Coming October 25: PeerSpot Awards will be announced! Learn more

Badges

User Activity

10 months ago
@Evgeny Belenky  Go through 3rd party independent testing reports, MITRE attack reports. Understanding it is a challenge, then do a PoC, and then you will be able to judge it.  S1 threat hunting capabilities, detection & protection is the real deal.
Over 1 year ago
Contributed a review of Veeam Agent for Microsoft Windows: Easy installation and useful for taking backups for end-user laptops
Over 1 year ago
Over 1 year ago
Contributed a review of Veeam Backup & Replication: A flexible and user-friendly backup solution
Almost 2 years ago
Contributed a review of Fortinet FortiWeb: Integrates very well and easy to use, configure, and manage
Almost 2 years ago
Veeam is a good easy to use backup solution. But it has some limitations when you have an HCI Infrastructure like Nutanix.  Veeam BEM though can manage the jobs in Nutanix but if I need to fetch any reports for compliance requirements, it's not available. BEM will provide…
Almost 2 years ago
The endpoint is the weakest link on the network Since we put in all the best security measures protecting the data, the users/endpoints have access to data directly, hence businesses should have the same level of security measures on the endpoints. 
Almost 2 years ago
Threat Hunting, Threat Feed and Analytics. Visibility and Co-Relation of Threats Cloud Based Management
About 2 years ago
About 2 years ago
Contributed a review of Trend Micro Endpoint Encryption: Very good interface; integration and support could be improved