Pantherun Technologies in cybersecurity space has Innovating offerings, a unique approach to protecting any device that uses or stores data. The company’s pioneering data protection approach involves the real-time encryption of data, making breaches 10x harder. Pantherun’s vision is to make encryption secure, easy to use and affordable for industries and users everywhere.
Today, Pantherun Technologies is proud to be an Indian technology company that has a solution to “Secure The World”. says Srinivas Shekar (CEO).
Srinivas Shekar (CEO) and Tiffany Chan (COO) founded Pantherun and its patented encryption technology not only makes data breaches 10x harder but is lso resistant to quantum computers and side channel attacks, making it the ideal solution against cyberattacks.
Pantherun is offering its solution via licensing models. There are several ways its IP can be used, including:
● A cost-effective Field Programmable Gate Array (FPGA)
● Part of tailor-made products for industrial markets like Railways, Smart City, and Road Safety
● An IP license that customers can integrate into any chip for any industrial segment
● A POSIX-compliant software integration IP that can be integrated in an almost no-
code fashion into products that run UNIX, Linux, Android, or iOS.
SecurityDive spoke to Srinivas Shekar (CEO) on various topics related to cybersecurity to get his insight about present state of cybersecurity and solution specifically AI related cyber security.
According to Srnivas ‘ we are fully aligned with this shift toward secure by design principles. Our product portfolio reflects this commitment, featuring solutions like AES encryption IP with an AI driven approach to key generation and management, industrial Ethernet switches, and IoT gateway platforms that we open source — all designed with robust security at their core.
At present, Pantherun is primarily targeting IoT and consumer safety in Railways, Road Safety, and Smart City. Ultimately, the goal is to expand into all markets that require secure, high-speed communication, including defense, automotive, industrial IOT, surveillance, energy, mobile, and more.
Securitydive.in: How do you think AI-Assisted Cybersecurity Tools will come in force in 2025?
By 2025, AI-assisted cybersecurity tools will be game-changers in the battle against evolving cyber threats. These tools will leverage advanced capabilities to not only enhance defenses but also make security operations smarter and more efficient. For instance, AI-powered Security Information and Event Management (SIEM) systems will shine in spotting and prioritizing security incidents, cutting down on false positives and identifying new, sophisticated attacks.
Alongside this, Next-Generation Antivirus (NGAV) and Endpoint Detection and Response (EDR) solutions will step up their game by analyzing behavior patterns in real time, enabling swift responses to emerging malware threats.
AI will also supercharge proactive threat hunting. These tools will uncover hidden risks that might otherwise go unnoticed while offering context-aware insights to guide investigations. User and Entity Behavior Analytics (UEBA) will add another layer of security by monitoring and flagging unusual behavior, significantly improving insider threat detection.
On top of that, automated vulnerability management systems will streamline how
organizations identify, prioritize, and address vulnerabilities. This will free up cybersecurity teams to focus on the most critical threats instead of being bogged down by routine tasks.
AI-driven tools will enable organizations to take a more proactive approach to cybersecurity, addressing modern threats with greater precision and agility. They’ll transform how we think about defense, making it both more effective and easier to manage in an increasingly complex threat landscape.
Securitydive.in: Recent high-profile security breaches will drive adoption of secure by design principles in IT projects. Your views ? Is Patherum technologies having such products in mind regarding security by design principal?
The recent wave of high-profile security breaches, including incidents involving major cloud platforms and tech giants in 2024, has made one thing clear: adopting secure by design principles is no longer optional—it’s essential. These breaches often stemmed from vulnerabilities like weak authentication methods and insufficient employee training, underscoring the need to integrate security measures right from the start of IT projects.
The secure by design approach focuses on proactive risk management, embedding security considerations into every phase of a project’s lifecycle, from initial planning to deployment.
This mindset not only helps prevent breaches but also builds a strong foundation for
long-term resilience.
At Pantherun Technologies, we are fully aligned with this shift toward secure by design principles. Our product portfolio reflects this commitment, featuring solutions like AES encryption IP with an AI driven approach to key generation and management, industrial Ethernet switches, and IoT gateway platforms that we open source — all designed with robust security at their core.
For example, our AES encryption IP ensures data protection through advanced cryptographic techniques based on adoption of AI and ML, while our secure communication protocols safeguard sensitive interactions across networks. These features are integrated from the ground up, ensuring our products meet the stringent security demands of industries like manufacturing, healthcare, and critical infrastructure.
By embedding advanced security features into our offerings, Pantherun Technologies
empowers organizations to adopt secure by design practices, helping them build resilient systems that can withstand today’s complex threat landscape.
Securitydive.in: Training and adhering to basic cybersecurity practices ensure that even non-technical staff can recognize and mitigate risks. As a CEO how do you see the training and skilling on Cyber security?
As a CEO, I strongly believe that training and skilling in cybersecurity are foundational to promoting a culture of security within any organization. With cyber threats becoming increasingly complex, it’s crucial that every employee—technical or not—understands basic cybersecurity practices to recognize and mitigate risks effectively.
Training programs should focus on real-world threats like phishing, ransomware, and social engineering, equipping employees with practical skills to identify and respond to suspicious activities. But it doesn’t stop there.
A multi-disciplinary approach is vital.
To ensure these programs resonate, training must be engaging, role-specific, and tailored to diverse learning styles. Tools like interactive workshops, videos, and infographics can make the material more accessible and relatable.
And because cyber threats are constantly evolving, continuous education is non-negotiable. By prioritizing cybersecurity training at all levels, we not only reduce vulnerabilities but also cultivate a shared sense of responsibility.
In this way, cybersecurity becomes more than just a technical challenge—it becomes a collaborative effort that strengthens the organization as a whole.
Data protection Strategies encompass both traditional data protection measures, like data backups and restore functions, and business continuity and disaster recovery (BCDR) plans.
Securitydive.in: What is the changing landscape of data security, new developments such as AI, multicloud security and quantum computing are influencing protection strategies, aiming to improve defense against threats?
The landscape of data protection strategies is rapidly evolving due to advancements in
technology and the increasing sophistication of cyber threats. Organizations are now
integrating traditional measures, such as data backups and disaster recovery plans, with innovative approaches driven by AI, multicloud security, and quantum computing.
AI enhances data protection through predictive analytics and automated threat detection, enabling faster responses to potential breaches. As businesses adopt multicloud environments, ensuring security across various platforms becomes essential, prompting a focus on cyber-integrated solutions that protect data during cloud-to-cloud transitions.
Meanwhile, the emergence of quantum computing poses challenges for traditional encryption methods, necessitating the development of quantum-resistant algorithms to safeguard sensitive information against future threats. To address these evolving challenges, organizations are adopting an innovative approach that includes data encryption, strict access controls, regular backups, and employee training on security best practices.
This comprehensive framework not only improves defenses against current threats but also positions businesses to adapt to future challenges in the digital landscape. By combining traditional and innovative strategies, organizations can enhance their overall data protection efforts and maintain resilience against an ever-changing threat environment.
Securitydive.in: What is the status of evolution of IoT and Edge Computing?
The evolution of IoT and edge computing is progressing rapidly, driven by technological advancements and increasing market demand. By 2025, the number of IoT devices is projected to exceed 30 billion, reflecting a significant growth from previous years. Industries such as energy, transportation, and healthcare are leading in IoT deployments, leveraging these technologies for enhanced operational efficiency and data-driven insights.
One major trend is the integration of AI with IoT, enabling real-time data analysis and
automation of processes at the edge, which reduces latency and bandwidth use. This shift towards edge computing allows data to be processed closer to its source, enhancing responsiveness and simplifying operations. Additionally, advancements in chip technology are facilitating specialized hardware for IoT applications, further enhancing performance.
The rollout of 5G networks is also pivotal, providing the necessary connectivity for IoT
devices to function effectively in real-time applications.
Looking ahead, the emergence of quantum computing may revolutionize data processing capabilities within IoT systems, offering unprecedented speeds for complex problem-solving.
Overall, the landscape of IoT and edge computing is maturing, with a focus on solutions that meet specific industry needs while addressing security and privacy concerns.
(Interview by Gaargi Chakravorty)