No more typing reviews! Try our Samantha, our new voice AI agent.
PM

Paresh Makwana

  • Director at a tech services company with 1-10 employees
  • Has 10+ Years Of Experience
Badges
35 Points6 Years
User Activity
About 5 years ago
Return on investment on over all product solution cost. especially hardware cost. when the licence increase due to jumpbox concept Hardware requirement also increase. secondly customisation duration cycle sd be reduse. 
Almost 6 years ago
Capability                               Cylance                   Carbon Black Leverages local ML Model        Yes                          No Leverages cloud ML Model.      Not required but      No                                               adds to efficacy Predictive…
Almost 6 years ago
Almost 6 years ago
Almost 6 years ago
This is one of the Identity theft issue, which means some one hack your password or account and do activity which he she is not suppose to do. basic reason of hack of your identity or password is Social engineering. second reason is system has week privilege access…
Almost 6 years ago
“EternalBlue” exploit that targeted open server message block (SMB) ports and was used to great effect in the recent WannaCry ransomware attack Attacks leveraging the EternalBlue exploit generally follow this pattern: A vulnerable system with an open, unpatched port is…
Almost 6 years ago
Protection against ransomware requires a multi-layered approach, with both preventative measures and recoverability capabilities. Due to the variety of attack methods, there is no single silver bullet that will provide comprehensive protection. As no protection is 100%…
Almost 6 years ago
There are many ways to BAckup SAN, its all depend on your company policy and industry best practice you follow.  1) Image copies 2) Disk-to-disk backups 3) Serverless backups 4) LAN-less backups My recommendation is Cloudberry MSP360 because of the following…
Almost 6 years ago
Most Important feature is Prevention – First, this means Effectiveness, Simplicity and Performance Additional Question to be ask to ERD solution provider. Predictive Advantage?Prevention First, Zero touch approachEasy Deployment and ManagementLow Performance ImpactProduct…
Almost 6 years ago
ARCON | UBA is a robust tool that helps security and risk assessment teams to build a unified governance framework. The solution helps in monitoring users’ access to systems across the network. It collects and correlates detailed information about users’ activities logs and…
Almost 6 years ago
If companies are not mindful of what the remote workforce is doing with confidential information, serious IT crimes such as data breaches, credential abuse, and data exfiltration can go unnoticed. Therefore, learning and predicting risky user behavior patterns is central if…
Almost 6 years ago
YOU are right that earlier vulnerability assessment was very basic and done as reactive manner, after that proactive manner was introduce where it use to compare with best practice and industry threats. But now in this world of ZERO day attack we really need very Advance and…
Almost 6 years ago
What I have seen and experience is every company is good at one thing which is native strength. My experience says that 3rd party backup is always good than native platform backup due to security and BCP reason 0365 is Cloud base so you need the solution also should be…
Almost 6 years ago
Almost 6 years ago
Cylance One of the fastest growing vendors in the Endpoint Security market, Cylance has built its reputation on the back of proactive and preventive antivirus technology based on artificial intelligence, machine learning, and algorithmic science. Headquartered in Irvine,…
Experience
Other Skills
Nexus Network Security Scanner; SSH; SSL; Digital Certificates; Anti-Virus – Mcafee and EPO, Websence, Postini, Google Apps, PGP, TLS, AFARIA ( MDM), ARCOS (PIM), IPS/IDS Checkpoint, Radware WAF. Windows, Linux – RedHat, Apple IOS. LANs, WANs, VPNs, Routers, Firewalls, TCP/IP .Net, IIS, Squid, Citrix, EMC Networker, ILO, VC Operation, MS Office (Word, Excel, Outlook, Access, PowerPoint)
Reviews
Questions
Answers
About 5 years ago
User Activity Monitoring
Almost 6 years ago
Endpoint Detection and Response (EDR)
Almost 6 years ago
Endpoint Detection and Response (EDR)
Almost 6 years ago
Endpoint Detection and Response (EDR)
Almost 6 years ago
Backup and Recovery
Almost 6 years ago
Endpoint Detection and Response (EDR)
Almost 6 years ago
User Entity Behavior Analytics (UEBA)
Almost 6 years ago
Endpoint Protection Platform (EPP)
About me
Certifications
  • Qualifications: ( Academic & Other certifications ) Smart Cities & Critical Infrastructure Security Professional (SCCISP) Certified Information Systems Security Professional (CISSP) Microsoft Certified System Engineer ( MCSE) Information Technology Infrastructure Library (ITIL) Certified BS 7799 Lead Auditor - BSI Diploma in Cyber Law (Mumbai Law University) Diploma in Banking & Finance (IIBF)
Employers

10

Education

Diploma in Cyber Law (Mumbai Law University)
Diploma in Banking & Finance (IIBF)