
RAUNAQ SINGH
DIRECTOR & CEO,
TARGUS TECHNOLOGIES PVT. LTD.
“We promote user awareness through training and disaster recovery plans to maintain business continuity during cyber incidents.”
Targus Technologies adopts a comprehensive approach to cybersecurity by identifying risks, addressing system vulnerabilities, and implementing robust protections. They use data encryption both at rest and in transit to prevent unauthorized access. Data is classified by sensitivity, with varying protection levels based on the importance of the information. Strict access controls, role-based permissions, and regular system checks ensure that data remains secure and traceable. Targus follows global security standards like ISO 27001, NIST, GDPR, HIPAA, and PCI DSS. They provide ongoing staff training and conduct regular system reviews to stay ahead of evolving threats.
STRATEGIC & SECURED ENABLEMENT
Targus employs a multi-layered security framework to combat threats such as phishing, ransomware, and zero-day attacks. Their integrated tools, including firewalls, intrusion prevention systems, SIEM, and endpoint detection, provide proactive threat detection and mitigation. The Security Operations Center (SOC) offers 24/7 monitoring and rapid response to incidents. Regular vulnerability assessments and patch management, along with email filtering and backup systems, add extra layers of defense. Additionally, Targus promotes user awareness through training and disaster recovery plans to maintain business continuity during cyber incidents.
To secure data access, Targus utilizes advanced authentication methods such as OAuth 2.0, Multi-Factor Authentication (MFA), Single Sign-On (SSO), biometric verification, and token-based systems. They apply the “least privilege” principle, ensuring users only have access to the necessary resources. Attribute-Based Access Control (ABAC) provides further control based on user characteristics and resource types. Public Key Infrastructure (PKI) ensures secure communication and identity verification. These security measures are implemented across both cloud and on-premise environments, ensuring comprehensive protection.
PARTNERSHIP IS CRUCIAL
Distributors and Value-Added Distributors (VADs) play a critical role in enhancing cybersecurity resilience. They bridge the gap between vendors and integrators, offering access to advanced technologies, expert training, and technical support. VADs also provide additional services like custom solutions, certifications, and threat intelligence, helping businesses create scalable, compliant, and secure cybersecurity frameworks. By acting as strategic partners, VADs strengthen businesses’ cybersecurity posture and support rapid response to emerging threats.
See What’s Next in Tech With the Fast Forward Newsletter
Tweets From @varindiamag
Nothing to see here - yet
When they Tweet, their Tweets will show up here.