Q U I S I T I V E

Loading

About us

We Built This Company Because We Watched Enterprises Fail for Reasons That Were Entirely Preventable

Not strategic failures. Not product failures. Failures caused by network faults nobody caught in time. Security incidents that unfolded over weeks while alerts queued in inboxes. Infrastructure that was never designed to handle the demands of a serious enterprise operation.

Quisitive Businesses exists because our founders and leadership team lived those failures — not as observers, but as the professionals on the ground when major organisations went dark. That experience is not on a slide deck. It is built into every service delivery decision, every SLA commitment, and every engineering standard we hold ourselves to.

Talk to Our Team

The Problem Was Not the Technology. It Was the Gap Between Detection and Action.

Sharry Maan spent years working within the IT operations of some of the world's most recognised financial institutions — including Bank of America. At that scale, technology is sophisticated, investment is substantial, and the consequences of failure are measured in millions per hour of downtime.

What he observed, repeatedly, was something that should not have been possible at that level of investment: enterprises going down — not from inevitable catastrophic failures, but from the kind of network degradation and security incidents that a properly staffed, properly attentive operations function would have caught hours or days earlier. Alerts firing into queues with nobody watching them. Network performance trending toward failure while teams were occupied with other priorities. Security indicators accumulating significance while the monitoring platform recorded them in logs nobody read.

What he observed, repeatedly, was something that should not have been possible at that level of investment: enterprises going down — not from inevitable catastrophic failures, but from the kind of network degradation and security incidents that a properly staffed, properly attentive operations function would have caught hours or days earlier. Alerts firing into queues with nobody watching them. Network performance trending toward failure while teams were occupied with other priorities. Security indicators accumulating significance while the monitoring platform recorded them in logs nobody read.

The most expensive IT failure is always the one that was preventable — where the data was there, the alert was generated, and nobody acted on it in time.

Sharry Founded Quisitive Businesses to close that gap. Not with another monitoring product. Not with another report. With dedicated, human-led operations — NOC and SOC teams that watch continuously, act immediately, and are accountable to contractual SLAs for the outcomes they deliver. The company was built around a conviction that has not changed since its founding: that enterprise-grade security and infrastructure operations should not be a privilege of scale, and that the gap between alert and action should be measured in minutes, not days.

Built by People Who Have Operated Inside the Environments Our Services Protect

The insight that shapes every Quisitive Businesses engagement comes from direct experience — not from a vendor briefing or a consulting report. Our leadership team has collectively managed security operations, infrastructure, and technology strategy for organisations where the cost of operational failure is tangible, immediate, and unacceptable. That background is not a marketing claim. It is the reason we built our services the way we did.

Sharry Maan

Founder & Director

Sharry brings over a decade of hands-on experience managing IT operations and infrastructure within global financial institutions — including enterprise-level engagements with Bank of America. Working at the intersection of network operations, security, and business continuity for organisations where downtime is measured in direct financial loss, he built a firsthand, ground-level understanding of the operational gaps that make serious enterprises vulnerable to failures they should never experience.

He founded Quisitive Businesses to build the kind of operations function he had seen too many organisations lack — one where monitoring is not passive, escalation is not optional, and accountability for outcomes is written into the service contract. His engineering discipline and enterprise operational background define the technical and cultural standards that every delivery team at Quisitive Businesses is built around. The company's founding principle — that the gap between alert and action should be measured in minutes, not days — is his.

Key Credentials & Recognition:

  • ▸ Enterprise IT operations experience — global financial institutions including Bank of America
  • ▸ Specialist in NOC and SOC operations model design and managed service delivery
  • ▸ ISO 27001:2022, ISO 9001:2015, ISO 20000-1:2018 certified leadership
  • ▸ Founder and strategic lead across all service lines

Deepi Dhiman

Co-Founder & Director

Deepi Dhiman brings strategic depth and operational leadership to Quisitive Businesses — complementing the technical foundation of the company with the organisational rigour required to build a service delivery operation that performs at the standard enterprise clients require, engagement after engagement.

Her focus is on the structural elements that determine whether a managed services company consistently delivers on its commitments: the processes, the quality frameworks, the client engagement model, and the team development practices that turn technical capability into reliable, repeatable outcomes. Deepi co-founded Quisitive Businesses on the conviction that the gap between what most managed service providers promise and what they actually deliver is not primarily a technology gap — it is an operational and governance gap. She is responsible for ensuring that the company's delivery matches the standards its certifications and SLAs represent — every month, across every engagement.

Key Credentials & Recognition:

  • ▸ Strategic operations and governance leadership
  • ▸ Quality management and ISO certification programme oversight
  • ▸ Organisational development and service delivery standards
  • ▸ Client relationship and engagement model design

Amit Sharma

Chief Technology Officer (CTO)

Amit Sharma leads the technology architecture and engineering capability of Quisitive Businesses as Chief Technology Officer. He brings substantial experience at the intersection of enterprise infrastructure, systems design, and managed technology operations — the precise domain where Quisitive Businesses' services are delivered. His background in designing and scaling technology platforms for demanding operational environments informs the architectural standards behind every NOC, SOC, and infrastructure engagement the company delivers.

As CTO, Amit is responsible for the tooling strategy, integration architecture, monitoring platform selection, and engineering standards that underpin Quisitive Businesses' service capability. He ensures that the technology foundation of every client engagement is designed for operational performance and long-term reliability — not minimum viable configuration. His involvement in delivery is not limited to design: he maintains active oversight of engineering quality across active engagements and leads the capability development roadmap for the technical team.

Key Credentials & Recognition:

  • ▸ Enterprise systems architecture and technology leadership
  • ▸ Managed services technology platform design and integration
  • ▸ Engineering standards and delivery quality oversight across all service lines
  • ▸ Technology roadmap and team capability development leadership

Mohammad Iqbal Ahmad

Chief Information Security Officer (CISO)

Mohammad Iqbal Ahmad serves as Chief Information Security Officer at Quisitive Businesses — the security authority behind every SOC engagement, MSSP delivery, and compliance advisory the company provides. He is an award-recognised cybersecurity leader with deep expertise in information security governance, cybersecurity compliance, and data privacy across regulated industry environments in India.

Iqbal's professional background spans security leadership roles across financial services, technology, and consulting — with specialisation in regulatory frameworks including SEBI's Cybersecurity and Cyber Resilience Framework (CSCRF), the RBI Cybersecurity Framework, the Digital Personal Data Protection (DPDP) Act, ISO 27001, and PCI-DSS. At Quisitive Businesses, he is responsible for the security architecture standards applied to every client engagement, the detection and response methodology of the SOC practice, the compliance advisory framework, and the internal information security posture of the company itself.

He brings the industry recognition and regulatory depth that clients in BFSI, healthcare, and government sectors require from a security operations partner — and the operational discipline to translate that expertise into the daily practice of a live SOC and MSSP delivery function.

Key Credentials & Recognition:

  • ▸ Winner — Super 50 CISO Award 2024
  • ▸ Winner — Cybersecurity Leader Award 2024
  • ▸ Regulatory expertise: SEBI CSCRF, RBI Cybersecurity Framework, DPDP Act 2023, ISO 27001, PCI-DSS
  • ▸ Prior security leadership roles across financial services, e-commerce, and technology sectors
  • ▸ Member — CISO Platform India
  • ▸ CISO advisory authority for all client-facing security operations and compliance engagements

A Managed Security and Infrastructure Company. Built for Organisations That Cannot Afford Operational Failure.

Quisitive Businesses is a specialist managed security and IT infrastructure company headquartered in India. We deliver the operational functions that keep enterprises secure, available, and performing — Security Operations Centre services, Network Operations Centre services, Managed Security (MSSP), Data Centre Consultancy, and Cloud Implementation and Execution.

We are not a software company that sells a monitoring platform. We are not a generalist IT firm that offers security as one item on a long menu. We are a specialist operations company — one that takes on the ongoing, daily responsibility for the detection, response, management, and reporting functions that enterprise IT environments require to remain secure and continuously available.

Every service we deliver is backed by a certified quality and security management framework, a structured delivery methodology, and contractual SLAs that define — in writing, before any engagement begins — exactly what we will deliver, at what speed, and what happens if we fall short of the standard we have committed to.

WHAT WE DO WHAT THAT MEANS FOR YOU
SOC as a Service Dedicated analysts monitor your environment for security threats around the clock — detecting, investigating, and responding before incidents become breaches.
NOC as a Service Dedicated engineers monitor your network and infrastructure continuously — catching performance degradation and faults before your users report them.
Managed Security Services (MSSP) The complete managed security posture — threat monitoring, vulnerability management, endpoint protection, compliance reporting, and incident response.
Data Centre Consultancy Independent, vendor-agnostic advisory across the full data centre lifecycle — design, assessment, capacity planning, energy efficiency, Tier certification, and migration.
Cloud Services — Implementation & Execution End-to-end cloud migration and deployment across AWS, Azure, and GCP — executed by certified engineers, not handed to your internal team with a strategy document.

Why We Exist — and What We Are Building Toward

Our Mission

To deliver managed security and infrastructure operations that eliminate preventable downtime and breach risk for every enterprise we serve — through human-led, technology-supported operations that are accountable to outcomes, not just effort. We build lasting relationships with the organisations and partners who rely on us, and we develop our team's capability continuously so that our service quality improves over time rather than stagnating.

Our Vision

To be recognised as the most trusted managed security and infrastructure operations company in India — one that sets a new operational standard for what an MSSP should deliver, and that enables the enterprises we serve to grow with the confidence that their infrastructure and security posture are in the hands of people who take that responsibility as seriously as they do.

Five Values That Are Not Aspirational Statements. They Are Operational Standards

These are not words on a wall. They are the criteria against which every service delivery decision, every escalation, and every engagement is measured — internally and by the clients whose environments depend on us.

01 Integrity Without Exception

We do not adjust what we tell you based on what we think you want to hear. If an SLA was missed, we report it. If a vulnerability exists in your environment, we surface it. If a service change is needed to deliver the outcome you need, we say so. Transparency is not a communications strategy for us — it is an operational requirement.

02 Operational Precision

The gap between a managed services company that prevents incidents and one that merely responds to them is precision — the discipline to monitor continuously, interpret correctly, and act without hesitation. We pay attention to what others overlook, because that is precisely where the most significant failures originate.

03 Accountability to Outcomes

We are accountable for results, not activity. Our SLAs define outcomes — response times, availability targets, detection windows — and our monthly reporting measures performance against them. A managed services company that cannot show you its SLA performance data is not a company you should trust with your operations.

04 Continuous Improvement

The threat landscape changes. Technology changes. Your business changes. A security and infrastructure operations partner that delivers the same service in year three as it did in year one is falling behind. We invest in continuous capability development — in our team, our tooling, and our processes — so that the service we deliver improves over time.

05 Partnership, Not Transaction

We take operational responsibility for the environments we manage. That is a different relationship from supplying a tool or delivering a report. It requires understanding your environment, your business context, and your risk tolerance — and making decisions with that context in mind, every day.

Three Independently Audited Certifications. Two Major Accreditations in Progress. All Operationally Active — Not Filed Away Post-Audit.

Certifications are only meaningful if the management systems they represent are actually functioning — not stored on a shelf once the audit is complete. Every certification Quisitive Businesses holds reflects a documented, independently audited management system governing how we deliver services, manage quality, and protect the information of every organisation in our care.

✔ ISO 27001:2022 — Information Security Management System — CERTIFIED

The international standard for information security management. Our ISO 27001:2022 certification confirms that our security practices, risk management processes, and information handling procedures have been independently audited and meet the most current revision of this global standard. For every organisation that trusts us with access to their environment, this certification is the assurance that we treat their data and systems with the same rigour we apply to our own.

✔ ISO 9001:2015 — Quality Management System — CERTIFIED

The international standard for quality management. Our ISO 9001:2015 certification confirms that our service delivery processes, operational procedures, and continuous improvement practices are structured, documented, and regularly audited against a recognised quality management framework. Consistent service quality is not accidental — it is the product of a managed system.

✔ ISO 20000-1:2018 — IT Service Management System — CERTIFIED

The international standard for IT service management. ISO 20000-1:2018 is the only auditable standard specifically designed for IT service delivery organisations — covering service design, transition, delivery, and improvement. Our certification confirms that the processes governing how we design, deliver, and manage IT services for our clients meet a verified, internationally recognised standard.

◎ SOC 2 Type II — Security, Availability & Confidentiality — CERTIFICATION IN PROGRESS

SOC 2 Type II is an independent audit of our operational controls over a defined period, confirming that our security, availability, and confidentiality practices consistently meet the AICPA Trust Services Criteria over time — not just at a point in time. This certification is currently in progress and reflects our commitment to meeting the attestation requirements of international clients and regulated industries.

The Market Has No Shortage of Managed Security Providers. The Difference Is in What Happens When Things Get Critical.

The choice of a managed security and infrastructure partner is not primarily a product decision. It is a people and process decision — because the moment of greatest consequence is always a 3am incident, not a product demo. The questions worth asking before that moment arrives:

THE QUESTION OUR ANSWER
Who founded this company and why? A professional who managed IT operations inside global financial institutions — including Bank of America — and founded this company specifically because he had seen what happens when operations are inadequate at scale.
Who is your CISO and what is their track record? Mohammad Iqbal Ahmad — Winner of the Super 50 CISO Award 2024 and Cybersecurity Leader Award 2024. Regulatory expertise spanning SEBI CSCRF, RBI Cybersecurity Framework, DPDP Act, ISO 27001, and PCI-DSS.
Are you certified to the current standard? ISO 27001:2022 (current revision), ISO 9001:2015, and ISO 20000-1:2018 — independently audited. SOC 2 Type II and CERT-In empanelment in progress.
Is monitoring truly 24×7 with human analysts? Yes. Three shifts, every hour of every day, 365 days per year. Dedicated analysts and engineers — not a shared pool or an automated platform with occasional human review.
Will the same team handle our environment? Dedicated assignment — your account has named analysts and engineers who develop deep familiarity with your specific infrastructure, not whoever is available in a generic queue.
What happens at 3am on a public holiday? The same thing that happens at 11am on a Tuesday. The shift is staffed. The alert is acknowledged within 15 minutes. The escalation process runs as documented.
Are your SLAs legally binding? Every SLA is documented in the service contract before the engagement begins. Monthly performance reporting is standard. Remedy terms for missed SLAs are specified in the contract.

Most Enterprises Have the Technology. Few Have the Operations to Make It Count.

The problem Sharry observed inside major financial institutions has not changed — if anything, it has intensified. Enterprises invest more in security and infrastructure tooling than ever before, and they still experience more significant security incidents and infrastructure failures than their investment level should produce. The gap is consistent: technology that detects, operations that do not respond in time.

THE GAP THE COST HOW WE CLOSE IT
Security alerts with no triage capacity Threats persist and escalate — average dwell time before detection: 194 days Dedicated SOC analysts, 24x7, 15-minute triage SLA — led by an award-recognised CISO
Network monitoring on business hours only Faults that develop overnight become outages that affect the business day Dedicated NOC engineers on shift around the clock — every fault acknowledged within 15 minutes
SIEM deployed but never properly tuned Thousands of false positives masking genuine threats — analyst fatigue and missed signals Continuous detection engineering — monthly rule review, false positive reduction as a measured KPI
No documented incident response process Improvised response — slower, more expensive, less coordinated Documented runbooks per threat type, tested before needed, executed without improvisation when required
Capacity managed reactively Unexpected constraints halt operations and require emergency procurement Proactive capacity planning — trends monitored, runway projected, expansion recommended before it becomes urgent

Different Industries. Different Failure Consequences. Our Delivery Is Scoped to Both.

A network outage in a trading environment is a financial event. In a hospital, it can be a clinical event. In government infrastructure, it is a public services event. Our CISO's expertise in sector-specific regulatory frameworks — SEBI CSCRF, RBI guidelines, HIPAA equivalents, MeitY standards — means our engagement is calibrated to what your industry requires, not applied from a generic template.

INDUSTRY OPERATIONAL FOCUS
Banking & Financial Services (BFSI) Trading system availability, payment infrastructure uptime, insider threat detection, core banking network operations
Healthcare Clinical network availability, patient data protection, EHR system uptime, ransomware early-warning detection
Manufacturing & Industrial Production network continuity, OT/IT boundary monitoring, ERP system availability, SCADA network visibility
Government & Public Sector Critical infrastructure protection, sovereign data requirements, APT detection, multi-site network operations
IT / ITeS & Technology Client SLA performance, developer environment availability, source code and IP protection
Retail & E-Commerce Payment environment security, POS network uptime, customer data protection, peak-load network management

If You Are Evaluating a Managed Security or Infrastructure Partner — This Is How We Begin.

We do not route you through a contact form and a sales sequence. The first conversation is a direct one — with the people who will actually scope and deliver the engagement — focused on your environment, your requirements, and whether we are genuinely the right fit for what you need.

If we are, we will scope it properly, price it transparently, and deliver to a standard we put in writing before the engagement begins. If we are not, we will say so.

  • ✔ Free initial assessment — security, network, or infrastructure depending on your priority
  • ✔ Fixed-price scoped proposal within 48 business hours
  • ✔ Senior team from first conversation — no handoffs to account managers
  • ✔ CISO advisory led by a 2024 Super 50 CISO Award winner
  • ✔ ISO 27001:2022, ISO 9001:2015, and ISO 20000-1:2018 certified delivery framework
  • ✔ SLA-backed performance — documented in the contract before the engagement begins

If You Are Evaluating a Managed Security or Infrastructure Partner — This Is How We Begin

We do not ask you to fill in a form and wait for a sales sequence. We do not send you a brochure and follow up three times asking whether you read it. The first conversation is a direct one — with the people who will actually scope and deliver the engagement — focused on your environment, your requirements, and whether we are genuinely the right fit for what you need.

If we are, we will scope it properly, price it transparently, and deliver to a standard we put in writing before the engagement begins. If we are not, we will tell you that too.

  • ✔ Free initial assessment — security, network, or infrastructure, depending on your primary concern
  • ✔ Scoped, fixed-price proposal within 48 business hours
  • ✔ Senior team engagement from first conversation — not a sales handoff
  • ✔ ISO 27001:2022, ISO 9001:2015, and ISO 20000-1:2018 certified delivery framework
  • ✔ SLA-backed performance — documented before the engagement begins

Explore the Services Behind the Team.

SERVICE PAGE WHAT YOU WILL FIND
Managed Security Services (MSSP) Full MSSP scope, compliance framework support, SLA structure, and CISO-led delivery model
SOC as a Service Dedicated analyst team model, 24×7 coverage, threat hunting, detection engineering, incident response
NOC as a Service Dedicated engineer model, proactive fault detection, what we monitor layer by layer, vendor coordination
Data Centre Consultancy Assessment, design, Tier classification, energy efficiency, risk assessment — vendor-agnostic
Cloud Services AWS and Azure implementation, migration execution, infrastructure setup, security built in from day one
Contact Us Direct contact — no forms, no queues