Try our new research platform with insights from 80,000+ expert users

Badges

35 Points
4 Years

User Activity

Over 3 years ago
Return on investment on over all product solution cost. especially hardware cost. when the licence increase due to jumpbox concept Hardware requirement also increase. secondly customisation duration cycle sd be reduse. 
Over 4 years ago
Capability                               Cylance                   Carbon Black Leverages local ML Model        Yes                          No Leverages cloud ML Model.      Not required but      No                                               adds to efficacy Predictive…
Over 4 years ago
Over 4 years ago
Contributed a review of ARCON User Behaviour Analytics: Great compliance, good session monitoring, and an excellent live dashboard
Over 4 years ago
This is one of the Identity theft issue, which means some one hack your password or account and do activity which he she is not suppose to do. basic reason of hack of your identity or password is Social engineering. second reason is system has week privilege access…
Over 4 years ago
Answered a question: How does EternalBlue work?
“EternalBlue” exploit that targeted open server message block (SMB) ports and was used to great effect in the recent WannaCry ransomware attack Attacks leveraging the EternalBlue exploit generally follow this pattern: A vulnerable system with an open, unpatched port is…
Over 4 years ago
Answered a question: What is Mimikatz?
Protection against ransomware requires a multi-layered approach, with both preventative measures and recoverability capabilities. Due to the variety of attack methods, there is no single silver bullet that will provide comprehensive protection. As no protection is 100%…
Over 4 years ago
Answered a question: How do you backup a SAN?
There are many ways to BAckup SAN, its all depend on your company policy and industry best practice you follow.  1) Image copies 2) Disk-to-disk backups 3) Serverless backups 4) LAN-less backups My recommendation is Cloudberry MSP360 because of the following…
Over 4 years ago
Most Important feature is Prevention – First, this means Effectiveness, Simplicity and Performance Additional Question to be ask to ERD solution provider. Predictive Advantage?Prevention First, Zero touch approachEasy Deployment and ManagementLow Performance ImpactProduct…
Over 4 years ago
ARCON | UBA is a robust tool that helps security and risk assessment teams to build a unified governance framework. The solution helps in monitoring users’ access to systems across the network. It collects and correlates detailed information about users’ activities logs and…
Over 4 years ago
If companies are not mindful of what the remote workforce is doing with confidential information, serious IT crimes such as data breaches, credential abuse, and data exfiltration can go unnoticed. Therefore, learning and predicting risky user behavior patterns is central if…
Over 4 years ago
YOU are right that earlier vulnerability assessment was very basic and done as reactive manner, after that proactive manner was introduce where it use to compare with best practice and industry threats. But now in this world of ZERO day attack we really need very Advance and…
Over 4 years ago
What I have seen and experience is every company is good at one thing which is native strength. My experience says that 3rd party backup is always good than native platform backup due to security and BCP reason 0365 is Cloud base so you need the solution also should be…
Over 4 years ago
Over 4 years ago
Cylance One of the fastest growing vendors in the Endpoint Security market, Cylance has built its reputation on the back of proactive and preventive antivirus technology based on artificial intelligence, machine learning, and algorithmic science. Headquartered in Irvine,…

Reviews

Questions

Answers

Over 3 years ago
User Activity Monitoring
Over 4 years ago
Endpoint Detection and Response (EDR)
Over 4 years ago
Endpoint Detection and Response (EDR)
Over 4 years ago
Endpoint Detection and Response (EDR)
Over 4 years ago
Backup and Recovery
Over 4 years ago
Endpoint Detection and Response (EDR)
Over 4 years ago
User Entity Behavior Analytics (UEBA)
Over 4 years ago
Endpoint Protection Platform (EPP)

About me

Paresh Makwana has more than 20 years of Data center and Cyber Security experience in financial services and has a very close working relationship with most of the CIO/CISO of banks, financial institutions, Technology vendors, and government regulators.
For the past 20 years, Paresh has been working with financial institutions to help them assess their business, operational and technical challenges, select the right Technology, vendors/partners, better understand their IT & IS TCO, and grow their customer base. His understanding of a range business, market, regulatory, and investment related issues enable him to work closely with financial institutions, consultants, vendors, and government agencies on various multi-disciplinary initiatives.
Qualifications: ( Academic & Other certifications )
Smart Cities & Critical Infrastructure Security Professional (SCCISP)
Certified Information Systems Security Professional (CISSP)
Microsoft Certified System Engineer ( MCSE)
Information Technology Infrastructure Library (ITIL)
Certified BS 7799 Lead Auditor - BSI
Diploma in Cyber Law (Mumbai Law University)
Diploma in Banking & Finance (IIBF)
Relevant Experience

● Design controls and procedures to ensure management and audit
compliance.
● Create and Implement Corporate Security Policies. Creating Security
Awareness.
● Setup and stabilize IT services, service desk, SLA management, Outage
management
● Aligning IT with business, Strategic Outsourcing and cost management
● Business Process Improvement & Organizational Efficiency and
Effectiveness
● Domain expert: Managing critical Infrastructure, application and Cyber
Security for BFSI and Critical Infrustructure.