Advertisment

Gemini communications to focus on security solutions

author-image
Swaminathan
New Update

Gemini communications, one of the lead player in the areas Network, Network Security, LAN, WAN, E-Governance, ITeS, IT Strategic, IT consulting and Wireless domains, is all set to focus more on the data security segment. The name of the new solution is ‘SURAKSHA' (the best protection). 

Advertisment

In an interaction with ‘The DQ Week', R Ramkumar, Chairman, Gemini Communications, said, " This year, the whole focus is on the trying to build on security services. When it is security, it will be both security monitoring services and device management. We will be offering managed authentication services. In these days One Time Password (OTP) services are used for very critical application. All the organisations are becoming very conscious on the data accessed both inside and outside the organisation. Our solution is not Dependent on the mobile network and generate and also manage authentication services." 

Ramkumar said that they are also giving security as a service rather than a product. "By building a firewall, we will take complete responsible for managing and updating the firewall. Customer gets a guarantee what is happening in the transactions, how many unauthorized hits, how we are defending them.", he said who further added that their focus is also in secure messaging service . "One of the biggest focus areas for possible attack is e-mail server. The best way for an outsider to know the confidentiality of an organization is to take control of the e-mail server. By doing so, they can easily learn the language and transaction of the organization. What we are doing is not just monitoring the virus, spam, secure message, but we have, two levels- monitor the exchange." 

For example, imagine a attempts were made to log in for five times or six times. If the attempts goes beyond a timeframe and continues for some days, it is sure that something is wrong and alert the message should be sent to check what vulnerable exists in the server. We will look at patterns of the hits, net the pattern and correlate. We are also giving OTP, second factor authentication on top of the initial authentication."

Advertisment
Advertisment