Prepare To Be Assaulted!
Sign in

editricon Prepare to be assaulted!

Just some thoughts about humanity, which is in the grip of technology both to its good and bad luck! Two weeks back we got up from our blanket in the early morning to read about a cruel phishing. A huge amount of money which had been gathered by Red Cross activists to spend for revival activities in quake hit China, was syphoned off by an act of phishing. Just some days ahead of that another security issue hit headlines of the global media that security analysts at McAfee warned of a Trojan program that emerged in cyber space and attacked around 50 million computers globally in a weeks time.

Yes security is a problem nationally and internationally. Various Web security firms are coming out with different solutions to shield off these bloody phishers even as threats are sprouting in the hundreds.

Aujas Networks is one of such company, which provides a pure-play Digital security services. The company offers high-end life-cycle security services including Application Security, IT Risk Management, Identity Management and Vulnerability Management. The company offers IT security services for ‘Enabling Digital Defense’ to global clients. Aujas is a Sanskrit word that means "strength and energy of a warrior". With a vision ‘To be the best-in-class, pure-play provider of advanced secure technologies’, Aujas combines SaaS with security.

Launch of the company in an already IT-choked Bangalore had a uniqueness that this was the seventh company in India that IDG Ventures India, the Indian arm of IDG Ventures, has invested in. More over it was the second investment of the IDG India in the information security space, a market which is worth $17 billion dollars.

In its operation in the market, Aujas has an agreement with iViZ, a network security firm, to receive assessment services. IViZ, which was the first IT security firm that IDG Venture India made investment in, will focus on depth and automation of assessment services and provide Aujas with service to address the security lifecycle with specific
domain expertise.

start_blog_img