Now Loading

Razorpay Elevates Khilan Haria to Chief Product Officer

Razorpay has announced the elevation of Khilan Haria to the role of Chief Product Officer (CPO). This strategic move aligns with Razorpay’s ambitious plans for international expansion, particularly in Southeast Asia, while reinforcing its commitment to UPI and Razorpay POS.

With over sixteen years of experience in product innovation at companies like Cisco, Yahoo!, and Treebo Hotels, Haria has a proven track record of leading cross-functional teams and driving scalable product solutions. As CPO, Haria will spearhead Razorpay’s product strategy, enhancing its product suite across online and offline payments, as well as business banking solutions. His leadership will be instrumental in driving innovation, ensuring the company delivers industry-first products tailored to the evolving needs of businesses in emerging markets. Having spent six years at Razorpay, Haria has played a pivotal role in transforming the company’s product portfolio. Previously serving as Senior Vice President & Head of Payments Product, he has led groundbreaking innovations, including RAY, Optimizer, UPI Switch, Turbo UPI, CC on UPI, and Credit Lines on UPI. His contributions have helped position Razorpay as a leader in fintech by consistently addressing real-world business challenges with cutting-edge solutions.

Congratulating Khilan on his elevation, Shashank Kumar, Co-founder & Managing Director, Razorpay, said, “Khilan has been a driving force behind Razorpay’s innovation journey, playing a crucial role in building transformative products that address the real-world challenges businesses face. His visionary approach and ability to translate challenges into impactful solutions have been integral to our success. As we expand our horizons globally, especially into Southeast Asia, Khilan’s leadership as Chief Product Officer ensures that we continue to deliver impactful solutions to empower businesses in real-time. I’m confident his deep expertise and unwavering commitment to customer-centric innovation will propel our product strategy to unparalleled heights, setting the stage for the next chapter in our mission to empower businesses and redefine financial technology on a global scale.”

Khilan Haria, Chief Product Officer, Razorpay, expressed his enthusiasm for the new role, stating, “Being part of Razorpay’s transformative journey over the past six years has been both an honor and a deeply fulfilling experience. Razorpay has set new benchmarks in fintech innovation, reshaping how businesses handle money movement and empowering them with groundbreaking solutions. As we continue to create a global footprint, I am humbled and thrilled to take on this expanded role and contribute to Razorpay’s next chapter of growth. My focus will remain on building innovative, customer-first products that solve critical business challenges and create lasting impact & value. Together with our exceptional team, I look forward to driving Razorpay’s vision of redefining the future of payments and financial technology both in India and across the globe.”

Commvault Enhances Cyber Resilience with CIS-Hardened Images for Major Cloud Marketplaces

Commvault, a leading provider of cyber resilience and data protection solutions for the hybrid cloud, today announced that the Commvault Cloud Platform can now be easily deployed from major cloud marketplaces utilizing CIS-hardened images. These images, pre-configured with CIS-recommended settings and controls, will be available on Amazon Web Services (AWS), Microsoft Azure, Google Cloud, and VMware.

CIS-hardened images are software files aligned with the Center for Internet Security (CIS) Benchmarks, designed to minimize configuration vulnerabilities. Misconfigurations, such as overly permissive network policies, are among the most common causes of cloud infrastructure attacks, contributing to 23% of breaches, according to industry research. By providing pre-configured security benchmarks, Commvault’s CIS-hardened images mitigate these risks, offering IT and security teams a higher level of confidence in their cloud deployments.

With this latest innovation, Commvault continues its commitment to cybersecurity excellence. These deployment options complement existing security certifications, including FedRAMP® High Authorized, ISO 27001:2013, SOC 2 Type II, and FIPS 140-2. Organizations leveraging Commvault Cloud will now benefit from Pre-built Compliance Checks, Enhanced Cybersecurity, Streamlined Compliance Mapping, Broad Marketplace Availability. This announcement arrives as enterprises accelerate cloud adoption.

“Organizations demand solutions that are not only secure and compliant but also straightforward to deploy,” said Chris Montgomery, CTO – Security, Americas at Commvault. “With CIS-hardened images, we can eliminate the guesswork, providing IT teams with a secure, pre-configured foundation to accelerate their cyber resilience strategies while meeting industry standards.”

“As a security-first organization, having confidence in how our solutions are deployed is critical,” said Marek Duranik, Storage & Data Protection Associate Director at Merck. “Commvault’s CIS-hardened images give us the assurance that we’re starting from a strong security baseline, allowing our teams to focus on protecting and recovering critical data.”

Commvault’s CIS-hardened images will be available globally this quarter at no additional cost to customers. Built on a hardened Rocky Linux 8 operating system, these images are designed to protect both software and infrastructure layers, further strengthening cybersecurity measures across cloud environments.

Bridging the Gender Gap in STEM: Advancing Opportunities for Women and Girls in Science

Background

ashok
Prof. Ashok Sangappa Alur, Vice Chancellor, Kodagu University, Government of Karnataka

Historically a significant gender gap has persisted throughout the years at all levels of science, technology, engineering and mathematics (STEM) disciplines all over the world. Even though women have made tremendous progress towards increasing their participation in higher education on, they are still under-represented in these fields. Gender equality has always been a core issue. Gender equality and the empowerment of women and girls will make a crucial contribution not only to economic development of the world, but to progress across all the goals and targets of the 2030 agenda for sustainable development, as well.

International Day of Women and Girls in Science is observed on February 11th each year. This date was chosen to honour the birthday of Marie Curie, a pioneering physicist and chemist who made ground breaking contributions to the fields of radioactivity and nuclear physics. Marie Curie remains an inspirational figure for women in science. As we approach the International Day of Women and Girls in Science on February 11, it’s essential to reflect on the current landscape of women in STEM and the role of universities in fostering scientific research and innovation. It aims to break down barriers and stereotypes that have historically limited the participation of women in these fields.

Significance and Objectives: The primary objectives of International Day of Women and Girls in Science include:

Promoting Gender Equality: The day emphasizes the importance of achieving gender equality in STEM disciplines, encouraging equal opportunities for women and girls in scientific education and careers.

Highlighting Achievements: It celebrates the accomplishments and innovations of women scientists, showcasing their contributions to research, technology, and scientific advancements.

Inspiring Future Generations: International Day of Women and Girls in Science serves as an inspiration for young girls and students to pursue studies and careers in STEM fields, challenging stereotypes and biases.

Advocating for Inclusion: The day calls for greater inclusion of women in decision-making processes and leadership roles within the scientific community.

Current Statistics on Women in STEM

Globally, women constitute over half of all tertiary education students; however, their representation in STEM fields remains disproportionately low. Between 2018 and 2023, women accounted for only 35% of STEM graduates, a figure that has remained stagnant over the past decade. In India, the scenario reflects similar challenges. Women hold approximately 14% of STEM jobs, indicating a significant gender gap in the workforce. Despite an increase in the number of women enrolling in science disciplines—from 2.6 million in 2016-2017 to 2.9 million in 2020-2021—their participation in STEM careers remains limited.

Role of Universities in Encouraging More Women to Pursue Careers in Science

Higher educational institutions and universities play a pivotal role in bridging the gender gap in STEM. By implementing targeted initiatives, they can create an inclusive environment that encourages women to pursue scientific careers. For instance, the University Grants Commission (UGC) in India has proposed the establishment of “Innovation Universities,” with grants ranging from Rs.100 crores to Rs.300 crores over five years, aiming to foster innovation and research excellence.

Inspiring More Young Girls to Take Up Science and Technology as a Career

Early exposure to STEM can significantly influence young girls’ career choices. Programs like the Atal Innovation Mission (AIM) in India promote a culture of innovation and entrepreneurship through initiatives such as Atal Tinkering Labs in schools, providing hands-on experience in science and technology.

Fostering of Stronger Culture of Scientific Research and Innovation Among Students by the Universities & Higher Education Institutions

To cultivate a robust research culture, universities must invest in infrastructure and provide ample opportunities for student engagement in research. The Department of Science and Technology (DST) in India supports initiatives like the Promotion of University Research and Scientific Excellence (PURSE) and the Fund for Improvement of S&T Infrastructure (FIST), which aim to strengthen research facilities and encourage scientific excellence in universities.

Key Initiatives by Institutions to Promote Scientific Learning and Discovery

Many institutions have launched programs to enhance scientific learning. For example, the National Quantum Mission (NQM) in India, with a budget of Rs.6,003.65 crore over eight years, seeks to develop a vibrant ecosystem in Quantum Technology, promoting both scientific research and industrial R&D.

Conclusion

International Day of Women and Girls in Science is a reminder of the importance of diversity and inclusivity in the scientific community. It recognizes that women and girls have made significant contributions to STEM fields throughout history and deserve equal opportunities and recognition. On this day, we celebrate the women and girls who have shattered barriers and paved the way for future generations of scientists. It is an opportunity to reaffirm our commitment to gender equality in science and to encourage young minds to explore the endless possibilities of STEM. Though progress has been made in promoting women’s participation in STEM and fostering a culture of research and innovation, there is still considerable work to be done. Universities, policymakers, and society must continue to collaborate to create an inclusive and supportive environment that encourages all individuals to pursue and excel in scientific fields. Let us continue to support and empower women and girls in science, ensuring that their voices and talents are heard and valued in the quest for knowledge and innovation.

Author: Prof. Ashok Sangappa Alur, Vice Chancellor, Kodagu University, Government of Karnataka

Disclaimer: The views expressed in this article are solely those of the author and do not necessarily reflect the opinions or policies of ObserveNow Media. The author is solely responsible for ensuring the accuracy, completeness, and validity of the information presented, encouraging readers to independently verify and seek professional advice if needed.

IAS Officer Ashwini Kumar Takes on Additional Role as Principal Secretary of Ports & Transport in Gujarat

In a significant move, IAS officer Ashwini Kumar (1997 batch, Gujarat cadre) has been entrusted with the additional responsibility of serving as the Principal Secretary of the Ports & Transport Department in Gujarat. This new role comes alongside his existing position as Principal Secretary of the Urban Development & Urban Housing Department, further expanding his leadership portfolio within the state administration.

With nearly 28 years of experience in public administration, infrastructure planning, and policy execution, Kumar has played a crucial role in shaping Gujarat’s urban and infrastructural landscape. His tenure at the Chief Minister’s Office in Gujarat was marked by impactful contributions toward policy implementation, infrastructure development, and urban governance.

Currently, he also serves as the Chairman of Gujarat Urban Development Company Limited and Urban Ring Development Corporation Limited, playing a pivotal role in urban planning and city expansion projects. Additionally, he holds key positions as a Nominee Director on the boards of several major corporations, including GIFT City Company Limited, Gujarat Metro Rail Corporation Limited, Diamond Research and Mercantile City Limited, Gujarat Town Planning Consultancy Limited, and Gujarat Olympic Planning & Infrastructure Limited.

Kumar’s academic background further bolsters his expertise in governance and policy-making. An alumnus of IIT Kanpur, he holds a B.Tech in Chemical Engineering and a Master’s degree in Public Services, Policy & Management from King’s College, London. His blend of technical knowledge and policy acumen has consistently driven forward-thinking urban and transport policies in Gujarat.

Gen AI: Redefining B2B Marketing with Precision and Personalization

Generative AI is no longer just a buzzword – it’s a driving force shaping the future of business. While much of the focus has been on its impact in creative sectors and consumer-facing industries, its potential within B2B marketing is equally revolutionary. In an environment marked by complex decision-making processes, vast data landscapes, and the need for highly personalized outreach, Generative AI presents an unprecedented opportunity. It allows B2B marketers to streamline operations, enhance precision in targeting, and build stronger, more meaningful customer relationships at scale.

Content Generation and Customization

At its core, Generative AI leverages machine learning models to create content, analyze data, and automate tasks with minimal human intervention. For B2B marketers, this capability translates into a suite of opportunities to streamline and enhance marketing strategies. One of the most impactful uses is content generation. Crafting tailored proposals, whitepapers, and case studies traditionally demands significant time and resources. Generative AI tools can now produce high-quality, customized content that resonates with specific industries and decision-makers, dramatically reducing turnaround times.

Personalization and Customer Engagement

Personalization in B2B marketing has often lagged behind B2C due to the complexity of organizational structures and longer sales cycles. Generative AI bridges this gap by analyzing vast datasets to uncover nuanced buyer behaviors and preferences. This insight allows marketers to develop hyper-personalized campaigns that address pain points unique to each client. From dynamic email marketing to personalized landing pages, AI-driven customization fosters stronger engagement and accelerates conversion rates.

Predictive Analytics and Demand Forecasting

Another critical application lies in predictive analytics and demand forecasting. By processing historical data and market trends, Generative AI can predict customer needs and identify emerging opportunities. This foresight enables businesses to tailor their offerings and messaging proactively, staying ahead of competitors. Moreover, AI-driven chatbots and virtual assistants streamline customer interactions, providing instant, relevant responses and freeing up human teams for strategic tasks.

Scaling Account-Based Marketing (ABM)

Generative AI also empowers account-based marketing (ABM), a strategy pivotal in B2B marketing. By automating research and content creation for target accounts, AI enables marketers to execute highly targeted campaigns at scale. This scalability allows businesses to engage multiple high-value accounts simultaneously with personalized messaging, fostering deeper relationships and increasing deal closures.

Despite its immense potential, integrating Generative AI into B2B marketing strategies requires thoughtful implementation. Ethical considerations, data privacy, and content authenticity must remain top priorities. Companies must balance automation with human oversight to ensure that AI-generated content aligns with brand voice and industry standards.

To conclude, Generative AI is revolutionizing B2B marketing by driving efficiency, enhancing personalization, and enabling data-driven decision-making. As technology continues to evolve, early adopters of Generative AI stand to gain a significant competitive edge. By harnessing its capabilities responsibly, businesses can forge stronger client relationships, streamline operations, and unlock unprecedented growth opportunities in the B2B landscape.

Author: Sooraj Balakrishnan, Associate Director & Head of Marketing, Acer India

Disclaimer: The views expressed in this article are solely those of the author and do not necessarily reflect the opinions or policies of ObserveNow Media. The author is solely responsible for ensuring the accuracy, completeness, and validity of the information presented, encouraging readers to independently verify and seek professional advice if needed.

boAt Co-founder & CEO Sameer Mehta Appointed as Non-Executive Independent Director at Delhivery

Gurugram-based logistics giant Delhivery has announced the appointment of Sameer Mehta, Co-Founder and CEO of boAt Lifestyle, as a non-executive independent director to its board.

This move signals Delhivery’s commitment to bolstering its leadership with accomplished professionals from diverse industries. Sameer Mehta, a seasoned entrepreneur, holds a B.Com. degree from Narsee Monjee College of Commerce and Economics, Mumbai. He co-founded boAt in 2014 alongside Aman Gupta, successfully steering it into becoming a leading global consumer wearable tech brand. Additionally, he previously co-founded and managed Redwood Interactive, which owned ‘RedGear,’ a well-recognized gaming brand in India.

Commenting on Mehta’s appointment, Sahil Barua, Managing Director and CEO of Delhivery, stated, “Sameer brings more than two decades of entrepreneurial experience to Delhivery’s Board, and we look forward to his insights on what consumers expect from brands and logistics in the decade to come.”

Delhivery boasts a nationwide logistics network spanning over 18,700 pin codes. The company offers a comprehensive suite of logistics solutions, including express parcel transportation, PTL freight, TL freight, cross-border logistics, supply chain management, and technology-driven services.

Since its inception, Delhivery has fulfilled over 3.2 billion shipments and currently collaborates with over 38,000 customers. Its clientele includes a mix of large and small e-commerce players, SMEs, and enterprises, underscoring its position as a key enabler in India’s logistics landscape.

The STEM Gender Gap: Are We Really Closing the Gap or Just Pretending?

The journey to bridging the gender gap in STEM is not just a matter of equality but a call to action for shaping a future driven by diverse perspectives. With powerful role models, inclusive learning environments, and groundbreaking government initiatives, we have the tools to create a STEM ecosystem that nurtures the talent and creativity of women. By continuing to foster opportunities and break down barriers, we can ensure that the future of science, technology, engineering, and mathematics is one where women are not only participants but leaders driving innovation and progress. Together, we can make the dream of gender equity in STEM a vibrant reality.

STEM—Science, Technology, Engineering, and Mathematics—holds immense promise for the world’s future. Yet, a significant barrier threatens to limit this potential: the persistent underrepresentation of women in the field. Much like in other sectors, women continue to face systemic challenges that hinder their participation and growth.

According to the Global Gender Gap Report (2023), women accounted for only 29.2% of the STEM workforce across 146 nations, despite making up nearly half (49.3%) of the total workforce in non-STEM fields. This disparity highlights the urgent need for a more inclusive approach to STEM education and careers.

On International Day of Women and Girls in Science, Siddharth Mala, Correspondent, ObserveNow Media, engaged with higher education leaders to understand their perspectives on the matter.

As technology becomes an integral part of everyday life, STEM education is no longer just a pathway to career growth—it is essential for social progress and even basic digital literacy. Ensuring equal access and participation for women in STEM is not just a matter of fairness; it is a crucial step toward achieving the 2030 Agenda for Sustainable Development.

Highlighting the importance Prof. Priyadarsan Patra, Vice Chancellor, NIST University stated “To inspire young girls to pursue careers in science and technology, we need a multifaceted approach that both addresses systemic barriers and fosters genuine interest among them. I believe we can achieve this through several key strategies.”

  • Firstly, showcasing powerful role models is crucial. Highlighting the achievements of women scientists, both past and present, demonstrates that success in STEM is attainable for girls, even in the face of historical and ongoing biases.
  • Secondly, creating inclusive and supportive learning environments is essential. This involves more than simply admitting female students; it requires actively fostering their success. Offering scholarships and financial aid specifically for women in STEM can help address economic barriers. Establishing clubs and societies where girls can collaborate, share their interests, and build a nurturing community is equally important.
  • Thirdly, integrating hands-on, project-based learning into the STEM curriculum can make these subjects more engaging and relevant for young girls. By allowing students to tackle real-world problems and participate in innovative projects, we can spark their curiosity and demonstrate the practical applications of scientific and technological knowledge.

Government initiatives play a pivotal role in fostering gender equity, particularly in STEM, where systemic barriers often hinder women’s participation. Recognizing this, India’s Department of Science and Technology (DST) has launched the WISE-KIRAN initiative, a comprehensive framework designed to support women at various career stages in science and technology. Programs such as WISE-PhD and WISE-PDF facilitate doctoral and post-doctoral research, while WIDUSHI ensures continued engagement for retired and non-permanent women scientists. WISE-SCOPE and WISE-IPR encourage societal impact and intellectual property expertise, respectively, while WINGS promotes international research opportunities. Additionally, CURIE enhances research infrastructure, Vigyan Jyoti fosters STEM education among girls, and GATI drives institutional gender equity. These initiatives collectively represent a strategic effort to bridge the gender gap, empower women in STEM, and create a more inclusive scientific ecosystem in India.

“Governments should introduce special funding programs and scholarships to support girls in pursuing undergraduate studies in basic sciences. Providing opportunities for them to study at top institutions across the country and abroad can further motivate them to build careers in research” said Mohammad Atiqur Rehman, Founder Director, The Creator International School, Khamgaon & Research Scientist (Ex), Tata Institute of Fundamental Research, Mumbai.

UNESCO data reveals that, on average, women make up approximately 33.3% of researchers worldwide, while only 35% of students pursuing STEM-related studies are female, underscoring a notable gender disparity in science and technology.

Despite the growing demand for technological expertise in the Fourth Industrial Revolution, women continue to be underrepresented, comprising just 28% of engineering graduates and 40% of those in computer science and informatics. The upcoming UNESCO Science Report, particularly the chapter To be Smart, the Digital Revolution will Need to be Inclusive, highlights the persistent gender bias faced by women in scientific careers.

This highlights the urgent need for targeted policies, mentorship programs, and institutional reforms to create a more inclusive and supportive environment for women in STEM, ensuring equal opportunities for participation and advancement in these critical fields.

Underscoring the role of Universities in Women’s Participation in Science, Dr. Anamika Singh, Director, Pune Institute of Business Management (PIBM) underscored “Universities shape the future of STEM by providing scholarships, mentorship, and strong female representation. By breaking biases and fostering an inclusive culture, they empower women to lead in science.”

Early exposure, hands-on learning, and visible female role models can spark a passion for STEM in young girls. When they see women excelling, they believe they can too. Encouraging curiosity and confidence makes all the difference. A culture of discovery grows when students have access to cutting edge research, collaboration, and real world problem solving. Innovation labs, hackathons, and industry partnerships help turn ideas into breakthroughs, further added Dr. Singh.

Citing such initiatives Dr. Safia Farooqui, Director, Dr. D Y Patil Vidyapeeth – Centre for Online Learning, asserted “Dr. D.Y. Patil Vidyapeeth, Centre for Online Learning, Pune, is actively fostering a strong culture of scientific research and innovation among students by creating an environment that encourages curiosity, experimentation, and collaboration.”

The institute integrates research-based learning into its curriculum, allowing students to engage in real-world problem-solving. Through hands-on projects, interdisciplinary research, and industry partnerships, students gain practical experience and exposure to cutting-edge advancements. Dr. D.Y. Patil Vidyapeeth, Centre for Online Learning, Pune, provides access to well-equipped virtual labs, research funding, and mentorship programs. Faculty members and researchers guide students in exploring complex scientific challenges, ensuring meaningful research outcomes, concluded Dr. Farooqui.

This highlights the journey to bridging the gender gap in STEM is not just a matter of equality but a call to action for shaping a future driven by diverse perspectives. With powerful role models, inclusive learning environments, and government initiatives, we have the tools to create a STEM ecosystem that nurtures the talent and creativity of women.

Conversations about the future of education should always be the talk of the town, and ObserveNow Media continues to lead the way in driving transformation in the education sector. With this commitment, we are excited to present the 9th Edition of the Education Leaders Conclave & Awards, which will be held in New Delhi on 21st February 2025. This event will bring together leading thinkers, innovators, and professionals to discuss ideas and celebrate achievements in education. Join us as a delegate at this impactful event—register now and be a part of shaping the future of education!

Fortinet’s Strong Forecast Propels Shares Up 12%

Fortinet projected its full-year revenue above Wall Street estimates, reinforcing its position as a leader in cybersecurity. The optimistic outlook, fueled by rising demand for cybersecurity solutions amid increasing online threats, sent the company’s shares surging 12% after the bell.

As digital scams and high-profile security breaches continue to pose risks to businesses, enterprise clients are intensifying their investments in AI-powered cybersecurity solutions. The rapid evolution of generative AI has further heightened the necessity for data security measures, providing a significant boost to firms like Fortinet. The advanced capabilities of AI-driven threats have made cybersecurity an even more critical component of digital operations.

Fortinet appears well-positioned to capitalize on the forthcoming industry-wide firewall refresh cycle, a strategic opportunity to retain existing customers, expand its reach, and acquire new clients. In a notable leadership shift, Fortinet announced in a regulatory filing that Chief Financial Officer Keith Jensen will retire from his position in May this year. Christiane Ohlgart, who has served as the company’s chief accounting officer since March of the previous year, will step into the role of CFO.

The cybersecurity firm projects its revenue for fiscal 2025 to range between $6.65 billion and $6.85 billion, surpassing analysts’ average estimate of $6.63 billion, as compiled by LSEG. Additionally, for the first quarter, Fortinet forecasts revenue between $1.50 billion and $1.56 billion, aligning closely with market expectations, with the midpoint matching analysts’ projection of $1.53 billion.

For the fourth quarter ending December 31, Fortinet reported revenue of $1.66 billion, surpassing Wall Street estimates of $1.59 billion. This robust performance underscores the growing reliance on advanced cybersecurity solutions in an increasingly digital and threat-prone landscape.

Triton Announces First Close of INR 120 Crore Second Fund to Boost B2B Tech Startups

Early-stage venture capital firm Triton has secured the first close of its second fund at INR 120 crore, targeting a total corpus of INR 240 crore ($28 million). The Mumbai-based firm, which specializes in B2B Tech and tech-enabled services, aims to foster innovation and support high-potential startups in India’s dynamic technology sector.

Triton’s first fund successfully backed startups across Enterprise SaaS, AI, B2B marketplaces, and marketing services, delivering strong returns and bolstering investor confidence. With Fund I nearing full deployment, Triton is set to build on its success with Fund II, which will focus on pre-Series A and Series A investments, ranging from INR 8–16 crore per company.

Expressing confidence in the fund’s potential, Managing Partner Pradyumna Dalmia stated, “Triton Fund II reinforces our commitment to advancing B2B Tech innovation and supporting transformative startups in India. The strong performance of Fund I positions us well to create significant value for investors and portfolio companies alike.”

Partner Dev Raman highlighted the changing investment landscape, noting that with the market moving past the funding boom, high-quality founders are now adopting a more disciplined approach to capital. “This shift is fostering a new generation of startups with solid economic foundations. Triton is committed to providing patient capital and strategic support to help these businesses scale,” he said.

Continuing its core focus on B2B Tech, Triton Fund II will invest in sectors such as Enterprise SaaS, SMB Tech, Agentic AI, DeepTech, and Tech-enabled Services. With a strong track record and a 100% success rate across its portfolio, Triton remains a key player in India’s early-stage investment landscape.

The Role of Identity and Access Management (IAM) in Protecting Applications for Building a Stronger Security Framework

With our lives now immersed in a predominantly digital environment, application security has become critical. The threat of cybercrimes is becoming more sophisticated, accompanied by growing regulatory expectations to protect sensitive data through effective Identity and Access Management (IAM). According to the ITRC, there were 1,571 reported incidents during the first six months of 2024 of compromised data, representing a 14% increase compared to 2023.

As a result, organizations must implement robust security measures to safeguard their digital assets. One of the most effective strategies is leveraging IAM, a framework that ensures only authorized users have access to applications, data, and systems. In this article, we will explore the significance of IAM in application security and discuss key techniques such as Multi-Factor Authentication, Single Sign-On, and Role-Based Access Control.

What is Identity and Access Management (IAM)?

Identity and Access Management (IAM) is a set of policies, processes, and technologies designed to manage and control user identities and access to resources within an organization. In essence, IAM provides companies with the tools to ensure that only authorized individuals have access to resources at the right time, reducing or even eliminating the risk of unauthorized access and potential data breaches. IAM is crucial for maintaining secure and compliant application environments as it oversees the entire user identity lifecycle, from creation and authentication to authorization and deactivation.

The Significance of IAM in Securing Applications

As organizations embrace cloud-based solutions, software-as-a-service (SaaS) applications, and remote working practices, the complexity of securing applications has increased. The traditional security models that relied on perimeter defenses are no longer sufficient to protect sensitive data. IAM helps manage user access across multiple environments from a centralized perspective, offering a range of benefits:

Enhanced Security: IAM solutions prevent unauthorized access by providing strong authentication and authorization protocols.

Improved Compliance: IAM Solutions, with regulatory frameworks like GDPR, HIPAA, and CCPA, IAM solutions provide the tools to maintain compliance with data protection laws.

Efficient User Management: IAM systems streamline the process of adding new users, as well as updating or revoking permissions to access application resources. This efficiency saves IT teams valuable time by organizing access management more effectively.

Reduced Risk of Data Breaches: By enforcing strict access controls and continuous monitoring, IAM minimizes the chances of malicious actors gaining access to sensitive information.

Key IAM Techniques for Strengthening Application Security

IAM provides multiple techniques to protect applications and sensitive data from unauthorized access. Some of the important techniques that are most integral to application security today are Multi-Factor Authentication (MFA), Single Sign-On (SSO), and Role-Based Access Control (RBAC).

1. Multi-Factor Authentication (MFA)

Multi-Factor Authentication (MFA) is one of the most effective ways to enhance security by requiring users to provide multiple forms of verification before accessing an application. Rather than relying on the traditional password (something the user knows), MFA adds additional layers of security by requiring something the user has (such as a smartphone or security token) and/or something the user is (such as a fingerprint or facial recognition).

MFA significantly reduces the risk of unauthorized access, even if the password is compromised. For instance, if an attacker steals a user’s password, they will still need the second factor such as a one-time passcode sent to the user’s mobile device to gain access to the application. This makes MFA an essential component of any IAM strategy, particularly for protecting sensitive applications and data. US Scoop reveals that big businesses lead the way in embracing MFA solutions to protect their digital assets and sensitive information, and as many as 87% of companies with over 10000 employees utilize MFA, whereas in small-sized companies having 26 to 100 employees, the rate drastically declines to 34%, while companies having less than 25 workers, the adoption rate is even lower at 27%.

2. Single Sign-On (SSO)

One key technique for managing single sign-ons is SSO, which allows users to access multiple applications within a trusted Identity and Access Management (IAM) system by entering a unique set of credentials just once such as a login ID and password or a more advanced authentication method. Once authenticated, users can seamlessly access all linked applications without needing to log in again. This can be very much seen in Google, through which different Google services like Gmail, Drive, and YouTube are allowed to be logged into using a single credential set.

In addition to making life easier and more productive for users, who no longer need to remember numerous passwords, SSO enhances security by centralizing authentication, allowing IT teams to enforce strong protocols more effectively. A key advantage is the reduced risk of weak passwords, a common vulnerability in traditional password systems. SSO also simplifies user management and enhances the overall user experience, especially for organizations relying on a suite of cloud-based applications. For instance, Google’s SSO functionality streamlines authentication across various services while minimizing the attack surface associated with managing multiple passwords, ultimately strengthening security.

3. Role-Based Access Control (RBAC)

Role-Based Access Control (RBAC) is an access management approach that involves granting roles to individual users, thereby providing these users with specific rights within the organization, as opposed to granting permissions to all individual users. Users are placed into a role (administrator, manager, and employee) and permissions are granted based on the role. This boosts efficiency in large organizations and ensures that individuals only have access to the resources necessary for their specific job functions.

RBAC plays a key role in enforcing the principle of least privilege, ensuring that user access is limited to the minimum required to perform their essential tasks. This approach helps protect sensitive data by minimizing the potential impact of a breach and ensures compliance with data protection regulations. Additionally, RBAC simplifies auditing and reporting, as the system clearly defines which users are authorized to access specific resources.

For example, in a healthcare organization, doctors may have access to patient records, while administrative staff are granted authority over appointment schedules. RBAC restricts access to sensitive medical data, reducing the risk of data breaches and ensuring greater compliance with established standards. By assigning access based on roles, RBAC helps organizations maintain the appropriate level of access for each user, thereby enhancing both security and compliance efforts.

Why These Techniques Matter for Application Security?

As cyber threats continue to evolve, securing applications is not a one-time task but an ongoing process. IAM techniques like MFA, SSO, and RBAC are critical to creating a strong defense against unauthorized access and minimizing the potential attack surface of an organization’s applications.

  • MFA adds an important layer of defense by ensuring the user identity is authenticated through multiple forms of authentication, significantly reducing the risk of compromised accounts.
  • SSO improves user experience and reduces the complexity associated with authentication but at the same time, keeps control of authentication centralized across multiple applications.
  • RBAC provides granular control over who can access what, limiting unnecessary exposure to sensitive data and enforcing the principle of least privilege.

Together, these IAM techniques can be integrated for a comprehensive security strategy that enables organizations to protect their applications, minimize the risk of breaches, ensuring that only authorized users can access critical systems and data.

Conclusion

Securing applications is crucial for protecting business assets and ensuring compliance with data privacy and protection regulations. Identity and Access Management (IAM) plays a key role, with techniques like Multi-Factor Authentication (MFA), Single Sign-On (SSO), and Role-Based Access Control (RBAC) forming the foundation of secure access management. By adopting these methodologies, an organization can minimize unauthorized access, streamline user management, and significantly strengthen application security. As cybercrime threats become increasingly sophisticated, a robust IAM solution is essential for safeguarding a business’s digital operations and maintaining stakeholder trust.

(Article by Mr. Shibu Paul, Vice President – International Sales at Array Networks)

Disclaimer: The views expressed in this article are solely those of the author and do not necessarily reflect the opinions or policies of ObserveNow Media. The author is solely responsible for ensuring the accuracy, completeness, and validity of the information presented, encouraging readers to independently verify and seek professional advice if needed.

Upcoming Conferences