Try our new research platform with insights from 80,000+ expert users

Badges

20 Points
4 Years

User Activity

About 3 years ago
@Evgeny Belenky  Go through 3rd party independent testing reports, MITRE attack reports. Understanding it is a challenge, then do a PoC, and then you will be able to judge it.  S1 threat hunting capabilities, detection & protection is the real deal.
Over 3 years ago
Contributed a review of Veeam Agent for Microsoft Windows [EOL]: Easy installation and useful for taking backups for end-user laptops
Over 3 years ago
Over 3 years ago
Contributed a review of Veeam Data Platform: A flexible and user-friendly backup solution
About 4 years ago
Contributed a review of Fortinet FortiWeb: Integrates very well and easy to use, configure, and manage
About 4 years ago
Veeam is a good easy to use backup solution. But it has some limitations when you have an HCI Infrastructure like Nutanix.  Veeam BEM though can manage the jobs in Nutanix but if I need to fetch any reports for compliance requirements, it's not available. BEM will provide…
About 4 years ago
The endpoint is the weakest link on the network Since we put in all the best security measures protecting the data, the users/endpoints have access to data directly, hence businesses should have the same level of security measures on the endpoints. 
About 4 years ago
Threat Hunting, Threat Feed and Analytics. Visibility and Co-Relation of Threats Cloud Based Management
Over 4 years ago
Over 4 years ago
Contributed a review of Trend Micro Endpoint Encryption: Very good interface; integration and support could be improved