1. Times May 2012
News
KEY WINS
NEC HCL ST
Greetings to everyone!! Collaboration Redefined
Welcome to yet another interesting edition of Progressive
NEC HCL ST, Noida
Times which we are restarting after a break of few months.
Perhaps the timing is great as we begin the financial year Progressive has bagged an imperative project from NEC
unveiling our new go to market strategy around HCL for Network Reengineering. As part of the project,
Consulting, Solutions and Outsourcing. The entire play has Progressive will design & implement the complete Network
to be around engaging and adding value and not "selling". Infrastructure based on CISCO Products.
To begin with we have our focus will on following four
irreversible trends that includes Cloud, Mobility,
Information Management and Outsourcing which stress
the importance for IT to leverage technology and
automation. It's clear we've only scratched the surface Ericsson, Gurgaon
when it comes to the ability of technology to drive better Progressive has bagged an imperative projects From
top-and bottom-line growth. However, it will take a high Ericsson for Bharti Airtel :
discipline and perseverance to get it right. 1. EIR (Equipment Identity Registry). As part of the project,
Today, technology advances so fast that the potential for Progressive will implement & support HP Server & storage
improvement is tremendous and ultimately what matters is across eight locations of Bharti Airtel in India.
only Excellence. We must always remain impatient to do 2. ADC (Advance Device Configuration). As part of the
better for our customers. And to keep this I have project, Progressive will implement &support HP Server for
reorganized the management team around our core Bharti Airtel in India.
products to improve responsibility and accountability
across Progressive. Hence emphasis would be more to
KEY ANNOUNCEMENTS
increase our velocity, improve our execution and focus on
the big bets that will makes a difference. As technology continues to
drive business productivity and
We are delighted to have two experienced campaigners to competitiveness, the role of the
our Progressive family-Anil Zuitshi (Director Sales- geek becomes increasingly
Enterprise) and Sheeba Hasnain (Business Development critical. Organization that
Manager-Middle East). I admire the capabilities of my team attracts and retains the
and have the confidence that we will reach to the pinnacle best geeks wins in this
by remaining focused on what we deliver. environment. From this quarter, we are delighted to
Last but not least, I would like to give this message to the announce an award to increase the motivation and
entire Progressive family in these changing economic enthusiasm of the intricate technological knowledge work
landscape remember two things-Focus on customer that geeks perform.
experience and execute with financial discipline.
Wishing you a great FY 2012-13!
Prateek Garg
2. Times
SOLUTIONS
Network Security Fig. 2 depicts the financial impact on organizations over
last 12 months.
In today's dynamic environment, network security becomes
a priority for any organization. Network Security is all about Cannot determine 16%
protecting all the valuable assets to maintain the More than $10,000,000 1%
intellectual property of the company and ensure smooth $5,000,001 to $10,000,000 0%
operation. Hence it becomes a mandate for any $2,500,001 to $5,000,000 3%
organization to have a sound network security strategy $1,000,001 to $2,500,000 15%
which will uncover threats and find ways to combat them. $500,001 to 1,000,000 22%
$250,001 to $500,000 23%
The most reliable way to ensure the safety of a company's
$250,001 to $250,000 16%
computers is to refrain from putting them on a network
$10,000 to $100,000 3%
and to keep them behind locked doors.
Less than $ 10,000 1%
Why Do We Need Network Security? 0% 5% 10% 15% 20% 25%
We definitely need secured network in order to protect our Fig. 2 - Source: Ponemon Institute Research Report
information and data. Security flaw can cause huge
financial impact on the businesses as well. Securing your network
35%
One can secure the network by implementing robust
32%
network appliances including firewalls, routers, switches
30%
and other network security equipments. Security is not only
25% putting firewall and it does not end there, much larger part
21%
20% 18% of network security is creating policies and using network
security tools that ensure your network is secured by
15%
10% 9% 10% allowing the access to authorized persons only and
10%
eliminating any threat to network.
5%
Network security is based on 3 pillars
0% Prevention, Detection & Response. This trinity should
None 1 time 2-3 4-5 More than Cannot
be the foundation for all security policies and measures
times times 5 times Determine
that organization develops and deploys.
Fig 1 - Source: Ponemon Institute Research Report
In the recent survey conducted by Computer Security
Institute (CSI), 70% percent of organizations stated that
their network security defenses had been breached.
Detection Response
The chart below shows the successful network security
breaches over past 12 months.
As per the survey report, 59 % of respondents say that their SECURITY
network security is breached at least twice a year, 10 % do
not even know if they are victim of breach or not? It
predicts that at least 80% of organizations have had at
least one breach even if we don't consider organization Prevention
who cannot determine it.
3. Times
Security is all about layers, it depends how many layers you
are using to configure your security.
The layers can be defined in the following manner GOOD TO READ
• Properly configuring the firewall 12 very profound lessons relevant for our lives
• Configuring antivirus with up to date signatures
• Strong password, which are changed regularly
• Proper use of access lists
• Logging and log analysis of security devices
• Following good security practices defined by local IT
Apart from the best practices there are a few other tools to
assist with network security and most of them are shipping
with Linux distribution
• Packet Sniffers
• System Services & tcp_wrappers
• DNS Information
• Identd
• Network Scanners to detect port scans
• Denial of Service Attacks
• Firewalls
• VPNs
It takes all of these elements collectively to constitute good 1. The more we know about ourselves, the more power we
security practices. The above mentioned tools are few to have to behave better- Humility is underrated. We each have
name which help us to secure the network. Using these an infinite capacity for self-deception-countless unconscious
practices, manageability of network becomes much easier ways we protect ourselves from pain, uncertainty, and
with security in place. responsibility-often at the expense of others and of
ourselves. Endless introspection can turn into self-
Benefits
indulgence, but deepening self-awareness is essential to
Using network monitoring tools one can record all the
freeing ourselves from our reactive, habitual behaviour.
traffic and analyze the suspicious behavior & patterns so
that proactive steps can be taken to prevent it. 2. Notice the good- We each carry an evolutionary
Security protects your network and assets by blocking predisposition to dwell on what's wrong in our lives. The
suspicious behaviors on real-time basis and alerting the antidote is to deliberately take time out each day to notice
administrators when high security filters are violated. It also what's going right, and to feel grateful for what you've got. It's
helps in increasing user productivity by blocking unwanted probably a lot.
and inappropriate web contents and program usage. 3. Let go of certainty- The opposite isn't uncertainty. It's
Also, one can save a lot of time and money as well by openness, curiosity and a willingness to embrace paradox,
keeping users on task and productive, by securing assets rather than choose up sides. The ultimate challenge is to accept
and preventing data theft on you network. ourselves exactly as we are, but never stop trying to learn and
It also removes the need of exhaustive investigations for grow.
possible troublesome employees as you can monitor every 4. Never seek your value at the expense of someone
bit of you network and can trace the culprit. else's- When we're feeling devalued, our reactive instinct is
to do anything to restore what we've lost. Devaluing the
person who made you feel bad will only prompt more of
the same in return.
5. Do the most important thing first in the morning and
you'll never have an unproductive day- Most of us have
the highest energy early in the day, and the fewest
distractions. By focusing for a designated period of time,
without interruption, on the highest value task for no more
than 90 minutes, it's possible to get an extraordinary
amount of work accomplished in a short time.
4. GOOD TO READ Times
6. It's possible to be excellent at anything, but nothing
valuable comes easy and discomfort is part of growth
Getting better at something depends far less on inborn
talent than it does the willingness to practice the
activity over and over, and to seek out regular feedback,
the more precise the better.
7. The more behaviors you intentionally make
automatic in your life, the more you'll get done- If you
have to think about doing something each time you do
it, you probably won't do it for very long. The trick is to
get more things done using less energy and conscious
self-control. How often do you forget to brush your
teeth?
8. Slow down- Speed is the enemy of nearly everything
in life that really matters. It's addictive and it
undermines quality, compassion, depth, creativity,
appreciation and real relationship.
9. The feeling of having enough is magical- It rarely Progressive's Rewards & Recognitions
depends on how much you've got. More is rarely better. Progressive has announced Rewards & Recognition winners
Too much of anything eventually becomes toxic. for the fourth quarter (JFM) in different categories as
mentioned
10. Do the right thing because it's the right thing to do,
Star Award
and don't expect anything in return- Your values are one
Nilesh Shivaji Jadhav (Mumbai) & Kislay Kumar (Noida)
of the only possessions you have that no one can take
away from you. Doing the right thing may not always Team Player
Sumant Pandey, Yogesh Dubey &
get you what you think you want in the moment, but it
Sumit Bhattacharya (Noida)
will almost always leave you feeling better about
yourself in the long run. When in doubt, default to calm Client Satisfaction
Anil B. Lavate (Mumbai), Mukund Narayan, Jitandra Kumar,
and kind.
Sameer Dayal & Anju Singh (Noida)
11. Add more value in the world than you're using up- Team of the Quarter
We spend down the earth's resources every day. Life's RPC South IT Support Team-South
primary challenge is to put more back into the world
EVENTS
than we take out.
12. Savour every moment- Even the difficult ones. It all
goes so fast.