point
The Smart Techie was renamed Siliconindia India Edition starting Feb 2012 to continue the nearly two decade track record of excellence of our US edition.

May - 2009 - issue > Top 10 most promising technology companies

Niksun: From being Cowboys to City Dwellers

Aritra Bhattacharya
Tuesday, May 5, 2009
Aritra Bhattacharya
Dr Parag Pruthi is hiring city planners. “We can afford to hire some really good ones,” he says, unfazed by the global economic recession.

Pruthi’s bunch of boys is turning into city dwellers—at least that’s how he describes the imminent transition of his company, NIKSUN, engaged in providing network performance and security monitoring solutions. After years of building a strong, and unusually broad, foundation, and being proverbial “cowboys”, NIKSUN is looking to make the transition of 'moving into the city'. It is working towards becoming become a household name in the next 3-4 years—by having large scale deployments of its security products in enterprise networks around the world—and touch the $200 million mark in sales.

Over the past twelve years, NIKSUN’s security solutions have grown immensely in terms their reach, application, relevance and criticality. Founder and CEO of NIKSUN, Dr. Pruthi is convinced that despite the recession, his company is positioned extremely well to adapt to the company's rapid growth and leverage it to greater heights. Pruthi is no stranger to expansion-- NIKSUN's success is very much based on Pruthi's ability to scale the relevance of NIKSUN's original technology to various business applications-- from the branch office to the corporate enterprise network; from one product architecture to 16-17 different solutions, each offering great value and relevance to large corporate networking environments.

Minding thefts, thieves, and their movements
So, where are NIKSUN products used today?
Readers might recall news of a breach in the US’ defence network a few days ago, where the plans for the country’s most advanced fighter jets are feared stolen. Several questions—like how did the breach actually happen, why did it happen, who did it—were raised soon after reports about the theft started pouring in.


Share on Twitter
Share on LinkedIn
Share on facebook