Badges
User Activity
3 months ago
Contributed a review of Cisco Secure Access: Provides conditional and application-level access while enabling seamless threat visibility
3 months ago
Contributed a review of Qualys Enterprise TruRisk Platform: Uses machine learning to assess risks and prioritize threats effectively
About 1 year ago
Contributed a review of Check Point Harmony SASE (formerly Perimeter 81): User interface and accessibility have enhanced network management transparency
Almost 2 years ago
Contributed a review of Microsoft Defender Threat Intelligence [EOL]: Offers good visibility over the underlying vulnerabilities in one's environment
Almost 2 years ago
Contributed a review of Microsoft System Center: Makes user management and application management easy for users
Almost 2 years ago
Contributed a review of Check Point Web Gateway: Offers cost-effectiveness and is user-friendly
Projects
Over 1 year ago
Threat Intelligence ELK-based evaluation of honeypots and IOT devicesConstant need to anonymously detect suspicious and conspicuous activity in the IoT landscape, based on the data that is generated by these devices, for example, by trying to understand attack patterns and motives of the attacker through deception in cloud environment
Value…
Reviews
3 months ago
Cisco Secure Access
3 months ago
Qualys Enterprise TruRisk Platform
About 1 year ago
Check Point Harmony SASE (formerly Perimeter 81)
Almost 2 years ago
Microsoft Defender Threat Intelligence [EOL]
Almost 2 years ago
Microsoft System Center
About me
I am highly motivated and hardworking individual, always eager to learn new technologies and apply. I have completed my graduation in computer Engineering. Currently I am working in Cybersecurity domain.





![Microsoft Defender Threat Intelligence [EOL] Logo](https://images.peerspot.com/image/upload/c_scale,dpr_3.0,f_auto,q_100,w_50/GqfBeX9zWxZG3rC5hyrUo9Aq.jpeg?_a=BACAGSGT)
