Home Innovator’s corner Wi-Jungle: Keeping Intrusions Away From Your Network Jungle

Wi-Jungle: Keeping Intrusions Away From Your Network Jungle

SHARE

Six months ago, while we toasted the turn of the decade, no one imagined the world would come to a grinding halt because of a biological virus. But it did, and it forced us to stay confined to our homes and work remotely. With the lines between work and home further blurring due to the indefinite nature of the ongoing pandemic, another type of virus seems to be spreading fast – Cybercrime.

By Mihir Bagwe, Technical Writer, CISO MAG

It’s a Jungle Out There!

Remember Disney’s famous animated movie “The Lion King”? What was Simba restricted from? He was forbidden from going beyond a certain boundary. Why was he forbidden? Because the threats in the valley were unknown and thus made him vulnerable to attack. The same applies to our urban digitally connected jungle; the threats are unknown, and we need to protect our boundaries.

In the early days of the pandemic, cybercriminals vowed not to attack healthcare facilities and systems that are at the forefront of the COVID-19 war, thus drawing a protected boundary around these services. However, it is a known fact that they use these global episodes and the associated fear among the masses for personal gain. And they did just that. Add to this the vulnerability of the humongous number of people working from home outside the company’s usual security perimeter. No wonder a recent study suggested that 85% of organizations anticipated a threat to business operations from remote workers.

While businesses are pushing to integrate digitization as an indispensable part of the personal and professional lives of the people, it is worth noting that vulnerability and misuse of personal and professional data are ringing serious alarm bells. It is like the threat actors are employing the jungle rules; attack and spread fear, and only the fittest survive. So how can you defend your digitally connected urban tribe from these intrusion threats to your cyberspace? WiJungle, an Indian based startup, may have an answer to this.

The WiJungle Story

Co-founded by Karmesh Gupta and Praveen Gupta in 2017, the company provides a Unified Network Security platform that is trusted by businesses spread across 25+ countries worldwide. Karmesh, due to his keen interest in cybersecurity, had previously worked with Lucideus (a cybersecurity firm founded by his college alumni, Saket Modi). The learnings from his time at Lucideus, the deep understanding about the distributed architecture followed within the cybersecurity industry from their first two ventures in computer networks, and its allied security products, coupled with their failures, helped them persevere in being successful the third time around, with a unique solution that served the need of the hour. The duo did not just succeed but excelled and the world took note of it by showering them with accolades such as ‘Most Innovative Product of The Year in 2018’, Frost and Sullivan – ‘New Product Innovation Award of the Year 2019’, etc. Karmesh’s perseverance was further rewarded when he was selected by Forbes in its annual 30 Under 30 Asia 2020 list.

As they say, all great stories have humble beginnings, and so is it the case with this duo. When asked about the challenges faced in bringing up the startup, the duo mentions, “We had already failed twice, so there was no chance to get capital from any sort of third-party for trying a new venture. Bootstrapping was the only way to take it forward. Consequently, we had a very limited period to develop a minimum viable product (MVP) and turn it into a successful sale to ensure cashflow. If the launch period were missed, the MVP product would have failed to hit the expected sales volume and we would have again been in a deadlock. So, ensuring to be lean was a prime challenge in the starting days.”

The Unified Network Security Gateway

This platform comprehensively offers the capabilities of NextGen Network Firewall, Secure Web Gateway, Web Application Firewall, Hotspot Gateway, DLP, Vulnerability Assessment, etc. with an all-in-one device. The AI and ML-enabled devices help businesses to seamlessly manage and safeguard their entire network through a single window.

WiJungle has a wide range of models to cater to the needs of businesses of all sizes in various sectors such as enterprises, education, hospitality, healthcare, BFSI, transport, retail, defense, smart city, real estate, events, etc.

With many industry giants telling their employees to continue working from home even in the post-pandemic world, in some cases as long as “forever,” it has now become more important than ever to secure your work cum home security perimeter with competent solutions like the Unified Network Security Gateway offered by WiJungle.

KEY DIFFERENTIATORS
  • Both unified threat management (UTM) / Firewall and Hotspot Gateway features in a single device.
  • Inbuilt storage of User logs for a period of one year along with search option.
  • Auto-Feature update via cloud.
  • Provision for PMS/HIS/third party integration and custom development.
  • Real-time activity notifications.

 

S N A P S H O T
Company
  • HttpCart Technologies Pvt. Ltd. (Registered Company Name)
  • WiJungle (Product Brand Name)
CEO/Co-Founders
Website www.wijungle.com
Tech Partners CISCO, AWS, RSA
Social Media Handles
Location(s) New Delhi, Jaipur
Employees 70
Awards
Industry-wise Services
  • Defense
  • Healthcare
  • Hospitality
  • Education
  • Smart City
  • Transportation
  • Enterprises (Services & Manufacturing)
  • BFSI
  • Retail

Company Timeline

Wi-Jungle Company Timeline

About the Author

CISO MAG Writer - Mihir Bagwe
Mihir Bagwe is a Tech Writer and part of the editorial team at CISO MAG. He writes news features, technical blogs, and conducts interviews on latest cybersecurity technologies and trends.

 


Other Posts from the Author:

 **Disclaimer** 

CISO MAG did not evaluate/test the products mentioned in this article, nor does it endorse any of the claims made by WiJungle. The facts, opinions, and language in the article do not reflect the views of CISO MAG and thus we do not assume any responsibility or liability for the same. CISO MAG does not guarantee the satisfactory performance of the products mentioned in this article.