Mumbai:
Sweden-based Pointsec (sales: SEK 149.5 million [$20.2 million] ), a subsidiary
of the publicly traded Protect Data AB, a global leader and provider of the
de facto standard for enterprise security software for laptop and desktop
PCs, PDAs and smartphones, has announced its entry into India. It
has appointed Trident Infotech Services as its 'premium distribution and service
support partner'in India and plans to set up its India office in Mumbai by
September 2005. The
company also announced the launch of its globally successful range of mobile
device security products in India. In the first year, it would primarily focus
on the enterprise segment, particular highly security sensitive verticals
such as IT services, BPO, banking, financial services, insurance and telecom.
So
far, Wipro Technologies, Syntel and ITC Infotech have already signed up with
Pointsec for enterprise wide application of Pointsec products to secure data
on mobile devices. Speaking
to the media in Mumbai, Thomas Bill, CEO, Protect Data AB said, "I am
confident that our first-mover position in India will help us capture a significant
portion of the market. Our Indian operations will be a launchpad for further
expansion in the APAC region." Sascha
Beyer, managing director, Middle East and India said, "Securing data
is a critical business concern in India as elsewhere. This is especially the
case given increasing requirements for enterprises to comply with security
regulations such as the India Information Technology Act here and elsewhere
globally the Sarbanes-Oxley Act, the Gramm-Leach-Bliley Act and the EU Data
Protection Directive. At Pointsec, we believe that our world-class solutions
combined with our expertise in the mobile device security market will help
us achieve success in India." Pointsec
is the global leader in comprehensive access control and encryption solutions
for laptops, desktops, PDAs and smartphones and works on all common operating
systems. Pointsec's solution provides protection for all stored data, automatically
and transparently
to the user. It is centrally managed, so that security policy changes can
be effected without user intervention.
|