Try our new research platform with insights from 80,000+ expert users

Badges

115 Points
5 Years
Top 20

User Activity

Over 1 year ago
Over 4 years ago
There is no single-most important aspect, but here are a few to consider as being absolute requirements Intrusion protection: I've seen break-ins from bad actors on the outside, who stole intellectual property for whatever purpose, including, but not limited to the sale of…
Over 4 years ago
Without knowing much about Seqrite, I can offer this advice 1. Request (2) loaners for you to test out. Any sales team worth their salt will agree to this simple request, especially if it's going to be 30 days or less. 2. Use a Penetration and Vulnerability tool so you can…
Over 4 years ago
Without knowing the applications your users are accessing and the file transfers you are seeing, I would need to ask how much bandwidth you are consuming. Bulky, chatty applications with a lot of file transfer can be throughput intensive, so a good start is to look at your…
About 5 years ago
Contributed a review of Palo Alto Networks NG Firewalls: The product stability and level of security are second to none in the industry