IT Central Station is now PeerSpot: Here's why

Badges

User Activity

Over 1 year ago
Return on investment on over all product solution cost. especially hardware cost. when the licence increase due to jumpbox concept Hardware requirement also increase. secondly customisation duration cycle sd be reduse. 
Almost 2 years ago
Capability                               Cylance                   Carbon Black Leverages local ML Model        Yes                          No Leverages cloud ML Model.      Not required but      No                                               adds to efficacy…
Almost 2 years ago
Almost 2 years ago
Contributed a review of ARCON User Behaviour Analytics: Great compliance, good session monitoring, and an excellent live dashboard
Almost 2 years ago
This is one of the Identity theft issue, which means some one hack your password or account and do activity which he she is not suppose to do. basic reason of hack of your identity or password is Social engineering. second reason is system has week privilege access…
Almost 2 years ago
Answered a question: How does EternalBlue work?
“EternalBlue” exploit that targeted open server message block (SMB) ports and was used to great effect in the recent WannaCry ransomware attack. Attacks leveraging the EternalBlue exploit generally follow this pattern: A vulnerable system with an open, unpatched port is…
About 2 years ago
Answered a question: What is Mimikatz?
Protection against ransomware requires a multi-layered approach, with both preventative measures and recoverability capabilities. Due to the variety of attack methods, there is no single silver bullet that will provide comprehensive protection. As no protection is 100%…
About 2 years ago
Answered a question: How do you backup a SAN?
There are many ways to BAckup SAN, its all depend on your company policy and industry best practice you follow.  1) Image copies 2) Disk-to-disk backups 3) Serverless backups 4) LAN-less backups My recommendation is Cloudberry MSP360 because of the following features.…
About 2 years ago
Most Important feature is Prevention – First, this means Effectiveness, Simplicity and Performance. Additional Question to be ask to ERD solution provider. Predictive Advantage? Prevention First, Zero touch approach Easy Deployment and Management Low Performance Impact…
About 2 years ago
ARCON | UBA is a robust tool that helps security and risk assessment teams to build a unified governance framework. The solution helps in monitoring users’ access to systems across the network. It collects and correlates detailed information about users’ activities logs and…
About 2 years ago
If companies are not mindful of what the remote workforce is doing with confidential information, serious IT crimes such as data breaches, credential abuse, and data exfiltration can go unnoticed. Therefore, learning and predicting risky user behavior patterns is central if…
About 2 years ago
YOU are right that earlier vulnerability assessment was very basic and done as reactive manner, after that proactive manner was introduce where it use to compare with best practice and industry threats. But now in this world of ZERO day attack we really need very Advance and…
About 2 years ago
What I have seen and experience is every company is good at one thing which is native strength. My experience says that 3rd party backup is always good than native platform backup due to security and BCP reason. 0365 is Cloud base so you need the solution also should be…
About 2 years ago
About 2 years ago
Cylance: One of the fastest growing vendors in the Endpoint Security market, Cylance has built its reputation on the back of proactive and preventive antivirus technology based on artificial intelligence, machine learning, and algorithmic science. Headquartered in Irvine,…

Projects

About 2 years ago
Digital Innovator Transforms Pharmaceutical Supply Chain With Robotic
Challenge Ascent is a digital-first company, leveraging artificial intelligence and automation throughout its business processes and running critical applications in the AWS cloud. At its founding, the company relied on public internet to connect its warehouses and head…

Reviews

Questions

Answers

Over 1 year ago
User Activity Monitoring
Almost 2 years ago
Endpoint Detection and Response (EDR)
Almost 2 years ago
Endpoint Detection and Response (EDR)
About 2 years ago
Endpoint Detection and Response (EDR)
About 2 years ago
Backup and Recovery Software
About 2 years ago
Endpoint Detection and Response (EDR)
About 2 years ago
User Behavior Analytics - UEBA
About 2 years ago
Backup and Recovery Software
About 2 years ago
Endpoint Protection for Business (EPP)

About me

Paresh Makwana has more than 20 years of Data center and Cyber Security experience in financial services and has a very close working relationship with most of the CIO/CISO of banks, financial institutions, Technology vendors, and government regulators.
For the past 20 years, Paresh has been working with financial institutions to help them assess their business, operational and technical challenges, select the right Technology, vendors/partners, better understand their IT & IS TCO, and grow their customer base. His understanding of a range business, market, regulatory, and investment related issues enable him to work closely with financial institutions, consultants, vendors, and government agencies on various multi-disciplinary initiatives.
Qualifications: ( Academic & Other certifications )
Smart Cities & Critical Infrastructure Security Professional (SCCISP)
Certified Information Systems Security Professional (CISSP)
Microsoft Certified System Engineer ( MCSE)
Information Technology Infrastructure Library (ITIL)
Certified BS 7799 Lead Auditor - BSI
Diploma in Cyber Law (Mumbai Law University)
Diploma in Banking & Finance (IIBF)
Relevant Experience

● Design controls and procedures to ensure management and audit
compliance.
● Create and Implement Corporate Security Policies. Creating Security
Awareness.
● Setup and stabilize IT services, service desk, SLA management, Outage
management
● Aligning IT with business, Strategic Outsourcing and cost management
● Business Process Improvement & Organizational Efficiency and
Effectiveness
● Domain expert: Managing critical Infrastructure, application and Cyber
Security for BFSI and Critical Infrustructure.

Interesting Projects and Accomplishments