Category Archives: Uncategorized

Top 10 reasons for decision makers to recommend Network Infrastructure Security management (NISM) Solution

Network Infrastucture Security Management solutions (NISM) can continuously provide network vizualisation and identify critical attack risks and non compliance in the complex security infrastructure. It provides security, risk and network teams with a firm understanding of where security is working, where investment is needed and where the greatest cyber attack lies.

Knowing the network, knowing the assets, knowing the security, mapping the topology, prioritize and fixing, continuous monitoring, change management and workflow build are the steps companies must take to provide an adequate network security.

Here are some useful top of mind recall areas for decision makers to go for NISM solution.

1. Visualize the network infrastructure

A. Shows network access and vulnerability paths, determine connectivity, view device details and evaluate any path
B. Visibility solves problems and can prevent thousands of cyber threats.

2. Control

A. Prioritize the vulnerabilities. The bank has say 100,000 vulnerabilities; this system will prioritize to say 100 or 200 for your attention. Over a period this exercise will optimize the security posture.
B. Highlight issues on your network path, quickly spot trouble areas and drill down to identify specific issues
C. Ensure all the access controls are correctly configured

3. Prevent

A. Proactively prevent next attack
B. Integrates knowledge of your own network, evaluates all paths to and from your critical data so you can prevent attacks and significantly reduce risk to your business.

4. Compliance

A. Solution gives you information regarding network security standards and implementations so that you can verify you are in compliance.
B. You can prove that your network follows applicable regulations and maintains those standards at all times during the time period in question.

5. Security is about systems
A. Help you to understand the interaction between the devices
B. It’s not enough to understand each element in isolation; what’s important is how these elements work together as one system.

6. Network complexities exceeds human ability to analyses

A. You need automation to properly assess the complex and quick-moving changes in your network, because you can’t handle it otherwise
B. Attackers use automation to find the holes, so you must need an automation tool as response
C. Even a 1-percent error rate in your security implementation can lead to problems affecting hundreds of changes, so using automation helps you pick out the errors and make your fixes as soon as possible.
D. Multiple points of access mean multiple opportunities for threats. You can use automation to close these holes.

7. Inconsistent IT implementations

A. Ensuring each and every access point uses the most effective and appropriate rules and regulations.
B. Even a large and attentive IT team can face an overwhelming challenge in trying to identify all security needs and provide a good remedy for each problem

8. Automation

A. No matter how many security people you have (or how skilled they are), your network security plans must include automation. Automation is simply better and faster at testing than humans can ever be.

9. Testing

A. NISM solutions can typically run over 100 basic tests for each device. Such tests include testing for whether the vendor-supplier default password is in use, whether insecure management protocols or services are enabled, and similar industry-wide best practice checks. These tests are oriented towards individual devices.
B. System test tells how the system works under the normal condition as well as when fault occurs and will verify connectivity between network zones, such as DMZ or cardholder data

10. Metrics

A. With the meaningful metrics with trending data, you can have meaningful discussions about attack risk with senior management in your organization
B. Metrics will be able to answer questions including: Where is security working, and where is additional investment needed? Where are the security holes? Are we as compliant today as we were when we passed the audit? How does our security posture compare to a month ago? A year ago?


Anatomy of a screenplay

Anatomy of a screenplay

A screenplay or script is a written work by screenplay writers for a film. These screenplays can be original works or adaptations from existing pieces of writing. In them, the movement, actions, expression, and dialogues of the characters are also narrated.

Is there is an underlying formula for screenplay.  I am trying to give a generic frame work on how to go about with the ups and lows of story and how various can be managed to fill up the screenplay.

<div style=”margin-bottom:5px”> <strong> <a href=”; title=”Anatomy of a screenplay” target=”_blank”>Anatomy of a screenplay</a> </strong> from <strong><a href=”; target=”_blank”>Twinkle Sebastian</a></strong> </div>

Surya Namaskar ( Sun Salutation)

Surya Namaskar ( Sun Salutation)

Surya Namaskara also known in English as Sun Salutation (lit. “salute to the sun”) is a common sequence of asanas. Its origins lie in a worship of Surya, the Hindu solar deity. This sequence of movements and asanas can be practised on varying levels of awareness, ranging from that of physical exercise in various styles, to a complete sadhana which incorporates asana, pranayama, mantra and chakra meditation. It is often the beginning vinyasa within a longer yoga series. Sūrya Namaskāra may also refer to other styles of “Salutations to the Sun”.

<div style=”margin-bottom:5px”> <strong> <a href=”; title=”Surya Namaskar (Sun Salutation)” target=”_blank”>Surya Namaskar (Sun Salutation)</a> </strong> from <strong><a href=”; target=”_blank”>Twinkle Sebastian</a></strong> </div>

Lead Generation Tools

Lead Generation Tools

Article deals with the inbound and outbound lead generation tools available. Explains 21 ways to grab the leads.  Gives an overview of the whole scenario.

<div style=”margin-bottom:5px”> <strong> <a href=”; title=”Ways for sales lead generation” target=”_blank”>Ways for sales lead generation</a> </strong> from <strong><a href=”; target=”_blank”>Twinkle Sebastian</a></strong> </div>

4 sales tips for uncovering the needs of customer

4 sales tips for uncovering the needs of customer

Best solution wins business. Solution comes though the thorough understanding of the needs and understanding needs should be backed by great questioning. The following tips help sales people to uncover the needs of companies before preparing the presentation.
1.) Create a mood match with the customer
Its interesting to know that the secret of success in any business deals lies in ‘You’ and not in ‘I’ or ‘My’. This makes customer feel that you are thinking about him and his issues, develops positive vibe in the conversation ultimately allow customer to open up more before the sales person. This in turn helps to establish a relationship with the customer.
2.) Where do we find the information about the customer?
The vision, mission, investor relation and press release are the not to miss pages in the website. The industry knowledge and the positioning of the company do matter. Word with the competitors decision makers (if you know any) and dealers help in understanding issues. Probing gatekeeper does add value to the final draft. It is recommended to directly call the decision maker during the appointment fixing to pull out information if required.
3.) How to frame questions?
A question has to be prepared from decision maker personal perspective and link his likes to products. Relevant questions can be framed from the goal, history and lifestyle of the customer. Questioning is the most obvious way to demonstrate our interest in their needs.
4.) Be prepared to listen
Listening is the key as the smallest detail could be the hottest button. Don’t think about your next question while your customer speaks. Size Up your listening skills by listening to the emotions in the story. Talk with the prospect.