mkeÀe³eyee@keÌme efmeke̳egefjìerves SmeF&HeerSue-meesu³egMevme SbìjÒeeF&me Òee. efue.®³ee Yeeieeroejerletve DeeHeuee peeieeflekeÀ Yeeieeroejer DeeJeekeÀe Jee{Jeuee
cegbyeF&, 12 ef[meWyej 2012- GÊejue#³eer, megj#eeefJe<e³ekeÀ efjmkeÀ ce@vespeceWì meesu³egMevmeceOeerue DeûeieC³e kebÀHeveer Demeuesu³ee mkeÀe³eyee@keÌme efmeke̳egefjìerves Deepe Yeejleeleerue DeeIee[er®eer Dee³eìerceOeerue megj#ee vesìJeke&À DeeefCe meJn&jefJe<e³ekeÀ Hee³eeYetle mesJee HegjJeþe DeeefCe J³eJemLeeHeve HegjJeCeejer efJe¬esÀlee-cegkeÌle mesJee HegjJeþeoej kebÀHeveer Demeuesu³ee SmeF&HeerSue-meesu³egMevme SbìjÒeeF&me Òee. efue.®³ee Yeeieeroejerletve DeeHeu³ee OeesjCeelcekeÀ ®e@vesue Yeeieeroejeb®³ee peeieeflekeÀ peeȳeele Yej Ieeleu³ee®es peenerj kesÀues.
meesu³egMevme SbìjÒeeF&me Òee. efue. ®es J³eJemLeeHekeÀer³e meb®eeuekeÀ ÒeeflekeÀ Heìsue cnCeeues, ’2009 ceO³es SmeF&HeerSueves iejpeebceO³es He[uesu³ee ojer®es efJeMues<eCe meg© kesÀues DeeefCe iejpe Demeuesu³ee #es$eeb®ee MeesOe ueeJeuee. l³ee®e #es$eebkeÀefjlee les Deepe leb$e%eeveefJe<e³ekeÀ GHee³e³eespevee HegjefJele Deensle. Deepe, efmemkeÀes Dee³eìerefJe<e³ekeÀ Hee³eeYetle megefJeOeeb®³ee J³eJemLeeHevee®es FäleceerkeÀjCe keÀjC³eele, keÀeBHuee³evme DeeefCe efjmkeÀ ce@vespeceWì ³eebJej Ke®e& nesCeeje JesU keÀceer keÀjC³eele DeeefCe vesìJeke&À keÀveskeÌìerJnerìer DeeefCe ceesefyeefueìer ³eeb®eer Kee$eer efceUeJeer cnCetve ceole keÀjCeeN³ee GHee³e³eespeveeb®³ee MeesOeele Deens.“
’mkeÀe³eyee@keÌmeyejesyej®³ee YeeieeroejercegUs Deecneuee Deece®³ee ûeenkeÀebvee HeÀe³ejJee@ueceOeerue yeoueeb®³ee J³eJemLeeHeve He×leer mJe³eb®eefuele keÀjC³eele, keÀeBHuee³evme®es ÒeoMe&ve keÀjC³eele DeeefCe vesìJeke&ÀefJe<e³ekeÀ efjmkeÀJej keÀe³ece osKejsKe keÀjC³eele ceole keÀjC³eekeÀefjlee veJ³ee GHee³e³eespevee HegjJelee ³esCes Meke̳e nesCeej Deens.“
``Yeejlee®ee J³eJemee³e peueoefjl³ee Jee{le Deens DeeefCe l³eeves peeieeflekeÀ DeLe&J³eJemLesle cenlJeHetCe& mLeeve ÒeeHle kesÀues Deens. l³eecegUs SJnevee mebmLeevee efJejesOeer MekeÌleeR®³ee mee³eyej nuu³eebcegUs mesJee efJemkeÀUerle Peeu³eecegUs efvecee&ve nesCeejs OeeskesÀ DeeefCe meesmeeJes ueeieCeejs vegkeÀmeeve ³eeb®³eeyeÎue keÀuHevee Deeueer Deens“ mkeÀe³eyee@keÌme efmeke̳eefjìer ®es cegK³e keÀe³e&keÀejer DeefOekeÀejer efie[er keÀesnsve cnCeeues, ’cetu³eJeeve [sìe DeeefCe J³eJemee³e mesJee ³eeb®es j#eCe keÀjC³eekeÀefjlee ceoleer®eer iejpe Demeuesu³ee kebÀHev³eeb®³ee mecetneuee GHee³e³eespevee osT keÀjC³eele Deece®eer ceole keÀjCeeN³ee veJ³ee Yeeieeroejeb®es Deecner mJeeiele®e keÀjlees.“
DenceoeyeeoceO³es cegK³eeue³e Demeuesueer SmeF&HeerSue YeejleYej keÀe³e&jle Deens DeeefCe efle®eer keÀe³ee&ue³es cegbyeF&, HegCes, efouueer, yebieueesj DeeefCe nwêeyeeo FLes Deensle. SmeF&HeerSue Denceoeyeeo DeeefCe cegbyeF&ceO³es ÒetHeÀ-Dee@HeÀ-keÀvmesHì ’ìskeÌvee@uee@peer meesu³egMevme meWìme&“ ®³ee ceeefuekesÀleosKeerue iegbleJeCetkeÀ keÀjle Deens.
mkeÀe³eyee@keÌme meesu³egMevme®eer GlHeeoves SmeF&HeerSueceOetve mee@HeÌìJes³ej uee³emevme, mkeÀe³eyee@keÌmeceOeerue SKeeos GHekeÀjCe efkebÀJee keÌueeT[Jej DeeOeeefjle GHee³e³eespevee cnCetve osKeerue GHeueyOe nesT MekeÀCeej Deensle. SmeF&HeerSuemenpe DebceueyepeeJeCeer DeeefCe FäleceerkeÀjCe Peeuesues keÀe³e&keÀejer He³ee&JejCe ³eeb®eer Kee$eer yeeUieC³eekeÀefjlee HetJe&/He½eele meuueeieej megefJeOeeb®eer ÞesCeer osKeerue HegjJeCeej Deens.
mkeÀe³eyee@keÌme efmeke̳egefjìer SbìjÒeeF&me®³ee GlHeeoveebceO³es meceeJesMe Deens:
About Solutions Enterprise Pvt. Ltd. (SEPL)
Through a comprehensive range of premium solutions specifically designed to meet the needs of clients, SEPL plan, deploy, optimise and manage complex and critical IT Infrastructures. SEPL has the right people, processes and technology expertise to deliver exceptional service levels and real value. SEPL provides Best-in-class service approach, providing fast incident response and early issue resolution, with 24x7 coverage and support. For more information visit www.sepl.net
About Skybox Security, Inc.
Skybox Security, Inc. is the leader in proactive security risk management solutions, providing automated tools that find and prioritize cyber risks such as vulnerabilities, firewall configuration errors, and access compliance issues. Our solutions help IT security personnel continuously monitor security risks that could lead to a data breach or cyber-attack. Organizations in Financial Services, Government, Energy, Defense, Retail, and Telecommunications rely on Skybox Security solutions to reduce risk exposure and achieve compliance. For more information visit www.skyboxsecurity.com