Badges
35 Points
4 Years
User Activity
Over 3 years ago
Answered a question: What needs improvement with CyberArk PAS?
Return on investment on over all product solution cost. especially hardware cost. when the licence increase due to jumpbox concept Hardware requirement also increase. secondly customisation duration cycle sd be reduse.
Over 4 years ago
Answered a question: Carbon Black and Cylance Comparison for EDR
Capability Cylance Carbon Black
Leverages local ML Model Yes No
Leverages cloud ML Model. Not required but No
adds to efficacy
Predictive…
Over 4 years ago
Contributed a review of Zscaler Cloud Firewall: Great security with stable function; advanced tech protection is winning feature
Over 4 years ago
Contributed a review of ARCON User Behaviour Analytics: Great compliance, good session monitoring, and an excellent live dashboard
Over 4 years ago
Answered a question: How was the 2020 Twitter Hack carried out? How could it have been prevented?
This is one of the Identity theft issue, which means some one hack your password or account and do activity which he she is not suppose to do. basic reason of hack of your identity or password is Social engineering. second reason is system has week privilege access…
Over 4 years ago
Answered a question: How does EternalBlue work?
“EternalBlue” exploit that targeted open server message block (SMB) ports and was used to great effect in the recent WannaCry ransomware attack
Attacks leveraging the EternalBlue exploit generally follow this pattern:
A vulnerable system with an open, unpatched port is…
Over 4 years ago
Answered a question: What is Mimikatz?
Protection against ransomware requires a multi-layered approach, with both preventative measures and recoverability capabilities. Due to the variety of attack methods, there is no single silver bullet that will provide comprehensive protection. As no protection is 100%…
Over 4 years ago
Answered a question: How do you backup a SAN?
There are many ways to BAckup SAN, its all depend on your company policy and industry best practice you follow.
1) Image copies
2) Disk-to-disk backups
3) Serverless backups
4) LAN-less backups
My recommendation is Cloudberry MSP360 because of the following…
Over 4 years ago
Answered a question: What features are important to look out for when choosing an EDR solution?
Most Important feature is Prevention – First, this means Effectiveness, Simplicity and Performance
Additional Question to be ask to ERD solution provider.
Predictive Advantage?Prevention First, Zero touch approachEasy Deployment and ManagementLow Performance ImpactProduct…
Over 4 years ago
Answered a question: Which is the best UEBA solution?
ARCON | UBA is a robust tool that helps security and risk assessment teams to build a unified governance framework. The solution helps in monitoring users’ access to systems across the network. It collects and correlates detailed information about users’ activities logs and…
Over 4 years ago
Answered a question: What are the different types of insider threats that UEBA solutions help to detect?
If companies are not mindful of what the remote workforce is doing with confidential information, serious IT crimes such as data breaches, credential abuse, and data exfiltration can go unnoticed. Therefore, learning and predicting risky user behavior patterns is central if…
Over 4 years ago
Answered a question: What is a more effective approach to cyber defense: risk-based vulnerability management or vulnerability assessment?
YOU are right that earlier vulnerability assessment was very basic and done as reactive manner, after that proactive manner was introduce where it use to compare with best practice and industry threats. But now in this world of ZERO day attack we really need very Advance and…
Over 4 years ago
Answered a question: Should I get a third-party backup solution for Office 365?
What I have seen and experience is every company is good at one thing which is native strength. My experience says that 3rd party backup is always good than native platform backup due to security and BCP reason
0365 is Cloud base so you need the solution also should be…
Over 4 years ago
Asked a question: How will AI and ML help or work with PIM/PAM?
Over 4 years ago
Answered a question: Which ransomware is the biggest threat in 2020?
Cylance
One of the fastest growing vendors in the Endpoint Security market, Cylance has built its reputation on the back of proactive and preventive antivirus technology based on artificial intelligence, machine learning, and algorithmic science. Headquartered in Irvine,…
Over 4 years ago
Contributed a review of MSP360 Backup: Has good online backup capacity because you don't have to do an entire back up again and again, it just does whatever you type in
Reviews
Over 4 years ago
Zscaler Cloud Firewall
Over 4 years ago
ARCON User Behaviour Analytics
Questions
Answers
Over 4 years ago
Application Security Tools
Over 4 years ago
Endpoint Detection and Response (EDR)
Over 4 years ago
User Entity Behavior Analytics (UEBA)
Over 4 years ago
Vulnerability Management
About me
Paresh Makwana has more than 20 years of Data center and Cyber Security experience in financial services and has a very close working relationship with most of the CIO/CISO of banks, financial institutions, Technology vendors, and government regulators.
For the past 20 years, Paresh has been working with financial institutions to help them assess their business, operational and technical challenges, select the right Technology, vendors/partners, better understand their IT & IS TCO, and grow their customer base. His understanding of a range business, market, regulatory, and investment related issues enable him to work closely with financial institutions, consultants, vendors, and government agencies on various multi-disciplinary initiatives.
Qualifications: ( Academic & Other certifications )
Smart Cities & Critical Infrastructure Security Professional (SCCISP)
Certified Information Systems Security Professional (CISSP)
Microsoft Certified System Engineer ( MCSE)
Information Technology Infrastructure Library (ITIL)
Certified BS 7799 Lead Auditor - BSI
Diploma in Cyber Law (Mumbai Law University)
Diploma in Banking & Finance (IIBF)
Relevant Experience
● Design controls and procedures to ensure management and audit
compliance.
● Create and Implement Corporate Security Policies. Creating Security
Awareness.
● Setup and stabilize IT services, service desk, SLA management, Outage
management
● Aligning IT with business, Strategic Outsourcing and cost management
● Business Process Improvement & Organizational Efficiency and
Effectiveness
● Domain expert: Managing critical Infrastructure, application and Cyber
Security for BFSI and Critical Infrustructure.