Try our new research platform with insights from 80,000+ expert users

Badges

55 Points
9 Years

User Activity

Almost 7 years ago
Yes, you can transparently forward the traffic to zscaler using GRE or IPsec. ZScaler will insect SSL traffic if the SSL inspection enabled on locations.
About 7 years ago
Hi, I am working on both Skyhigh and Netskope. The both has their own unique features. List down your requirement and do the POC with the said products Skyhigh is efficiently handling both shadow IT and sanctioned IT applications. DLP, threat protection and access…
About 7 years ago
I have experience is all flavors mentioned here If you are thinking about the cost of the product , then go with Fortinet. Fortinet products are cheep when compare to PA or Checkpoint. Whereas the performance of the box is not mentioned on the datasheet. You have to…
About 7 years ago
Here I would suggest your to go with Fortigate, The model 60E or 100 E is based on your throughput. 100 E is capable of handle 100 Mbps in realtime UTM traffic and 60E is capable of handle 40 Mbps UTM traffic. .
About 7 years ago
We have used Skyhigh and its pretty good to handle cloud sanctioned IT applications like Office365, Google APPs and salesforce etc. Easy to deploy, better application, device and user visibility.
Over 8 years ago
Over 8 years ago
About 9 years ago
Fotigate is enhanced their GUI from 5.0 onwards . firmware 5.2.2 is very good GUI , user friendly. more stable , Webfiltering, explicit proxy and Application controls are awesome. I would suggest Fortigate devices at perimeter level, because which will eliminates the…
Over 9 years ago
Both devices are good. Checkpoint is one of the market leader who gives a good UTM solution. Fortinet is cheaper when compare to checkpoint and flexible. You may try the Paloalto which gives more attention on zero day attacks. Thanks & Regards /*Ramesh M*

About me

A highly driven IT Professional, possessing more than 8 years of experience in various aspects of Security Management, Vulnerability Assessment, deployment, and security, of large enterprise networks. Possessing a wide range of technical proficiencies, in Telecommunication and Real time Application Service Provider industry and Banking with ability to design deploy and secure data and data centers. Highly proficient in implementing, configuring and supporting large scale IP networks with expertise in server platforms.

Managing Security Devices (Firewall, IDS etc) , Managing Vulnerability and Patch Assessment for IT Infrastructure, Assess risk of exceptions in day to day processes, Network Analysis, Design and Deployment, Configuring and Administering Server Technology , Managing and Administering, Firewall and UTM Products, Managing and Administering Mail Servers, DNS, Database Server, Configuring, maintaining and customizing content management systems , Proactive Network management and Monitoring, Active and Passive Clustering, Server Virtualization, Managing and Administering 802.11b/g/n based wireless networks, Implementation of IT policies and regulations