Coming October 25: PeerSpot Awards will be announced! Learn more

Badges

User Activity

About 1 year ago
I have experience on both from Disti and channel experience. Please find below my comments (nothing new as such). -Check Point GUI is a bit complicated,  -Application and Web filtering are better than Fortigate.  -IPS and AV are more effective than Fortigate. Overall more…
About 1 year ago
Few points to add: -Test the capability, effectiveness provided by the endpoint security solution compared to the one they are already running.-The complexity of the migration.-The implementation impact on the business.-Efficacy of this solution in the long term.-Local…
About 1 year ago
PAM, PIM and PAS and acronyms are related to the same thing: (PAM) solutions control and monitor access “privileged access” by these special users. In an enterprise environment, “privileged access” is a term used to designate special access or abilities above and beyond…
About 1 year ago
Next-Generation Antivirus (NGAV) uses a combination of artificial intelligence, behavioural detection, machine learning algorithms, and exploit mitigation, so known and unknown threats can be anticipated and immediately prevented. NGAV is cloud-based, which allows it to be…
Over 1 year ago
FortiGate VM  FortiGate-VM delivers the same FortiOS and FortiGuard real-time threat intelligence as the hardware models, in a virtual form factor. FortiGate-VM offers flexible licensing and provisioning for virtual network deployments. Support for multiple…
Over 1 year ago
We are not a user, but a service provider. ExtraHop is an enterprise cyber analytics company. ExtraHop analyzes all network interactions in real-time and leverage machine learning to identify threats, deliver critical applications.Currently, most organizations have…
Over 1 year ago
AI & ML helps in proactive threat intelligence modules, risk rating. Also, to automate operations. For eg CyberArk has a module names PTA ( privilege threat analytics )
Over 1 year ago
Hi, Is there a special use case you are looking for? Please refer to these links below to know more about Fortinet AI updates https://www.fortinet.com/corpo... https://www.fortinet.com/produ...
Over 1 year ago
Okta price list is competitive. It is available online. For special pricing depends on projects, size, nature of the deal- Okta business is always available to support
Over 1 year ago
What is zero trust? Assume zero trust when someone or something requests access to work assets. You must first verify their trustworthiness before granting access. Zero Trust is rapidly becoming the security model of choice for many organisations; however, security leaders…
Over 1 year ago
Hi, Both FT and PA have compelling features for large Enterprises. I would like to add a few good points about Fortinetwhich might be helpful ( from my 13 years of engagement with them as Distributor and Partner) Fortinet:  Have higher throughput; which comes with…
Over 1 year ago
Good to read reviews from customers
Over 1 year ago
Crowdstrike USPs compared to CB and SentinelOne: 1. Very powerful Machine Learning AV 2. Device Control 3. Vulanrablity Assessment ( Sentinel One have the partial capability ) 4. AWS Partner Competency 5. Leaders and having a high rating in all major Analyst reviews…
Over 1 year ago
Ease of use ( with less training ) for the workforce of any and system knowledge. The vast amount of possible integrations and proactive security by Adaptive MFA.
Over 1 year ago
Over 1 year ago

Reviews

Questions

Answers

About 1 year ago
EPP (Endpoint Protection for Business)
About 1 year ago
Privileged Access Management (PAM)
About 1 year ago
EDR (Endpoint Detection and Response)
Over 1 year ago
Network Traffic Analysis (NTA)
Over 1 year ago
Privileged Access Management (PAM)
Over 1 year ago
Identity and Access Management as a Service (IDaaS) (IAMaaS)
Over 1 year ago
Identity and Access Management as a Service (IDaaS) (IAMaaS)

Comments

Over 1 year ago
Identity and Access Management as a Service (IDaaS) (IAMaaS)

About me

Founder & Managing Director at FOX DATA DUBAI
IT Security Sector Business Management, Technical Sales and Channel Management Professional
20 Years of Work Experience, over 14 Years in the Middle East, based in Dubai
Strong knowledge in IAM, PAM, MFA, PKI, UEM, Endpoint, Network and Application Security Business
Multiple Competence: BU Management, Account Management, Channel/ Vendor Management