Amish Shah

Co-CEO & Director at Blueinfy
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501
Location
IN

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

You need to have a working account to view this content.
You need to have a working account to view this content.

Credentials

  • Big Data Integration and Processing
    Coursera
    Jul, 2017
    - Oct, 2024
  • Big Data Modeling and Management Systems
    Coursera
    May, 2017
    - Oct, 2024
  • Introduction to Big Data
    Coursera
    Mar, 2017
    - Oct, 2024
  • BigData
    Coursera
  • CEH
    -

Experience

    • Computer and Network Security
    • 1 - 100 Employee
    • Co-CEO & Director
      • Apr 2012 - Present

      We specialize in application security with a clear strategic focus. We provide products and services to evaluate and improve the overall security posture of enterprise applications, websites and software deployed worldwide. We continually strive to ensure complete security of our clients' applications and software assets, and to achieve this through state-of-the-art know-how built by enhancing methodologies, evolving tools and researching technologies. We specialize in application security with a clear strategic focus. We provide products and services to evaluate and improve the overall security posture of enterprise applications, websites and software deployed worldwide. We continually strive to ensure complete security of our clients' applications and software assets, and to achieve this through state-of-the-art know-how built by enhancing methodologies, evolving tools and researching technologies.

    • IT Services and IT Consulting
    • 1 - 100 Employee
    • Partner
      • Apr 2012 - Present

      eSphere is focused on application level security for mobile devices. This encompasses mobile applications and components running on web servers. In today’s world, mobile applications are easy targets for attackers and malwares. Applications running on Android, iPhone, BlackBerry and Windows Phones can be attacked and unauthorized access can be gained. It is therefore imperative for enterprises to secure their mobile assets and have them assessed at regular intervals. eSphere provides total security solutions to protect these assets during development, deployment and monitoring phases. We provide consulting, training and on-demand services to comprehensively cover mobile security. eSphere Security also develops mobile security products and tools to further strengthen security of Mobile Platform. .

  • iAppSecure Solutions Pvt. Ltd
    • Ahmedabad Area, India
    • Founder & Director
      • Apr 2012 - Sep 2015

      iAppSecure Solutions is a company started by a vision to create scientifically advanced technologies for application security analysis. We, at iAppSecure, continuously endeavor to innovate and build novel smart technologies that radically enhance the accuracy and effectiveness of discovering vulnerabilities and weaknesses in applications. The technologies that we build enable smarter and deeper application security analysis providing clear actionable reports to our customers. iAppSecure Solutions is a company started by a vision to create scientifically advanced technologies for application security analysis. We, at iAppSecure, continuously endeavor to innovate and build novel smart technologies that radically enhance the accuracy and effectiveness of discovering vulnerabilities and weaknesses in applications. The technologies that we build enable smarter and deeper application security analysis providing clear actionable reports to our customers.

    • Independent Consultant
      • Apr 2010 - Mar 2012

      For, - Industrial Automation Projects like Siemens PLC, SCADA Softwares, - Security Product, Tools or Software Development. - Network or Web Application Vulnerability Assessment or Penetration Testing For, - Industrial Automation Projects like Siemens PLC, SCADA Softwares, - Security Product, Tools or Software Development. - Network or Web Application Vulnerability Assessment or Penetration Testing

    • Chief Technology Officer
      • Jan 2001 - Mar 2010

      Manages all the security products development work starting from software requirement specification to deployment of product. Also, involved in code review, vulnerability assessment, penetration testing and training. Manages all the security products development work starting from software requirement specification to deployment of product. Also, involved in code review, vulnerability assessment, penetration testing and training.

Education

  • L.D. College of Engineering
    BE, Engineering
    1991 - 1995

Community

You need to have a working account to view this content. Click here to join now