Badges
55 Points
9 Years
User Activity
Almost 7 years ago
Yes, you can transparently forward the traffic to zscaler using GRE or IPsec. ZScaler will insect SSL traffic if the SSL inspection enabled on locations.
About 7 years ago
Answered a question: Evaluating CASBs. Looking for community feedback on some vendors.
Hi, I am working on both Skyhigh and Netskope. The both has their own unique features. List down your requirement and do the POC with the said products
Skyhigh is efficiently handling both shadow IT and sanctioned IT applications. DLP, threat protection and access…
About 7 years ago
Answered a question: Fortinet, Palo Alto or Check Point?
I have experience is all flavors mentioned here
If you are thinking about the cost of the product , then go with Fortinet. Fortinet products are cheep when compare to PA or Checkpoint. Whereas the performance of the box is not mentioned on the datasheet. You have to…
About 7 years ago
Answered a question: Sophos XG 210 vs Fortigate FG 100E
Here I would suggest your to go with Fortigate, The model 60E or 100 E is based on your throughput. 100 E is capable of handle 100 Mbps in realtime UTM traffic and 60E is capable of handle 40 Mbps UTM traffic.
.
About 7 years ago
Answered a question: Evaluating CASBs. Looking for community feedback on some vendors.
We have used Skyhigh and its pretty good to handle cloud sanctioned IT applications like Office365, Google APPs and salesforce etc.
Easy to deploy, better application, device and user visibility.
Over 7 years ago
Contributed a review of Cisco Secure Firewall: The throughput and reliability of the product improve the network stability of our organization.
Over 8 years ago
Contributed a review of Zscaler Internet Access: No need to maintain multiple devices on the data center and secure entire traffic.
Over 8 years ago
Contributed a review of Zscaler Internet Access: No need to maintain multiple devices on the data center and secure entire traffic.
About 9 years ago
Commented on I don't need to have a cluster because it's stable, but rules are not intuitive and the admin UI needs improvement.
Fotigate is enhanced their GUI from 5.0 onwards . firmware 5.2.2 is very good GUI , user friendly. more stable , Webfiltering, explicit proxy and Application controls are awesome. I would suggest Fortigate devices at perimeter level, because which will eliminates the…
Over 9 years ago
Answered a question: We're trying to choose between Fortinet or Checkpoint UTM firewalls. Can you help?
Both devices are good. Checkpoint is one of the market leader who gives a
good UTM solution. Fortinet is cheaper when compare to checkpoint and
flexible.
You may try the Paloalto which gives more attention on zero day attacks.
Thanks & Regards /*Ramesh M*
Reviews
Over 7 years ago
Cisco Secure Firewall
Over 8 years ago
Zscaler Internet Access
Over 8 years ago
Zscaler Internet Access
Answers
About 7 years ago
Cloud Access Security Brokers (CASB)
About 7 years ago
Cloud Access Security Brokers (CASB)
Over 9 years ago
Firewalls
Comments
Almost 7 years ago
Secure Web Gateways (SWG)
About me
A highly driven IT Professional, possessing more than 8 years of experience in various aspects of Security Management, Vulnerability Assessment, deployment, and security, of large enterprise networks. Possessing a wide range of technical proficiencies, in Telecommunication and Real time Application Service Provider industry and Banking with ability to design deploy and secure data and data centers. Highly proficient in implementing, configuring and supporting large scale IP networks with expertise in server platforms.
Managing Security Devices (Firewall, IDS etc) , Managing Vulnerability and Patch Assessment for IT Infrastructure, Assess risk of exceptions in day to day processes, Network Analysis, Design and Deployment, Configuring and Administering Server Technology , Managing and Administering, Firewall and UTM Products, Managing and Administering Mail Servers, DNS, Database Server, Configuring, maintaining and customizing content management systems , Proactive Network management and Monitoring, Active and Passive Clustering, Server Virtualization, Managing and Administering 802.11b/g/n based wireless networks, Implementation of IT policies and regulations