height="0" width="0" style="display:none;visibility:hidden">
No more typing reviews!
Try our Samantha
, our new voice AI agent.
Research Reports
Categories
Cybersecurity
Endpoint Detection and Response (EDR)
Security Information and Event Management (SIEM)
Vulnerability Management
Cloud Security Posture Management (CSPM)
Extended Detection and Response (XDR)
Endpoint Protection Platform (EPP)
Firewalls
Container Security
ZTNA
Intrusion Detection and Prevention Software (IDPS)
Anti-Malware Tools
Advanced Threat Protection (ATP)
ZTNA as a Service
Data Loss Prevention (DLP)
Unified Threat Management (UTM)
Cloud-Native Application Protection Platforms (CNAPP)
Secure Access Service Edge (SASE)
Cloud Workload Protection Platforms (CWPP)
Distributed Denial-of-Service (DDoS) Protection
Threat Intelligence Platforms (TIP)
Cloud Computing
AWS Marketplace
Cloud Monitoring Software
Microsoft Security Suite
Cloud Backup
Cloud Management
PaaS Clouds
Cisco Security Portfolio
Infrastructure as a Service Clouds (IaaS)
Cloud Cost Management
Cloud Storage
Cloud Migration
Hybrid Cloud Computing Platforms
Public Cloud Storage Services
MSP Backup
Cloud Analytics
Managed Cloud Services
Compute Service
Software Defined Data Center (SDDC)
Cloud Storage Gateways
Hadoop
IT Management
IT Infrastructure Monitoring
Log Management
Server Monitoring
Remote Access
Operating Systems (OS) for Business
Configuration Management
IT Service Management (ITSM)
Container Monitoring
Workload Automation
Managed DNS
Container Management
IT Asset Management
Server Virtualization Software
User Provisioning Software
Virtualization Management Tools
Managed File Transfer (MFT)
IT Alerting and Incident Management
Remote Monitoring and Management (RMM)
Virtual Desktop Infrastructure (VDI)
Autonomous Operational Resilience
Data Management
Data Integration
Data Governance
Cloud Data Integration
Compliance Management
Relational Databases Tools
Data Warehouse
Cloud Data Warehouse
Data Quality
Database Management Systems (DBMS)
Vector Databases
Open Source Databases
Metadata Management
Database Development and Management
Cloud Master Data Management (MDM)
Data Masking
Database as a Service (DBaaS)
Deduplication Software
NoSQL Databases
Data Observability
Managed NoSQL Databases
Data Protection and Storage
Backup and Recovery
All-Flash Storage
Disaster Recovery (DR) Software
File and Object Storage
Software Defined Storage (SDS)
SaaS Backup
HCI
NVMe All-Flash Storage Arrays
NAS
Modular SAN (Storage Area Network)
File Archiving
Data Replication
Enterprise SAN
Converged Infrastructure
Disk Based Backup Systems
Application Server
Container Backup Software
File System Software
Storage Software
Storage Management
Application Development Software
Application Performance Monitoring (APM) and Observability
Application Security Tools
Static Application Security Testing (SAST)
Rapid Application Development Software
IT Operations Analytics
DevSecOps
Application Security Posture Management (ASPM)
Functional Testing Tools
Patch Management
Test Automation Tools
Application Lifecycle Management (ALM) Suites
Software Supply Chain Security
API Testing Tools
Dynamic Application Security Testing (DAST)
Mobile APM
Build Automation
Regression Testing Tools
Release Automation
Enterprise Architecture Management
Software Development Analytics
Enterprise Communications and Networking
Network Monitoring Software
Secure Web Gateways (SWG)
Software Defined WAN (SD-WAN) Solutions
WAN Edge
AIOps
CDN
WAN Optimization
Network Traffic Analysis (NTA)
Ethernet Switches
Network Management Applications
Wireless LAN
Network Automation
Application Delivery Controllers (ADC)
Network Troubleshooting
Rack Servers
Blade Servers
LAN Switching
Routers
Enterprise Browsers
AV Over IP Switching
Enterprise Applications
AI Observability
AI Data Analysis
AI Software Development
Business Process Management (BPM)
Business Orchestration and Automation Technologies
AI Security
AI-Powered Cybersecurity Platforms
BI (Business Intelligence) Tools
Email Security
Process Automation
AI IT Support
Robotic Process Automation (RPA)
Low-Code Development Platforms
Project Management Software
Reporting
Data Visualization
GRC
AI Customer Experience Personalization
ERP
Talent Management
Enterprise Architecture and Integration
Integration Platform as a Service (iPaaS)
API Management
Streaming Analytics
Business-to-Business Middleware
Event Monitoring
Application Infrastructure
Enterprise Service Bus (ESB)
Message Queue (MQ) Software
Message Oriented Middleware (MOM)
Data Migration Appliances
Migration Tools
SOA Governance
General Purpose HSM
SOA Application Gateways
Web Access Management
Complex Event Processing (CEP)
Payment HSM
Code Signing Management
Customer Care
CRM
Help Desk Software
Customer Experience Management
Data Management Platforms (DMP)
Digital Experience Monitoring (DEM)
CRM Customer Engagement Centers
AI-Powered Chatbots
Contact Center Platforms
Field Service Management
Social CRM
Workforce Engagement Management
Digital Experience Platforms (DXP)
Contact Center as a Service (CCaaS)
IT Support Services
Social Media Management Solutions
Partner Relationship Management (PRM)
Live Chat
Customer Communications Management (CCM)
Customer Data Analysis
Contact Center Infrastructure
Sales and Marketing
Marketing Management
Sales Force Automation
Marketing Automation
Opportunity Management
eCommerce Platforms
Product Configuration and Quoting
Marketing Intelligence
Web Analytics
Payment Processing Software
Product Management Software
Cloud GTM Platforms
Personalization Engines
Marketing Resource Management
Sales and Market Intelligence
Revenue Enablement Platforms
Advertisement Technology Platforms
Predictive Sales Intelligence
Channel Marketing Automation Software
Sales Performance Management
Content Marketing Software
Data Center and Facilities Management
Enterprise Asset Management (EAM)
Data Center Networking
Data Center Infrastructure Management
Workplace Management Software
Data Center Power Solutions
Computerized Maintenance Management Software (CMMS)
Facility Maintenance Management Software
Data Center Monitoring
Data Center Cooling Systems
Workplace Analytics Software
Wiring and Cabling Solutions
All categories
Comparisons
Top comparisons
Cloudflare vs. Quad9
Netgate pfSense vs. OPNsense
Fortinet FortiGate vs. Sophos Firewall
Amazon API Gateway vs. Microsoft Azure API Management
Checkmarx One vs. SonarQube
Hyper-V vs. VMware vSphere
GitLab vs. Microsoft Azure DevOps
MinIO vs. Red Hat Ceph Storage
AWS Secrets Manager vs. Azure Key Vault
AWS GuardDuty vs. Microsoft Defender for Cloud
Amazon Web Services (AWS)
Amazon API Gateway vs. Microsoft Azure API Management
AWS Secrets Manager vs. Azure Key Vault
AWS GuardDuty vs. Microsoft Defender for Cloud
Amazon Route 53 vs. Azure DNS
Akamai Connected Cloud (Linode) vs. Amazon AWS
Amazon EKS vs. Red Hat OpenShift Container Platform
Amazon EFS (Elastic File System) vs. Microsoft Azure File Storage
Amazon QuickSight vs. Microsoft Power BI
AWS Security Hub vs. Microsoft Sentinel
AWS Database Migration Service vs. AWS Glue
Cisco
Cisco Secure Firewall vs. Fortinet FortiGate
Aruba Wireless vs. Cisco Meraki Wireless LAN
Aruba ClearPass vs. Cisco Identity Services Engine (ISE)
Cisco Umbrella vs. Zscaler Internet Access
Cisco Wireless vs. Ruckus Wireless
Aruba Switches vs. Cisco Ethernet Switches
Cisco Secure Email vs. Trellix Collaboration Security
Cisco Meraki MX vs. Palo Alto Networks NG Firewalls
Cisco Intersight vs. Cisco UCS Manager
Cisco Linksys Ethernet Switches vs. NETGEAR Switches
Dell Technologies
Dell PowerEdge R-Series vs. HPE ProLiant DL Servers
Dell PowerFlex vs. VxRail
Dell PowerStore vs. Dell Unity XT
Dell PowerProtect Data Domain vs. HPE StoreOnce
Dell PowerEdge T-Series vs. HPE Proliant ML
Dell PowerScale (Isilon) vs. NetApp FAS Series
Dell Avamar vs. Dell PowerProtect Data Manager
Dell RecoverPoint for Virtual Machines vs. VMware Live Recovery
Dell APEX vs. HPE GreenLake
Amazon AWS vs. Dell ObjectScale
Google
Google Cloud Identity vs. Microsoft Entra ID
Google Cloud DNS vs. Quad9
Apigee vs. Microsoft Azure API Management
Azure OpenAI vs. Google Vertex AI
Amazon WorkMail vs. Google Workspace
Alibaba Cloud vs. Google Cloud
Google Firebase vs. Microsoft Azure
Amazon S3 Glacier vs. Google Cloud Storage Nearline
Google Gemini AI vs. Grammarly Pro - Enterprise
AWS Snowball vs. Google Transfer Appliance
IBM
IBM Security Guardium Data Protection vs. Imperva Data Security Fabric
IBM Security QRadar vs. Splunk Enterprise Security
ActiveMQ vs. IBM MQ
IBM DOORS vs. Polarion Requirements
Camunda vs. IBM BPM
IBM API Connect vs. IBM DataPower Gateway
IBM MaaS360 vs. Microsoft Intune
IBM Db2 Database vs. SQL Server
IBM Maximo vs. ServiceNow
IBM Integration Bus vs. Mule ESB
Microsoft
Amazon API Gateway vs. Microsoft Azure API Management
Hyper-V vs. VMware vSphere
GitLab vs. Microsoft Azure DevOps
AWS Secrets Manager vs. Azure Key Vault
AWS GuardDuty vs. Microsoft Defender for Cloud
Amazon Route 53 vs. Azure DNS
Windows 11 vs. Windows Server
Amazon EFS (Elastic File System) vs. Microsoft Azure File Storage
Google Cloud Identity vs. Microsoft Entra ID
Jamf Pro vs. Microsoft Intune
OpenText
OpenText Functional Testing vs. Tricentis Tosca
OpenText Core Application Security vs. SonarQube
Jira vs. OpenText Software Delivery Management
Sentinel vs. Splunk Enterprise Security
OpenText Documentum Content Management vs. SharePoint
OpenText Communications vs. Quadient Inspire
OpenText Professional Performance Engineering (LoadRunner Professional) vs. Tricentis NeoLoad
Microsoft Azure DevOps vs. OpenText Application Quality Management
OpenText Dynamic Application Security Testing vs. PortSwigger Burp Suite Professional
Microsoft Defender for Endpoint vs. OpenText Core Endpoint Protection
Oracle
Oracle VM VirtualBox vs. Proxmox VE
Oracle VM vs. VMware vSphere
Oracle Linux vs. Ubuntu Linux
Firebird SQL vs. MySQL
Oracle HCM Cloud vs. SAP SuccessFactors
Oracle Database vs. SAP HANA
Microsoft Power Apps vs. Oracle Application Express (APEX)
Oracle Data Integrator (ODI) vs. Oracle Integration Cloud Service
Oracle WMS vs. SAP Warehouse Management
NetSuite ERP vs. Oracle Fusion Cloud ERP
Palo Alto Networks
Prisma Cloud by Palo Alto Networks vs. Wiz
Cortex XSIAM vs. Palo Alto Networks Cortex XSOAR
Cisco Secure Firewall vs. Palo Alto Networks WildFire
Fortinet FortiGate vs. Palo Alto Networks NG Firewalls
Netskope vs. Prisma Access by Palo Alto Networks
Island vs. Prisma Access Browser
Cortex XDR by Palo Alto Networks vs. Microsoft Defender for Endpoint
Cisco Umbrella vs. Palo Alto Networks DNS Security
Azure Firewall vs. Palo Alto Networks VM-Series
Cisco Catalyst SD-WAN vs. Prisma SD-WAN
SAP
Celonis vs. SAP Signavio Process Manager
SAP SuccessFactors vs. Workday
SAP ERP vs. SAP S/4HANA
Amazon AWS vs. SAP Cloud Platform
Kinaxis vs. SAP Integrated Business Planning for Supply Chain
Oracle Database vs. SAP HANA
Microsoft Dynamics CRM vs. SAP CRM
SAP PowerDesigner vs. erwin Data Modeler
Oracle WMS vs. SAP Warehouse Management
SAP Business Data Cloud vs. SAP BusinessObjects Business Intelligence Platform
More comparisons
For Vendors
For Vendors
Learn More
AWS + PeerSpot
Get Listed
peerspot.ai
Sign In
Mohan Janarthanan
Associate Vice President at Novac Technology Solutions
Has 10+ Years Of Experience
Message this user
Send a message to Mohan Janarthanan
Summary
Contributions
Experience
Projects
Badges
995 Points
4 Years
Top 5
Leaderboard
User Activity
About 1 month ago
Contributed a review of SentinelOne Singularity AI SIEM:
AI-driven monitoring has improved real-time threat detection but still needs better automation
2 months ago
Contributed a review of SentinelOne Singularity Endpoint:
Unified AI-driven protection has reduced alerts and accelerated cloud and endpoint security response
2 months ago
Contributed a review of F5 Silverline Managed Services:
Cloud applications have gained stronger protection and real-time defense against web attacks
3 months ago
Contributed a review of Purple AI:
Proactive threat hunting has become seamless and daily workflows are reduced on a single platform
2 months ago
Contributed a review of Fortinet Managed Rules for AWS WAF:
Advanced threat protection has secured payment transactions and improved API defenses
3 months ago
Contributed a review of SentinelOne Singularity Endpoint:
Endpoint protection has delivered full visibility and has strengthened zero-day attack defense
3 months ago
Contributed a review of F5 Distributed Cloud Services:
Centralized security has protected APIs and optimized multi‑cloud traffic management
3 months ago
Contributed a review of SentinelOne Singularity Cloud Security:
Cloud posture has improved and security team gains instant visibility into misconfigurations
3 months ago
Contributed a review of Check Point WAF (formerly CloudGuard WAF):
Cloud security has improved and now consolidates multiple applications under one flexible firewall
8 months ago
Contributed a review of Zscaler Internet Access:
User access management and threat prevention are enhanced with user-friendly controls
Over 1 year ago
Contributed a review of Check Point Harmony Endpoint:
Offers good reporting functionality and zero-phishing feature
Over 1 year ago
Contributed a review of Check Point Quantum Force (NGFW):
Real-time prevention is there to protect against zero-day malware
Over 2 years ago
Contributed a review of Check Point CloudGuard CNAPP:
Great asset detection, risk assessment, and remediation processes
About 4 years ago
Contributed a review of Check Point Harmony SASE (formerly Perimeter 81):
Great real-time phishing blocking, great zero-day sandboxing, and effectively minimizes threats
Projects
About 4 years ago
Crowdstrike
End point detetction and response
Product Leaderboard Rank
Check Point Harmony Endpoint
202 Reviews
SentinelOne Singularity Endpoint
233 Reviews
Zscaler Internet Access
59 Reviews
Check Point Quantum Force (NGFW)
347 Reviews
F5 Silverline Managed Services
16 Reviews
Check Point WAF (formerly CloudGuard WAF)
56 Reviews
SentinelOne Singularity Cloud Security
122 Reviews
F5 Distributed Cloud Services
5 Reviews
Purple AI
6 Reviews
SentinelOne Singularity AI SIEM
5 Reviews
Fortinet Managed Rules for AWS WAF
8 Reviews
Category Leaderboard Rank
Application Security Tools
(5th)
Business Rules Management
(1st)
CDN
(2nd)
Secure Web Gateways (SWG)
(5th)
Firewalls
(7th)
Internet Security
(3rd)
Security Information and Event...
(3rd)
Vulnerability Management
(5th)
Endpoint Protection Platform (...
(6th)
Web Application Firewall (WAF)
(4th)
Distributed Denial-of-Service ...
(3rd)
Cloud and Data Center Security
(2nd)
Anti-Malware Tools
(6th)
Container Security
(5th)
Endpoint Detection and Respons...
(6th)
Cloud Workload Protection Plat...
(5th)
Enterprise Infrastructure VPN
(6th)
ZTNA as a Service
(4th)
ZTNA
(4th)
Unified Threat Management (UTM)
(4th)
Secure Access Service Edge (SASE)
(4th)
Extended Detection and Respons...
(5th)
API Security
(3rd)
Cloud Security Posture Managem...
(5th)
Cloud-Native Application Prote...
(4th)
Data Security Posture Manageme...
(4th)
Compliance Management
(2nd)
AI-Powered Cybersecurity Platf...
(4th)
AI-SOC
(1st)
AI Observability
(6th)
Currently Researching
Experience
Other Skills
Palo alto SASE, Forcepoint, Checkpoint, Microsoft , Fortinet and Zscaler , F5, CrowdStrike, SentinelOne, Postpoint
Reviews
About 1 month ago
SentinelOne Singularity AI SIEM
AI-driven monitoring has improved real-time threat detection but still needs better automation
2 months ago
SentinelOne Singularity Endpoint
Unified AI-driven protection has reduced alerts and accelerated cloud and endpoint security response
2 months ago
F5 Silverline Managed Services
Cloud applications have gained stronger protection and real-time defense against web attacks
3 months ago
Purple AI
Proactive threat hunting has become seamless and daily workflows are reduced on a single platform
2 months ago
Fortinet Managed Rules for AWS WAF
Advanced threat protection has secured payment transactions and improved API defenses
3 months ago
SentinelOne Singularity Endpoint
Endpoint protection has delivered full visibility and has strengthened zero-day attack defense
3 months ago
F5 Distributed Cloud Services
Centralized security has protected APIs and optimized multi‑cloud traffic management
3 months ago
SentinelOne Singularity Cloud Security
Cloud posture has improved and security team gains instant visibility into misconfigurations
3 months ago
Check Point WAF (formerly CloudGuard WAF)
Cloud security has improved and now consolidates multiple applications under one flexible firewall
8 months ago
Zscaler Internet Access
User access management and threat prevention are enhanced with user-friendly controls
Over 1 year ago
Check Point Harmony Endpoint
Offers good reporting functionality and zero-phishing feature
Over 1 year ago
Check Point Quantum Force (NGFW)
Real-time prevention is there to protect against zero-day malware
Over 2 years ago
Check Point CloudGuard CNAPP
Great asset detection, risk assessment, and remediation processes
About 4 years ago
Check Point Harmony SASE (formerly Perimeter 81)
Great real-time phishing blocking, great zero-day sandboxing, and effectively minimizes threats
Interesting Projects and Accomplishments
About 4 years ago
Crowdstrike
© 2026 PeerSpot, All Rights Reserved.