September 21, 2020

We have around 200 channel partners working with us at present in the corporate and enterprise segment user base- Mr. Zakir Hussain – Director, BD soft

Mr. Zakir Hussain - Director, BD soft, Country Partner of Bitdefender

An exclusive interview with IT.Voice, Mr. Zakir Hussain – Director, BD soft, Country Partner of Bitdefender, reveals his strategies for business in India .

  • ITVoice Media :- How do you think your enterprise channel partners should pitch Bitdefender Computing to execute profitable business deals?

Mr. Zakir Hussain :- Bitdefender is 100% cloud based solution and the partners can pitch the same to the customers, where it will help to install faster and no hassles of infrastructure or setting up server etc. Ofcourse on premise edition is also available who do not wish to go on cloud. Secondly, it has more than 500 million user base across the world and some of the leading antivirus solutions and firewall use Bitdefender engine to provide security. Also, the solutions are trouble free, so it saves lot of work from channel partner engineers and even at the customer end.

Mr. Zakir Hussain – Director, BD soft, Country Partner of Bitdefender
  • ITVoice Media :- How many channel partners are working with Bitdefender at present?

Mr. Zakir Hussain :- We aim to be a very channel friendly company. We have around 200 channel partners working with us at present in the corporate and enterprise segment user base. We are working with many more and plan to increase our channel partners. Soon they will be added as our working partners. 

  • ITVoice Media :- What will be the company’s strategy as far as system integrators are concerned?

Mr. Zakir Hussain :- We have seen that the SI has very strong relationship with their customers and most of the time the customers like to work with them on most of the technology requirements. We have identified SIs, who are giving our solutions to their customers, and also we have a MSP program for them, if they wish to join. We give them digital codes only and hence better pricing for retail products as no involvements of packing or shipping is involved. We are also having programs for training their sales and technical staff so that they can give the necessary solution to their customers and give support on time if and when required. Bitdefender has also come out with attractive schemes from time to time to keep them motivated and reward them for their contribution to our success.

  • ITVoice Media :- Please explain what are the differences between Viruses, Spyware?

Mr. Zakir Hussain :- A computer virus is a type of malicious software program (“malware”) that, when executed, replicates itself by modifying other computer programs and inserting its own code. Infected computer programs can include, as well, data files, or the “boot” sector of the hard drive.

And Spyware is software that aims to gather information about a person or organization without their knowledge, that may send such information to another entity without the consumer’s consent, or that asserts control over a device without the consumer’s knowledge.

  • ITVoice Media :- How have Bitdefender develop their software?

Mr. Zakir Hussain :- Bitdefender is an industry pioneer, introducing and developing award-winning protection since 2001. Today, Bitdefender technology secures the digital experience of 500 million home and corporate users across the globe. Top international testing organizations and world-renowned software reviewers acknowledge Bitdefender’s solutions as the world’s most effective. At the same time, Bitdefender’s nearly undetectable impact on system performance won it Best Overall Speed.

  • ITVoice Media :- Basic overview of how a DDOS attack works?

Mr. Zakir Hussain :- Denial-of-service attack (DoS attack) is a cyber-attack where the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet. Denial of service is typically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled.

In a distributed denial-of-service attack (DDoS attack), the incoming traffic flooding the victim originates from many different sources.

  • ITVoice Media :- Please tell us the strategies your team would to keep ahead of viruses?

Mr. Zakir Hussain :- We are a bunch of experts who thrive on the Online platforms. We are always at RED Alert and always keep an eye on upcoming threats and their networks.

Some few guidelines we would like to list here –

  • Login password (for All User Profiles).

  • Avoid sharing of OS drive.

  • Use good antivirus software.

  • Constantly obtain Latest Windows security updates & Service Packs.

  • Check for latest updates/patches of antivirus.

  • Incredibly careful with the emails you receive and the attachments and links that you open.

  • Avoid visiting unwanted sites.

  • Avoid installing software’s from unknown source.