Cyber SecurityNews

PerfectCloud Launches Cloud Security Solutions

PerfectCloud, a provider of enterprise, cloud and mobile security solutions, has launched its security and privacy service offerings in India.

It provides a range of services from enterprise-class cloud and mobile security solutions specializing in Identity Management, Security of IoT to data lifecycle encryption, guaranteeing complete security and privacy.

With some of the world’s biggest IT service companies based in India, the country is vulnerable to cybercrimes on account of its growing economic progress. Also, increasing smartphone use, online transactions and the government’s “Digital India” initiative are opening up opportunities in an industry that is worth $77 billion globally.

MayukhGon, CEO, PerfectCloud, said, “Cloud computing is transforming the IT landscape in India and we see tremendous opportunity in the rapidly-growing cyber security industry. Today, almost 53% of organizations in India indicate they are using Cloud Services, with another 43% indicating plans to begin using cloud services in the next 12 months.”

“While cloud computing has opened up many new opportunities, it also presents a number of new security risks to company information. In fact, security has been identified as the most important concern for Cloud adoption. With the unique security architecture offered by PerfectCloud, organisations can become immune to the threats that all cloud service providers suffer from,” he added.

PerfectCloud has introduced two integrated products in the Indian market – SmartSignin and SmartCryptor.

SmartSignin is the secure way for organizations to manage and control access to cloud applications for employees, customers, and partners across multiple devices. It includes: Single Sign-on, Identity Management, Authorization, Authentication, Access control & Audit.

SmartCryptor helps encrypt data and store it on your desktop or cloud storage applications securely. You can share or revoke access to shared documents with anyone at any time, using any device. You can retain complete control over who has the authority to decrypt and access the critical data.

Related posts

VMware expands its reach to Tier2, 3 cities

adminsmec

SEQRITE releases cyber threats predictions for 2023

adminsmec

EMC India COE gets recognition by NASSCOM

adminsmec

Leave a Comment