Cyber SecurityNews

PerfectCloud Launches Cloud Security Solutions

PerfectCloud, a provider of enterprise, cloud and mobile security solutions, has launched its security and privacy service offerings in India.

It provides a range of services from enterprise-class cloud and mobile security solutions specializing in Identity Management, Security of IoT to data lifecycle encryption, guaranteeing complete security and privacy.

With some of the world’s biggest IT service companies based in India, the country is vulnerable to cybercrimes on account of its growing economic progress. Also, increasing smartphone use, online transactions and the government’s “Digital India” initiative are opening up opportunities in an industry that is worth $77 billion globally.

MayukhGon, CEO, PerfectCloud, said, “Cloud computing is transforming the IT landscape in India and we see tremendous opportunity in the rapidly-growing cyber security industry. Today, almost 53% of organizations in India indicate they are using Cloud Services, with another 43% indicating plans to begin using cloud services in the next 12 months.”

“While cloud computing has opened up many new opportunities, it also presents a number of new security risks to company information. In fact, security has been identified as the most important concern for Cloud adoption. With the unique security architecture offered by PerfectCloud, organisations can become immune to the threats that all cloud service providers suffer from,” he added.

PerfectCloud has introduced two integrated products in the Indian market – SmartSignin and SmartCryptor.

SmartSignin is the secure way for organizations to manage and control access to cloud applications for employees, customers, and partners across multiple devices. It includes: Single Sign-on, Identity Management, Authorization, Authentication, Access control & Audit.

SmartCryptor helps encrypt data and store it on your desktop or cloud storage applications securely. You can share or revoke access to shared documents with anyone at any time, using any device. You can retain complete control over who has the authority to decrypt and access the critical data.

Related posts

Cybercriminals use DDoS as smokescreen for attacks on business

adminsmec

DIGISOL Introduces Sonakshi Sinha Brand Ambassador

adminsmec

Cyber hackers could take over critical infrastructure: Kaspersky

adminsmec

Leave a Comment