Companies
Interview with Raskin Paul: Network security is the key to enterprise operation
In the exclusive interview with Raskin Paul, General Manager of the Technology Division at Grameenphone Limited, BTW discovered how to guarantee enterprise network security, the most important aspect of securing an enterprise network and what is Grameenphone Ltd’s strategy for success. Q: How do you…

Headline
In the exclusive interview with Raskin Paul, General Manager of the Technology Division at Grameenphone Limited, BTW discovered how to guarantee enterprise network security, the most important aspect of securing an enterprise network and what is Grameenphone Ltd’s strategy for…
Context
In the exclusive interview with Raskin Paul , General Manager of the Technology Division at Grameenphone Limited, BTW discovered how to guarantee enterprise network security, the most important aspect of securing an enterprise network and what is Grameenphone Ltd’s strategy for success. I will participate in security incident investigations and root cause analysis, ensure continuous threat search based on security tool alerts and reports, develop and follow security incident response plans and cyber security incident remediation programmes.
Evidence
Pending intelligence enrichment.
Analysis
We work with the Security Operations Centre and the Management Detection and Response team on day-to-day security incident management, forensics and threat search activities. We work with OEMs, partners, vendors and stakeholders to ensure security incident response and maintain SLAs. Technology develops use cases for SIEM, XDR dashboards, NBA, UBA, SOAR scripts to ensure next generation SOC functionality. The core of securing an enterprise network lies in building a multi-layered defense system. This includes conducting a comprehensive risk assessment to continually identify and evaluate potential security threats and ensure that protection measures match actual risks. Ensure that only authorised personnel have access to sensitive information, using multi-factor authentication to enhance security. To conduct continuous monitoring and response, establish a real-time monitoring system to detect abnormal activities and respond quickly to potential security incidents.
Key Points
- In the exclusive interview with Raskin Paul, manager of Technology Division at Grameenphone, BTW uncovered how to improve network security.
- As cyber attacks continue to evolve, companies need to upgrade and adapt our defence strategies to protect against increasingly sophisticated threats.
Actions
Pending intelligence enrichment.





