eScan offers anti-virus and content security solutions powered by futuristic technologies such as MWL technology, DIRC technology, NILP technology, and sophisticated Anti-Virus Heuristic algorithms.
Govind Rammurthy, MD & CEO, eScan, shares his views on the latest trends and challenges in content security and elaborates on how eScan helps clients address various security concerns.
What are your latest offerings?
The latest version of eScan security solutions with Cloud Security for businesses comprises
of an efficient management console that helps simplify endpoint security administration and
helps lower total cost of ownership by reducing administrative overhead as well as the cost
associated with managing multiple endpoint security products. It provides operational
efficiencies such as single software updates and policy updates, unified and central
reporting as well as a centralized licensing and maintenance program.
eScan offers advanced IT management through comprehensive Asset Management,
managing Print activity and customized real-time reporting modules. It neutralizes the
requirement of any other third-party software for meeting your specific requirements in
managing, monitoring and controlling security on network computers.
What are the latest price trends and technology trends?
The current cyber security landscape comprises of Advanced Persistent Threats that have
been one of the fiercest examples in the field of stealth threats. They are complex enough to
stay undetected for weeks in the field of cyber warfare where exposure of corporate data
and espionage is more of an agenda.
The rise in usage of Smartphones has essentially turned them into a fundamental objective
for cybercriminals, who have started to target these devices at a much larger scale. Whether
it is a fake antivirus scam, malware using social networks to spread or even e-mail
attachments which come loaded with viruses – these threats continue to hinder business
Though Blackhole exploit kit broke new grounds in 2012 but in 2013 it gave rise to other
stealthier malware with CryptoLocker being the stealthiest of them all. Moreover, Botnets
continue to be dangerous for IT infrastructure as the working of a bot is complex and can
infect a person’s PC in more ways than one. They are specifically designed to search the web
for machines which are unprotected and vulnerable. Bots stay hidden till they are asked to
carry forth a task. Hence, bots act like a bridge that allows hackers to control thousands of
infected machines at any given point in time. The Zeus source code is one prime example
which leads to the development of Gameover. What followed was a whole lot of changes
which made greater use of encryption, gave the botmasters flexibility at setting rules and
also added a backup communication center.
Unlike Windows, Linux has always seen a smaller fraction of malware. Linux-based web
servers have become targets for criminals as it is by far the most used operating system for
a large percentage of web servers. Another aspect surrounding Linux is the assumption of
the operating system to be safer. They are therefore overlooked as potential targets. In other
words, if a Linux system is infected, it can remain infected for months or probably years. The
last few years we have witnessed a growth in the usage of malicious Java and PHP scripts
that are basically written to make Linux servers operate as nodes. Basically turning them
into zombies, which are then controlled to execute payloads such as DDoS.
Mac based malware has been the topic of discussion for most security researchers. Not only
have we witnessed that the once impenetrable Mac was just a myth but the threat to this
once supposedly secure OS is slowly growing by the numbers. Attacks on the Mac have
evolved over the years. The type of malware encountered has been limited to Trojans,
Malicious Java Scripts and malicious browser plugins. Attack on Macs cannot be written off
as the platform has gained traction and is slowly turning into a prime device for a number of
We have seen and will continue witnessing the use of stolen certificates where signed
components taken from either the Windows OS or third-party vendors will be used in order
to conceal and load specific malware.
With the starting of April 2014, Microsoft will stop providing patches for Windows XP and
Office 2003. As of last year, approximately 32% of all PCs still run Windows XP. So for all
Windows XP users, the abandonment of providing support and patches is a serious concern.
Who are your main customers and main industry verticals?
Every IT user is our customer. Anyone who uses computer, laptop, smartphone, tablet or
any digital device is our customer. eScan is used by IT users belonging to all major segments
such as home users, small and medium businesses as well as corporate and enterprises. Our
clientele includes customers from all major verticals such as government, BFSI, education,
healthcare, defense, Telecom, IT & ITeS, real-estates, etc. worldwide.
Share some of the customer benefits and quotes from your customers?
# “I just started using your product; hence I am yet to know about your product. However, I
came to know through my friends that your product is very good in protecting the system
– D S Rayudu – Mumbai, India
# “After the deployment of eScan Corporate, we have realized a 90 per cent decrease in
issues with regards to endpoint security, which was considerably better than what we had
– Mr. Mathew Joseph – vice president – IT, Shalimar Paints
# “eScan is excellent. I liked your services. Currently, eScan is the first choice in my local
– Sogoseye Anthony – Dar es Salaam, United Republic of Tanzania
# “We are truly very satisfied with your product.”
– Mehul Patni – network administrator, Mercury Laboratories LTD., Vadodara, India
# “Dear Sir, This is so easy to install and operate. I like it.”
– Shivananda Nayak – system administrator, Triumph Auto PVT. LTD., Gurgaon, India
Technical Support Team,
It is very joy to say that my antivirus problem has completely been solved. Many thanks to
your technical team who have contacted me to resolve my problem. I’m very much pleased
to the sincerity of your team members. Wishing for your team’s success in a very bigger way
and hope that whenever I need your assistance you will provide me.
– Jayanta Chakraborty
# “Good service with remote support and phone.”
– Bharat Waghela – Mumbai, India
# “Keep up the great service and support. Loved eScan cloud.”
– Matthew Maria – Victoria, Australia
# “Dear Sir,
Thanks for your support. My problem has been solved by one of your engineers by taking
remote connection of my pc. Thank you again for such a quick support.”
– Pushkar Ranadive – Mumbai India
# “I got a good technical support via chat.”
– Antony Issac, general manager Fotospeed – Lagos, Nigeria
# “eScanAV Anti-Virus Toolkit (MWAV) is the best I have ever seen and used among all the
antivirus available in the market.”
– Monty, restaurant manager, Kebabs n More – Hyderabad, India
# “Your new interface eScan features are very good especially scanning of USB pen drive
(flash). Your antivirus is excellent.”
– Moses K. Ronoh, director Zaburi Cyber World – Nairobi, Kenya
Share 5 tips to enterprise CIOs before selecting solutions?
BYOD: The concerns of BYOD are related to device management and deployment of corporate
security policies. Catering to these issues require a holistic approach. Unified / Centralized
management / security solutions should be chosen to handle the emerging threats.
CLOUD: Cloud has reduced the overall infrastructure cost; however the concerns of Cloud are related to user access.
SECURITY: When it comes to overall Security, deployment of IDS/IPS and WAF is a must, along with this
securing the end-points and BYOD coupled with regular Security Audits would provide CIOs
with a perspective which is in tune with the changing times.
BFSI SECURITY: CIOs of BFSI have to deal with security in its entirety. Choosing the right solution to handle
perimeter security and also the application security is of prime importance. Moreover,
providing a secure environment to the customers is the need of the hour considering the
fact that daily tens and hundreds of malware / phishing attacks are directed towards them.
NETWORK SECURITY: Deployment of IDS/IPS/WAF will simply block the outsiders from attacking/compromising
your networks. However, insider threats have to be recognized, not just with respect to
rogue employees but rogue devices or spam mails which might be opened up by an
unsuspecting employee. Moreover, IT security awareness programs for employees are a
must in this ever changing IT Security Landscape.