Badges
55 Points
10 Years
User Activity
Over 7 years ago
Answered a question: Can Cylance be used with Symantec or Kaspersky endpoint solutions without conflict?
Hi,
Don't have experience with cylance.
RSA ecat and Palo Alto Traps can run with symantec. One is behavior based,
other is signature.
Almost 8 years ago
Contributed a review of Symantec Data Loss Prevention: Data Insight helps clients gain visibility over data usage, ownership and permissions.
Over 8 years ago
Commented on The ability to start the project, install and add the passwords in just a few days is valuable.
Did you try the 9.7 version? CyberArk changed the HA configuration for windows server 2012 R2, and they use their proprietary Secured Cluster Vault. With this version MS Cluster will not be supported with Windows 2012. They will keep the old clustering system only for…
Over 8 years ago
Contributed a review of CyberArk Privileged Access Manager: The ability to start the project, install and add the passwords in just a few days is valuable.
About 9 years ago
Contributed a review of Trellix Endpoint Security: If a client needs new components, ePO helps them to bring the new products into the organization, although older versions had issues during installation.
About 9 years ago
Over 9 years ago
Contributed a review of Qualys VMDR: Vulnerability management is the most valuable feature but it would be good if they could provide an internal computing appliance.
Over 9 years ago
Answered a question: When evaluating Application Performance Management, what aspect do you think is the most important to look for?
When you want to evaluate an APM Solution in my option the most important aspect is
1) What are my organization needs and if that solution partialy complies to the needs.
If we know for what we need the APM Solution we go for the other things:
2) Monitor End-to-end…
Over 9 years ago
Contributed a review of Proofpoint Insider Threat Management: The ability to record user activity on a Unix X Server would be nice. All in all a good solution.
Reviews
Almost 8 years ago
Symantec Data Loss Prevention
Over 8 years ago
CyberArk Privileged Access Manager
About 9 years ago
Trellix Endpoint Security
Over 9 years ago
Proofpoint Insider Threat Management
Answers
Over 7 years ago
Endpoint Protection Platform (EPP)
Over 9 years ago
Application Performance Monitoring (APM) and Observability
Comments
Over 8 years ago
User Activity Monitoring
About me
After an experience of 7 years in the IT gaming field, the next period was filled with a lot of new informations and oportunities of developement.
Working for a leading system integrator and provider of IT services, has many advantages as access to new technologies, and the ability to learn new things and be updated with the technologies development.
I have experience as infrastructure auditor,Enterprise vulnerability management, training, clustering, discovery and monitoring, compliance audit, ISMS audit (ISO 27001), and IT Security Specialist with multiple vendor software.
- BMC Consultant for BMC Atrium Discovery and Dependency Mapping(ADDM)
- BMC Consultant for BMC ProactiveNet Performance Management Suite(BPPM)
- BMC Consultant for BMC Transaction Management Application Response Time(TM-ART)
- Vulnerability management Consultant – Qualys Guard, Nexpose , Nessus
- Fraud Management - Intellinx,ObserveIT, Symantec DLP, McAfee DLP
- Secure File Exchange - CyberArk
- Privileged Identity Management - CyberArk
- Privileged Session Manager (PSM) - CyberArk
- Mobile Device Management - Airwatch, MobileIron