Endpoint Security , Fraud Management & Cybercrime , Hardware / Chip-level Security

The Need to Look Beyond Endpoint Security

Kaspersky's Bhayani on Evolving to Predictive Analytics and Response
Shrenik Bhayani, general manager - South Asia, Kaspersky Lab

With endpoint security, the fundamental concept was always to detect and prevent. Mature security strategies today are increasingly looking at response and remediation as well to complete the cycle, Says Shrenik Bhayani, general manager - South Asia at Kaspersky Lab.

See Also: 2024 Threat Hunting Report: Insights to Outsmart Modern Adversaries

In this video interview recorded at ISMG's Fraud and Breach Prevention Summit in Bengaluru, he also talks about:

  • The state of ransomware;
  • The need for analysis and response;
  • Critical infrastructure and nation-state attacks.

Bhayani took over as Kaspersky Lab South Asia's general manager in October 2017, covering India, Sri Lanka, Bangladesh, Nepal, Bhutan and the Maldives. In this role, Bhayani is responsible for further developing the growth of the company in the South Asian SMB and enterprise markets, capitalizing on the demonstrated capability of Kaspersky Lab's industrial cybersecurity solutions for the critical vertical sectors. With over 17 years of sales leadership experience across the information and communication technology sector in the South Asia market, Bhayani lists channel sales, distribution, business development to solution design, and support services among his areas of expertise.


About the Author

Varun Haran

Varun Haran

Managing Director, Asia & Middle East, ISMG

Haran has been a technology journalist in the Indian market for over six years, covering the enterprise technology segment and specializing in information security. He has driven multiple industry events such as the India Computer Security Conferences (ICSC) and the first edition of the Ground Zero Summit 2013 during his stint at UBM. Prior to joining ISMG, Haran was first a reporter with TechTarget writing for SearchSecurity and SearchCIO; and later, correspondent with InformationWeek, where he covered enterprise technology-related topics for the CIO and IT practitioner.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.