Dell & EMC, Leader in 22 Gartner magic quadrants ?

Got it from the EMC world. I can see their serious re-iteration to get the confidence back from the market. I was told by a storage architect friend that the customers are looking at NetApp seriously because of the foreseen merger integration issues.Good Luck Dell-EMC !

I always liked Michael Dell’s audacious expansion into new areas where Dell was not at all comfortable. Starting from Secureworks, Sonicwall, AppAssure to many things in Security world has got my serious attention as InfoSec guy.

Dear Valued EMC Customer,As you know, Michael Dell, MSD Partners, and Silver Lake are leading a transaction to combine the EMC Federation of companies and Dell. This business combination will create the world¹s largest privately-controlled technology company. We expect the transaction to close in mid-2016.

Our combined product and technology portfolios and sales approaches are complementary, so customers can buy with confidence as we expect minimal disruption to existing product lines. In fact, the strength of our combination is generating positive feedback from customers excited about what the future will bring.

I commit to you that EMC will sustain our absolute focus on you, our valued customers, to power your IT transformation initiatives by:

1. Delivering the high quality customer experience you expect from EMC, including our customary commitment to support all current products as we always have
2. Extending our technology leadership through investment in R&D, including enhancing existing products and roadmaps
3. Preserving our dedication to customer choice (free of lock-in)
4. Continuing to enhance our partnerships & technology ecosystems
5. Listening to customer feedback and communicating updates to you clearly — and often.

Combined, EMC and Dell will be a leader in 22 Gartner Magic Quadrants, with an end-to-end product portfolio spanning the world’s greatest technology franchises in storage, servers, virtualization, PCs, including leadership positions in software-defined data center, hybrid cloud, converged infrastructure, mobile and security.

Plus, moving to a privately-controlled ownership model will provide more freedom to invest for the long-term, in R&D and innovation to provide you with top-class products, services and support.

We very much look forward to bringing the power of this combination to you, and we thank you for your continued confidence in us as your trusted partner in your IT transformation.

David Goulden
Chief Executive Officer
EMC Information Infrastructure


3 Things Chennai can learn from 9/11

Wanted to dedicate this piece of work to SaaS & IT Services Capital of India, Chennai

FixNix Year III Anniversary Celebrations- Part 2

Nov’22 2012 to Nov’22’2015

Member,Cyber Security Task Force of India.

if the recent flood is taking down Chennai from its BAU and it is still aspirant about being a global thought leader in Information Technology and Software Products industry, it need to learn from it’s american counterparts how they handled the 9/11 successfully and recouped back.

not writing anything specific, don’t want to reinvent the wheel.

quoting the important parts of the SEC analysis about their experience handling 9/11.

Business Continuity Models

The events of September 11 may lead to changes in the way that institutions plan for emergencies, as well as changes in their ongoing operations. It is helpful to review the basic models for business continuity planning and how these fared during the recent crisis.

A. Traditional Active/Backup Model

In its simplest form, the traditional model of business continuity is based on an “active” operating site with a corresponding backup site, both for data processing and for operations. This strategy generally relies on relocating staff from the active site to the backup site, and on maintaining backup copies of technology and data. There is an inherent dependency on the staff at the active site and their ability to move to the backup site. An adequate “desktop” recovery strategy – one that contemplates the movement of, at a minimum, core employees to fully functional backup office space – is a critical element of this model. This approach tends to limit geographic separation to reduce relocation time. Common approaches for the backup of technology infrastructure and data processing also rely on keeping data, hardware, and software current at the backup site and on resilient and diverse services (including telecommunications and electric power) at each site.

B. Split Operations Model

An emerging business model, which is used by some firms with nationwide or global operations, is to operate with two or more widely separated active sites (“active/active”) for critical operations that provide inherent backup for one another. For banking organizations with nationwide operations, for example, such sites are often hundreds of miles apart. For international firms, routine workloads can be shared among sites in different countries. Each site has the capacity to absorb some or all of the work of another for an extended period of time. This strategy can provide close-to-immediate resumption capacity, depending on the systems used to support the operations and the operating capacity at each site. This strategy addresses many of the key vulnerabilities noted above, eliminating dependency on availability and relocation of staff at any single location, reducing likelihood of telecommunications single points of failure, supporting maximum geographic separation, and assuring business continuity through actual use, rather than infrequent and less than complete testing.

C. Other Models

There may be other business continuity models that can provide a high degree of resiliency. For example, some institutions employ a variation on the above models in which a backup site periodically functions as the primary site for some period of time (“alternate site” model).

Developing Sound Practices for Business Continuity

In the face of revised assessments of the types, severity, and probability of potential threats, the cost-benefit balance of enhancing resilience to these threats has clearly shifted post-September 11. There are a number of steps, described below, that may help achieve a common view of sound practices for business continuity.

A. Define the Scope of Scenarios

A core question is the range of scenarios that financial institutions realistically need to address in their business continuity planning. There are a number of scenarios that would affect particular geographic areas, such as explosive devices, biohazards, and natural disasters. Such scenarios could render a large area inaccessible and could harm or disperse an organization’s critical employees.

B. Establish Business Continuity Objectives

Business continuity objectives or principles need to be articulated that are consistent with cost-effective, sound business operations and that take into account the impact that one critical institution’s operations can have on another. These objectives could cover issues such as:

  • Recovery time expectations for critical operations.
  • Recovery capacity or volume expectations.
  • Sound business continuity practices to support these objectives.

Although in practice, recovery time expectations may differ depending on the scenario (e.g., the expected times for institutions to recover from a localized power outage may differ from that of a regional disaster with loss of life), there are critical functions, including those relating to safeguarding and transferring of funds and financial assets that are so vital to the U.S. and global financial system that they arguably should continue with minimal, if any, disruption even in the event of a major regional disaster. The near-immediate “fail-over” capabilities provided by current technologies can support this objective.

C. Identify Key Elements of the Financial System

A coordinated industry-wide approach to business continuity planning requires identification of the critical operational components of the financial system that must achieve a high level of business continuity preparedness.A primary question is whether and how business continuity objectives should differ for institutions or infrastructure components with different levels of systemic importance. In particular, expectations may be highest for institutions whose activity has the potential to significantly affect other institutions, such as major clearing and settlement entities, as well as institutions that essentially act as financial “utilities” in some of their functions. Other institutions may be collectively critical to the daily operations of financial system, but individually of less systemic significance.

D. Testing and Crisis Management

Finally, the effectiveness of common business continuity strategies needs to be assured, whether through planning and testing or through regular use. Some institutions found that their routine testing of their business continuity plans as frequently as monthly or quarterly helped considerably in dealing with the crisis, relative to annual or less frequent testing. While testing and planning absorbs resources, institutions have found ways to integrate business continuity tests into their routine operations, such as by actively switching live operations to alternate sites periodically.

In addition, many institutions have noted the need for the industry to consider whether a more coordinated approach to crisis management and communication needs to be developed. Since September 11, several public and private-sector initiatives have begun to address the issue of coordinated crisis management communication within the industry and with regulators.

Dear India, Let’s get to action on Cyber Security

Wanted to dedicate this piece of work to our country India

FixNix Year III Anniversary Celebrations- Part 1

Nov’22 2012 to Nov’22’2015

Member,Cyber Security Task Force of India.

Got invited for few activities of National Cyber Security Awareness Month here in US Last month, October

My frustration level went up when i found billion$ security companies to training institutions to water supply company to defense agencies to 100 other firms joining this effort under one single window all across the country supporting the mission of “National Cyber Security Awareness Month”.

America is so successful because they seriously foresee what’s coming in the future, be it tech or many other stuffs, get their acts together.


As a country, if we can imbibe in getting all such interested variety of stakeholders to promote Cyber Security to school kids to industry, we’ll have better run way.

I am writing this with saddened heart, many months back one of my very well funded entrepreneur friend mocked at me by not responding to my help to fix hi attack thinking security business is all snake oil selling. If that’s the maturity of an very well funded entrepreneur, think about others.

Every body in our country takes cyber security as cosmetic, which is not true.

In Microsoft world, I was part of those teams who defined the SDL “Security Development Lifecycle” where security becomes part of applications, products in each and every step of the company.

Let’s nix it from Grass Roots !

What Varuna devan(rainGod), Sinking Chennai Corporation and billion $ cognizant’s of the world have in common?

Business Continuity and Disaster Recovery is the connection !

Today i heard a story about a DBA getting canned by his management for questioning what’s the organization’s BC strategy. God save that company ..

Quoting Cognizant because it’s almost head quartered in chennai wrt all of its offshore activities. Whether they have readiness planned completely when chennai is going down because of a natural disaster. I doubt so..

We can learn a lot from 9/11. America was able to handle 9/11 swiftly because they had it in their DNA.–top-lessons-learned-for-disaster-recovery.html

Whether business continuity is about a maintaining an excel full of plans, say to
management that u have put everything together to help them with their ISO 27001, PCI DSS, HIPAA missions ?

No, it’s not !

It’s about a religious, flexible, user friendly management system where you need to feel confident about your own organization’s continuity in serving it’s customers even in the case of any type of disasters.
It need not necessarily a excel, even it’s thinking process done and mapped
somewhere and implemented real time, you’re set to go.

Business continuity planning (or business continuity and resiliency planning) is the process of creating systems of prevention and recovery to deal with potential threats to a company.

A business continuity plan is a plan to continue operations if a place of business is affected by different levels of disaster which can be localized short term disasters, to days long building wide problems, to a permanent loss of a building.

The important things to take care is,
1. Test the BC plan not just table top.
Table top means mimicking world class disasters in table itself and claim “naam ke vaas” that it works. Ask your {h}indian friend for meaning of naam ke vaas.
2. Do some real time mock drills where shut down a site without notice and see if the DR site can manage the core minimal operations atleast.
3. Audit and document regulalry, it’s a living process.
4. enlighten the whole organization about this setup as a small tiny new developer may be the only one who know about the service which need to be kicked off for the new module to work in DR.
5. Test it often
6. Do 1 to 5 till you reach maturity.

Disaster recovery (DR) involves a set of policies and procedures to enable the recovery or continuation of vital technology infrastructure and systems following a natural or human-induced disaster.

Disaster recovery focuses on the IT or technology systems supporting critical business functions,as opposed to business continuity, which involves keeping all essential aspects of a business functioning despite significant disruptive events.

Disaster recovery is therefore a subset of business continuity.

7 Tiers of Disaster Recovery

Tier 0: No off-site data – Possibly no recovery
Tier 1: Data backup with no hot site
Tier 2: Data backup with a hot site
Tier 3: Electronic vaulting
Tier 4: Point-in-time copies
Tier 5: Transaction integrity
Tier 6: Zero or near-zero data loss
Tier 7: Highly automated, business integrated solution

In the recent rain sink of chennai city, not sure how the IT Service mammoths like cognizant to wipro sustained their operations. They have presence in bengaluru, hyderabad, etc. But still I’m sure about their dependency as the BC/DR planning is always done for naam ke vaas and we know that our customers come handy for convincing.


I don’t want to even touch our billion $ startups as they may think i’m hurting our own community. I’m sure we’ve not even ventured into the first steps of any such large scale Business process improvement things in our startup world. Forget about it, there’s Didi Kuaidi and many more waiting with their million $ cheques, who care for business continuity. I forgot to mention the guys who are writing large cheques also dont know how to handle the large disasters.

Please be mindful that, it’s not ecommerce, helpdesk, travel, service company, its applicable for all.

If you’ve not put your acts together, atleast now..

Few useful resources

ISO/IEC 27031:2011 Information technology — Security techniques — Guidelines for information and communications technology readiness for business continuity

ISO/IEC 27031:2011 describes the concepts and principles of information and comunication technology (ICT) readiness for business continuity, and provides a framework of methods and processes to identify and specify all aspects (such as performance criteria, design, and implementation) for improving an organization’s ICT readiness to ensure business continuity.

It applies to any organization (private, governmental, and non-governmental, irrespective of size) developing its ICT readiness for business continuity program (IRBC), and requiring its ICT services/infrastructures to be ready to support business operations in the event of emerging events and incidents, and related disruptions, that could affect continuity (including security) of critical business functions. It also enables an organization to measure performance parameters that correlate to its IRBC in a consistent and recognized manner.

The scope of ISO/IEC 27031:2011 encompasses all events and incidents (including security related) that could have an impact on ICT infrastructure and systems. It includes and extends the practices of information security incident handling and management and ICT readiness planning and services.

what to learn from Zoho ?

Last week Zoho, the “Operating System for Businesses” got DDos attacked by unidentified hackers. I’ve been closely observing how the issue was panning out since then. Got opportunity to talk to few people on their engineering world to provide few references voluntarily .

The interesting stuff I’ve seen during this toughest security incident of their entire Zoho history is, TRANSPARENCY.

They’ve remained in touch with all of their customers and kept communicating the developments. This is very crucial in Security Incident Management.

Very bold move Zoho.. !

As a security Industry guy, i respect the transparency you maintained through out the time.

You’re supposed to teach the fellow SaaS world how to do this bold move.

It comes with culture, keep up the spirit.

All good things comes to an end 😉
Great that too much of code writing even by your caterers ended now after this one week ordeal.

Hope the DDos naragasuran got killed, finally..

Indian Security Product Industry

Don’t know whether i’m the authority to write on this. But As a Security Product Entrepreneur from India, gone global wanted to write about this. It not me(guy who have sold everything for this idea, except my soul and body), then who else ? 😉 There’re tons of my friend security entrepreneurs who’re also trying to crack this space.

Please take it with a pinch of salt as the passion level may be a little one line more than the others as I’ve not become glorified employee of a VC on day 1 by taking funds to build this. Wanted to prove our skin in the game and taken it to extreme bootstrapping to get here.

The Pic in the title header shows the 20+ serious guys denting Indian Security Product Ecosystem.

We’re here to stay and make a dent. as the domestic market itself is growing phenomenally and entrepreneurs are figuring out how to how to raise, exit, etc

Let’s see the industry trend on Security investments

About Silicon Valley angles

There may be cases where the global GRC denters like convercent might have got funded 10.2 million on the day they have started their story. But FixNix may be denting still bootstrapping. Yet to figure out the global institution’s take on Indian Security startups on compliance space. Sometimes it may look insulting, but the indian spirit, tenacity, perseverance and local market demand is helping us stay put. “On the day it introduced its service, convercent start-up also said it had received $10.2 million in funding led by Azure Capital Partners, Mantucket Capital and City National Bank, Till todate, the global player has raised 30.72m$” On the contrary, from India we’re able to bootstrap with 200k$ debt raised from one of the states of Indian Government. The reason I’m trying to get more into FixNix funding case, it’s choice of the entrepreneur. Overall, the Indian funding situation is improving a lot.


Indian banking and securities firms to spend 499 bn rupees on IT in 2015- Gartner

Indian banking and securities companies will spend 499 billion rupees on IT products and services in 2015, an increase of 9.8 percent over 2014 spend of 455 billion rupees, according to Gartner.

India will remain the world’s fastest growing information technology (IT) market in 2016 as it is expected to spend more than $72 billion on IT services, products and hardware, up from 7.2% from the current year, according to research firm Gartner Inc

Some insights from PwC survey for understanding the global picture how security incidents are leading to different programs, budgets, policies, etc


Who got Security Analytics right ?

Our Chairman Prof.Subra and I were white boarding few Security Analytics modules we were envisioning for FixNix GRC platform on Risk, Audit, compliance Analytics. These new modules can drastically help Internal Audit teams and Compliance teams to predict the future areas they need to focus by a proprietary machine learning algorithm we’ve put together.

I don’t know how many except RSA have solved the analytics need of security industry correctly. Even RSA Analytics is more about the IT part of the GRC and its future. Particularly for the GRC world, who has built a great GRC Analytics module ? Whether it’s Metricstream, Lockpath, Openpages ? I don’t know even anybody has inclination towards innovating towards big data, machine learning, etc. We’re seriously trying to innovate and democratize this space.

Make Security Analytics affordable .. is one of our newly added mission now.

Mastering Security Analytics

Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?

Today’s enterprise security tools have developed an ability to detect a plethora of anomalies and “events” that indicate an attack is under way. For most companies, the problem is interpreting all of that security data to identify sophisticated threats and eliminate them before a serious data loss occurs.

“We’re sort of living in this alert-driven culture, but no one has the resources to respond to every alert,” says Dmitri Alperovitch, co-founder and CTO of CrowdStrike, a security intelligence and Analytics firm. “There are a lot of false positives, so not every alert is going to be prioritized.”

Innovations within security software, appliances, and services have automated many detection and blocking tasks, resulting in improved protection from next-generation firewalls and intrusion-prevention systems. But no matter how advanced a tool is, it will never block 100% of attacks.

That’s why, even with so much sophisticated technology available today, brainpower remains the most effective tool in fighting advanced attacks. Smart analysts can connect the dots among different security alerts and logs, letting analysts hunt down and shut down the sneakiest of exploits. But as security data proliferates, these analysts are being snowed under.

Even the most highly skilled analysts can only sift through so much data per day before they become ineffective. What’s more, there are only so many analysts out there — and they don’t come cheap.

For most companies, then, it’s not just a matter of hiring more analysts. “It’s all about how do you maximize the efficiency of your human analysts — how you present them with the information that’s most relevant to them and most actionable,” Alperovitch says.

To do that, IT organizations must rethink the factors that drive their security intelligence and analysis. They need to find ways to digest data more efficiently and automate some of the easier correlations among data sets so that analysts have more time to focus on the complex ones.

There are a number of ways to improve data analysis, and much of it revolves around providing data in better context, automating data flows and mathematical analyses, and improving the way data is presented to humans when it’s decision-making time.

The trouble with SIEM
Anyone who has been in IT security for a little while might stop at this point and ask, “Wait, isn’t data analysis what security information and event management (SIEM) systems are for?”

When SIEM technology kicked off over a decade ago, the promise was that these platforms would become the catch-all system for storing and correlating security data across the enterprise to help analysts stop attacks in their tracks. But that was a time when the corporate attack surface was fairly limited, and the volume of attacks was still manageable. Many of these SIEM systems had a pedigree in log management, and their underlying architecture was built in a time long before the non-relational database revolutionized big data analysis. As a result, SIEM has a number of weaknesses that keep it from being an analytical superstar.

First, many SIEM platforms still can’t pull in all of the necessary feeds to track attacks across the typical attack life cycle, or kill chain, which often spans endpoints, network resources, databases, and so on. Even when they can ingest data from, say, endpoint security systems, they are often unable to normalize it (meaning get the data sets into roughly the same format) and pair it with related network security data that could help analysts correlate separate events into a single attack.

“The challenge is you have endpoint systems that don’t talk to log data and don’t talk to network data,” says Craig Carpenter of AccessData, a forensics and incident response vendor. “It may all be sitting in the SIEM, but it’s not being correlated. It’s not being translated into a singular language that the analyst can actually look at.”

In most cases, Carpenter adds, you’ll have two different teams looking at the data: the network team and the endpoint team.

“And the two alerts don’t match to each other, so they look like completely different events to the analysts,” he says.

As the number of security data feeds increases with more specialized services and products — be they phishing and malware detection or external threat intelligence data — it only gets harder to map out a single attack across all of the different infrastructure touch points. It’s a case of too many alerts with little to no context.

“There’s no prioritization,” explains Alperovitch. “So it’s easy to say with hindsight that they should have connected the dots because there was one alert, but if there’s 5 million dots for you to connect, then it’s really, really hard for any organization to make sense of it all.”

For example, prior to its breach, the retailer Target did get an alert from its security tool, but it was lost in the noise of many other alerts coming in at a rate of hundreds a day.

IT security analytics: the before, during and after

The scope of IT Security Analytics is broad. In an ideal world, Threat Intelligence, provided in advance, would prevent IT security incidents from occurring in the first place.

However, complete mitigation will never be possible and incidents are inevitable, often with associated data breaches.

Post-event clear up requires intelligence gathering, too. The quicker that can be done, the better; more chance of finding the smoking gun.

The net result of trying to speed up incident response is that an increasing capability to use intelligence as an event is occurring. As one supplier, Cisco’s Sourcefire, puts it: the need for security intelligence is “before, during and after” an incident.

SANS Security Analytics Survey

Results of the current survey show that the market is in need of analytics and intelligence wrapped around the data that is being (and can be) collected in respondent organizations. In it, only 10 percent of respondents felt truly confident in their “Big Data” intelligence and analytics capabilities. Their biggest impediment is in the process of collecting the correct data in order to make the necessary associations, followed by lack of vulnerability awareness and context. Yet these capabilities are important for a comprehensive detection and response system. The system should also be affordable and able to reduce manpower for strapped IT security departments

Security Analytics Platform

Comparing the top Security Analytics tools in the industry

These categories emphasize varying needs for key Security Analytics features, such as deployment models, modularity, scope and depth of analysis, forensics, and monitoring, reporting and visualization. Several products are discussed, including Blue Coat Security Analytics Platform, Lancope Stealth Watch System, Juniper Networks JSA Series Secure Analytics, EMC RSA Security Analytics NetWitness, FireEye Threat Analytics Platform, Arbor Networks Security Analytics, Click Security Click Commander and Sumo Logics’ cloud service.

Topics: SANS, security, Security Analytics Survey, Sumo Logics, Analytics, Blog, Click Security Click Commander, EMC RSA Security Analytics, Networks JSA Series Secure Analytics

Color me in the color of sacrifice, Prime Minister..

I’m not a very experienced person to enlighten the administrators of my country…But i feel as part of the gen Y defining my country’s what next I felt I should share my thoughts. now or never..

May be i thought i will dedicate a song to my Prime Minister which will tell the crux of the ongoing situation in our country.

Dear Prime Minister Modi,

I love you for the vibe you’ve brought in otherwise sober, dull business momentum of the country.

Want to quote the great quote from the newsRoom TV series on America.

The first step in solving any problem is recognizing there is one-America is not the greatest country in the world anymore.

If there’s a problem pointed out by RBI governor  & one of the billion $ elite entrepreneur who built his company from India for globe from scratch, there’s is one.

Believe me, they’re not alone. There’re tons of us who don’t want the country to become Hindu nation.

The great economic development can’t happen without the intolerance in place.

We may not be in a position to cherish the success the government is doing on it’s reforms in bringing billions of $ worth of venture investments, with losing our diversity fundamentals.

Let’s accept and fix ! Sorry let’s nix it permanently..

Dear Prime Minister, I want the country to be saffron, but the saffron created by ….

And the passion red like the blood that flows in my veins

Mix all this together and bring a new color alive

color me in the colour of sacrifice

let love simmer
on a low flame
then stir it all together
and bring the new colour alive

colour me in the colour of sacrifice

Translation of the song “Rang De Basanti” from movie ” Rang De Basanti”

Take a little soil of my land
Take a waft of perfume from the crazy wind
Take a breath from my ever quickening heart
And the passion red like the blood that flows in my veins

mix all this together and bring a new color alive

color me in the colour of sacrifice

the colour of sacrifice
the colour of sacrifice
the colour of sacrifice

Color the dreams, color the ones you love
Color happiness, Color sadness,
Color new generation, color all crops,
Color your heart beats, color the music
Color your face

the colour of your sacrifice

let love simmer
on a low flame
then stiry it all together
and bring the new colour alive

colour me in the colour of sacrifice

colour your town colour your life
Colour your smile Color your veins

Colour your childhood Color your youth
Paint everything in the color of patriotism

colour me in the colour of sacrifice