2 Nov 2023 , 02:15 PM
Tata Consultancy Services (TCS) launched a new Cyber Insights Platform on Thursday, utilizing AI and Amazon Security Lake to improve cybersecurity and compliance for its customers.
The platform enables TCS to unify diverse security data from public and private clouds, on-premise environments, and third-party security providers into a central repository powered by Amazon Security Lake.
Machine learning models within the platform help monitor anomalies and predict potential issues in advance, allowing clients to proactively address potential threats.
TCS customizes the Cyber Insights Platform to cater to industry-specific security requirements by leveraging its domain knowledge across various industry verticals.
One offering, the Financial Crime Fusion Center, employs generative AI to provide financial services clients with insights into incidents like account takeovers, unauthorized fund transfers, and identity theft by integrating data from their fraud detection and cybersecurity systems.
Krishna Mohan, Deputy Head of TCS AI. Cloud, emphasized the platform’s innovative use of cutting-edge technologies to address clients’ critical business problems and the collaboration with AWS in transforming cybersecurity practices.
TCS offers comprehensive services and solutions for enterprise customers, including cloud migration, application and data modernization, managed services, and industry-specific innovations on AWS, holding multiple AWS validated qualifications and competencies.
For feedback and suggestions, write to us at editorial@iifl.com
Related Tags
IIFL Customer Care Number
(Gold/NCD/NBFC/Insurance/NPS)
1860-267-3000 / 7039-050-000
IIFL Capital Services Support WhatsApp Number
+91 9892691696
IIFL Capital Services Limited - Stock Broker SEBI Regn. No: INZ000164132, PMS SEBI Regn. No: INP000002213,IA SEBI Regn. No: INA000000623, SEBI RA Regn. No: INH000000248
ARN NO : 47791 (AMFI Registered Mutual Fund Distributor)
This Certificate Demonstrates That IIFL As An Organization Has Defined And Put In Place Best-Practice Information Security Processes.