ahead in the cyber security game - Sogeti + IBM
Staying ahead in the cyber security game - Sogeti + IBM
 
"Enterprise Strategy Group, Information Security Brief: The Tape Encryption O...
"Enterprise Strategy Group, Information Security Brief: The Tape Encryption O..."Enterprise Strategy Group, Information Security Brief: The Tape Encryption O...
"Enterprise Strategy Group, Information Security Brief: The Tape Encryption O...
 
BCP Expo Presentation and company overview final ver. 1.0
BCP Expo Presentation and company overview final ver. 1.0BCP Expo Presentation and company overview final ver. 1.0
BCP Expo Presentation and company overview final ver. 1.0
 
BCP Expo Presentation and company overview final ver. 1.0
BCP Expo Presentation and company overview final ver. 1.0BCP Expo Presentation and company overview final ver. 1.0
BCP Expo Presentation and company overview final ver. 1.0
 
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
 
Isbs Survey 2010 Technical Report
Isbs Survey 2010 Technical ReportIsbs Survey 2010 Technical Report
Isbs Survey 2010 Technical Report
 
[CLASS 2014] Palestra Técnica - Fabio Rosa
[CLASS 2014] Palestra Técnica - Fabio Rosa[CLASS 2014] Palestra Técnica - Fabio Rosa
[CLASS 2014] Palestra Técnica - Fabio Rosa
 
The 2018 Threatscape
The 2018 ThreatscapeThe 2018 Threatscape
The 2018 Threatscape
 
How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19
 
5 Tech Stocks With High Buyback & Increased Dividend
5 Tech Stocks With High Buyback & Increased Dividend5 Tech Stocks With High Buyback & Increased Dividend
5 Tech Stocks With High Buyback & Increased Dividend
 

Destacado (8)

Case Study - Investment Approval Workflow Application
Case Study - Investment Approval Workflow ApplicationCase Study - Investment Approval Workflow Application
Case Study - Investment Approval Workflow Application
 
Presentation 001
Presentation 001Presentation 001
Presentation 001
 
Trabajo de juan pablo II
Trabajo de juan pablo IITrabajo de juan pablo II
Trabajo de juan pablo II
 
London
LondonLondon
London
 
5.2 Present progressive
5.2 Present progressive5.2 Present progressive
5.2 Present progressive
 
2.2 forming questions
2.2 forming questions2.2 forming questions
2.2 forming questions
 
1.1 nouns and articles
1.1 nouns and articles1.1 nouns and articles
1.1 nouns and articles
 
7.2 Indefinite and negative words
7.2 Indefinite and negative words7.2 Indefinite and negative words
7.2 Indefinite and negative words
 

Similar a Progressive Times - May 2012

How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
SecPod Technologies
 

Similar a Progressive Times - May 2012 (20)

Securing the Digital Economy: Reinventing the Internet for Trust
Securing the Digital Economy: Reinventing the Internet for TrustSecuring the Digital Economy: Reinventing the Internet for Trust
Securing the Digital Economy: Reinventing the Internet for Trust
 
Cybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lensCybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lens
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
Check Point SMB Proposition
Check Point SMB PropositionCheck Point SMB Proposition
Check Point SMB Proposition
 
Cyber-attacks
Cyber-attacksCyber-attacks
Cyber-attacks
 
2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - Ireland2018 State of Cyber Resilience Report - Ireland
2018 State of Cyber Resilience Report - Ireland
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
 
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
 
EMA Megatrends in Cyber-Security
EMA Megatrends in Cyber-SecurityEMA Megatrends in Cyber-Security
EMA Megatrends in Cyber-Security
 
Azure Security.pdf
Azure Security.pdfAzure Security.pdf
Azure Security.pdf
 
Azure security
Azure securityAzure security
Azure security
 
Navigating the new normal with self healing infrastructure automation
Navigating the new normal with self healing infrastructure automationNavigating the new normal with self healing infrastructure automation
Navigating the new normal with self healing infrastructure automation
 
Human Centric Innovation - Driving Digital Transformation - Co-creation
Human Centric Innovation - Driving Digital Transformation - Co-creationHuman Centric Innovation - Driving Digital Transformation - Co-creation
Human Centric Innovation - Driving Digital Transformation - Co-creation
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
Cyber threat forecast 2018..
Cyber threat forecast 2018..Cyber threat forecast 2018..
Cyber threat forecast 2018..
 
2018 State of Cyber Reslience in Healthcare
2018 State of Cyber Reslience in Healthcare2018 State of Cyber Reslience in Healthcare
2018 State of Cyber Reslience in Healthcare
 
Retail Week: Cloud Security
Retail Week: Cloud SecurityRetail Week: Cloud Security
Retail Week: Cloud Security
 

Progressive Times - May 2012

  • 1. Times May 2012 News KEY WINS NEC HCL ST Greetings to everyone!! Collaboration Redefined Welcome to yet another interesting edition of Progressive NEC HCL ST, Noida Times which we are restarting after a break of few months. Perhaps the timing is great as we begin the financial year Progressive has bagged an imperative project from NEC unveiling our new go to market strategy around HCL for Network Reengineering. As part of the project, Consulting, Solutions and Outsourcing. The entire play has Progressive will design & implement the complete Network to be around engaging and adding value and not "selling". Infrastructure based on CISCO Products. To begin with we have our focus will on following four irreversible trends that includes Cloud, Mobility, Information Management and Outsourcing which stress the importance for IT to leverage technology and automation. It's clear we've only scratched the surface Ericsson, Gurgaon when it comes to the ability of technology to drive better Progressive has bagged an imperative projects From top-and bottom-line growth. However, it will take a high Ericsson for Bharti Airtel : discipline and perseverance to get it right. 1. EIR (Equipment Identity Registry). As part of the project, Today, technology advances so fast that the potential for Progressive will implement & support HP Server & storage improvement is tremendous and ultimately what matters is across eight locations of Bharti Airtel in India. only Excellence. We must always remain impatient to do 2. ADC (Advance Device Configuration). As part of the better for our customers. And to keep this I have project, Progressive will implement &support HP Server for reorganized the management team around our core Bharti Airtel in India. products to improve responsibility and accountability across Progressive. Hence emphasis would be more to KEY ANNOUNCEMENTS increase our velocity, improve our execution and focus on the big bets that will makes a difference. As technology continues to drive business productivity and We are delighted to have two experienced campaigners to competitiveness, the role of the our Progressive family-Anil Zuitshi (Director Sales- geek becomes increasingly Enterprise) and Sheeba Hasnain (Business Development critical. Organization that Manager-Middle East). I admire the capabilities of my team attracts and retains the and have the confidence that we will reach to the pinnacle best geeks wins in this by remaining focused on what we deliver. environment. From this quarter, we are delighted to Last but not least, I would like to give this message to the announce an award to increase the motivation and entire Progressive family in these changing economic enthusiasm of the intricate technological knowledge work landscape remember two things-Focus on customer that geeks perform. experience and execute with financial discipline. Wishing you a great FY 2012-13! Prateek Garg
  • 2. Times SOLUTIONS Network Security Fig. 2 depicts the financial impact on organizations over last 12 months. In today's dynamic environment, network security becomes a priority for any organization. Network Security is all about Cannot determine 16% protecting all the valuable assets to maintain the More than $10,000,000 1% intellectual property of the company and ensure smooth $5,000,001 to $10,000,000 0% operation. Hence it becomes a mandate for any $2,500,001 to $5,000,000 3% organization to have a sound network security strategy $1,000,001 to $2,500,000 15% which will uncover threats and find ways to combat them. $500,001 to 1,000,000 22% $250,001 to $500,000 23% The most reliable way to ensure the safety of a company's $250,001 to $250,000 16% computers is to refrain from putting them on a network $10,000 to $100,000 3% and to keep them behind locked doors. Less than $ 10,000 1% Why Do We Need Network Security? 0% 5% 10% 15% 20% 25% We definitely need secured network in order to protect our Fig. 2 - Source: Ponemon Institute Research Report information and data. Security flaw can cause huge financial impact on the businesses as well. Securing your network 35% One can secure the network by implementing robust 32% network appliances including firewalls, routers, switches 30% and other network security equipments. Security is not only 25% putting firewall and it does not end there, much larger part 21% 20% 18% of network security is creating policies and using network security tools that ensure your network is secured by 15% 10% 9% 10% allowing the access to authorized persons only and 10% eliminating any threat to network. 5% Network security is based on 3 pillars 0% Prevention, Detection & Response. This trinity should None 1 time 2-3 4-5 More than Cannot be the foundation for all security policies and measures times times 5 times Determine that organization develops and deploys. Fig 1 - Source: Ponemon Institute Research Report In the recent survey conducted by Computer Security Institute (CSI), 70% percent of organizations stated that their network security defenses had been breached. Detection Response The chart below shows the successful network security breaches over past 12 months. As per the survey report, 59 % of respondents say that their SECURITY network security is breached at least twice a year, 10 % do not even know if they are victim of breach or not? It predicts that at least 80% of organizations have had at least one breach even if we don't consider organization Prevention who cannot determine it.
  • 3. Times Security is all about layers, it depends how many layers you are using to configure your security. The layers can be defined in the following manner GOOD TO READ • Properly configuring the firewall 12 very profound lessons relevant for our lives • Configuring antivirus with up to date signatures • Strong password, which are changed regularly • Proper use of access lists • Logging and log analysis of security devices • Following good security practices defined by local IT Apart from the best practices there are a few other tools to assist with network security and most of them are shipping with Linux distribution • Packet Sniffers • System Services & tcp_wrappers • DNS Information • Identd • Network Scanners to detect port scans • Denial of Service Attacks • Firewalls • VPNs It takes all of these elements collectively to constitute good 1. The more we know about ourselves, the more power we security practices. The above mentioned tools are few to have to behave better- Humility is underrated. We each have name which help us to secure the network. Using these an infinite capacity for self-deception-countless unconscious practices, manageability of network becomes much easier ways we protect ourselves from pain, uncertainty, and with security in place. responsibility-often at the expense of others and of ourselves. Endless introspection can turn into self- Benefits indulgence, but deepening self-awareness is essential to Using network monitoring tools one can record all the freeing ourselves from our reactive, habitual behaviour. traffic and analyze the suspicious behavior & patterns so that proactive steps can be taken to prevent it. 2. Notice the good- We each carry an evolutionary Security protects your network and assets by blocking predisposition to dwell on what's wrong in our lives. The suspicious behaviors on real-time basis and alerting the antidote is to deliberately take time out each day to notice administrators when high security filters are violated. It also what's going right, and to feel grateful for what you've got. It's helps in increasing user productivity by blocking unwanted probably a lot. and inappropriate web contents and program usage. 3. Let go of certainty- The opposite isn't uncertainty. It's Also, one can save a lot of time and money as well by openness, curiosity and a willingness to embrace paradox, keeping users on task and productive, by securing assets rather than choose up sides. The ultimate challenge is to accept and preventing data theft on you network. ourselves exactly as we are, but never stop trying to learn and It also removes the need of exhaustive investigations for grow. possible troublesome employees as you can monitor every 4. Never seek your value at the expense of someone bit of you network and can trace the culprit. else's- When we're feeling devalued, our reactive instinct is to do anything to restore what we've lost. Devaluing the person who made you feel bad will only prompt more of the same in return. 5. Do the most important thing first in the morning and you'll never have an unproductive day- Most of us have the highest energy early in the day, and the fewest distractions. By focusing for a designated period of time, without interruption, on the highest value task for no more than 90 minutes, it's possible to get an extraordinary amount of work accomplished in a short time.
  • 4. GOOD TO READ Times 6. It's possible to be excellent at anything, but nothing valuable comes easy and discomfort is part of growth Getting better at something depends far less on inborn talent than it does the willingness to practice the activity over and over, and to seek out regular feedback, the more precise the better. 7. The more behaviors you intentionally make automatic in your life, the more you'll get done- If you have to think about doing something each time you do it, you probably won't do it for very long. The trick is to get more things done using less energy and conscious self-control. How often do you forget to brush your teeth? 8. Slow down- Speed is the enemy of nearly everything in life that really matters. It's addictive and it undermines quality, compassion, depth, creativity, appreciation and real relationship. 9. The feeling of having enough is magical- It rarely Progressive's Rewards & Recognitions depends on how much you've got. More is rarely better. Progressive has announced Rewards & Recognition winners Too much of anything eventually becomes toxic. for the fourth quarter (JFM) in different categories as mentioned 10. Do the right thing because it's the right thing to do, Star Award and don't expect anything in return- Your values are one Nilesh Shivaji Jadhav (Mumbai) & Kislay Kumar (Noida) of the only possessions you have that no one can take away from you. Doing the right thing may not always Team Player Sumant Pandey, Yogesh Dubey & get you what you think you want in the moment, but it Sumit Bhattacharya (Noida) will almost always leave you feeling better about yourself in the long run. When in doubt, default to calm Client Satisfaction Anil B. Lavate (Mumbai), Mukund Narayan, Jitandra Kumar, and kind. Sameer Dayal & Anju Singh (Noida) 11. Add more value in the world than you're using up- Team of the Quarter We spend down the earth's resources every day. Life's RPC South IT Support Team-South primary challenge is to put more back into the world EVENTS than we take out. 12. Savour every moment- Even the difficult ones. It all goes so fast.