Mechanically Tough- XPG SUMMONER Gaming Keyboard, a Right Accessory for Extreme Gaming Experience

December 31, 2020

  • XPG SUMMONER inspires the gaming hue effects with 7 preset RGB backlight modes
  • The aluminum sandblasted body gives the XPG SUMMONER an imposing look and added reliability and durability

NEW DELHI, India – December 31, 2020 – ADATA, a leading manufacturer of high-performance DRAM modules and NAND Flash storage application products and accessories, recently announced the launch of XPG SUMMONER Gaming Keyboard. The SUMMONER has an aluminum top panel with open-chassis design. Equipped with CHERRY MX RGB mechanical switches, the XPG SUMMONER keyboard offers complete game control, tactile feedback and the highest click precision with a 1000 Hz polling rate. The device comes in three variants: Cherry MX Silver which is fast and sensitive switches, Blue which comes in the classic and tactile design switches and the Red one quiet and linear switches.

Good mechanical keyboards have already become an integral part of a gamer’s setup. Mechanical switches have also become increasingly affordable and more brands have started offering keyboards with varying switch types, caps, form factors, and more.” said Sachin Sharma, Country Manager – India at ADATA Technology (India) Pvt. Ltd. “The XPG SUMMONER gives users excellent stability, tactile feedback, and the utmost precision. It’s solid brushed aluminum frame is ready to withstand a lifetime of gaming while keeping styling simple and refined. Every key is individually backlit with stunning addressable RGB backlighting.”

The XPG SUMMONER has 7 pre-configured RGB lighting modes with the ability to individually customize each key using the XPG PRIME app. The media keys make it easy to control the volume of the sound, and various complex combinations of actions can be assigned to the macro keys. It is equipped with a shock-absorbed armrest for increased comfort during long gaming sessions and is easily removable thanks to its magnetic mount. The force of attraction of the magnets is sufficient so that the stand does not fall off even in the hottest battles. The keyboard has an inbuilt USB slot which allows users to connect to USB devices such as a gaming mouse, headset or charging smartphone. Additionally, anti-Ghosting technology provides complete protection against signal conflicts and erroneous keystrokes.

Price, Availability and Warranty

XPG SUMMONER Gaming Keyboard comes with an MRP of Rs 10,550, carrying warranty of 2 years. These products are immediately available on Amazon.

# # #


ADATA Technology, one of the world’s largest vendors of DRAM modules and USB flash drives, provides complete solutions, including memory cards, solid-state drives, and portable hard drives. ADATA products also include on the go power for mobile devices and the company is now a major provider of advanced LED lighting. ADATA products continue to garner international acclaim from organizations such as iF Design Awards (Germany), red dot Awards, CES Best of Innovations Awards, Good Design Awards (Japan), Best Choice of Computex Awards, and Taiwan Excellence Gold Awards. The company’s slogan of Love, Life, and Dreams embodies the ADATA brand and the role of innovative memory products in the human pursuit of universally cherished ideas. For more information, please visit

PremiumAV’s Enhanced Services Beneficial for Vendors and Partners

December 29, 2020

Positioning product sales of different brands from multiple categories, providing brand licencing from brands and helping vendors in smooth sales of their products in the channel market are the services PremiumAV is offering to vendors and partners which can be availed from

NEW DELHI, India – December 29, 2020

PremiumAV, a leading provider of new age PC & Mobile accessories, today announced the enhancement in their operations and services to benefit vendor and partner communities. PremiumAV has taken a one stop solution approach for vendors and channel partners. PremiumAV’s gamut of services include placing products for sale with profitable margins on Amazon and other ecommerce sites, helping channel partners in owning brand licensing for categories of vendor brands and helping vendors with its online and offline channel business strategy. PremiumAV has established a strategic plan to uplift their vendor and channel partners businesses through these models.

PremiumAV invites partners and vendors from across the vertices to avail these services. PremiumAV, BigPlayer, Breda, CableDeconn, Draganwar, Ehuoyan, CellShell, Xtrike Me, etc. are few of the brands which are currently associated with PremiumAV.

We are very excited and happy to announce our plan to enable our enhanced services, to help our vendors and channel partners serve better. We believe in growing with our vendors & partners and help them to create a productive go-to-market strategy which will help them sustain and grow” said Mr. Sanjay Garg, CEO at PremiumAV. “We have established a pleasant and healthy relationship with our vendors and channel partners over the years. We at PremiumAV always offer our partner community with the best of brands that helps them to sell with ease and help them get better profits.”

PremiumAV service offerings

  • Placing products on Amazon- vendors can place their products on Amazon through PremiumAV at competitive prices, yielding more profits to the vendors. PremiumAV has introduced an impressive product range of more than 1000 in Amazon alone.
  • Brand licencing- PremiumAV is authorised to provide brand licensing for over 41 premium brands and its products. Partners can connect with PremiumAV to own the brand licensing rights.
  • Strategizing the channel for sales – PremiumAV helps vendors connect with right channel partners to plan and attain a profitable business.

# # #

About PremiumAV

PremiumAV is the new age PC & Mobile Accessories company. With more than two decades of experience, PremiumAV has come a long way in addressing the market dynamics of evolving customer’s needs. PremiumAV has been a trusted partner for vendors who would want to launch their brands on Amazon. PremiumAV also helps the vendors achieve brand licensing. PremiumAV has been doing this for multiple brands spread across various categories like speakers, mobile accessories, smart watches, high-end cables and connectors, software solutions, musical instruments, chargers & converters, PC peripherals, pet accessories, and more.

PremiumAV operation was started by Mr. Sanjay Garg in 1999, a well-known company selling software for laptops and mobile devices. Mr. Sanjay then took a parallel entry into the gadgets and mobile accessories segment in 2016. PremiumAV built an impressive product range of more than 1000. Today, PremiumAV has its own 10 trademark branded products on Amazon.

In early 2017, PremiumAV moved towards being a service-oriented company. It took the approach of filling in the gap where vendors were finding it difficult to place their products on e-commerce portals. Adding the issues, PremiumAV today helps vendors place their products on Amazon at competitive prices, yielding more profits to the vendors. PremiumAV has a tie-up with Appario and Cloudtail to place vendor products on Amazon. PremiumAV has also signed-up Accelerator Program with Amazon under the brand name “BRIX”. to learn more about PremiumAV visit

Budgeting Smart When Implementing Digital Transformation

December 22, 2020


Rajendra Chitale


Crayon Software Experts India

Digital transformation is the first step taken by companies when they want to integrate digital technologies into all spheres of their business. As we are living in a digital economy, businesses are facing the urgent need to be more relevant with changing customer needs and preferences, while others are trying to remain competitive, and also looking at opportunities to expand into new markets. When it comes to implementing a holistic digitisation project, organizations must take certain points factored in when working on the most primary step to digital transformation.

It’s budgeting. It’s a completely operational and cultural change aimed to deliver the best to the customer by leveraging trending digital technology.

Consider opinions of inside stakeholders

Traditionally, companies take budgeting decisions on a departmental basis, with the financial director approving a high-level budget, which is then distributed across the team. This process does not involve everyone from across the organization, as it was never required. This usual approach might require a little alteration, when it comes to budgeting for digital transformation, as these models simply aren’t viable today. Digitisation of an entire organization would be affecting each and every area of business. If digitisation will come into the sales and marketing department, then it shall also come into the HR, finance, operations, to even to the facility management department. Hence, to understand how digitisation will impact all these areas, it is important to have participation of the people involved in each process. It calls for a collaborative approach that facilitates a thorough understanding of core business processes. Without a holistic overview, there are risks of creating bottlenecks that will affect the investment down and away from the revenue-gene activities that matter.

Flexible Budgeting Model

Unlike how budget plans were designed traditionally, digital transformation budgets cannot be strictly limited. As most of the digital tools and solutions will be newly acquainted with, the budget may at times need to accommodate unforeseen needs and issues. Hence, it is advisable to have a buffer amount to the budget. In flagship budgets it is a smart move to consider contingencies. Thus, instead of having just a long-term budget, a short-term budget and goals along with it is more advisable. With short-term goals, the digital transformation process and results are monitored better and modification to the budget allocation can be done timely to reduce wastage and improve returns. In the absence of short-term goals, any failures are realized at a much later stage and it becomes costlier to correct the errors.

Consider data migration costs

While planning a budget for digital transformation one critical component is often ignored, that is data migration costs. When the business undergoes digital transformation, all the data needs to be migrated from the existing set-up to the new system. This is a costly affair, as it must be assured that there is no loss of data in the process, hence all care to be taken. Thus, there must be sufficient budget for compliance and security requirements, as these important factors must be considered in digital transformation planning. It’s also important to assess the non-financial costs, time taken for migration, additional work burden on employees during migration & risks associated with data loss as well.

It is always advisable that businesses take consultancy from industry experts in each step. This can help eliminate many common risk factors and make the process smooth. Hence consultancy costs must be factored into the budgeting as well.

Allocating Workforce Training Budget

Digital transformation would require additional training of the staff, without which it is a complete futile initiative. For optimal utility of the digital tools, the workforce must be well versed with the tools. Training may require outsourcing separate software training agencies or authorized trainers for certain software’s. Some training may go up to a high cost than others. Thus, this is one area which will require coming under the budgeting head.

Plan for the Risk

Every change in a legacy process can trigger certain possibilities. These can be either positive or negative. It is rather an intelligent step to consider any kind form of outcome and be prepared for it with prior plans. Digital transformation is a major change in any company, which may have certain impacts. The goal of digital transformation is to create new markets. This process can even bring negative results. Companies must analyse this on time. In short, the digital transformation of a business is a risk, but if planned well and prompt action taken, the results can be desirable ones. Keeping enough backup funds ready for unexpected budget issues is a smart move here.


Planning and budgeting for digital transformation is a complex and layered process. For any business, digital transformation creates a new path for success, but it has risks. To achieve heights, it is imperative to take this risk. Diligent efforts on budget planning can help reduce the negative impacts of digital transformation to the business.

iValue and CloudDefense Join Hands to Provide Hands-On Opportunity in Securing Complete Software Portfolio

December 22, 2020

BENGALURU, India – December 22, 2020 – iValue InfoSolutions, India’s premium technology aggregator, today announced their collaboration with CloudDefense. The purpose of this collaboration is to ease the terms of securing numerous applications in any organization that leads to security and development processes moving hand-in-hand, with no delay hampering the development.

In this era of DevOps, an average enterprise has to deal with more than a hundred applications to support their digital-driven businesses. The size and scale of potential application vulnerabilities and threats have grown significantly and it’s a humungous task for the SecOps team to certify, pen test and validate all applications. CloudDefense introduces a breakthrough platform for assessing the risk posture for the entire application stack and enables a more agile DevSecOps philosophy, which will help security move at the same pace as development. Finally, a way for developers to build secure applications and balance risk and development speed! Identifying the necessity of solutions provided by CloudDefense to tackle such issues, iValue is happy to bring their solution to the Indian market,” said Harsh Marwah, Chief Growth Officer at iValue InfoSolutions.

iValue’s readymade framework precisely targets the right set of enterprise customers through analytics based on customer life cycle adoption framework. Their focused partner network pan-India has helped to target specific partners of relevance based on his top customers and top brands. CloudDefense introduces a breakthrough platform for assessing the risk posture of the entire application stack and enables a more agile DevSecOps philosophy, which will help security move at the same pace as development. This enables CIO’s and CISO’s to better balance risk and development speed.

The risk for an application can only be assessed by evaluating the entire application stack, and CloudDefense enables Security and Compliance teams to get a bird’s-eye view of overall application security risk, open source vulnerabilities and quickly investigate any legal compliance issues. Its single platform for assessing the risk of applications helps in integrating the existing software build system to identify application and container vulnerabilities.

Anshu Bansal, CEO / CTO at CloudDefense said “Nowadays, companies can’t afford to just protect one layer of their (numerous) applications. This leads to companies investing in several tools to provide complete coverage or opting to not protect certain aspects of their applications. Neither option is ideal. The former leads to lots of expensive shelfware as it’s very hard to train on, manage, maintain and report on so many tools. The latter is bad form. So that’s why we’re on a mission to streamline DevSecOps – just one tool to comprehensively handle your open-source components, static code analysis, pen-testing, API scanning and container scanning. And we’re excited to say that we are being supported on this journey by seasoned business veterans like Gokul Rajaram (commonly known as one of the creators of Google Adsense), Arjun Malhotra (founder of HCL), Atiq Raza (ex-COO and President of AMD), as well as many others. It is with great excitement that we are partnering with iValue to bring our solution to the Indian market and enable seamless DevSecOps for companies of all sizes!

Their Software Composition Analysis (SCA) verifies third-party libraries, frameworks and components used within an application. The Static Application Security Testing (SAST) automatically analyzes compiled or un-compiled written code for security vulnerabilities. Dynamic Application Security Testing (DAST) is similar to black-box application testing. API Scanning tests the API endpoints for any potential vulnerabilities and Container Scanning allows security scan on Docker images to find vulnerabilities.

# # #

About iValue InfoSolutions:

A premium technology enabler, iValue InfoSolutions drives “Go to Market” for Niche, Compelling and Complimentary offerings, “Digital Assets” Protection, Optimization & Transformation area, leveraging Customer Life Cycle and Product Life Cycle Adoption frameworks.

iValue mission is to optimize, protect & transform “Digital Assets” of Organizations, with leading edge & proven offerings, in collaboration with trusted partners. iValue offerings are aligned, customized & optimized for organizations, across vertical & size, through its OEM, consultant & global, national, regional and local system integrators partnership.

iValue has direct partnership with 35+ “Best of Breed” OEM’s with 7,000+ Customers through 700+ partners. iValue has a direct presence across 13+ locations in multiple continents, with channel, solution, vertical & horizontal focused teams, addressing pre-sales, sales & post sales needs of Customer, Consultants & Partner for Private, Public and Hybrid cloud needs. Apart from India, iValue overseas presence includes Nairobi, Kenya office for Africa foray.

The team at iValue leverage Analytics for its structured and targeted business development at Customers along with AI-driven CRM solution for ensuring profitable growth for its partners and OEM. iValue has been growing consistently at 4+ times market growth rates, at 50%+ CAGR for the last 12+ years.

For more information, visit iValue and follow us on LinkedIn and Twitter.

About CloudDefense:

CloudDefense AI was founded by the desire to solve a problem. Securing applications is hard enough already, and even more so when having to stitch together a stack of up to 8 tools.

That’s why our founders decided to use their experience leading security teams at large Fortune 50 companies and their experience with previously founding a company that went on to IPO to create CloudDefense.

One tool to secure your entire application – SCA, SAST, DAST, API, Licenses, and Secrets Scanning. We want to make comprehensive application security a reality for all organizations.

For more information, visit Cloud Defense.

An Analytics & Behavior-Centric Approach to Digital Payment Security for the RBI

December 22, 2020

The recent news of cyberattack on a large private bank, where banking operations were halted for two days is really alarming. It appears to have been a denial of service (DDoS) attack or some other flaw in the netbanking system, which led to this attack, where people were not able to connect to the bank’s server and its netbanking site for 48 hours. These types of attacks are always related to flooding of traffic for a specific service because of which the service would stop responding or crash. A known vulnerability within an internal application can also pose these kinds of issues which can lead to a big impact such as bringing the system to a complete halt.

Examples like this always result in the amendment of current security practices. It is good that the Reserve Bank of India (RBI) is focusing on this and bringing more digital initiatives that will ensure banking transactions are secure from a cybersecurity perspective. When banks undertake updates or add new applications, they should evaluate the risk related to these applications and ensure that people accessing them can trust the new services. These parameters need to be assessed every time the bank does a vulnerability assessment. The security team at a bank should know how a certain application is behaving, what is the baseline load, what type of transactions are happening, etc, but this information also needs to be captured at an analytics level. Then if this baseline load is exceeded, it acts as an early warning system to step in and address DDoS attacks quickly.

As RBI is focused on building a more secure digital framework, it should look at utilizing analytics to make sure banking platforms are resilient. In India, the banking sector seems to be heading towards a big transformation. For instance in the past, RBI rolled out new kinds of credit cards for users where a small chip is inserted in cards to improve security and convenience for card transactions. This shows how RBI is working towards modern initiatives and frameworks for the banks to adopt. Once we get to know the new policy and guidelines, we can further share our thoughts.

I imagine that RBI would intend to build a robust security policy that takes all types of banking players (private, nationalized, overseas and cooperative) and modes of transactions into account. As India is talking about data protection and data privacy, these factors will also have to be considered. For example, whether a person completes a transaction from a mobile phone or laptop or from any location, data gets logged into the system. This brings up the question of data security and privacy. I’m sure RBI will focus on these aspects from their digital initiative perspective-how to manage the infrastructure risk along with the privacy risk. Data protection is another point that RBI may keep in mind while designing security policies. Data can be protected and better secured by taking a behavior-centric approach to security.

For instance, during a crisis Forcepoint’s Data Loss Prevention (DLP) solution can help banking customers detect and protect data leaks from a compromised system, the web, email or from an endpoint. As any B2B service consumes that data, it can also monitor data over the transport layer.

Our Dynamic User Protection helps in detecting and preventing an insider threat, and monitors user activities using indicators of behaviors to implement an auto-response based on the risk matrix. This helps banks detect risky behaviors in the core banking system and to identify people who interact with that data.

As people are working from home even in the banking sector, our Private Access replaces the traditional VPN and brings in micro-segmentation. This solution helps in segregating network and data management plane to provide secure remote access to applications and data in the datacenter.

# # #

About Forcepoint

Forcepoint is the global cybersecurity leader for user and data protection. Forcepoint’s behavior-based solutions adapt to risk in real-time and are delivered through a converged security platform that protects network users and cloud access, prevents confidential data from leaving the corporate network, and eliminates breaches caused by insiders. Learn more at

%d bloggers like this: