Make Your Product Secure Before You Release Or Deploy It

Author: Isaac Sundarajan
President and CEO, GDA Technologies & Executive Vice President L&T Infotech
Traditionally, the security trend has been reactive. Typically, after a product or major software system has been released and deployed engineers figure out that the product may be vulnerable to attacks. In the last several years, lots of money has been spent on to avoid some of the known problems and make the product secure after the product is released or deployed.

However, the trend is shifting rapidly. The new age product development process now will involve security aspects to be included during the product design and development stage itself. For this to happen, care should be taken to build the product in such a manner that the products remain safe not only from known threats, but also from unknown threats both at the application and at the protocol level. The real dollar costs and reputation risks associated with system patching, product recall, service downtime and data corruption are significant when it comes to networks, wireless, and storage systems. Preemptive security and robustness testing offsets these risks. Fundamentally you need to change the way you are building or rolling out products and deploying it at the enterprise.

The hackers' community has become very sophisticated and threats have increased drastically. Attacks are much more advanced and vulnerability to hackers' attacks is now been extended to even wireless infrastructures, let alone network infrastructure. Consequently, along with the network infrastructure, digital media, wireless infrastructure and mobile systems are also equally susceptible to assails nowadays. So, it is crucial to take the proactive measures and preemptively tackle the new age avatars of threats.

Miscreants can jeopardize even the wireless system and take control or steal any information flowing through wireless infrastructures such as wi-fi, wi-max and Bluetooth without much sweat if there are no proactive and preventive measures to deal with the attacks. You don't even know where the attacks are coming from to take control of your network. So, it is mandatory to look for possible security holes and cover it during the product development stage as well as during the deployment stage before it is too late!

Previous  article
Next article
Write your comment now

Email    Password: 
Don't have SiliconIndia account? Sign up    Forgot your password? Reset
Reader's comments(4)
1: From: Mrs. Mary David

This mail may be a surprise to you because you did not give me the permission to do so and neither do you know me but before I tell you about myself I want you to please forgive me for sending this mail without your permission. I am writing this letter in confidence believing that if it is the will of God for you to help me and my family, God almighty will bless and reward you abundantly. I need an honest and trust worthy person like you to entrust this huge transfer project unto.

My name is Mrs. Mary David, The Branch Manager of a Financial Institution. I am a Ghanaian married with 3 kids. I am writing to solicit your assistance in the transfer of US$7,500,000.00 Dollars. This fund is the excess of what my branch in which I am the manager made as profit last year (i.e. 2010 financial year). I have already submitted an annual report for that year to my head office in Accra-Ghana as I have watched with keen interest as they will never know of this excess. I have since, placed this amount of US$7,500,000.00 Dollars on an Escrow Coded account without a beneficiary (Anonymous) to avoid trace.

As an officer of the bank, I cannot be directly connected to this money thus I am impelled to request for your assistance to receive this money into your bank account on my behalf. I agree that 40% of this money will be for you as a foreign partner, in respect to the provision of a foreign account, and 60% would be for me. I do need to stress that there are practically no risk involved in this. It's going to be a bank-to-bank transfer. All I need from you is to stand as the original depositor of this fund so that the fund can be transferred to your account.

If you accept this offer, I will appreciate your timely response to me. This is why and only reason why I contacted you, I am willing to go into partnership investment with you owing to your wealth of experience, So please if you are interested to assist on this venture kindly contact me back for a brief discussion on how to proceed.

All correspondence must be via my private E-mail ( for obvious security reasons.

Best regards,
Mrs. Mary David.
Posted by: mary lovely david - Monday 26th, September 2011
2: Interesting blog
have a look at

Posted by: Hari Nair - Sunday 02nd, January 2011
3: sir i want a job
Posted by: subhransu sekhar sahoo - Tuesday 11th, May 2010
My Name is Tata I was impressed when i saw your profile at and will like you to email me back to my inbox so that i can send you my picture for you to know who i am.i belive we can establishe a long lasting relation ship with you.In addition,i will like you to reply me through my private e mail box (
This is because i dont know the possibilities of
remainning in forum for a long time.
Thanks,waiting to hear from you soonest.
Posted by: tata tatababy os - Friday 30th, October 2009
More articles
by Kaushal Mehta - Founder & CEO, Motif Inc..
The retail industry is witnessing an increased migration of customers from traditional brick and mortar retail to E-commerce (online retail)...more>>
by Samir Shah - CEO, Zephyr .
You probably do because you are on the phone with them! For all of you working in some technical management capacity here in Silicon Valley,...more>>
by Raj Karamchedu - Chief Operating Officer, Legend Silicon .
These days are a mixed bag for me. Of late I have been considering "doing something bigger and better," in my life, perhaps seriously though...more>>
by Madhavi Vuppalapati - CEO of Prithvi Information Solutions .
IT Services Rise of Tier II companies The Indian IT outsourcing industry is going through very exciting phase in its business life...more>>
by Bhaskar Bakthavatsalu- Country Manager, India and SAARC of Check Point Software Technologies.
Data loss occurs every day through corporate email. In fact, given the sheer number of emails an organization sends every day, data loss inc...more>>