{"id":16994,"date":"2024-11-05T12:41:06","date_gmt":"2024-11-05T12:41:06","guid":{"rendered":"https:\/\/popularreads.co\/indian-company-is-granted-technology-patent-that-will-disrupt-data-protection-and-compliance-2\/"},"modified":"2024-11-05T12:41:06","modified_gmt":"2024-11-05T12:41:06","slug":"indian-company-is-granted-technology-patent-that-will-disrupt-data-protection-and-compliance-2","status":"publish","type":"post","link":"https:\/\/popularreads.co\/?p=16994","title":{"rendered":"Indian company is granted technology patent that will disrupt data protection and compliance"},"content":{"rendered":"<div class='booster-block booster-read-block'>\n                <div class=\"twp-read-time\">\n                \t<i class=\"booster-icon twp-clock\"><\/i> <span>Read Time:<\/span>3 Minute, 40 Second                <\/div>\n\n            <\/div><p style=\"background-color:#ffffff;border-style:none;border-width:1px;line-height:1.09;margin:12.74px 0px 0px 0.77px;text-align:justify;text-indent:-0.22px\"><span style=\"color:#000000;font-family:Arial, Helvetica, sans-serif;font-size:14.72px\"><span style=\"vertical-align:baseline\">Synersoft Technologies Private Limited, an Indian company has developed the technology for which \u00a0it is granted patent in India. The patented system, officially titled <strong>\u201cA SYSTEM AND METHOD FOR \u00a0FORCED DATA CENTRALIZATION TO PROTECT DATA INTEGRITY,\u201d <\/strong>is set to democratize high-level \u00a0data protection, which until now has largely been unaffordable for smaller businesses. <strong>Mr. Vishal \u00a0Prakash Shah<\/strong>, Founder and CEO of Synersoft Technologies, emphasized that the commercialization of this technology is expected to reduce the cost of implementing data \u00a0protection policies by up to 90%.<\/span><\/span><span style=\"color:#000000;font-family:Arial, Helvetica, sans-serif;font-size:14.72px\"><span style=\"vertical-align:baseline\">\u00a0<\/span><\/span><\/p>\n<p style=\"background-color:#ffffff;border-style:none;border-width:1px;line-height:1;margin:11.36px 0px 0px 1.16px;text-align:justify;text-indent:0px\"><span style=\"color:#000000;font-family:Arial, Helvetica, sans-serif;font-size:14.72px\"><span style=\"vertical-align:baseline\"><strong>Problem Statement<\/strong><\/span><\/span><span style=\"color:#000000;font-family:Arial, Helvetica, sans-serif;font-size:14.72px\"><span style=\"vertical-align:baseline\"><strong>\u00a0<\/strong><\/span><\/span><\/p>\n<p style=\"background-color:#ffffff;border-style:none;border-width:1px;line-height:1.09;margin:12.9px 0.48px 0px 0.77px;text-align:justify;text-indent:0.5px\"><span style=\"color:#000000;font-family:Arial, Helvetica, sans-serif;font-size:14.72px\"><span style=\"vertical-align:baseline\">Enterprises today struggle with the scattered nature of data across various devices such as \u00a0laptops, desktops, and servers. This scattered data poses significant risks, increasing the likelihood \u00a0of data loss, leakage, or theft. Centralizing such fragmented data is an enormous challenge for \u00a0businesses of all sizes, but particularly for MSMEs, which often lack the resources to invest in \u00a0comprehensive solutions.<\/span><\/span><span style=\"color:#000000;font-family:Arial, Helvetica, sans-serif;font-size:14.72px\"><span style=\"vertical-align:baseline\">\u00a0<\/span><\/span><\/p>\n<p style=\"background-color:#ffffff;border-style:none;border-width:1px;line-height:1;margin:11.36px 0px 0px 0.13px;text-align:justify;text-indent:0px\"><span style=\"color:#000000;font-family:Arial, Helvetica, sans-serif;font-size:14.72px\"><span style=\"vertical-align:baseline\"><strong>Traditional Solutions<\/strong><\/span><\/span><span style=\"color:#000000;font-family:Arial, Helvetica, sans-serif;font-size:14.72px\"><span style=\"vertical-align:baseline\"><strong>\u00a0<\/strong><\/span><\/span><\/p>\n<p style=\"background-color:#ffffff;border-style:none;border-width:1px;line-height:1.09;margin:12.9px 7.67px 0px 0.06px;text-align:justify;text-indent:0.72px\"><span style=\"color:#000000;font-family:Arial, Helvetica, sans-serif;font-size:14.72px\"><span style=\"vertical-align:baseline\">Conventionally, businesses have relied on central storage infrastructures like NAS (Network \u00a0Attached Storage), file servers, terminal servers, or Virtual Desktop Interfaces to centralize data. It \u00a0is expected of the users to voluntarily store the data files like designs, drawings, documents, \u00a0spreadsheets, presentations, pdf, emails etc. on central storage infrastructure. In case of NAS and \u00a0File Server, the effectiveness of such a solution is proportionate to how diligently the users follow \u00a0the instructions. If the users are ignorant or negligent about following the instructions, the data of \u00a0the enterprise remains scattered and the problem is not resolved.<\/span><\/span><span style=\"color:#000000;font-family:Arial, Helvetica, sans-serif;font-size:14.72px\"><span style=\"vertical-align:baseline\">\u00a0<\/span><\/span><\/p>\n<p style=\"background-color:#ffffff;border-style:none;border-width:1px;line-height:1.09;margin:11.54px 6.37px 0px 0.77px;text-align:justify;text-indent:0.5px\"><span style=\"color:#000000;font-family:Arial, Helvetica, sans-serif;font-size:14.72px\"><span style=\"vertical-align:baseline\">In case of Terminal Server, it requires huge investment in software, hardware, and bandwidth. Also, \u00a0certain technical design software do not permit the use of terminal servers.<\/span><\/span><span style=\"color:#000000;font-family:Arial, Helvetica, sans-serif;font-size:14.72px\"><span style=\"vertical-align:baseline\">\u00a0<\/span><\/span><\/p>\n<p style=\"background-color:#ffffff;border-style:none;border-width:1px;line-height:1.09;margin:11.63px 13.88px 0px 0.07px;text-align:justify;text-indent:1.19px\"><span style=\"color:#000000;font-family:Arial, Helvetica, sans-serif;font-size:14.72px\"><span style=\"vertical-align:baseline\">However, the effectiveness of these solutions is often contingent on user diligence. In instances \u00a0where employees fail to follow instructions diligently, enterprise data remains vulnerable, and the \u00a0problem persists.<\/span><\/span><span style=\"color:#000000;font-family:Arial, Helvetica, sans-serif;font-size:14.72px\"><span style=\"vertical-align:baseline\">\u00a0<\/span><\/span><\/p>\n<p style=\"background-color:#ffffff;border-style:none;border-width:1px;line-height:1;margin:11.56px 0px 0px 0.71px;text-align:justify;text-indent:0px\"><span style=\"color:#000000;font-family:Arial, Helvetica, sans-serif;font-size:14.72px\"><span style=\"vertical-align:baseline\"><strong>Overview of the Technology for which the Patent is Granted<\/strong><\/span><\/span><span style=\"color:#000000;font-family:Arial, Helvetica, sans-serif;font-size:14.72px\"><span style=\"vertical-align:baseline\"><strong>\u00a0<\/strong><\/span><\/span><\/p>\n<p style=\"background-color:#ffffff;border-style:none;border-width:1px;line-height:1.09;margin:12.74px 6.54px 0px 0.13px;text-align:justify;text-indent:-0.1px\"><span style=\"color:#000000;font-family:Arial, Helvetica, sans-serif;font-size:14.72px\"><span style=\"vertical-align:baseline\">The technology patent is granted over BLACKbox hardware (can be deployed on-premise or on cloud). It is known as <strong>A SYSTEM AND METHOD FOR FORCED DATA CENTRALIZATION TO \u00a0PROTECT DATA INTEGRITY. <\/strong>This technology works on agent based authentication with the storage \u00a0hardware developed by Synersoft. By applying this technology in real-life environments, it ensures \u00a0that the choice of storage destination id not left with the users and they are forced to save the data on the central location only, over the network, or over the VPN. By not leaving any choice with the \u00a0user on where to store the data, it ensures a zero trust environment and does not depend on user\u2019s \u00a0diligence to follow the instructions. It ensures the centralization of data, hence minimum \u00a0scatteredness of the data.<\/span><\/span><\/p>\n<p style=\"background-color:#ffffff;border-style:none;border-width:1px;line-height:1;margin:0px 0px 0px 1.16px;text-align:justify;text-indent:0px\"><span style=\"color:#000000;font-family:Arial, Helvetica, sans-serif;font-size:14.72px\"><span style=\"vertical-align:baseline\"><strong>Industrial Benefit of Patented Technology<\/strong><\/span><\/span><span style=\"color:#000000;font-family:Arial, Helvetica, sans-serif;font-size:14.72px\"><span style=\"vertical-align:baseline\"><strong>\u00a0<\/strong><\/span><\/span><\/p>\n<p style=\"background-color:#ffffff;border-style:none;border-width:1px;line-height:1.1;margin:12.74px 10.49px 0px 0.77px;text-align:justify;text-indent:-0.63px\"><span style=\"color:#000000;font-family:Arial, Helvetica, sans-serif;font-size:14.72px\"><span style=\"vertical-align:baseline\">This patented technology represents a significant leap forward for MSMEs, making robust IT policy \u00a0enforcement both accessible and affordable. By centralizing data without dependence on user \u00a0behavior, the system simplifies compliance with stringent data protection standards, often \u00a0mandated by large enterprises, government bodies, and international clients.<\/span><\/span><span style=\"color:#000000;font-family:Arial, Helvetica, sans-serif;font-size:14.72px\"><span style=\"vertical-align:baseline\">\u00a0<\/span><\/span><\/p>\n<p style=\"background-color:#ffffff;border-style:none;border-width:1px;line-height:1.09;margin:11.33px 5.33px 0px 0px;text-align:justify;text-indent:0.13px\"><span style=\"color:#000000;font-family:Arial, Helvetica, sans-serif;font-size:14.72px\"><span style=\"vertical-align:baseline\">This technology will simplify the IT Policy enforcement process for data centralization at fraction of \u00a0the cost. It will democratize the IT Policy adherence for micro, small, and medium sized \u00a0enterprises, which otherwise was not affordable to them. It will also help them comply with the \u00a0vendor empanelment criteria imposed by their large or government or overseas customers who \u00a0mandate highest level of data protection practices on their approved suppliers. It will make these \u00a0MSMEs globally competitive and make them have better business continuity plan against data loss \u00a0possibilities. By the use of this technology, enterprises will be confident of data centralization and \u00a0will not have to bear the overhead backup of each and every desktop or laptop asset.<\/span><\/span><span style=\"color:#000000;font-family:Arial, Helvetica, sans-serif;font-size:14.72px\"><span style=\"vertical-align:baseline\">\u00a0<\/span><\/span><\/p>\n<p style=\"background-color:#ffffff;border-style:none;border-width:1px;line-height:1.09;margin:11.53px 16.06px 0px 0.07px;text-align:justify;text-indent:0.47px\"><span style=\"color:#000000;font-family:Arial, Helvetica, sans-serif;font-size:14.72px\"><span style=\"vertical-align:baseline\">Synersoft&#8217;s patented technology is expected to have a profound impact on industries such as \u00a0Engineering, Aerospace, Defense, Pharmaceuticals, Biotechnology, Finance, and Manufacturing, \u00a0where data security and compliance are paramount.<\/span><\/span><span style=\"color:#000000;font-family:Arial, Helvetica, sans-serif;font-size:14.72px\"><span style=\"vertical-align:baseline\"> \u00a0<\/span><\/span><\/p>\n<p style=\"background-color:#ffffff;border-style:none;border-width:1px;line-height:1;margin:11.56px 0px 0px 0.01px;text-align:justify;text-indent:0px\"><span style=\"color:#000000;font-family:Arial, Helvetica, sans-serif;font-size:14.72px\"><span style=\"vertical-align:baseline\"><strong>About Synersoft Technologies Private Limited:<\/strong><\/span><\/span><span style=\"color:#000000;font-family:Arial, Helvetica, sans-serif;font-size:14.72px\"><span style=\"vertical-align:baseline\"><strong>\u00a0<\/strong><\/span><\/span><\/p>\n<p style=\"background-color:#ffffff;border-style:none;border-width:1px;line-height:1.1;margin:12.74px 9.89px 0px 0.5px;text-align:justify;text-indent:0.04px\"><span style=\"color:#000000;font-family:Arial, Helvetica, sans-serif;font-size:14.72px\"><span style=\"vertical-align:baseline\">Synersoft is a technology company dedicated to providing innovative solutions that drive business \u00a0growth and efficiency. With a focus on data protection, compliance, and cybersecurity, Synersoft \u00a0empowers organizations to safeguard their valuable assets and achieve operational excellence.<\/span><\/span><span style=\"color:#000000;font-family:Arial, Helvetica, sans-serif;font-size:14.72px\"><span style=\"vertical-align:baseline\">\u00a0<\/span><\/span><\/p>\n<p style=\"background-color:#ffffff;border-style:none;border-width:1px;line-height:1;margin:11.36px 0px 0px 0.01px;text-align:justify;text-indent:0px\"><span style=\"color:#000000;font-family:Arial, Helvetica, sans-serif;font-size:14.72px\"><span style=\"vertical-align:baseline\"><strong>About Vishal Prakash Shah, Founder and CEO at Synersoft<\/strong><\/span><\/span><span style=\"color:#000000;font-family:Arial, Helvetica, sans-serif;font-size:14.72px\"><span style=\"vertical-align:baseline\"><strong>\u00a0<\/strong><\/span><\/span><\/p>\n<p style=\"background-color:#ffffff;border-style:none;border-width:1px;line-height:1.09;margin:12.9px 12.26px 0px 0.74px;text-align:justify;text-indent:-0.68px\"><span style=\"color:#467886;font-family:Arial, Helvetica, sans-serif;font-size:14.72px\"><span style=\"vertical-align:baseline\"><u>Vishal Prakash Shah <\/u><\/span><\/span><span style=\"color:#000000;font-family:Arial, Helvetica, sans-serif;font-size:14.72px\"><span style=\"vertical-align:baseline\">is the founder and CEO of <\/span><\/span><span style=\"color:#467886;font-family:Arial, Helvetica, sans-serif;font-size:14.72px\"><span style=\"vertical-align:baseline\"><u>Synersoft<\/u><\/span><\/span><span style=\"color:#000000;font-family:Arial, Helvetica, sans-serif;font-size:14.72px\"><span style=\"vertical-align:baseline\">. He is known as a seasoned technology \u00a0stalwart, an inventor of specific patented technologies, a writer, a serial entrepreneur, an investor, \u00a0and, importantly, a &#8220;Go to Guy&#8221; for MSMEs.<\/span><\/span><\/p>\n        <div class=\"booster-block booster-reactions-block\">\n            <div class=\"twp-reactions-icons\">\n                \n                <div class=\"twp-reacts-wrap\">\n                    <a react-data=\"be-react-1\" post-id=\"16994\" class=\"be-face-icons un-reacted\" href=\"javascript:void(0)\">\n                        <img decoding=\"async\" src=\"https:\/\/popularreads.co\/wp-content\/plugins\/booster-extension\/\/assets\/icon\/happy.svg\" alt=\"Happy\">\n                    <\/a>\n                    <div class=\"twp-reaction-title\">\n                        Happy                    <\/div>\n                    <div class=\"twp-count-percent\">\n                                                    <span style=\"display: none;\" class=\"twp-react-count\">0<\/span>\n                        \n                                                <span class=\"twp-react-percent\"><span>0<\/span> %<\/span>\n                                            <\/div>\n                <\/div>\n\n                <div class=\"twp-reacts-wrap\">\n                    <a react-data=\"be-react-2\" post-id=\"16994\" class=\"be-face-icons un-reacted\" href=\"javascript:void(0)\">\n                        <img decoding=\"async\" src=\"https:\/\/popularreads.co\/wp-content\/plugins\/booster-extension\/\/assets\/icon\/sad.svg\" alt=\"Sad\">\n                    <\/a>\n                    <div class=\"twp-reaction-title\">\n                        Sad                    <\/div>\n                    <div class=\"twp-count-percent\">\n                                                    <span style=\"display: none;\" class=\"twp-react-count\">0<\/span>\n                                                                        <span class=\"twp-react-percent\"><span>0<\/span> %<\/span>\n                                            <\/div>\n                <\/div>\n\n                <div class=\"twp-reacts-wrap\">\n                    <a react-data=\"be-react-3\" post-id=\"16994\" class=\"be-face-icons un-reacted\" href=\"javascript:void(0)\">\n                        <img decoding=\"async\" src=\"https:\/\/popularreads.co\/wp-content\/plugins\/booster-extension\/\/assets\/icon\/excited.svg\" alt=\"Excited\">\n                    <\/a>\n                    <div class=\"twp-reaction-title\">\n                        Excited                    <\/div>\n                    <div class=\"twp-count-percent\">\n                                                    <span style=\"display: none;\" class=\"twp-react-count\">0<\/span>\n                                                                        <span class=\"twp-react-percent\"><span>0<\/span> %<\/span>\n                                            <\/div>\n                <\/div>\n\n                <div class=\"twp-reacts-wrap\">\n                    <a react-data=\"be-react-6\" post-id=\"16994\" class=\"be-face-icons un-reacted\" href=\"javascript:void(0)\">\n                        <img decoding=\"async\" src=\"https:\/\/popularreads.co\/wp-content\/plugins\/booster-extension\/\/assets\/icon\/sleepy.svg\" alt=\"Sleepy\">\n                    <\/a>\n                    <div class=\"twp-reaction-title\">\n                        Sleepy                    <\/div>\n                    <div class=\"twp-count-percent\">\n                                                    <span style=\"display: none;\" class=\"twp-react-count\">0<\/span>\n                        \n                                                <span class=\"twp-react-percent\"><span>0<\/span> %<\/span>\n                                            <\/div>\n                <\/div>\n\n                <div class=\"twp-reacts-wrap\">\n                    <a react-data=\"be-react-4\" post-id=\"16994\" class=\"be-face-icons un-reacted\" href=\"javascript:void(0)\">\n                        <img decoding=\"async\" src=\"https:\/\/popularreads.co\/wp-content\/plugins\/booster-extension\/\/assets\/icon\/angry.svg\" alt=\"Angry\">\n                    <\/a>\n                    <div class=\"twp-reaction-title\">Angry<\/div>\n                    <div class=\"twp-count-percent\">\n                                                    <span style=\"display: none;\" class=\"twp-react-count\">0<\/span>\n                                                                        <span class=\"twp-react-percent\"><span>0<\/span> %<\/span>\n                        \n                    <\/div>\n                <\/div>\n\n                <div class=\"twp-reacts-wrap\">\n                    <a react-data=\"be-react-5\" post-id=\"16994\" class=\"be-face-icons un-reacted\" href=\"javascript:void(0)\">\n                        <img decoding=\"async\" src=\"https:\/\/popularreads.co\/wp-content\/plugins\/booster-extension\/\/assets\/icon\/surprise.svg\" alt=\"Surprise\">\n                    <\/a>\n                    <div class=\"twp-reaction-title\">Surprise<\/div>\n                    <div class=\"twp-count-percent\">\n                                                    <span style=\"display: none;\" class=\"twp-react-count\">0<\/span>\n                                                                        <span class=\"twp-react-percent\"><span>0<\/span> %<\/span>\n                                            <\/div>\n                <\/div>\n\n            <\/div>\n        <\/div>\n\n    ","protected":false},"excerpt":{"rendered":"<p>Synersoft Technologies Private Limited, an Indian company has developed the technology for which \u00a0it is granted patent in India. The patented system, officially titled \u201cA SYSTEM AND METHOD FOR \u00a0FORCED DATA CENTRALIZATION TO PROTECT DATA INTEGRITY,\u201d is set to democratize high-level \u00a0data protection, which until now has largely been unaffordable for smaller businesses. Mr. Vishal [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":16995,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[66],"tags":[],"class_list":["post-16994","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-agency-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Indian company is granted technology patent that will disrupt data protection and compliance<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/popularreads.co\/?p=16994\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Indian company is granted technology patent that will disrupt data protection and compliance\" \/>\n<meta property=\"og:description\" content=\"Synersoft Technologies Private Limited, an Indian company has developed the technology for which \u00a0it is granted patent in India. The patented system, officially titled \u201cA SYSTEM AND METHOD FOR \u00a0FORCED DATA CENTRALIZATION TO PROTECT DATA INTEGRITY,\u201d is set to democratize high-level \u00a0data protection, which until now has largely been unaffordable for smaller businesses. Mr. Vishal [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/popularreads.co\/?p=16994\" \/>\n<meta property=\"og:site_name\" content=\"Popular Reads\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-05T12:41:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/popularreads.co\/wp-content\/uploads\/2024\/11\/173081046877797975911.1730805412592_content_img-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1707\" \/>\n\t<meta property=\"og:image:height\" content=\"2560\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/popularreads.co\\\/?p=16994#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/popularreads.co\\\/?p=16994\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/popularreads.co\\\/#\\\/schema\\\/person\\\/9e92abcc10fa4f78227517a6782ef83c\"},\"headline\":\"Indian company is granted technology patent that will disrupt data protection and compliance\",\"datePublished\":\"2024-11-05T12:41:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/popularreads.co\\\/?p=16994\"},\"wordCount\":743,\"publisher\":{\"@id\":\"https:\\\/\\\/popularreads.co\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/popularreads.co\\\/?p=16994#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/popularreads.co\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/173081046877797975911.1730805412592_content_img-scaled.jpg\",\"articleSection\":[\"Agency News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/popularreads.co\\\/?p=16994\",\"url\":\"https:\\\/\\\/popularreads.co\\\/?p=16994\",\"name\":\"Indian company is granted technology patent that will disrupt data protection and compliance\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/popularreads.co\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/popularreads.co\\\/?p=16994#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/popularreads.co\\\/?p=16994#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/popularreads.co\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/173081046877797975911.1730805412592_content_img-scaled.jpg\",\"datePublished\":\"2024-11-05T12:41:06+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/popularreads.co\\\/?p=16994#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/popularreads.co\\\/?p=16994\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/popularreads.co\\\/?p=16994#primaryimage\",\"url\":\"https:\\\/\\\/popularreads.co\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/173081046877797975911.1730805412592_content_img-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/popularreads.co\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/173081046877797975911.1730805412592_content_img-scaled.jpg\",\"width\":1707,\"height\":2560,\"caption\":\"Indian company is granted technology patent that will disrupt data protection and compliance\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/popularreads.co\\\/?p=16994#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/popularreads.co\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Indian company is granted technology patent that will disrupt data protection and compliance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/popularreads.co\\\/#website\",\"url\":\"https:\\\/\\\/popularreads.co\\\/\",\"name\":\"Popular Reads\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/popularreads.co\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/popularreads.co\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/popularreads.co\\\/#organization\",\"name\":\"Popular Reads\",\"url\":\"https:\\\/\\\/popularreads.co\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/popularreads.co\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/popularreads.co\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Popular-Reads_Logo_Design-300.png\",\"contentUrl\":\"https:\\\/\\\/popularreads.co\\\/wp-content\\\/uploads\\\/2022\\\/04\\\/Popular-Reads_Logo_Design-300.png\",\"width\":300,\"height\":80,\"caption\":\"Popular Reads\"},\"image\":{\"@id\":\"https:\\\/\\\/popularreads.co\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/popularreads.co\\\/#\\\/schema\\\/person\\\/9e92abcc10fa4f78227517a6782ef83c\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a6be411a6d0f7b01ba2c4803c9a00e5f9b7217beca69d3196391be82ee712ac1?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a6be411a6d0f7b01ba2c4803c9a00e5f9b7217beca69d3196391be82ee712ac1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a6be411a6d0f7b01ba2c4803c9a00e5f9b7217beca69d3196391be82ee712ac1?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/popularreads.co\"],\"url\":\"https:\\\/\\\/popularreads.co\\\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Indian company is granted technology patent that will disrupt data protection and compliance","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/popularreads.co\/?p=16994","og_locale":"en_US","og_type":"article","og_title":"Indian company is granted technology patent that will disrupt data protection and compliance","og_description":"Synersoft Technologies Private Limited, an Indian company has developed the technology for which \u00a0it is granted patent in India. The patented system, officially titled \u201cA SYSTEM AND METHOD FOR \u00a0FORCED DATA CENTRALIZATION TO PROTECT DATA INTEGRITY,\u201d is set to democratize high-level \u00a0data protection, which until now has largely been unaffordable for smaller businesses. Mr. Vishal [&hellip;]","og_url":"https:\/\/popularreads.co\/?p=16994","og_site_name":"Popular Reads","article_published_time":"2024-11-05T12:41:06+00:00","og_image":[{"width":1707,"height":2560,"url":"https:\/\/popularreads.co\/wp-content\/uploads\/2024\/11\/173081046877797975911.1730805412592_content_img-scaled.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/popularreads.co\/?p=16994#article","isPartOf":{"@id":"https:\/\/popularreads.co\/?p=16994"},"author":{"name":"admin","@id":"https:\/\/popularreads.co\/#\/schema\/person\/9e92abcc10fa4f78227517a6782ef83c"},"headline":"Indian company is granted technology patent that will disrupt data protection and compliance","datePublished":"2024-11-05T12:41:06+00:00","mainEntityOfPage":{"@id":"https:\/\/popularreads.co\/?p=16994"},"wordCount":743,"publisher":{"@id":"https:\/\/popularreads.co\/#organization"},"image":{"@id":"https:\/\/popularreads.co\/?p=16994#primaryimage"},"thumbnailUrl":"https:\/\/popularreads.co\/wp-content\/uploads\/2024\/11\/173081046877797975911.1730805412592_content_img-scaled.jpg","articleSection":["Agency News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/popularreads.co\/?p=16994","url":"https:\/\/popularreads.co\/?p=16994","name":"Indian company is granted technology patent that will disrupt data protection and compliance","isPartOf":{"@id":"https:\/\/popularreads.co\/#website"},"primaryImageOfPage":{"@id":"https:\/\/popularreads.co\/?p=16994#primaryimage"},"image":{"@id":"https:\/\/popularreads.co\/?p=16994#primaryimage"},"thumbnailUrl":"https:\/\/popularreads.co\/wp-content\/uploads\/2024\/11\/173081046877797975911.1730805412592_content_img-scaled.jpg","datePublished":"2024-11-05T12:41:06+00:00","breadcrumb":{"@id":"https:\/\/popularreads.co\/?p=16994#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/popularreads.co\/?p=16994"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/popularreads.co\/?p=16994#primaryimage","url":"https:\/\/popularreads.co\/wp-content\/uploads\/2024\/11\/173081046877797975911.1730805412592_content_img-scaled.jpg","contentUrl":"https:\/\/popularreads.co\/wp-content\/uploads\/2024\/11\/173081046877797975911.1730805412592_content_img-scaled.jpg","width":1707,"height":2560,"caption":"Indian company is granted technology patent that will disrupt data protection and compliance"},{"@type":"BreadcrumbList","@id":"https:\/\/popularreads.co\/?p=16994#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/popularreads.co\/"},{"@type":"ListItem","position":2,"name":"Indian company is granted technology patent that will disrupt data protection and compliance"}]},{"@type":"WebSite","@id":"https:\/\/popularreads.co\/#website","url":"https:\/\/popularreads.co\/","name":"Popular Reads","description":"","publisher":{"@id":"https:\/\/popularreads.co\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/popularreads.co\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/popularreads.co\/#organization","name":"Popular Reads","url":"https:\/\/popularreads.co\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/popularreads.co\/#\/schema\/logo\/image\/","url":"https:\/\/popularreads.co\/wp-content\/uploads\/2022\/04\/Popular-Reads_Logo_Design-300.png","contentUrl":"https:\/\/popularreads.co\/wp-content\/uploads\/2022\/04\/Popular-Reads_Logo_Design-300.png","width":300,"height":80,"caption":"Popular Reads"},"image":{"@id":"https:\/\/popularreads.co\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/popularreads.co\/#\/schema\/person\/9e92abcc10fa4f78227517a6782ef83c","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/a6be411a6d0f7b01ba2c4803c9a00e5f9b7217beca69d3196391be82ee712ac1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a6be411a6d0f7b01ba2c4803c9a00e5f9b7217beca69d3196391be82ee712ac1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a6be411a6d0f7b01ba2c4803c9a00e5f9b7217beca69d3196391be82ee712ac1?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/popularreads.co"],"url":"https:\/\/popularreads.co\/?author=1"}]}},"_links":{"self":[{"href":"https:\/\/popularreads.co\/index.php?rest_route=\/wp\/v2\/posts\/16994","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/popularreads.co\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/popularreads.co\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/popularreads.co\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/popularreads.co\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=16994"}],"version-history":[{"count":0,"href":"https:\/\/popularreads.co\/index.php?rest_route=\/wp\/v2\/posts\/16994\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/popularreads.co\/index.php?rest_route=\/wp\/v2\/media\/16995"}],"wp:attachment":[{"href":"https:\/\/popularreads.co\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=16994"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/popularreads.co\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=16994"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/popularreads.co\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=16994"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}