Xcitium
Niveditha Balakrishnan is a seasoned professional in implementation and project management with expertise in dialer systems and customer relationship management integrations. Currently serving as Team Lead Implementation at Xcitium since September 2022, Niveditha previously held the position of Senior Associate Implementation at Acqueon, where responsibilities included full installation of UCCE and Unexsys for UCCX, AWS cloud implementations, and database management. Niveditha's earlier experience includes roles as Implementation Engineer at ClearTouch, where dialer performance optimization and issue management were key focus areas, and as Process Associate at IndiGo, addressing client management issues. Niveditha started a career at Cognizant as a Process Executive, where multifaceted problem-solving and competitor analysis were integral tasks. Niveditha holds an MBA in System, Networking, and LAN/WAN Management from the University of Madras and a B.Sc. in Computer Science from VELS University.
This person is not in any teams
This person is not in any offices
Xcitium
Xcitium is used by more than 3,000 organizational customers & partners around the globe. Founded with one simple goal – to put an end to cyber breaches, Xcitium’s patented ‘ZeroDwell Containment technology uses Kernel API Virtualization to isolate and remove threats like zero-day malware & ransomware before they cause any damage. ZeroDwell is the cornerstone of Xcitium’s endpoint suite which includes advanced endpoint protection (AEP), endpoint detection & response (EDR), and managed detection & response (MDR). Since inception, Xcitium has a zero breach track record when fully configured. “Every day, the AV-TEST Institute registers more than 450,000 new malicious malware strains and potentially unwanted applications, which enterprises must stay vigilant for. This creates alert fatigue within many organizations,” said Ken Levine - CEO of Xcitium. “ZeroDwell gives customers’ peace of mind in knowing that any ransomware and other malware lurking undetected in their environment will remain dormant, resulting in zero breaches.”