
|
Report Date : |
13TH
June, 2006 |
IDENTIFICATION
DETAILS
|
Name : |
PALADION
NETWORKS PRIVATE LIMITED |
|
|
|
|
Registered Office : |
2nd
Cross, 1ST Street, Pachayappan Colony, Chennai, Tamilnadu |
|
|
|
|
Country : |
India |
|
|
|
|
Financials (as on) : |
31.03.2003 |
|
|
|
|
Date of Incorporation : |
24.05.2000 |
|
|
|
|
Com. Reg. No.: |
18-45018 |
|
|
|
|
CIN No.: [Company
Identification No.] |
U72200TN2000PTC045018 |
|
|
|
|
TAN No.: [Tax
Deduction & Collection Account No.] |
MUMP11467B |
|
|
|
|
Legal Form : |
Private
Limited Liability Company |
|
|
|
|
Line of Business : |
Company
is in engaged in Providing Software Services |
RATING & COMMENTS
|
MIRA’s Rating : |
Ca |
|
RATING |
STATUS |
PROPOSED CREDIT LINE |
|
|
11-25 |
Ca |
Adverse factors are apparent. Repayment of
interest and principal sums in default or expected to be in default upon
maturity |
Limited with full security |
|
Maximum Credit Limit : |
|
|
|
|
|
Status : |
Moderate
|
|
|
|
|
Payment Behaviour : |
Slow |
|
|
|
|
Litigation : |
Unknown
|
|
|
|
|
Comments : |
Available
information indicates moderate financial position of the company having
substantial accumulated losses. Payments are reported as slow. Initially,
the company can be considered for any business dealings on safe and secured
trade terms and conditions. |
LOCATIONS
|
Registered Office : |
2nd
Cross, 1ST Street, Pachayappan Colony, Chennai, Tamilnadu |
|
Website : |
|
|
|
|
|
Head
Office : |
307,
Devarata Sector – 17, Vashi – 400703, Navi Mumbai |
|
Tel.
No.: |
91-22-27892889 |
|
Fax
No.: |
91-22-67913580 |
|
|
|
|
Office
: |
Bangalore
N-307,
Manipal Centre USA
Virginia
12801 Worldgate
Drive, Suite 500, Malaysia
Kuala
Lumpur
F313,
Phileo Damansara 1, Middle
East
Dubai
Dubai Internet
City,
Marketing
Enquiries
|
DIRECTORS
|
Name : |
Mr. Rajat Mohanty |
|
Designation : |
Chief Executive
Officer |
|
|
|
|
Name : |
Mr. Vinod
Vasudevan |
|
Designation : |
Chief Technology
Officer |
|
|
|
|
Name : |
Mr. Rohit Kumar |
|
Designation : |
Vice President
(Sales & Marketing) |
|
|
|
|
Name : |
Ms. Shifa Suresh |
|
Designation : |
Vice President
(Human resources) |
BUSINESS DETAILS
|
Line of Business : |
Company
is in engaged in Providing Software Services |
GENERAL
INFORMATION
|
Customers : |
Banking, finance
and insurance
State
Bank of India AMI
Insurance Ocwen FinancialCorporation First
Islamic Bank Commercial Bank of Kuwait OrbiTech
Solutions Riyad
Bank ICICI
Bank Principal
Financials AMC Prudential Singapore IDBI
Bank Prudential
ICICI AMC Medmarc
Insurance Kotak
Mahindra Bank Standard
Chartered Bank ABN
AMRO Bank Kotak
Mutual AMC Syndicate
Bank Information
technology and consulting
Infosys
Technologies Ltd. CMC ITS2 Polaris Digicert Keane Aditi Fortuna PWC Microsoft
Consulting HCL
Tech SK-International Hewitt
Associates Hurix
Systems Tata
Elxsi America
To Go Intel Atcom ISeva Manufacturing
Titan HLL IReliance
Industries Asian Paints Pfizer Daimler Chrysler Pidilite Telecommunications
Comsat
Max Reliance
Infocomm ITata
ISP Global
Tele Rolta
Net Satyam Nextel Research and
development
BEL GE
Tech Center ISRO Government
Department
of Justice,USA Ministry
of IT, India |
|
|
|
|
Bankers : |
Not
Available |
|
|
|
|
Facilities : |
-- |
|
|
|
|
Banking Relations : |
Unknown
|
|
|
|
|
Auditors : |
Parihar
& Sonpar Chartered
Accountant |
|
|
|
|
Associates/Subsidiaries : |
Nil |
CAPITAL STRUCTURE
Authorised
Capital :
|
No.
of Shares |
Type |
Value |
Amount |
|
1000000 |
Equity Shares |
Rs.10/- each |
Rs. 10.000 Millions |
Issued,
Subscribed & Paid-up Capital :
|
No.
of Shares |
Type |
Value |
Amount |
|
327400 |
Equity
Shares |
Rs. 10/- Each |
Rs. 3.274 Millions |
FINANCIAL DATA
[all figures are in Rupees
Millions]
No
financial are available from Registry
Management
remained non – cooperative during current investigation
We could
mange brief financials for 31.03.2003 which is enclosed here with as on
indication
ABRIDGED
BALANCE SHEET
|
SOURCES OF FUNDS |
|
31.03.2003 |
31.03.2002 |
|
|
SHAREHOLDERS FUNDS |
|
|
|
|
|
1] Share Capital |
|
3.274 |
3.051 |
|
|
2] Share Application Money |
|
0.000 |
0.000 |
|
|
3] Reserves & Surplus |
|
24.884 |
17.108 |
|
|
4] (Accumulated Losses) |
|
(15.402) |
(12.329) |
|
|
NETWORTH |
|
12.756 |
7.830 |
|
|
LOAN FUNDS |
|
|
|
|
|
1] Secured Loans |
|
0.000 |
0.000 |
|
|
2] Unsecured Loans |
|
0.000 |
0.000 |
|
|
TOTAL BORROWING |
|
0.000 |
0.000 |
|
|
DEFERRED TAX LIABILITIES |
|
0.000 |
0.000 |
|
|
|
|
|
|
|
|
TOTAL |
|
12.756 |
7.830 |
|
|
|
|
|
|
|
|
APPLICATION OF FUNDS |
|
|
|
|
|
|
|
|
|
|
|
FIXED ASSETS [Net Block] |
|
4.392 |
4.352 |
|
|
Capital work-in-progress |
|
0.000 |
0.000 |
|
|
|
|
|
|
|
|
INVESTMENT |
|
0.000 |
0.000 |
|
|
DEFERREX TAX ASSETS |
|
0.000 |
0.000 |
|
|
|
|
|
|
|
|
CURRENT ASSETS, LOANS & ADVANCES |
|
|
|
|
|
|
Inventories |
|
|
|
|
|
Sundry Debtors |
|
|
|
|
|
Cash & Bank Balances |
|
11.173 |
4.337 |
|
|
Other Current Assets |
|
|
|
|
|
Loans & Advances |
|
|
|
|
Total Current Assets |
|
11.173 |
4.337 |
|
|
Less : CURRENT LIABILITIES & PROVISIONS |
|
|
|
|
|
|
Current Liabilities |
|
2.878 |
0.938 |
|
|
Provisions |
|
0.000 |
0.000 |
|
Total Current Liabilities |
|
2.878 |
0.938 |
|
|
Net Current Assets |
|
8.295 |
3.399 |
|
|
|
|
|
|
|
|
MISCELLANEOUS EXPENSES |
|
0.069 |
0.079 |
|
|
|
|
|
|
|
|
TOTAL |
|
12.756 |
7.830 |
|
|
PARTICULARS |
|
|
31.03.2003 |
31.03.2002 |
|
Debt
Equity Ratio (Total
Liability/Networth) |
|
|
0.22 |
0.11 |
|
|
|
|
|
|
|
Current
Ratio (Current
Asset/Current Liability) |
|
|
3.88 |
4.62 |
LOCAL AGENCY
FURTHER INFORMATION
Paladion News
Sangita Pakala
speaks on “Secure Coding Guidelines for .Net” at the RSA Conference 2006 in San
Jose
They were selected from the 1500+ proposals RSA received. Their topic is "Secure
Coding Guidelines for .Net". This is their second time at RSA -
they spoke on Network Forensics in 2004.
The RSA conference is the largest security conference . 10,000+ participants,
1000+ vendors, 200 presentations, and keynote speakers like Bill Gates. For
more information, visit: http://2006.rsaconference.com
Paladion launches
Plynt, the security certification for applications
Plynt,
a Paladion enterprise, provides on-demand Application Security Testing and
Certification. Plynt is headquartered in Herndon, Virginia and has global
delivery centers in Virginia, India and Malaysia. Plynt has been designed with
speed, budget and comprehensiveness as the key advantages. If you work in
software product management, information security management or software
quality assurance, Plynt will prove to be the dependable ally in application
security.
Today, when customers use a software product, they are concerned about its
security. Businesses want to ensure that software they use do not have security
holes that can impact financial transactions, customer privacy or process
availability. People with responsibility to build, deliver or sell software are
taking steps to have good security in their products. Plynt augments this
effort by providing an independent assurance that the software has robust
security and is resistant to attacks. Plynt security testing criteria is
exhaustive and benchmarked with industry standards so that each software is
always tested against latest set of threats and vulnerabilities.
Plynt will help you assure the customers, whether internal or external to the
organization, that the software product has good security. And this is backed
with a Plynt Certificate for the software.
Banking & Finance
Technology has
fueled remarkable productivity growth at financial institutions that are
witnessing an unprecedented speed of change related to technological and
customer service innovation and creation of new business models involving
financial institutions and other entities, such as Internet service providers,
telecommunication companies and technology service providers. Customers are
linked electronically to banks through channels such as ATMs and the Internet.
Outsourcing has enabled banks to cut costs and focus on their core business.
Communications technologies have increased connectivity across global financial
systems.
While the financial institutions leverage technology to enhance the value of
their service offerings and improve efficiency and effectiveness of their
operations, they are also exposed to significant risks on account of security
and integrity of sensitive information. Competitive pressures to roll out new
business applications and technology initiatives in very compressed timeframes
to offer more and more value-added services intensifies the management
challenge to ensure that adequate strategic assessment, risk analysis and
security reviews are conducted prior to implementing new initiatives.
This has resulted in heightened industry awareness and concern, accompanied by
increased regulatory scrutiny of financial institution?s information risk
assessment, mitigation and management systems. It is imperative that financial
institutions recognize, address and manage information security risks in a
prudent manner and information security management becomes an integral part of
the financial institution's overall enterprise risk management framework.
How Paladion Can Offer Value?
Effective risk management is central to financial institutions. However,
despite several information security regulations and guidelines for financial
sector, many financial firms are found lacking in their information security
management. In their experience, the financial institutions that have succeeded
in achieving strong security are the ones who have brought in a clear
implementation focus to the global security standards and regulations. Just as
in business, successful financial firms have not done different things for
security; rather they have done the same things differently.
They assist financial institutions in developing world-class security
governance structure and information risk management processes appropriate for
their individual risk profile, operational structure and corporate governance
culture, as well as in conformance with the specific information risk
management requirements from leading international standards and regulations
such as BS 7799/ISO 27001, ITIL, COBIT, Basel Committee Guidelines amongst
others.
They have worked closely with several leading global financial institutions in
developing robust, effective and sustainable security management systems.
Telecom & Communications
The Telecom industry is currently
characterized by significant challenges ? changing customer needs, industry
restructuring and consolidation, fierce competition, transformational
innovation, and convergence. Availability of increased bandwidth is changing
the way in which telecom operators conduct business, as revenue streams for
information and data transfer gain greater importance. Increased bandwidth
means new and larger applications and service offerings such as picture
messaging, video, games, transactional capability and e-billing. Industry
players are gearing up to harness the potential of converging technology,
networks, devices and content to develop multimedia services and solutions of
ever-increasing sophistication.
Furthermore, there is also an increased regulatory and legislative pressure:
new legislations, such as the Sarbanes- Oxley Act and the EU 8th Directive, are
forcing telecom service providers to increase their level of internal control
and to ensure they are operating (and generating revenue) at the highest levels
of efficiency.
IT is at the core of telecom operations, particularly in IT-enabled
functionality provided for billing and customer care. From quickly yet securely
integrating new services from partner providers, to protecting the billing and
personal information of their customers, security is a primary consideration of
all telecom service providers. Information security threats to the operators
and service providers in the telecom industry could adversely affect the firms
on account of:
![]()
Denial
or disruption of service to customers
|
|
Unauthorized
monitoring and disclosure of sensitive customer and business information |
|
|
Unauthorized
modification of user or network information and network services leading to
unreliable services to customers |
|
|
Revenue
Loss through fraud and unauthorized services-revenues leakage |
Enhancing and streamlining information risk management capabilities can provide
significant business and competitive advantages.
How Paladion Can Offer Value?
Effective information risk management in a rapidly evolving telecom environment
is indeed a challenging task. Telecom carriers and service providers need to
take a proactive approach to integrating information security as a core
component of their enterprise operations and initiatives, to provide for the
stability, availability and resiliency required for successful operations, and
to protect their reputation, customers and revenues.
Paladion has the industry-specific experience, knowledge and technology skills
to assist you in designing and implementing a world-class security governance
structure and security management system in the organization that is
appropriate for the individual risk profile, operational structure and
enterprise risk management culture, as well as in conformance with the specific
information risk management requirements from leading international standards
and regulations such as BS 7799/ISO 27001, ITIL, COBIT, CPNI and EU Directives
amongst others.
IT & BPO
Information
Security and Data Privacy concerns are paramount as organizations outsource
their IT Services and business processes, especially to offshore service
providers As sensitive information of financial, insurance, medical and
personal nature begins to get handled by offshore outsourcing service
providers, there is a growing concern about the manner in which it is being
collected, stored and utilized. This is shaped by various security and privacy
regulations such as GLBA, SOX, HIPAA, OCC Guidelines, FISMA and EU Directives
to name a few.
Organizations demand a high level of information security controls from their
outsourcing service providers and are incorporating stringent provisions for
information security in their contractual agreements with service providers, as
the consequences of an information security breach could lead to business harm
and legal liability.
This is not merely a matter of competitive advantage for service providers in
the BPO and IT/ITES industry. Service providers could be liable under various
security, privacy, trade secret and copyright laws in case of breaches such as
unauthorized disclosure of financial information, release of maliciously
modified financial information, and disclosure of customer information, for
example, a person's financial status, heath condition or employment. These
types of regulatory, legal, statutory and contractual requirements are not
limited to actions by the service provider alone. The organization that has outsourced
its services can be liable for information security breaches by the service
provider and the organization suffers equally in case of such breaches by its
own staff or by service provider personnel.
How Paladion Can Offer Value?
They can assist companies in the BPO and IT/ITES industry in developing and
implementing world-class security governance structure and risk management
processes that will effectively alleviate the perceived risks of outsourcing
amongst its customer base.
Paladion has the industry-specific experience, knowledge and technology skills
to assist you in designing and implementing a security management system in the
organization that is in conformance with the specific information risk
management requirements from leading international standards and regulations
such as BS 7799/ISO 27001, ITIL, COBIT and client-specific security policies
and standards.
Oil, Energy & Manufacturing
Oil, Gas, Energy and other process
industries in the Manufacturing industry significantly leverage information
technology to integrate business processes within the enterprise and beyond to
achieve efficiency and effectiveness in their operations. Significant economic
factors drive the need for manufacturing information throughout the enterprise
and beyond. Globalization, lean manufacturing, outsourcing, and other factors
have driven manufacturers to adopt the Collaborative Manufacturing Model (CMM)
where information can flow seamlessly throughout the enterprise and to the
business partners. The business improvement concepts around manufacturing
process excellence are driving the need for real time operational data to be
available any time any where within and outside the organization. Modern
manufacturing cannot thrive without current information from its manufacturing
processes and plant floors being fed to its enterprise systems and
applications.
However, the same technologies that make business operations and manufacturing
processes more efficient introduce new security risks and make Manufacturing
Information Assurance an increasingly critical issue. Open connectivity
standards being deployed on the plant floors and in the extended enterprise are
increasingly web-based. Industrial automation systems are seldom
security-aware. Further, risks are not fully appreciated because it is
perceived that plant floor systems are ?isolated? and ?not interesting?. Some
of the risks from a plant operations perspective could be ?
|
|
Anyone
with access to control network and having the proper programming package can
perform unauthorized operations |
|
|
Disruptions
to production and processes, power and communications systems |
|
|
Exposure
to human safety and environmental risks |
Information security in manufacturing firms is also important for maintaining
competitive advantage in market. Marketing plans, customer purchase pattern,
product formulae and supplier are some of the proprietary information, which
differentiates a manufacturing firm from its competitor. If the confidentiality
of such information is not maintained, firms will find it difficult to compete.
How Paladion Can Offer Value?
They can assist you in developing and implementing an Integrated Manufacturing
Enterprise Security System that encompasses information security in both
enterprise systems and process control systems.
Paladion has the industry-specific experience, knowledge and technology skills
to assist you in designing and implementing a security governance structure in
the organization that is in conformance with leading international standards
such as BS 7799/ISO 27001, ITIL, COBIT and specific manufacturing sector best
practices.
![]()
Paladion services begin with a forecast of the
security systems, to determine if it is capable of protecting you from risk.
You require is a strong security check on the hardware, software and network
platforms. All of which are possible through the range of services they
provide:
ISO 17799 compliance / BS7799 Certification
BS7799 provides a list of protection measures that organizations should adopt
to build a comprehensive security infrastructure. ISO 17799, the
internationally recognized information security management standard, is a
direct descendant of BS7799, which is finding increasing acceptance by
companies in the areas such as business process outsourcing, offshore software
development and in-house IT services. This globally accepted and highly
marketable system ensures a sustainable security cover.
Security Code Review
A security code review involves the rigorous testing of the application source
code and identifying structural faults responsible for the security weaknesses.
On checking an application you get in depth knowledge of the security strength
of the application and code sets. You are also provided with the 'threat
models' for the entire application or the components to be reviewed.
Application Security Audit
Application security audit acts as a watchdog for the applications through the
Internet or through the customer site on a staging server, checking for
security holes. They offer this service in two modes:
|
|
Application
Penetration Testing (remote) |
|
|
Comprehensive
Application Security audit (onsite) |
Vulnerability Assessment
Vulnerability assessment offers a methodology that critically detects the
deficiencies, from a security standpoint, in any given system. An Organization,
particularly while launching new systems, needs very strong security which only
vulnerability assessment provides. With fast and reliable data-collection and
analysis, you also get easy, practical reports and recommendations. The VA methodology
can be easily implemented.
Enterprise Security Audit
An Enterprise security audit involves a review of all processes and practices
followed by an organization looking to ensure enterprise-wide security.
Additionally, there will be a technical audit conducted across all the
locations and devices in the enterprise. Based on the spread and criticality of
the devices being audited, there is a judicious mix of remote and onsite
audits. The technical audit uses industry-standard tools as well as custom-developed
tools.
Penetration Testing
Penetration testing is required for testing networks and their components to
avoid security threats. It doesn?t matter whether you have restricted knowledge
of the network, or do not have it at all. Because the internal penetration test
is conducted remotely via the Internet on the IP address, the URL specified by
the client, or at the client site.
|
|
Light
perimeter test ? Testing the strength of the perimeter from a remote
location. |
|
|
Full
perimeter test ? Verifying the security of the perimeter, the servers in the
DMZ with - remote exploitation of DMZ and accessible internal systems. |
|
|
Internal
test ? The 'trusted insider' test, launched from inside the client's network,
with internal exploitation. |
Product
Centralized Audit Tool
Internal auditors of banks and large corporate houses
have been using their system audit tool to verify the security status of
servers, databases and network elements. They have found their tool to be
highly powerful in detecting security weaknesses, while saving on time and cost
of doing the audit.
Their tool supports a wide variety of platforms, namely:
Operating systems
|
|
Windows
(2000, 2003, XP, NT) |
|
|
Solaris
(7.0, 8.0) |
|
|
Linux
(7.3, 8.0, 9.0) |
|
|
Aix |
Web server
|
|
Apache
(1.3) |
|
|
IIS
(5.0, 6.0) |
Database
|
|
MSSQL
(6.5, 7.0, 2000) |
|
|
Oracle
(7.0, 8.0, 8i, 9i) |
Network devices
|
|
Cisco
routers |
|
|
Nortel
passport switches |
Features
|
|
Can be
used to audit in stand alone or networked mode |
|
|
Comprehensively
audits for vulnerabilities, insecure settings, miss-configurations and policy
non-compliance with built-in checklists |
|
|
Can be
easily configured to test for the custom security policies |
|
|
Provides
automated data capture, analysis and reporting |
|
|
Gives
a clear and concise report, listing the insecurities and recommended
mitigation steps |
Benefits to internal auditors
|
|
Reduces
time for auditing large number of systems in a network |
|
|
Helps
you audit more systems, more number of times to achieve better compliance |
|
|
Extremely
easy to use and to generate reports, assuming minimal knowledge of security |
|
|
Provides
richer and more accurate information on the security status of systems than
most of the other audit tools |
Available at highly competitive prices
If you think their system audit tool will benefit the company, write to Nanda
Kumar at nanda.kumar@paladion.net and we'll get back to you.
Internet Traffic monitoring System
As a Law Enforcement Agency (LEA)
looking for Internet interception solutions, you will find their product the
best in price and performance. Having worked with several LEAS, they understand
the specific needs that such interception products should meet.
Accordingly, their product is designed to intercept a wide range of Internet
protocols from emails, chat, file transfers, browsing and VOIP in a seamless
manner. Their interception occurs in real time without any interference with
the normal flow of Internet traffic.
Features of their product include:
|
|
Supports
interception at high bandwidth |
|
|
Wide
range of parameters for interception |
|
|
Rich
reporting features |
|
|
Integrated
platform |
|
|
Robust
security controls |
They also recognize that LEA needs vary. Their product is built in modules and
can be easily customized to diverse needs in a minimal time frame, at a highly
competitive price
![]()
Overview
Paladion depicts
the ultimate seal of security represented in the Greek Myth - 'The War of the
Trojans.'
The Paladion, a sacred icon of Pallas Athena (the Greed goddess of war, wisdom
and the arts), protected the city of Troy. The wicked ways of the Trojans
angered Pallas Athena, which led to the Trojans being dispossessed of the
Paladion. As the war with the Greeks began, the Trojan horse broke into the
city, which was once impenetrable. Troy was burnt down and the Greeks emerged
victorious.
The company today provides world-class solutions to reduce information security
risks and enable clients enhance their potential to leverage technology,
through adoption of business-centric information protection programs.
Paladion today has operations in 4 continents and a spread of customers
comprising 150 leading companies, across 15 countries.
Staffed by some of the best talent in the infosec business, Paladion
professionals are certified in CISSP, CISA, SANS, BS7799, CBCP, BS 15000 and
others. Their gamut of industry expertise covers the:
Banking-Finance-Insurance, IT & Consulting, Manufacturing, Telecom, R &
D and Government sectors.
Management Team
Chief Executive
Officer - Rajat Mohanty (CISSP, CISA)
![]()
![]()
Rajat, who hails from eastern
India, is an alumnus of the renowned Indian Institute of Technology and of
XLRI. He held managerial positions with the Steel Authority of India, the
country's largest steel company, and ICICI, India's largest financial
institution, before co-founding Paladion Networks.
Under Rajat's leadership Paladion has successfully achieved a leading position
in the Indian market, and is now focused on replicating this success in new
markets, specifically the United States, Malaysia and the Middle East. His
interests include puzzles, Indian mythology, Indian history and trekking.
"As they expand globally, their customers' expectations are also
growing," says Rajat. "Their challenge is to consistently meet their
heightened expectations, and then strive to exceed them. This philosophy has
always been the bedrock of their growth."
Chief Technology
Officer - Vinod Vasudevan (CISSP, BS7799 LA)
![]()
![]()
Vinod, who comes from South India,
is an alumnus of the College of Engineering, Trivandrum. He has held key
technical positions with Microsoft and Wipro, and has traveled extensively
across the globe on numerous projects. Vinod is a co-founder of Paladion
Networks.
Vinod leads a large team of highly skilled and accomplished security
consultants and project leaders across Asia and America. His responsibilities
with the organization include security research, delivery processes and new
technology offerings. Indian philosophy, yoga, meditation and poetry are among
Vinod's interests.
"They are focusing on streamlining their processes, so that clients can
enjoy better and faster service," says Vinod. "Their consultants have
been aggressively thinking of new ways to improve their security assessments,
and their clients have started appreciating the work."
Vice President
(Sales & Marketing) - Rohit Kumar (CISSP)
![]()
![]()
Born and brought up in North India,
Rohit was educated at the Indian Institute of Technology and at XLRI. He has
held sales and marketing positions at Heinz Inc in Cincinnati, United States,
and operational positions with Reliance, India's largest private company.
Rohit leads a diverse team of sales consultants across their Asia and America
operations. He also manages the alliance and business partner relationships at
Paladion. Travel, trekking, river rafting, sauces and spicy cuisine, all of
these are close to Rohit's heart.
"They are able to deliver strong value to their customers through
partnerships with leading technology players," explains Rohit. "Their
in-depth understanding of their customers' problems, coupled with their
partner's robust solutions, provides a unique value proposition to their
clients."
Vice President
(Human resources) - Shifa Suresh
![]()
![]()
Raised in western India, Shifa is an alumnus of Mount
Carmel College, Bangalore, and XLRI. She has held managerial positions in the
human resources function at i-flex solutions (an IT subsidiary of Citicorp) and
ICICI, India's largest financial institution.
Shifa manages the recruitment and people development processes at Paladion. She
has a fondness for art, painting, cinema and psychological testing.
"They are investing strongly in developing their people to meet the
heightened demands of their enterprise clients," says Shifa. "Their
consultants are trained in handling global customers, and are updated with the
current thinking in security practices."
Corporate Milestones
2006
March
Conducts Second round of
SANS (GCIH) training in India.
February
Plynt, specialized
application security service, is launched.
Invited to speak at RSA
Conference 2006 on .NET security guidelines.
2005
October
Sangita Pakala invited to
speak on Web Security Practice at ISACA Europe, Amsterdam.
Partners with SANS
Institute and offers SANS (GSEC) training in India.
March
Roshan Chandran from
Paladion speaks at SDWEST 2005 on J2EE security.
2004
October
Achieved ISO 9001:2000
certification from BSI.
July
First Edition of Palisade
newsletter published.
2003
May
Participated in TiEC on
2003.
April
Establishes partnership
relationship in USA.
Establishes partnership
relationship in the Middle East.
January
Establishes office in
Virginia, USA.
2002
March
Establishes office in Kuala
Lumpur, Malaysia.
Hosted 'Server Security
Administration Workshop' in Mumbai, Banglore, India.
2001
August
Hosted Joint Conference
with CIO Magazine in Mumbai, India.
June
Hosted Information Warfare
Seminar I in India.
January
Establises corparate
offices in Mumbai & Banglore, India.
DISCLAIMER
Paladion Networks Pvt Ltd retains
copyright on all the text, graphics and trademarks displayed on this site. All
the text, graphics and trademarks displayed on this site are owned by Paladion
Networks Pvt Ltd and used under licence by Paladion affiliates.
You
may print copies of the information on this site for the personal use and store
the files on the computer for personal use. You may not distribute text or
graphics to others without the express written consent of Paladion Networks and
Paladion Networks affiliates. Also, you may not, without their permission, copy
and distribute this information on any other server, or modify or reuse text or
graphics on this or any another system.
No
reproduction of any part of the site may be sold or distributed for commercial
gain, nor shall it be modified or incorporated in any other work, publication
or site, whether in hard copy or electronic format, including postings to any
other site. Paladion Networks reserves all other rights.
The
information on this site has been included in good faith and is for general
purposes only. It should not be relied upon for any specific purpose and no
representation or warranty is given as regards its accuracy or completeness.
No
information on this site shall constitute an invitation to invest in Paladion
Networks or any of its affiliates. Neither Paladion Networks and Paladion
affiliates, nor their or their affiliates' officers, employees or agents shall
be liable for any loss, damage or expense arising out of any access to or use
of this site or any site linked to it, including, without limitation, any loss
of profit, indirect, incidental or consequential loss.
CMT REPORT [Corruption, Money
laundering & Terrorism]
The
Public Notice information has been collected from various sources including but
not limited to: The Courts, India Prisons Service, Interpol, etc.
1] INFORMATION
ON DESIGNATED PARTY
No exist designating subject or any of its beneficial owners,
controlling shareholders or senior officers as terrorist or terrorist
organization or whom notice had been received that all financial transactions
involving their assets have been blocked or convicted, found guilty or against
whom a judgement or order had been entered in a proceedings for violating
money-laundering, anti-corruption or bribery or international economic or
anti-terrorism sanction laws or whose assets were seized, blocked, frozen or
ordered forfeited for violation of money laundering or international
anti-terrorism laws.
2] Court
Declaration :
No records exist to suggest that subject is or was the subject of any
formal or informal allegations, prosecutions or other official proceeding for
making any prohibited payments or other improper payments to government
officials for engaging in prohibited transactions or with designated parties.
3] Asset
Declaration :
No records exist to suggest that the property or assets of the subject
are derived from criminal conduct or a prohibited transaction.
4] Record
on Financial Crime :
Charges or conviction registered
against subject: None
5] Records
on Violation of Anti-Corruption Laws :
Charges or investigation registered
against subject: None
6] Records
on Int’l Anti-Money Laundering Laws/Standards :
Charges or investigation registered
against subject: None
7] Criminal
Records
No
available information exist that suggest that subject or any of its principals
have been formally charged or convicted by a competent governmental authority
for any financial crime or under any formal investigation by a competent
government authority for any violation of anti-corruption laws or international
anti-money laundering laws or standard.
8] Affiliation
with Government :
No record
exists to suggest that any director or indirect owners, controlling
shareholders, director, officer or employee of the company is a government
official or a family member or close business associate of a Government
official.
9] Compensation
Package :
Our market
survey revealed that the amount of compensation sought by the subject is fair
and reasonable and comparable to compensation paid to others for similar
services.
10] Press Report :
No press reports / filings exists on
the subject.
CORPORATE GOVERNANCE
MIRA
INFORM as part of its Due Diligence do provide comments on Corporate Governance
to identify management and governance. These factors often have been predictive
and in some cases have created vulnerabilities to credit deterioration.
Our
Governance Assessment focuses principally on the interactions between a
company’s management, its Board of Directors, Shareholders and other financial
stakeholders.
CONTRAVENTION
Subject
is not known to have contravened any existing local laws, regulations or
policies that prohibit, restrict or otherwise affect the terms and conditions
that could be included in the agreement with the subject.
FOREIGN EXCHANGE RATES
|
Currency |
Unit
|
Indian Rupees |
|
US
Dollar |
1 |
Rs.45.91 |
|
UK
Pound |
1 |
Rs.84.72 |
|
Euro |
1 |
Rs.57.92 |
SCORE &
RATING EXPLANATIONS
|
SCORE FACTORS |
RANGE |
POINTS |
|
HISTORY |
1~10 |
4 |
|
PAID-UP CAPITAL |
1~10 |
2 |
|
OPERATING SCALE |
1~10 |
2 |
|
FINANCIAL CONDITION |
|
|
|
--BUSINESS SCALE |
1~10 |
2 |
|
--PROFITABILIRY |
1~10 |
- |
|
--LIQUIDITY |
1~10 |
- |
|
--LEVERAGE |
1~10 |
4 |
|
--RESERVES |
1~10 |
- |
|
--CREDIT LINES |
1~10 |
3 |
|
--MARGINS |
-5~5 |
- |
|
DEMERIT POINTS |
|
|
|
--BANK CHARGES |
YES/NO |
NO |
|
--LITIGATION |
YES/NO |
NO |
|
--OTHER ADVERSE INFORMATION |
YES/NO |
NO |
|
MERIT POINTS |
|
|
|
--SOLE DISTRIBUTORSHIP |
YES/NO |
NO |
|
--EXPORT ACTIVITIES |
YES/NO |
NO |
|
--AFFILIATION |
YES/NO |
NO |
|
--LISTED |
YES/NO |
YES |
|
--OTHER MERIT FACTORS |
YES/NO |
17 |
|
TOTAL |
|
|
This score serves as a reference to assess SC’s credit risk
and to set the amount of credit to be extended. It is calculated from a
composite of weighted scores obtained from each of the major sections of this
report. The assessed factors and their relative weights (as indicated through
%) are as follows:
Financial
condition (40%) Ownership
background (20%) Payment
record (10%)
Credit
history (10%) Market
trend (10%) Operational
size (10%)
RATING EXPLANATIONS
|
RATING |
STATUS |
PROPOSED CREDIT LINE |
|
|
>86 |
Aaa |
Possesses an extremely sound financial
base with the strongest capability for timely payment of interest and
principal sums |
Unlimited |
|
71-85 |
Aa |
Possesses adequate working capital. No
caution needed for credit transaction. It has above average (strong)
capability for payment of interest and principal sums |
Large |
|
56-70 |
A |
Financial & operational base are
regarded healthy. General unfavourable factors will not cause fatal effect.
Satisfactory capability for payment of interest and principal sums |
Fairly Large |
|
41-55 |
Ba |
Overall operation is considered normal. Capable
to meet normal commitments. |
Satisfactory |
|
26-40 |
B |
Unfavourable & favourable factors
carry similar weight in credit consideration. Capability to overcome
financial difficulties seems comparatively below average/normal. |
Small |
|
11-25 |
Ca |
Adverse factors are apparent. Repayment of
interest and principal sums in default or expected to be in default upon
maturity |
Limited with full security |
|
<10 |
C |
Absolute credit risk exists. Caution
needed to be exercised |
Credit not recommended |