Securing statistics is a key requirement for any agency, especially with the growing want to digitize data. While there are several protection startups in Tier I towns, Geet Vaishnav and Prateek Sharma determined to start their fatherland – Indore. The duo founded Securitybulls – a penetration trying out and infrastructure safety carrier company – in 2016. The platform analyses an enterprise’s digital belongings from a hacker’s factor of view to offer a blueprint for remediation to assist build or beautify a protection method.
Geet and Prateek noticed a lack of knowledge whilst it came to protection and felt the want for corporations to be extra focussed on it. During his engineering days in Indore, Geet decided to be an Offensive Security Certified Professional (OSCP). This gave him the exposure to paintings on exclusive tasks at the same time as nevertheless in university. The concept to do something his very own and help comfy records of various enterprises. He determined to drop college and commenced freelancing on the same. He says he has labored on distinctive initiatives with statistics agencies and economic establishments. As an OSCP protection freelancer, he has additionally labored and taught other university students.
Prateek commenced working with one-of-a-kind companies in the course of his engineering days in coding and protection and worked in enterprise development at Infogrames Software Solutions, Code Decode Labs, and Teleperformance India. After completing his engineering in Mumbai, Prateek moved again to Indore to pursue a certification direction in the International enterprise from IIM Indore.
It is here that the two met. They determined to build an employer that checked out safety. Soon, they roped in Rohit Asoliya, Rishabh Dogra, Thrivikram Gujrathi, and Medha Singh. As the point of interest is analyzing threats from a hacker’s point of view, the crew wishes to be up to date with the cutting-edge attack vectors. Prateek says the group is educated on earlier exploitation techniques that malicious customers can use to compromise networks, structures, and applications to get accessories to touchy information and crucial assets.