You are on page 1of 99

About Us | Careers | Visit Us

About Us


Among Asia’s Best Employers
For the year 2009

• Rs. 10 billion multi-


product, multi-
o EFL Among
channel corporation - Asia’s Best Employers
part of the Shapoorji 2009 study
Pallonji Group
o India’s Best
• Over 7,000 Employer four years
employees in a row!
• Leaders in domestic
o EFL in Top 10
and industrial Water
for second
Purification consecutive study
Systems, Vacuum
o EFL the Top
Cleaners, Air
ranked in Consumer
Purifiers & Security Durables industry
Solutions
• Pioneers in Direct
selling - Asia's
Eureka Forbes also featured in
Largest Direct
“Top 50 Best Companies to Work For”
Sales Organisation For the year 2009
o 6,000 strong
Direct Sales In a Study conducted by Great Place to Work® Institute
Force in partnership with Economic Times.

touches 1.50
million Indian homes, adding 1,500 customers daily
o Customer family now numbers over 6 million - enduring relationships as "Friends
For Life"
o Operations in over 125 cities & 475 towns across India.
• Expanded channels that reach out to customers to include
o Over 5,000 strong Dealer Sales Network
o A 58 distributor strong Institutional Sales Network
o Security Systems Division - one of India's largest system integrators
o A customer finance scheme, Eurovalue, for customers to easily obtain the means to
Live Healthier Lives
• A strong service network that backs up sales efforts
o 4500 company trained technicians who make 20,000 kitchen visits daily
o Supported by Call Centres, Customer Care Representatives & Mobile Service
Vans
• Eureka Forbes - A Business Superbrand
o Aquaguard & Euroclean - Chosen Superbrands
o Ranked among India's Most Admired Consumer Durable Companies
o One of India’s best Employers
o Winner of 'Most Admired Knowledge Enterprise' MAKE- Asia Awards
o A case study at the prestigious Harvard Business School
o Winner of awards on Customer Responsiveness
o Winner of Water Digest awards

Content provided by Eureka Forbes Limited. Info Edge India Limited disclaims all warranties against infringement

LinkedIn
• Home
• What is LinkedIn?
• Join Today
• Sign In

Find a company

This is the limited version of the Eureka Forbes Ltd company profile: Join LinkedIn or Sign
In to see more information.

Eureka Forbes, Ltd. offers water purification systems, vacuum cleaners, and air purifiers. The
company also offers security solutions, including home security systems, intrusion alarm systems,
access control systems, fire alarm systems, and surveillance systems. In addition, it offers
industrial solutions, such as industrial water purifiers, commercial and industrial vacuum... more

Research by: | »

Your Connections to Eureka Forbes Ltd

To see how you’re connected: Join Now or Sign In

Popular Profiles at Eureka Forbes Ltd

• Shashank Sinha

General Manager & Head Marketing - Direct Sales

• Suresh Goklaney

Executive Vice Chairman

• Mr.Mathialagan Mr.Mathialagan

Vice President

• Anil Bali

DGM CUSTOMER SERVICE (NORTH)

New Hires and Recent Promotions at Eureka Forbes Ltd

• Shashank Sinha
General Manager & Head Marketing - Direct Sales

was Dy.General Manager & Head Marketing - Direct Sales

6 months ago

• Ramkumar Raja

Asst.Manager - Marketing

was Product Executive - Marketing

6 months ago

• Shradha Sundaram

Manegement Trainee, Marketing

was Management Trainee, Marketing

5 months ago

To see more new hires & promotions: Join Now or Sign In

Key Statistics about Eureka Forbes Ltd


Eureka Forbes Ltd Headquarters Address
Konkan Nagar Co-operative Housing Society Ltd. Prakash Narayan Kotnis Marg Mahim (West)
Mumbai, Maharashtra 400 016
India
Phone: 91 22 2444 3436
Headquarters Mumbai Area, India
Industry Consumer Goods
Type Public Company
Status Operating Subsidiary
Company Size 1001-5000 employees
Founded 1982
Website http://www.eurekaforbes.c...
More Eureka Forbes Ltd info »
Common Job Titles Head 7%
Accountant 6%
General Manager 5%
Manager 5%
Territory Manager 4%

Top Schools Bangalore Univ. 8%


Univ. of Mumbai 8%
Kendriya Vidyalaya 5%
Univ. of Pune 4%

Median Age 31 years


Median Tenure 2 years
Gender Male 81%
Female 19%
Estimated based on LinkedIn Data
Companies related to Eureka Forbes Ltd

Career path for Eureka Forbes Ltd employees

before:

• Eureka Forbes...

after:

• ICICI Bank
• Reliance...

See more Related Companies »

In partnership with

Send feedback on BusinessWeek/CapIQ content to linkedinissues@capitaliq.com. Copyright © 2010 Capital IQ.

This LinkedIn Company Profile was created by LinkedIn and is about Eureka Forbes Ltd. This page is not
endorsed by or affiliated with Eureka Forbes Ltd. For questions regarding LinkedIn Company Profiles, contact us.

Eureka Forbes Ltd full company profile, top executives, board of directors & more.

• Customer Service
• About
• Blog
• Careers
• Advertising
• Recruiting Solutions
• Tools
• Mobile
• Developers
• Language

o Deutsch
o English
o Español
o Français
o Italiano
o Português

• LinkedIn Updates
• LinkedIn Answers
• LinkedIn Jobs
• Jobs Directory
• Company Directory
• Service Provider Directory

LinkedIn Corporation © 2010


• User Agreement
• Privacy Policy
• Copyright Policy

Security
From Wikipedia, the free encyclopedia
Jump to: navigation, search
For other uses, see Security (disambiguation).
This article may require cleanup to meet Wikipedia's quality standards.
Please improve this article if you can. (September 2010)
This article needs additional citations for verification.
Please help improve this article by adding reliable references. Unsourced material may be
challenged and removed. (November 2009)

X-ray machines and metal detectors are used to control what is allowed to pass through
an airport security perimeter.

Security spikes protect a gated community in the East End of London.


Security checkpoint at the entrance to the Delta Air Lines corporate headquarters in
Atlanta

Security is the degree of protection against danger, damage, loss, and criminal activity.
Security as a form of protection are structures and processes that provide or improve
security as a condition. The Institute for Security and Open Methodologies (ISECOM) in
the OSSTMM 3 defines security as "a form of protection where a separation is created
between the assets and the threat. This includes but is not limited to the elimination of
either the asset or the threat. Security as a national condition was defined in a United
Nations study (1986)[citation needed], so that countries can develop and progress freely.

Security has to be compared to related concepts: safety, continuity, reliability. The key
difference between security and reliability is that security must take into account the
actions of people attempting to cause destruction.

Different scenarios also give rise to the context in which security is maintained:

• With respect to classified matter, the condition that prevents unauthorized persons
from having access to official information that is safeguarded in the interests of
national security.
• Measures taken by a military unit, an activity or installation to protect itself
against all acts designed to, or which may,
Contents
[hide]

• 1 Perceived security compared to real security


• 2 Categorising security
o 2.1 Types
• 3 Security concepts
• 4 Security management in organizations
• 5 People in the security business
o 5.1 Computer security
o 5.2 National security
o 5.3 Physical security
• 6 See also

• 7 References

[edit] Perceived security compared to real security

Perception of security is sometimes poorly mapped to measureable objective security.


The perceived effectiveness of security measures is sometimes different from the actual
security provided by those measures. The presence of security protections may even be
taken for security itself. For example, two computer security programs could be
interfering with each other and even cancelling each other's effect, while the owner
believes s/he is getting double the protection.

Security theater is a critical term for deployment of measures primarily aimed at raising
subjective security in a population without a genuine or commensurate concern for the
effects of that measure on—and possibly decreasing—objective security. For example,
some consider the screening of airline passengers based on static databases to have been
Security Theater and Computer Assisted Passenger Prescreening System to have created
a decrease in objective security.

Perception of security can also increase objective security when it affects or deters
malicious behavior, as with visual signs of security protections, such as video
surveillance, alarm systems in a home, or an anti-theft system in a car such as a LoJack,
signs.

Since some intruders will decide not to attempt to break into such areas or vehicles, there
can actually be less damage to windows in addition to protection of valuable objects
inside. Without such advertisement, a car-thief might, for example, approach a car, break
the window, and then flee in response to an alarm being triggered. Either way, perhaps
the car itself and the objects inside aren't stolen, but with perceived security even the
windows of the car have a lower chance of being damaged, increasing the financial
security of its owner(s).
However, the non-profit, security research group, ISECOM, has determined that such
signs may actually increase the violence, daring, and desperation of an intruder [1] This
claim shows that perceived security works mostly on the provider and is not security at
all [2].

It is important, however, for signs advertising security not to give clues as to how to
subvert that security, for example in the case where a home burglar might be more likely
to break into a certain home if he or she is able to learn beforehand which company
makes its security system.

[edit] Categorising security

There is an immense literature on the analysis and categorisation of security. Part of the
reason for this is that, in most security systems, the "weakest link in the chain" is the
most important. The situation is asymmetric since the defender must cover all points of
attack while the attacker need only identify a single weak point upon which to
concentrate.

[edit] Types

IT realm Physical realm Political

• Application • Airport security • Homeland security


security • Port security/Supply chain • Human security
• Computing security • International
security • Food security security
• Data security • Home security • National security
• Information • Hospital security • Public security
security • Physical security
• School security Monetary
• Network security • Shopping centre security
• Financial security
• Infrastructure security

• Aviation security is a combination of measures and material and human resources


intended to counter the unlawful interference with the aviation security.
• Operations Security (OPSEC) is a complement to other "traditional" security
measures that evaluates the organization from an adversarial perspective.[3].

[edit] Security concepts

Certain concepts recur throughout different fields of security:

• Assurance - assurance is the level of guarantee that a security system will behave
as expected
• Countermeasure - a countermeasure is a way to stop a threat from triggering a risk
event
• Defense in depth - never rely on one single security measure alone
• Exploit - a vulnerability that has been triggered by a threat - a risk of 1.0 (100%)
• Risk - a risk is a possible event which could cause a loss
• Threat - a threat is a method of triggering a risk event that is dangerous
• Vulnerability - a weakness in a target that can potentially be exploited by a threat

[edit] Security management in organizations

In the corporate world, various aspects of security were historically addressed separately
- notably by distinct and often noncommunicating departments for IT security, physical
security, and fraud prevention. Today there is a greater recognition of the interconnected
nature of security requirements, an approach variously known as holistic security, "all
hazards" management, and other terms.

Inciting factors in the convergence of security disciplines include the development of


digital video surveillance technologies (see Professional video over IP) and the
digitization and networking of physical control systems (see SCADA)[4][5]. Greater
interdisciplinary cooperation is further evidenced by the February 2005 creation of the
Alliance for Enterprise Security Risk Management, a joint venture including leading
associations in security (ASIS), information security (ISSA, the Information Systems
Security Association), and IT audit (ISACA, the Information Systems Audit and Control
Association)[6].

In 2007 the International Organisation for Standardization (ISO) released ISO 28000 -
Security Management Systems for the supply chain. Although the title supply chain is
included, this Standard specifies the requirements for a security management system,
including those aspects critical to security assurance for any organisation or enterprise
wishing to management the security of the organisation and its activities. ISO 28000 is
the foremost risk based security system and is suitable for managing both public and
private regulatory security, customs and industry based security schemes and
requirements.

[edit] People in the security business

[edit] Computer security

See also: Computer security, Cryptography, and Economics of security

• Ross J. Anderson
• Dan Geer
• Andrew Odlyzko
• Bruce Schneier
• Eugene Spafford
[edit] National security

See also: Belfer Center for Science and International Affairs and National security

• Richard A. Clarke
• David H. Holtzman

[edit] Physical security

See also: Private police

• James F. Pastor

[edit] See also


Concepts Branches

• 3D Security • Computer security


• Classified information o Cracking
• Insecurity o Hacking
• ISO 27000 o MySecureCyberspace
• ISO 28000 o Phreaking
• ISO 31000 • Communications security
• Security breach • Human security
• Security increase • Information security
• Security Risk o CISSP
• Surveillance • National security
• Physical Security
o Wireless sensor network o Police
o Public Security Bureau
 Security guard

 Security police

[edit] References

1. ^ http://wiki.answers.com/Q/Do_home_security_systems_prevent_burglaries
2. ^ http://www.isecom.org/hsm
3. ^ OSPA Website
4. ^ Taming the Two-Headed Beast, CSOonline, September 2002
5. ^ Security 2.0, CSOonline, April 2005
6. ^ AESRM Website

Retrieved from "http://en.wikipedia.org/wiki/Security"


Categories: Security | Prevention
Hidden categories: Articles needing cleanup from September 2010 | All pages needing
cleanup | Articles needing additional references from November 2009 | All articles
needing additional references | All articles with unsourced statements | Articles with
unsourced statements from May 2010

Personal tools

• New features
• Log in / create account

Namespaces

• Article
• Discussion

Variants

Views

• Read
• Edit
• View history

Actions

Search

Navigation

• Main page
• Contents
• Featured content
• Current events
• Random article
• Donate

Interaction

• About Wikipedia
• Community portal
• Recent changes
• Contact Wikipedia
• Help
Toolbox

• What links here


• Related changes
• Upload file
• Special pages
• Permanent link
• Cite this page

Print/export

• Create a book
• Download as PDF
• Printable version

Languages

• ‫العربية‬
• Български
• Deutsch
• Esperanto
• ‫فارسی‬
• Français
• 한국어
• Bahasa Indonesia
• Italiano
• ‫עברית‬
• Nederlands
• 日本語
• Олык Марий
• Português
• Русский
• Suomi
• Тоҷикӣ
• Türkçe
• ‫יִידיש‬
• 中文

• This page was last modified on 22 September 2010 at 19:55.


• Text is available under the Creative Commons Attribution-ShareAlike License;
additional terms may apply. See Terms of Use for details.
Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-
profit organization.
• Contact us

• Privacy policy
• About Wikipedia
• Disclaimers

Web Images Maps News Orkut Books Gmail more ▼


Translate Scholar Blogs Updates
YouTube Calendar Photos Documents Reader Sites Groups
even more »
Search settings | Sign in

Google
SafeSearch
moderate ▼
› Off› Moderate
Search (recommended)›
Strict
More about
SafeSearch
Advanced search
About 78,200,000 results (0.34 seconds)

Related searches: wireless security systemshome security


systemscar security systemssecurity cameraaccess control system

Search Results
Page 2
1.
o

Page 2
o
o

o
o

o
o

o
o

Page 3
o

o
o

o
o

o
o

o
o

Page 4
o

o
o

o
o

o
o

o
o

Page 5
o

o
o

o
o

o
o

Page 6
o

o
o

o
o

o
o

Page 7
o

o
o

o
o

o
o

Page 8
o

o
o

o
o

o
o

Page 9
o
o

o
o

o
o

o
o

Page 10
o

o
o

o
o

o
o

Page 11
o

o
o

o
o

o
o

Page 12
o

o
o

o
o

o
o

Page 13
o

o
o

o
o

o
o

Page 14
o

o
o

o
o

o
o

o
o

Page 15
o

o
o

o
o

o
o

Page 16
o

o
o

o
o

o
o

Page 17
o

o
o

o
o

o
o

Page 18
o

o
o

o
o

o
o

Page 19
o
o

o
o

o
o

Page 20
o

o
o

o
o

o
o

Page 21
o

o
o

o
o

o
o

Page 22
o
o

o
o

o
o

Page 23
o
o

o
o

o
o

Page 24
o

o
o

o
o

Page 25
o

o
o

o
o

Page 26
o
o

o
o

o
o

• Everything
• Images
• Videos
• Maps
• News
• Shopping
• Books
• Blogs
• Updates
• Discussions
More
Search Options

o Any size
o Large
o Medium
o Icon

o Larger than...
o Exactly...
Width: px

Height: px
Search

o Any type
o Face
o Photo
o Clip art
o Line drawing

o Any color
o Full color
o Black and white
o •
o Standard view
o Show sizes
o Reset tools

Search

Google Images Home Switch to basic versionHelpGive


us feedback
Google HomeAdvertising ProgramsPrivacyAbout Google
{"/images?hl=en&biw =1259&bih

You might also like