GRM Technologies Private Limited
Deepika Sukumar is currently serving as an Associate Cyber Security Consultant at GRM Technologies Private Limited, a position held since March 2024. Prior to this role, Deepika completed a Cyber Security Trainee position at NEC Corporation from September 2023 to March 2024 and gained experience as a Digital Marketing Intern at Ezapp Solution from August 2021 to February 2022. Deepika earned a Bachelor of Technology in Information Technology from Jerusalem College of Engineering, India, from August 2019 to May 2023, and completed 12th grade with a focus on Computer Science at Gurunanak Mat. Hr. Sec. School from June 2018 to March 2019.
This person is not in the org chart
This person is not in any teams
GRM Technologies Private Limited
About GRM Technologies With the business organizations growing in leaps and bounds, it has become mandatory for all businesses to keep their business information, data and assets safe and secure. In this world of vulnerability to cyber threats and crimes, protecting data and information has become a major challenge to all organizations. This is not the time of reactive security which is of no use. This is the time for proactive security measures. At GRM Technologies, Empaneld Indian Computer Emergency Response Team (CERTIN) Cyber and Information Security Audit, Advisory and Consulting Company that helps enterprises to store, process, and access data in a secure manner. We help our clients reduce organizational risk and strengthen all defenses, and build customer trust. Founded in 2013, our company was launched with a view to protect and preserve the integrity of client organizations’ systems and data. Our team of 18+ industry-certified security professionals, headquartered in Chennai, India, possess deep and extensive knowledge of threat vectors, security standards, government regulations, and data protection laws. We work with you in the implementation of the entire life cycle of the security services so that it becomes easy for you to integrate all the security processes with your organizational needs. In short, we are your one-stop Cybersecurity partner for everything. Our Methodology "We follow the four ‘A’s": Assess: We assess your security needs. Advice: We advice on what processes you should adopt to keep all your data and infrastructure safe and secure. Adopt: We help you adopt the best processes that suit the needs of the organization and empower you to manage all risks with great ease and agility. Assist: We are there to assist you in the entire implementation of all the security measures. Our Services:- - Cyber Security Services - Advisory Services - Managed Security Services - Privacy Services - Forensic Services - Training Services