MIRA INFORM REPORT

 

 

Report Date :

13TH June, 2006

 

IDENTIFICATION DETAILS

 

Name :

PALADION NETWORKS PRIVATE LIMITED

 

 

Registered Office :

2nd Cross, 1ST Street, Pachayappan Colony, Chennai, Tamilnadu

 

 

Country :

India

 

 

Financials (as on) :

31.03.2003

 

 

Date of Incorporation :

24.05.2000

 

 

Com. Reg. No.:

18-45018

 

 

CIN No.:

[Company Identification No.]

U72200TN2000PTC045018

 

 

TAN No.:

[Tax Deduction & Collection Account No.]

MUMP11467B

 

 

Legal Form :

Private Limited Liability Company

 

 

Line of Business :

Company is in engaged in Providing Software Services

 

RATING & COMMENTS

 

MIRA’s Rating :

Ca

 

RATING

STATUS

PROPOSED CREDIT LINE

11-25

Ca

Adverse factors are apparent. Repayment of interest and principal sums in default or expected to be in default upon maturity

Limited with full security

 

Maximum Credit Limit :

 

 

 

Status :

Moderate

 

 

Payment Behaviour :

Slow

 

 

Litigation :

Unknown

 

 

Comments :

Available information indicates moderate financial position of the company having substantial accumulated losses. Payments are reported as slow.

 

Initially, the company can be considered for any business dealings on safe and secured trade terms and conditions. 

 

LOCATIONS

 

Registered Office :

2nd Cross, 1ST Street, Pachayappan Colony, Chennai, Tamilnadu

Website :

http://www.paladion.net

 

 

Head Office :

307, Devarata Sector – 17, Vashi – 400703, Navi Mumbai 

Tel. No.:

91-22-27892889

Fax No.:

91-22-67913580

 

 

Office :

Bangalore

N-307, Manipal Centre
Dickenson Road, Bangalore 560042
Phone: +91-80-25092108
Fax: +91-80-25092108

 

  USA

 Virginia

12801 Worldgate Drive, Suite 500,
Herndon, VA 20170, USA
Phone: +1-703-871-3934
Fax: +1-703-871-3936

 

 

Malaysia

 Kuala Lumpur

F313, Phileo Damansara 1,
46350 Petaling Jaya, Malaysia
Phone: +60-3-7960-4275
Fax: +60-3-7660-4273

 

  Middle East

 Dubai

Dubai Internet City,
Dubai, UAE

 

  Marketing Enquiries

http://www.paladion.net

sales@paladion.net

 

DIRECTORS

 

Name :

Mr. Rajat Mohanty

Designation :

Chief Executive Officer

 

 

Name :

Mr. Vinod Vasudevan

Designation :

Chief Technology Officer

 

 

Name :

Mr. Rohit Kumar

Designation :

Vice President (Sales & Marketing)

 

 

Name :

Ms. Shifa Suresh

Designation :

Vice President (Human resources)

 

BUSINESS DETAILS

 

Line of Business :

Company is in engaged in Providing Software Services

 

GENERAL INFORMATION

 

Customers :

Banking, finance and insurance

 

State Bank of India

 

AMI Insurance

 

Ocwen FinancialCorporation

 

First Islamic Bank

 

Commercial Bank of Kuwait

 

OrbiTech Solutions

 

Riyad Bank

 

ICICI Bank

 

Principal Financials AMC

 

Prudential Singapore

 

IDBI Bank

 

Prudential ICICI AMC

 

Medmarc Insurance

 

Kotak Mahindra Bank

 

Standard Chartered Bank

 

ABN AMRO Bank

 

Kotak Mutual AMC

 

Syndicate Bank

 

 

Information technology and consulting

Infosys Technologies Ltd.

 

CMC

 

ITS2

 

Polaris

 

Digicert

 

Keane

 

Aditi

 

Fortuna

 

PWC

 

Microsoft Consulting

 

HCL Tech

 

SK-International

 

Hewitt Associates

 

Hurix Systems

 

Tata Elxsi

 

America To Go

 

Intel

 

Atcom

 

ISeva

 

 

Manufacturing

 

Titan

 

HLL

 

IReliance Industries

 

Asian Paints

 

Pfizer

 

Daimler Chrysler

 

Pidilite

 

 

Telecommunications

 

Comsat Max

 

Reliance Infocomm

 

ITata ISP

 

Global Tele

 

Rolta Net

 

Satyam

 

Nextel

 

 

Research and development

 

BEL

 

GE Tech Center

 

ISRO

 

Government

 

Department of Justice,USA

 

Ministry of IT, India

 

 

Bankers :

Not Available

 

 

Facilities :

--

 

 

 

Banking Relations :

Unknown

 

 

Auditors :

Parihar & Sonpar

Chartered Accountant

 

 

Associates/Subsidiaries :

Nil

 

CAPITAL STRUCTURE

 

Authorised Capital :

No. of Shares

Type

Value

Amount

1000000

Equity Shares

Rs.10/- each

Rs. 10.000 Millions

 

 

 

Issued, Subscribed & Paid-up Capital :

No. of Shares

Type

Value

Amount

327400

Equity Shares

Rs. 10/- Each

Rs. 3.274 Millions

 


 

FINANCIAL DATA

[all figures are in Rupees Millions]

 

No financial are available from Registry

 

Management remained non – cooperative during current investigation

 

We could mange brief financials for 31.03.2003 which is enclosed here with as on indication

 

ABRIDGED BALANCE SHEET

 

SOURCES OF FUNDS

 

 

31.03.2003

31.03.2002

SHAREHOLDERS FUNDS

 

 

 

1] Share Capital

 

3.274

3.051

2] Share Application Money

 

0.000

0.000

3] Reserves & Surplus

 

24.884

17.108

4] (Accumulated Losses)

 

(15.402)

(12.329)

NETWORTH

 

12.756

7.830

LOAN FUNDS

 

 

 

1] Secured Loans

 

0.000

0.000

2] Unsecured Loans

 

0.000

0.000

TOTAL BORROWING

 

0.000

0.000

DEFERRED TAX LIABILITIES

 

0.000

0.000

 

 

 

 

TOTAL

 

12.756

7.830

 

 

 

 

APPLICATION OF FUNDS

 

 

 

 

 

 

 

FIXED ASSETS [Net Block]

 

4.392

4.352

Capital work-in-progress

 

0.000

0.000

 

 

 

 

INVESTMENT

 

0.000

0.000

DEFERREX TAX ASSETS

 

0.000

0.000

 

 

 

 

CURRENT ASSETS, LOANS & ADVANCES

 

 

 

 

Inventories

 

 

 

 

Sundry Debtors

 

 

 

 

Cash & Bank Balances

 

11.173

4.337

 

Other Current Assets

 

 

 

 

Loans & Advances

 

 

 

Total Current Assets

 

11.173

4.337

Less : CURRENT LIABILITIES & PROVISIONS

 

 

 

 

Current Liabilities

 

2.878

0.938

 

Provisions

 

0.000

0.000

Total Current Liabilities

 

2.878

0.938

Net Current Assets

 

8.295

3.399

 

 

 

 

MISCELLANEOUS EXPENSES

 

0.069

0.079

 

 

 

 

TOTAL

 

12.756

7.830

 


KEY RATIOS

 

PARTICULARS

 

 

 

31.03.2003

31.03.2002

Debt Equity Ratio

(Total Liability/Networth)

 

 

0.22

0.11

 

 

 

 

 

Current Ratio

(Current Asset/Current Liability)

 

 

3.88

4.62

 

LOCAL AGENCY FURTHER INFORMATION

 

Paladion News

 

Sangita Pakala speaks on “Secure Coding Guidelines for .Net” at the RSA Conference 2006 in San Jose

They were selected from the 1500+ proposals RSA received. Their topic is "Secure Coding Guidelines for .Net". This is their second time at RSA - they spoke on Network Forensics in 2004.

The RSA conference is the largest security conference . 10,000+ participants, 1000+ vendors, 200 presentations, and keynote speakers like Bill Gates. For more information, visit: http://2006.rsaconference.com

 

Paladion launches Plynt, the security certification for applications

Plynt, a Paladion enterprise, provides on-demand Application Security Testing and Certification. Plynt is headquartered in Herndon, Virginia and has global delivery centers in Virginia, India and Malaysia. Plynt has been designed with speed, budget and comprehensiveness as the key advantages. If you work in software product management, information security management or software quality assurance, Plynt will prove to be the dependable ally in application security.

Today, when customers use a software product, they are concerned about its security. Businesses want to ensure that software they use do not have security holes that can impact financial transactions, customer privacy or process availability. People with responsibility to build, deliver or sell software are taking steps to have good security in their products. Plynt augments this effort by providing an independent assurance that the software has robust security and is resistant to attacks. Plynt security testing criteria is exhaustive and benchmarked with industry standards so that each software is always tested against latest set of threats and vulnerabilities.

Plynt will help you assure the customers, whether internal or external to the organization, that the software product has good security. And this is backed with a Plynt Certificate for the software.

 

Banking & Finance

 

Technology has fueled remarkable productivity growth at financial institutions that are witnessing an unprecedented speed of change related to technological and customer service innovation and creation of new business models involving financial institutions and other entities, such as Internet service providers, telecommunication companies and technology service providers. Customers are linked electronically to banks through channels such as ATMs and the Internet. Outsourcing has enabled banks to cut costs and focus on their core business. Communications technologies have increased connectivity across global financial systems.

While the financial institutions leverage technology to enhance the value of their service offerings and improve efficiency and effectiveness of their operations, they are also exposed to significant risks on account of security and integrity of sensitive information. Competitive pressures to roll out new business applications and technology initiatives in very compressed timeframes to offer more and more value-added services intensifies the management challenge to ensure that adequate strategic assessment, risk analysis and security reviews are conducted prior to implementing new initiatives.

This has resulted in heightened industry awareness and concern, accompanied by increased regulatory scrutiny of financial institution?s information risk assessment, mitigation and management systems. It is imperative that financial institutions recognize, address and manage information security risks in a prudent manner and information security management becomes an integral part of the financial institution's overall enterprise risk management framework.

How Paladion Can Offer Value?

Effective risk management is central to financial institutions. However, despite several information security regulations and guidelines for financial sector, many financial firms are found lacking in their information security management. In their experience, the financial institutions that have succeeded in achieving strong security are the ones who have brought in a clear implementation focus to the global security standards and regulations. Just as in business, successful financial firms have not done different things for security; rather they have done the same things differently.

They assist financial institutions in developing world-class security governance structure and information risk management processes appropriate for their individual risk profile, operational structure and corporate governance culture, as well as in conformance with the specific information risk management requirements from leading international standards and regulations such as BS 7799/ISO 27001, ITIL, COBIT, Basel Committee Guidelines amongst others.

They have worked closely with several leading global financial institutions in developing robust, effective and sustainable security management systems.

 

Telecom & Communications

 

The Telecom industry is currently characterized by significant challenges ? changing customer needs, industry restructuring and consolidation, fierce competition, transformational innovation, and convergence. Availability of increased bandwidth is changing the way in which telecom operators conduct business, as revenue streams for information and data transfer gain greater importance. Increased bandwidth means new and larger applications and service offerings such as picture messaging, video, games, transactional capability and e-billing. Industry players are gearing up to harness the potential of converging technology, networks, devices and content to develop multimedia services and solutions of ever-increasing sophistication.

Furthermore, there is also an increased regulatory and legislative pressure: new legislations, such as the Sarbanes- Oxley Act and the EU 8th Directive, are forcing telecom service providers to increase their level of internal control and to ensure they are operating (and generating revenue) at the highest levels of efficiency.

IT is at the core of telecom operations, particularly in IT-enabled functionality provided for billing and customer care. From quickly yet securely integrating new services from partner providers, to protecting the billing and personal information of their customers, security is a primary consideration of all telecom service providers. Information security threats to the operators and service providers in the telecom industry could adversely affect the firms on account of:

Denial or disruption of service to customers

 

Unauthorized monitoring and disclosure of sensitive customer and business information

 

Unauthorized modification of user or network information and network services leading to unreliable services to customers

 

Revenue Loss through fraud and unauthorized services-revenues leakage


Enhancing and streamlining information risk management capabilities can provide significant business and competitive advantages.

How Paladion Can Offer Value?

Effective information risk management in a rapidly evolving telecom environment is indeed a challenging task. Telecom carriers and service providers need to take a proactive approach to integrating information security as a core component of their enterprise operations and initiatives, to provide for the stability, availability and resiliency required for successful operations, and to protect their reputation, customers and revenues.

Paladion has the industry-specific experience, knowledge and technology skills to assist you in designing and implementing a world-class security governance structure and security management system in the organization that is appropriate for the individual risk profile, operational structure and enterprise risk management culture, as well as in conformance with the specific information risk management requirements from leading international standards and regulations such as BS 7799/ISO 27001, ITIL, COBIT, CPNI and EU Directives amongst others.

 

IT & BPO

 

Information Security and Data Privacy concerns are paramount as organizations outsource their IT Services and business processes, especially to offshore service providers As sensitive information of financial, insurance, medical and personal nature begins to get handled by offshore outsourcing service providers, there is a growing concern about the manner in which it is being collected, stored and utilized. This is shaped by various security and privacy regulations such as GLBA, SOX, HIPAA, OCC Guidelines, FISMA and EU Directives to name a few.

Organizations demand a high level of information security controls from their outsourcing service providers and are incorporating stringent provisions for information security in their contractual agreements with service providers, as the consequences of an information security breach could lead to business harm and legal liability.

This is not merely a matter of competitive advantage for service providers in the BPO and IT/ITES industry. Service providers could be liable under various security, privacy, trade secret and copyright laws in case of breaches such as unauthorized disclosure of financial information, release of maliciously modified financial information, and disclosure of customer information, for example, a person's financial status, heath condition or employment. These types of regulatory, legal, statutory and contractual requirements are not limited to actions by the service provider alone. The organization that has outsourced its services can be liable for information security breaches by the service provider and the organization suffers equally in case of such breaches by its own staff or by service provider personnel.

How Paladion Can Offer Value?

They can assist companies in the BPO and IT/ITES industry in developing and implementing world-class security governance structure and risk management processes that will effectively alleviate the perceived risks of outsourcing amongst its customer base.

Paladion has the industry-specific experience, knowledge and technology skills to assist you in designing and implementing a security management system in the organization that is in conformance with the specific information risk management requirements from leading international standards and regulations such as BS 7799/ISO 27001, ITIL, COBIT and client-specific security policies and standards.

 

Oil, Energy & Manufacturing

 

Oil, Gas, Energy and other process industries in the Manufacturing industry significantly leverage information technology to integrate business processes within the enterprise and beyond to achieve efficiency and effectiveness in their operations. Significant economic factors drive the need for manufacturing information throughout the enterprise and beyond. Globalization, lean manufacturing, outsourcing, and other factors have driven manufacturers to adopt the Collaborative Manufacturing Model (CMM) where information can flow seamlessly throughout the enterprise and to the business partners. The business improvement concepts around manufacturing process excellence are driving the need for real time operational data to be available any time any where within and outside the organization. Modern manufacturing cannot thrive without current information from its manufacturing processes and plant floors being fed to its enterprise systems and applications.

However, the same technologies that make business operations and manufacturing processes more efficient introduce new security risks and make Manufacturing Information Assurance an increasingly critical issue. Open connectivity standards being deployed on the plant floors and in the extended enterprise are increasingly web-based. Industrial automation systems are seldom security-aware. Further, risks are not fully appreciated because it is perceived that plant floor systems are ?isolated? and ?not interesting?. Some of the risks from a plant operations perspective could be ?

Anyone with access to control network and having the proper programming package can perform unauthorized operations

 

Disruptions to production and processes, power and communications systems

 

Exposure to human safety and environmental risks


Information security in manufacturing firms is also important for maintaining competitive advantage in market. Marketing plans, customer purchase pattern, product formulae and supplier are some of the proprietary information, which differentiates a manufacturing firm from its competitor. If the confidentiality of such information is not maintained, firms will find it difficult to compete.

How Paladion Can Offer Value?

They can assist you in developing and implementing an Integrated Manufacturing Enterprise Security System that encompasses information security in both enterprise systems and process control systems.

Paladion has the industry-specific experience, knowledge and technology skills to assist you in designing and implementing a security governance structure in the organization that is in conformance with leading international standards such as BS 7799/ISO 27001, ITIL, COBIT and specific manufacturing sector best practices.

 

 

Paladion services begin with a forecast of the security systems, to determine if it is capable of protecting you from risk. You require is a strong security check on the hardware, software and network platforms. All of which are possible through the range of services they provide:

ISO 17799 compliance / BS7799 Certification
BS7799 provides a list of protection measures that organizations should adopt to build a comprehensive security infrastructure. ISO 17799, the internationally recognized information security management standard, is a direct descendant of BS7799, which is finding increasing acceptance by companies in the areas such as business process outsourcing, offshore software development and in-house IT services. This globally accepted and highly marketable system ensures a sustainable security cover.

Security Code Review
A security code review involves the rigorous testing of the application source code and identifying structural faults responsible for the security weaknesses. On checking an application you get in depth knowledge of the security strength of the application and code sets. You are also provided with the 'threat models' for the entire application or the components to be reviewed.

Application Security Audit
Application security audit acts as a watchdog for the applications through the Internet or through the customer site on a staging server, checking for security holes. They offer this service in two modes:

Application Penetration Testing (remote)

 

Comprehensive Application Security audit (onsite)


Vulnerability Assessment
Vulnerability assessment offers a methodology that critically detects the deficiencies, from a security standpoint, in any given system. An Organization, particularly while launching new systems, needs very strong security which only vulnerability assessment provides. With fast and reliable data-collection and analysis, you also get easy, practical reports and recommendations. The VA methodology can be easily implemented.

Enterprise Security Audit
An Enterprise security audit involves a review of all processes and practices followed by an organization looking to ensure enterprise-wide security. Additionally, there will be a technical audit conducted across all the locations and devices in the enterprise. Based on the spread and criticality of the devices being audited, there is a judicious mix of remote and onsite audits. The technical audit uses industry-standard tools as well as custom-developed tools.


Penetration Testing
Penetration testing is required for testing networks and their components to avoid security threats. It doesn?t matter whether you have restricted knowledge of the network, or do not have it at all. Because the internal penetration test is conducted remotely via the Internet on the IP address, the URL specified by the client, or at the client site.

Light perimeter test ? Testing the strength of the perimeter from a remote location.

 

Full perimeter test ? Verifying the security of the perimeter, the servers in the DMZ with - remote exploitation of DMZ and accessible internal systems.

 

Internal test ? The 'trusted insider' test, launched from inside the client's network, with internal exploitation.

 

Product

 

Centralized Audit Tool

 

Internal auditors of banks and large corporate houses have been using their system audit tool to verify the security status of servers, databases and network elements. They have found their tool to be highly powerful in detecting security weaknesses, while saving on time and cost of doing the audit.

Their tool supports a wide variety of platforms, namely:

Operating systems

Windows (2000, 2003, XP, NT)

 

Solaris (7.0, 8.0)

 

Linux (7.3, 8.0, 9.0)

 

Aix


Web server

Apache (1.3)

 

IIS (5.0, 6.0)


Database

MSSQL (6.5, 7.0, 2000)

 

Oracle (7.0, 8.0, 8i, 9i)


Network devices

Cisco routers

 

Nortel passport switches


Features

Can be used to audit in stand alone or networked mode

 

Comprehensively audits for vulnerabilities, insecure settings, miss-configurations and policy non-compliance with built-in checklists

 

Can be easily configured to test for the custom security policies

 

Provides automated data capture, analysis and reporting

 

Gives a clear and concise report, listing the insecurities and recommended mitigation steps


Benefits to internal auditors

Reduces time for auditing large number of systems in a network

 

Helps you audit more systems, more number of times to achieve better compliance

 

Extremely easy to use and to generate reports, assuming minimal knowledge of security

 

Provides richer and more accurate information on the security status of systems than most of the other audit tools


Available at highly competitive prices

If you think their system audit tool will benefit the company, write to Nanda Kumar at nanda.kumar@paladion.net and we'll get back to you.

Internet Traffic monitoring System

 

As a Law Enforcement Agency (LEA) looking for Internet interception solutions, you will find their product the best in price and performance. Having worked with several LEAS, they understand the specific needs that such interception products should meet.

Accordingly, their product is designed to intercept a wide range of Internet protocols from emails, chat, file transfers, browsing and VOIP in a seamless manner. Their interception occurs in real time without any interference with the normal flow of Internet traffic.

Features of their product include:

Supports interception at high bandwidth

 

Wide range of parameters for interception

 

Rich reporting features

 

Integrated platform

 

Robust security controls


They also recognize that LEA needs vary. Their product is built in modules and can be easily customized to diverse needs in a minimal time frame, at a highly competitive price

 


 Overview

 

Paladion depicts the ultimate seal of security represented in the Greek Myth - 'The War of the Trojans.'

The Paladion, a sacred icon of Pallas Athena (the Greed goddess of war, wisdom and the arts), protected the city of Troy. The wicked ways of the Trojans angered Pallas Athena, which led to the Trojans being dispossessed of the Paladion. As the war with the Greeks began, the Trojan horse broke into the city, which was once impenetrable. Troy was burnt down and the Greeks emerged victorious.

The company today provides world-class solutions to reduce information security risks and enable clients enhance their potential to leverage technology, through adoption of business-centric information protection programs.

Paladion today has operations in 4 continents and a spread of customers comprising 150 leading companies, across 15 countries.

Staffed by some of the best talent in the infosec business, Paladion professionals are certified in CISSP, CISA, SANS, BS7799, CBCP, BS 15000 and others. Their gamut of industry expertise covers the: Banking-Finance-Insurance, IT & Consulting, Manufacturing, Telecom, R & D and Government sectors.

 

           

Management Team

 

Chief Executive Officer - Rajat Mohanty (CISSP, CISA)

Rajat, who hails from eastern India, is an alumnus of the renowned Indian Institute of Technology and of XLRI. He held managerial positions with the Steel Authority of India, the country's largest steel company, and ICICI, India's largest financial institution, before co-founding Paladion Networks.

Under Rajat's leadership Paladion has successfully achieved a leading position in the Indian market, and is now focused on replicating this success in new markets, specifically the United States, Malaysia and the Middle East. His interests include puzzles, Indian mythology, Indian history and trekking.

"As they expand globally, their customers' expectations are also growing," says Rajat. "Their challenge is to consistently meet their heightened expectations, and then strive to exceed them. This philosophy has always been the bedrock of their growth."

Chief Technology Officer - Vinod Vasudevan (CISSP, BS7799 LA)

Vinod, who comes from South India, is an alumnus of the College of Engineering, Trivandrum. He has held key technical positions with Microsoft and Wipro, and has traveled extensively across the globe on numerous projects. Vinod is a co-founder of Paladion Networks.

Vinod leads a large team of highly skilled and accomplished security consultants and project leaders across Asia and America. His responsibilities with the organization include security research, delivery processes and new technology offerings. Indian philosophy, yoga, meditation and poetry are among Vinod's interests.

"They are focusing on streamlining their processes, so that clients can enjoy better and faster service," says Vinod. "Their consultants have been aggressively thinking of new ways to improve their security assessments, and their clients have started appreciating the work."

Vice President (Sales & Marketing) - Rohit Kumar (CISSP)

Born and brought up in North India, Rohit was educated at the Indian Institute of Technology and at XLRI. He has held sales and marketing positions at Heinz Inc in Cincinnati, United States, and operational positions with Reliance, India's largest private company.

Rohit leads a diverse team of sales consultants across their Asia and America operations. He also manages the alliance and business partner relationships at Paladion. Travel, trekking, river rafting, sauces and spicy cuisine, all of these are close to Rohit's heart.

"They are able to deliver strong value to their customers through partnerships with leading technology players," explains Rohit. "Their in-depth understanding of their customers' problems, coupled with their partner's robust solutions, provides a unique value proposition to their clients."

Vice President (Human resources) - Shifa Suresh

Raised in western India, Shifa is an alumnus of Mount Carmel College, Bangalore, and XLRI. She has held managerial positions in the human resources function at i-flex solutions (an IT subsidiary of Citicorp) and ICICI, India's largest financial institution.

Shifa manages the recruitment and people development processes at Paladion. She has a fondness for art, painting, cinema and psychological testing.

"They are investing strongly in developing their people to meet the heightened demands of their enterprise clients," says Shifa. "Their consultants are trained in handling global customers, and are updated with the current thinking in security practices."

 

Corporate Milestones

 

2006

March

Conducts Second round of SANS (GCIH) training in India.

 

 

February

 

Plynt, specialized application security service, is launched.

Invited to speak at RSA Conference 2006 on .NET security guidelines.

 

2005

 

October

 

Sangita Pakala invited to speak on Web Security Practice at ISACA Europe, Amsterdam.

Partners with SANS Institute and offers SANS (GSEC) training in India.

 

March

 

Roshan Chandran from Paladion speaks at SDWEST 2005 on J2EE security.

 

2004

October

 

Achieved ISO 9001:2000 certification from BSI.

 

July

 

First Edition of Palisade newsletter published.

 

2003

May

Participated in TiEC on 2003.

 

April

 

Establishes partnership relationship in USA.

Establishes partnership relationship in the Middle East.

 

January

 

Establishes office in Virginia, USA.

 

2002

March

 

Establishes office in Kuala Lumpur, Malaysia.

Hosted 'Server Security Administration Workshop' in Mumbai, Banglore, India.

 

2001

August

 

Hosted Joint Conference with CIO Magazine in Mumbai, India.

 

June

 

Hosted Information Warfare Seminar I in India.

 

January

 

Establises corparate offices in Mumbai & Banglore, India.

 

DISCLAIMER

 

Paladion Networks Pvt Ltd retains copyright on all the text, graphics and trademarks displayed on this site. All the text, graphics and trademarks displayed on this site are owned by Paladion Networks Pvt Ltd and used under licence by Paladion affiliates.

You may print copies of the information on this site for the personal use and store the files on the computer for personal use. You may not distribute text or graphics to others without the express written consent of Paladion Networks and Paladion Networks affiliates. Also, you may not, without their permission, copy and distribute this information on any other server, or modify or reuse text or graphics on this or any another system.

No reproduction of any part of the site may be sold or distributed for commercial gain, nor shall it be modified or incorporated in any other work, publication or site, whether in hard copy or electronic format, including postings to any other site. Paladion Networks reserves all other rights.

The information on this site has been included in good faith and is for general purposes only. It should not be relied upon for any specific purpose and no representation or warranty is given as regards its accuracy or completeness.

No information on this site shall constitute an invitation to invest in Paladion Networks or any of its affiliates. Neither Paladion Networks and Paladion affiliates, nor their or their affiliates' officers, employees or agents shall be liable for any loss, damage or expense arising out of any access to or use of this site or any site linked to it, including, without limitation, any loss of profit, indirect, incidental or consequential loss.

 


CMT REPORT [Corruption, Money laundering & Terrorism]

 

The Public Notice information has been collected from various sources including but not limited to: The Courts, India Prisons Service, Interpol, etc.

 

1]         INFORMATION ON DESIGNATED PARTY

No exist designating subject or any of its beneficial owners, controlling shareholders or senior officers as terrorist or terrorist organization or whom notice had been received that all financial transactions involving their assets have been blocked or convicted, found guilty or against whom a judgement or order had been entered in a proceedings for violating money-laundering, anti-corruption or bribery or international economic or anti-terrorism sanction laws or whose assets were seized, blocked, frozen or ordered forfeited for violation of money laundering or international anti-terrorism laws.

 

2]         Court Declaration :

No records exist to suggest that subject is or was the subject of any formal or informal allegations, prosecutions or other official proceeding for making any prohibited payments or other improper payments to government officials for engaging in prohibited transactions or with designated parties.

 

3]         Asset Declaration :

No records exist to suggest that the property or assets of the subject are derived from criminal conduct or a prohibited transaction.

 

4]         Record on Financial Crime :

            Charges or conviction registered against subject:                                                  None

 

5]         Records on Violation of Anti-Corruption Laws :

            Charges or investigation registered against subject:                                                          None

 

6]         Records on Int’l Anti-Money Laundering Laws/Standards :

            Charges or investigation registered against subject:                                                          None

 

7]         Criminal Records

No available information exist that suggest that subject or any of its principals have been formally charged or convicted by a competent governmental authority for any financial crime or under any formal investigation by a competent government authority for any violation of anti-corruption laws or international anti-money laundering laws or standard.

 

8]         Affiliation with Government :

No record exists to suggest that any director or indirect owners, controlling shareholders, director, officer or employee of the company is a government official or a family member or close business associate of a Government official.

 

9]         Compensation Package :

Our market survey revealed that the amount of compensation sought by the subject is fair and reasonable and comparable to compensation paid to others for similar services.

 

10]        Press Report :

            No press reports / filings exists on the subject.

 

 

CORPORATE GOVERNANCE

 

MIRA INFORM as part of its Due Diligence do provide comments on Corporate Governance to identify management and governance. These factors often have been predictive and in some cases have created vulnerabilities to credit deterioration.

 

Our Governance Assessment focuses principally on the interactions between a company’s management, its Board of Directors, Shareholders and other financial stakeholders.

 

 

CONTRAVENTION

 

Subject is not known to have contravened any existing local laws, regulations or policies that prohibit, restrict or otherwise affect the terms and conditions that could be included in the agreement with the subject.

 

 

FOREIGN EXCHANGE RATES

 

Currency

Unit

Indian Rupees

US Dollar

1

Rs.45.91

UK Pound

1

Rs.84.72

Euro

1

Rs.57.92

 

 

SCORE & RATING EXPLANATIONS

 

SCORE FACTORS

 

RANGE

POINTS

HISTORY

1~10

4

PAID-UP CAPITAL

1~10

2

OPERATING SCALE

1~10

2

FINANCIAL CONDITION

 

 

--BUSINESS SCALE

1~10

2

--PROFITABILIRY

1~10

-

--LIQUIDITY

1~10

-

--LEVERAGE

1~10

4

--RESERVES

1~10

-

--CREDIT LINES

1~10

3

--MARGINS

-5~5

-

DEMERIT POINTS

 

 

--BANK CHARGES

YES/NO

NO

--LITIGATION

YES/NO

NO

--OTHER ADVERSE INFORMATION

YES/NO

NO

MERIT POINTS

 

 

--SOLE DISTRIBUTORSHIP

YES/NO

NO

--EXPORT ACTIVITIES

YES/NO

NO

--AFFILIATION

YES/NO

NO

--LISTED

YES/NO

YES

--OTHER MERIT FACTORS

YES/NO

17

TOTAL

 

 

 

This score serves as a reference to assess SC’s credit risk and to set the amount of credit to be extended. It is calculated from a composite of weighted scores obtained from each of the major sections of this report. The assessed factors and their relative weights (as indicated through %) are as follows:

 

Financial condition (40%)                  Ownership background (20%)                         Payment record (10%)

Credit history (10%)                            Market trend (10%)                                             Operational size (10%)

 


 

RATING EXPLANATIONS

 

 

RATING

STATUS

PROPOSED CREDIT LINE

>86

Aaa

Possesses an extremely sound financial base with the strongest capability for timely payment of interest and principal sums

Unlimited

71-85

Aa

Possesses adequate working capital. No caution needed for credit transaction. It has above average (strong) capability for payment of interest and principal sums

Large

56-70

A

Financial & operational base are regarded healthy. General unfavourable factors will not cause fatal effect. Satisfactory capability for payment of interest and principal sums

Fairly Large

41-55

Ba

Overall operation is considered normal. Capable to meet normal commitments.

Satisfactory

26-40

B

Unfavourable & favourable factors carry similar weight in credit consideration. Capability to overcome financial difficulties seems comparatively below average/normal.

Small

11-25

Ca

Adverse factors are apparent. Repayment of interest and principal sums in default or expected to be in default upon maturity

Limited with full security

<10

C

Absolute credit risk exists. Caution needed to be exercised

Credit not recommended

 

 

 

PRIVATE & CONFIDENTIAL : This information is provided to you at the request, you having employed MIPL for such purpose. You will use the information as aid only in determining the propriety of giving credit and generally as an aid to your business and for no other purpose. You will hold the information in strict confidence, and shall not reveal it or make it known to the subject persons, firms or corporations or to any other. MIPL does not warrant the correctness of the information as you hold it free of any liability whatsoever. You will be liable to and indemnify MIPL for any loss, damage or expense, occasioned by your breach or non observance of any one, or more of these conditions