

User Authentication Based on Machine Learning Algorithm
ApON-EZMCOM develops algorithm that is machine learning based Entity User Behavior Authentication. To know more contact...
Business IT Conclave - Bengal Chamber of Commerce & Industry
Hackers, insiders, criminals and nations have motives for gaining access to information and systems to disrupt or destroy them. Keeping...
Brand building at organisation level - Talent Loyalty and Employee retention
Browsing one day through Linked In on a sultry afternoon, I was reminded of a thought. I recalled a few conversations some CEOs had had...
Top cyber security threats
Top cyber security threats 1. Mobile Security Threats Mobile Apps/Systems are being used to make transactions, e.g., Near Field...
Report of Sub-Group on Cyber Security
1 XII five-year plan on information technology sector Report of Sub-Group on Cyber Security 1.0 Background Over the years,...
National Cyber Security Policy
Page 1 of 9 National Cyber Security Policy -2013 Preamble 1. Cyberspace1 is a complex environment consisting of interactions between...
Quote-unQuote from few of our recent interactions.
“Acquiring a IT Software, IT Tool, IT Processes without ApON as Knowledge Partner is like buying medicines from shop and eating them...