Securing statistics is a key requirement for any agency, especially with the growing want to digitize data. While there are several protection startups in Tier I towns, Geet Vaishnav and Prateek Sharma determined to start one of their fatherland – Indore.
The duo founded Securitybulls – a penetration trying out and infrastructure safety carrier company – in 2016. The platform analyses an enterprise’s digital belongings from a hacker’s factor of view to offer a blueprint for remediation to assist build or beautify a protection method.
Geet and Prateek noticed a lack of knowledge whilst it came to protection and felt the want for corporations to be extra focussed on it.
During his engineering days in Indore, Geet had decided to come to be an Offensive Security Certified Professional (OSCP). This gave him the exposure to paintings on exclusive tasks at the same time as nevertheless in university. The concept to do something his very own and help comfy records of various enterprises. He determined to drop the college and commenced freelancing on the same. He says he has labored on distinctive initiatives with statistics agencies and economic establishments. As an OSCP protection freelancer, he has additionally labored and taught other university students.
Prateek commenced working with one-of-a-kind companies in the course of his engineering days in coding and protection and worked in enterprise development at Infogrames Software Solutions, Code Decode Labs and Teleperformance India. After he completed his engineering in Mumbai, Prateek moved again to Indore to pursue a certification direction in the International enterprise from IIM Indore.
It is here that the two met. They determined to build an employer that checked out safety. Soon, they roped in Rohit Asoliya, Rishabh Dogra, Thrivikram Gujrathi, and Medha Singh.
As the point of interest is on analyzing threats from a hacker’s point of view, the crew wishes to be up to date with the cutting-edge attack vectors. Prateek says the group is educated earlier exploitation techniques that malicious customers can use to compromise networks, structures, and applications to benefit get right of entry to touchy information and crucial assets.