00:00cyber attacks every 3rd and 4th year and companies also have cyber fraud or cyber attack
00:10so a company like this is the two founders who have made a company for cyber security and
00:19they also have a cyber security company award. What is your name Amit?
00:27What company have you made and what are you doing for this time?
00:33The first time of our company was that cyber security is a big enterprise.
00:39The small companies are so busy that they do not afford the big products that are in big enterprises.
00:45They are vulnerable to cyber attack.
00:48In India, if you talk about GDP contribution to the sector of SME,
00:54we have a total of 60% of SMEs that are vulnerable to cyber attack.
00:59Our mission is to make the cyber security democratise,
01:02make it affordable,
01:03and make a solution for such companies,
01:06so that they can prevent any attack from any threat.
01:09How are you from today?
01:12Today, we have the best cyber security of the India company.
01:16When did your company start and where are you?
01:19This is based out of our good country.
01:20It is based out of our 75 cities.
01:23Our offices are in Bangalore and in the USA.
01:27When you start here,
01:29you are doing international level here,
01:31how many companies are doing security?
01:35Now, we have 300 companies all over India,
01:39which we are doing security.
01:40We are doing security.
01:40We are doing security.
01:40Yes, one of the founders of our company is talking about
01:44what we are doing.
01:44Ankit.
01:45Ankit.
01:46Ankit, you have created a company,
01:48and you are providing security.
01:50What are you doing in the future?
01:53When you are doing cyber security attacks,
01:56what are you doing in the future?
01:58Ankit.
01:59Ankit.
02:01Ankit.
02:14Ankit.
02:19Ankit.
02:21Ankit.
02:36Ankit.
02:39Ankit.
02:41Ankit.
02:55Ankit.
02:57Ankit.
03:02Ankit.
03:05Ankit.
03:06Ankit.
03:07Ankit.
03:08Ankit.
03:09Ankit.
03:09Ankit.
03:10Ankit.
03:11Ankit.
03:11the government tries to become new businesses and become new businesses.
03:14If there are so many businesses,
03:16if there are so many of these businesses,
03:17and the global companies,
03:19we can't trust them as a global business as a global business.
03:25So, it's a question for the overall country's credibility.
03:28So, for that,
03:29we need AI-powered solutions to fight AI.
03:33It's not that people will be replaced in companies.
03:36It's not that the speed of war is happening.
03:39It's not that the speed of war is happening.
03:43It's not that the speed of war is happening.
03:43And since companies have so complicated enterprise products,
03:49we have built a very simple platform
03:52which enables these companies,
03:54without any expertise,
03:56they can secure you.
03:58And in real-time compliance,
04:00they can track real-time compliance.
04:02So, if I work as a global company,
04:05then I can see that
04:06at this time,
04:06it will automatically build my trust.
04:10And overall,
04:11as a company,
04:12India,
04:13as a country,
04:15as a global trusted partner,
04:17I can work with you.
04:18So,
04:19how do you work with your company?
04:24How do you work with your software?
04:43How do you work with your software?
04:51How do you work withESE.
04:55We work всему,
04:58springs to the way of doing this conference?
05:01If you'll like it,
05:06very close to your team,
05:08I'mника96 Not where you know all-time likenesses to your company.
05:18So,
05:18we try to apply those Late-room companies,
05:18and they are very focused on their business and they don't know how to use it.
05:24So our product fits into this existing ecosystem.
05:27It automatically gives us an identity to every user who is working from home or outside.
05:33It gives us an identity.
05:34Like your name.
05:36Your name is Sharma Ji.
05:38Sharma Ji has access to this time.
05:41If someone has attacked you, you can give it to you.
05:45Where did you get attacked?
05:46What happened?
05:47How did you get attacked?
05:50But for all this,
05:52we need to use complex systems and large IT teams.
05:56We can easily use this platform.
06:01We can integrate AI into this platform.
06:04So that the complexity of this is easy to understand.
06:08We can help them to implement this system in real time.
06:14So this is our product.
06:16And one thing we need to know is,
06:18if we talk about it,
06:20what do we need to do with cyber attacks?
06:25The most important thing is to verify before trust.
06:29This means that I know you.
06:31But if you do have something for me,
06:34what should I do with your first default?
06:36It should be verify before trusting.
06:39That you are very important.
06:40You have phoned me.
06:41You have sms.
06:42You have emailed me.
06:43But first,
06:44I will see that this is not a fake email.
06:47It is not a fake SMS.
06:48It is not a fake call.
06:49We have not to blindly trust.
06:51And the other thing,
06:53We need to continue to train and awareness of cyber security and cyber security.
06:57There are new types of attacks and tricks in the market.
07:01If we don't need to update our employees,
07:06then we are very easy to create an AI and attackers.
Comments