Mouli Dorai Talks About Zoho’s Innovations in Data Privacy and Security at #Zoholics24
Mar 24, 2025
Dive into a comprehensive discussion on data privacy and security with Mouli Dorai from Zoho at Zoholics 2024. In this interview, Mouli explains why data privacy and security are crucial for small businesses and how Zoho is leading the charge in protecting sensitive business data. Learn about Zoho's innovative data protection tools designed to safeguard against threats like phishing and crypto mining. Discover the benefits of conditional access, smart sign-in, and password management within Zoho's platform. Mouli shares valuable insights on how these tools collectively enhance security, manage user access, and protect business data in an increasingly digital world. This is essential viewing for businesses looking to fortify their data security.
#Zoholics2024 #DataPrivacy #DataSecurity #ZohoSecurity #PhishingDetection #CryptoMiningDetection #ConditionalAccess #SmartSignIn #PasswordManager #SmallBusinessSecurity #TechInnovation #BusinessProtection #ZohoInterview #DataProtection #CyberSecurityTools #Zoho #ZoholicsUS #Zoholics24
Show More Show Less View Video Transcript
0:01
hi this is Sean hessinger reporting for
0:03
small business Trends from zoholics
0:05
2024 and I'm here with moly durai
0:09
speaking uh about security and data
0:13
privacy and uh let's just start with
0:16
this uh we hear so much about uh data
0:19
privacy and data security these days why
0:21
are these two issues so important do you
0:23
think to small businesses in particular
0:26
so when it comes to security and privacy
0:29
uh especially small small businesses are
0:30
the ones who get affected more if you
0:33
look at the number of incidents or the
0:35
number of breaches that happened in the
0:37
last five years you would be knowing a
0:39
lot of small businesses has gone out of
0:42
business just after facing a breach so
0:45
one out of three business uh small
0:47
business especially uh who fa the breach
0:49
has gone out of their own business so
0:52
why because they lack their expertise
0:54
they don't have the right uh security
0:56
expertise and they don't have the right
0:58
type of budget to handle the new age
1:02
cyber attacks or security threat
1:03
landscape that is prevailing today let's
1:07
talk about how to how how do you go
1:08
about protecting your data I mean why
1:11
has this become such a focus for Zoho in
1:13
particular Zoho is a company our larger
1:16
vision is to service the operating
1:18
system for business we help customers
1:20
already with their sales marketing
1:22
finance and all that but security is
1:25
also very very essential today in 2024
1:28
we all work in a hybrid fashion and we
1:30
have a lot of devices lot of
1:32
applications which means for any company
1:34
it's very hard for them to manage to
1:36
know who is using which account from
1:38
where when and all that so security is
1:41
of a Paramount importance today because
1:44
uh there is a lot of regulations in
1:46
across the regions so if you put your
1:49
business data and customer data at risk
1:52
or if it is something breached The
1:54
Regulators are going to come after you
1:56
with huge fines and maybe take you out
1:59
of business well yeah well let's look at
2:02
some of the specific uh data protection
2:04
tools that Zoho offers can can you give
2:06
us a kind of a an overview of some of
2:09
the uh some of the tools that that Zoho
2:12
uh developed to protect business data or
2:15
has to protect business data so uh today
2:19
our security tag with with four
2:22
different solutions starting with our
2:24
browser followed by the identity and
2:27
access management platform and the
2:29
multia authentication and a password
2:31
manager so if you go in a chronological
2:34
order every single day we all wake up we
2:38
take our mobile device or a laptop we
2:40
need to authenticate first and from
2:42
there we need to open a browser to log
2:44
in all the work applications to complete
2:47
our work right so Zoho kind of gives you
2:49
this holistic picture it helps you to
2:52
authenticate your device and it gives
2:54
you a privacy first browser from which
2:56
also offers you single sign on for the
2:58
entire Zoho EO system and the dashboard
3:01
the Zogo directory dashboard helps you
3:03
to give a single sign on for third party
3:05
application as well if you are using
3:07
Sales Force if you using docy sign if
3:09
you're using Dropbox you don't need to
3:11
remember additional password so just
3:13
with one single password you do device
3:15
authentication uh you get a good browser
3:18
from there you log into all your work
3:19
application you can peacefully go uh
3:22
after the end of the day the security is
3:24
taken care of multiactor authentication
3:26
comes on top of it for shared accounts
3:28
for marketing finance and banking you
3:31
need a password manager so you need to
3:33
share password based on roles and
3:35
responsibilities so we have four levels
3:37
of password sharing that helps you uh to
3:40
share passwords based on your business
3:42
requirements let me ask you about two
3:44
terms that I that I saw creeping up in
3:46
in uh in press releases particularly
3:48
about Security First fishing detection
3:51
and crypto mining detection uh what are
3:55
they and and how do Zoho tools help
3:58
protect you against those kinds of
3:59
things uh these two techniques uh these
4:02
two uh are part of our aula browser
4:05
fishing prevention is basically
4:07
something say for example facebook.com
4:10
many times there are some malicious
4:11
website that look similar to
4:13
facebook.com where we end up giving up
4:15
our credentials the machine learning
4:17
technology which is powered by the Zoho
4:19
intelligent assistant Zia in the
4:21
background kind of helps the browser to
4:23
know the fishing sites uh which also get
4:26
away with our personal data that is the
4:28
first part of it the crypto mining
4:30
prevention so there are a lot of
4:32
websites today the GPU cost on the
4:34
hardware cost across the globe has risen
4:37
so the scammers today want to use our
4:40
personal devices to mine the data so AA
4:43
browser kind of helps you to prevent
4:45
your physical devices for from further
4:47
damage or without your permission I see
4:51
um let's drill down into something
4:53
called the conditional access um let me
4:56
ask you about Zoho to uh uh tools that
4:58
are helping business businesses use that
5:01
to manage user apps and devices and
5:03
networks and more securely can you talk
5:06
a little bit about that more specifical
5:07
access yeah conditional access basically
5:10
helps you uh with both your applications
5:13
and MFA say for example I'm an IT admin
5:17
I'm going to uh open up Salesforce only
5:20
for users from California region who
5:22
join the company from 2020 to 2022 it is
5:26
basically if else statement you can come
5:29
up with your own IFL statement based on
5:31
your business requirement this condition
5:33
is okay and then this happens as an
5:36
admin you can have any type of condition
5:38
uh within your company uh with which you
5:40
can have role based access time based
5:43
access and a lot of restrictions on top
5:45
of it see um what is Smart signin uh and
5:50
what Zoho tools uh tool uses the
5:53
technology uh to better protect data
5:55
smart signin is part of our Zoho one the
5:58
multiactor authentication system system
6:00
so all the 100 million Zoho users uh
6:03
gets access to the Zoho one system which
6:05
is basically free even if you are not
6:07
part of Zoho you can use this technology
6:10
so instead of using your password every
6:12
single time you basically authenticate
6:14
with the uh QR code or your Biometrics
6:17
so you don't need to enter your password
6:18
you can seamlessly log to your account
6:21
so that is what we call a smart signin
6:23
uh we talked about I think password
6:25
managers could you specifically kind of
6:28
Define what that is I mean we kind of
6:30
passed over it but what exactly is it
6:32
and and how how does that fit into the
6:34
whole Zoho platform to protect data a
6:37
password manager uh passwords like it or
6:39
hate it so they are here to stay it is
6:42
one of the most affordable
6:44
authentication mechanism today we have
6:46
it people talk about passwordless pass
6:49
Keys Biometrics and all that but still
6:52
passwords are easy to manage and
6:54
affordable authentication method but the
6:56
tricky part is people use uh easy to M
6:59
password like Mai 123 password one 12 3
7:02
combination of anniversary dates and all
7:04
that especially for business account if
7:07
I going to use a a password which my
7:09
friend can easily predict I am going to
7:11
be at risk they can get away with my
7:13
personal data and also with the company
7:15
data so all the companies in many
7:17
companies you could have seen they have
7:19
put all the password in spreadsheets or
7:21
some companies even print it out uh
7:23
paste it on a sticky note on top of the
7:25
laptops and all that so as an admin you
7:27
never know who access the bank account
7:29
from where and when let's take a family
7:32
example I share my Netflix password with
7:34
my friends or my parents or my siblings
7:38
so what happens here if someone is going
7:39
to change that password I'm not going to
7:41
know it right so especially in a
7:43
business environment in a sh account uh
7:46
you need to put all your business
7:48
password into a wall and share it with
7:50
different levels of access Privileges
7:52
and you need to have uh good audit
7:54
trials uh that records who accessed the
7:57
password where from when and all that
7:59
and the NIS compliance says that the
8:01
password requirement should be between 8
8:03
to 32 characters it should have
8:05
multiactor and all that it it is part of
8:09
complaints for larger companies as well
8:11
got it okay well thank you uh that was
8:14
amol Don Dy and he is the uh evangelist
8:18
for uh data and security with Zoho and
8:22
I'm Sean hessinger reporting for small
8:24
business Trends from zoholics 2024
#Computer Security
#Hacking & Cracking
#Consumer Resources
#Network Security
#Other
#Identity Theft Protection

