Badges

1365 Points
3 Years
Expert
Moderator
Top 5
Leaderboard

User Activity

8 months ago
IT Monitoring tools can help to identify and fix performance issues quickly. By monitoring the performance of different systems, these tools can help to identify problems early and prevent them from becoming larger issues
8 months ago
Few basic features as a must for the tools are as below Automated Device Discovery. Topology Mapping. Alerts. Customizable Reports. Multi System Monitoring. Performance Analysis. Dashboards and Visualization. Usage Monitoring.
About 1 year ago
Manage Engine OpUtils is a good tool to work with. Equally, Zabbix is also one of the best tools. Zabbix is an open-source software tool to monitor IT infrastructure such as networks, servers, virtual machines, and cloud services. Zabbix collects and displays basic metrics…
About 1 year ago
About 1 year ago
Hi, some of the best cloud compliance reporting tools are as below- * Checkpoint CloudGuard Dome9 * Nutanix Xi Beam * Qualys Cloud Platform * Sophos Cloud Optix * Symantec Control Compliance Suite
About 1 year ago
Check Point CloudGuard for cloud native security provides threat-hunting features.
About 1 year ago
Hi,Defender Cloud Security Posture Management has agentless data collection.
About 1 year ago
Hi, cross-cloud solutions can be used to prioritize critical cloud security issues.
About 1 year ago
Hi, hope the below data helps, I prepared it for my internal documentation Feature Sophos Home Premium Bitdefender Total Security Compatibility Windows, macOS, iOS, Android Windows, macOS, iOS, Android Antivirus and antispyware ✔…
About 1 year ago
Hi, A couple of low-code database solutions as per my peers are: 1) Zoho Creator 2) OutSystems  3) Kissflow
Over 1 year ago
Hi, Few patch management tools that I would recommend is as below: Atera SolarWinds Patch Manager SecPod SanerNow Patch Management. ManageEngine Patch Manager Plus LANDesk Patch Manager Shavlik GFI LanGuard
Over 1 year ago
Hi @Gulzar C ​, Some of the preferred solutions seen in educational institutes are mentioned below: Sophos. Fortinet Fortigate. Juniper SRX Firewall. SonicWall.
Over 1 year ago
Thanks for sharing.
Over 1 year ago
Over 1 year ago
A few of the gains we felt Reduced IT costs and complexity Fast, seamless user experience Reduced risk Ensures Consistent Policy Increases IT Staff Effectiveness Centralized Orchestration Threat Prevention and Reducing Risk Secure, Seamless User Access Secure Remote /…
Over 1 year ago
All the tools available in the market are equally good. It would be for you to decide on the requirements that best suit you. Some of the basic points that you need to look at when deciding on the tools is a below 1. Look for all-inclusive protection Check whether it offers…
Over 1 year ago
Hi @Linda NamayanjaPMP,CBPA,ITIL ​ Choosing the right EAM tools involves various steps that are aimed to ensure smooth integration and maximum benefits. Some points collected with the help of my peers may be of help to you. Understanding the benefits of EAM tools: Through…
Over 1 year ago
Contributed a review of SymphonyAI IT Service Management: High-availability solution that reduces costs and workload
Over 1 year ago
Hi @reviewer1384359​, @AnkurAshok ​@reviewer1514349 ​@Johnathan Bennett ​@Kush Rai ​@KamalSharma, ​ Can you please share any suggestions with @Rajashree Bemblekar ​on listing and comparing inventory discovery tools for cloud migration and project modernization?Thanks.
Over 1 year ago
@AlbaFerri , Thanks for your explanation
Over 1 year ago
Dear @reviewer1928709 ​, Hope the below mentioned link will help you  giving more insights . https://www.peerspot.com/quest...
Over 1 year ago
Almost 2 years ago
Replied to Shibu Babuchandran What is an RPA complexity matrix template?
@Nilesh Pawar , Yes it was quite insightful. Thanks for sharing such documents
Almost 2 years ago
Hi @Nagesh Y​, One of our PeerSpot experts @Nilesh Pawar ​had shared the below article. I hope it gives you some insights:  https://www.peerspot.com/artic...
Almost 2 years ago
Hi @Evgeny Belenky​ Some of the below points would help in setting the security framework for DevOps: Embrace a DevSecOps model Enforce policy & governance Automate your DevOps security processes and tools Perform comprehensive discovery Conduct vulnerability management…
Almost 2 years ago
Hi @Nilesh Pawar ​@Venkateswarlu Paturu ​@Celestine ​@Ram Chenna ​@Biswajit Mohanty ​@Okay Akdeniz, Can you please provide your inputs to @Nagesh Y ​ on creating an RPA complexity matrix template? I really appreciate your help.
Almost 2 years ago
Hi @Evgeny Belenky​ A few points that need emphasis when deciding on the EDR are as below:  1) Does the solution employ Foundational Techniques (traditional), modern techniques (next-gen), or even a combination of both? 2) How does the solution detect unknown threats. Does…
Almost 2 years ago
Hi @Dovid Gelber ​ Features to look for in a IPAM solutions Discovery and reporting of end devices, infrastructure and linkages Visual appeal Role based management DNS/DHCP integrated Customizability and integration Single pane of glass view of both physical and virtual…
Almost 2 years ago
Hi @Dovid Gelber ​ Few point that will help select a container security solution for any business Consider the entire ecosystem. Securing each container and its image is critical, but don’t ignore the rest of the container ecosystem. The orchestration platform, cloud…
Almost 2 years ago
Hi @Janet Staver​ IP Address Management (IPAM) is used to plan, track and manage information associated with a network’s Internet Protocol address space. Using IPAM software, administrators can make sure the repository of assignable IP addresses stays up-to-date.  IPAM…
Almost 2 years ago
Almost 2 years ago
Hi @reviewer1740369​ Hope this will be helpful when you have to take a call for exact differences. EDR Features:1. EDR includes real-time monitoring and detection of threats – including those that may not be easily recognized or defined by standard antivirus. Also, EDR is…
Almost 2 years ago
Hi @reviewer1740369​ When evaluating EDR vs. antivirus, it’s important to note that an Endpoint Detection and Response solution does all that the best antivirus product does – and more. Typically it is recommended other antivirus tools be removed when an EDR solution is…
Almost 2 years ago
@Amol Gajbhiye , Thanks
Almost 2 years ago
@Jack Frano Thanks for the info
Almost 2 years ago
@Paweł Wielgus Thanks 
Almost 2 years ago
Replied to Thomas H Jones II What are your use cases for SaltStack?
@Thomas H Jones II , Thanks a lot for the response
Almost 2 years ago
Replied to Thomas H Jones II What are your use cases for SaltStack?
Dear @Thomas H Jones II , Thanks for your response. Will you be able to helps us with some use cases. Thanks in Advance.
Almost 2 years ago
Hi, @Kush Gupta, @Faycal Noushi, @AliceGolakiya, @Venek Otevrel ​@NishantSingh​, Will you be able to help @Vikas_Jain ​with some use cases of SaltStack? Thanks in advance.
Almost 2 years ago
Hi, Personally, I used the below tools and solved the purpose: - Teamviewer - Anydesk - Zoho Assist - Connectwise - VNC
Almost 2 years ago
Answered a question: Why do you need a CSPM?
HI Cloud security presents different challenges compared to the risks of previous computing models. Cloud infrastructure is connected by necessity to the Internet. Because it allows for the near-instant transfer of any type of data, the Internet exposes anything connected…
Almost 2 years ago
Answered a question: Why do I need an MFT solution?
Hi MFT or managed file transfer refers to software that enables users to manage file sharing between endpoints on a network. MFT solutions are used by organizations that need to transfer sensitive information. Compared to a simple FTP server, MFT software can support…
Almost 2 years ago
Hi Enterprise agile planning (EAP) tools help organizations to make use of agile practices at scale to achieve enterprise-class agile development. This is achieved by supporting practices that are business-outcome-driven, customer-centric, collaborative and cooperative, as…
Almost 2 years ago
Zabbix would also be the right tool for container monitoring. The latest version 6.0 gives you more advantages and features.
Almost 2 years ago
Answered a question: Why use remote access tools?
Some of the benefits of Remote Access: Quick response times Cost savings Any device, any location Scripting Simplified help desk tasks Better remote working capabilities Security
Almost 2 years ago
Atlassian, Collabnet, MicroFocus and Planview.
Almost 2 years ago
M365, Slack, Asana, G Suite and Flock.
Almost 2 years ago
Hi Believe the below are the top emerging trends looking at the present market outlook. Natural Language Processing (NLP) Enhanced Cybersecurity The Metaverse Low-code and No-code Technologies Hyper automation Quantum AI The Domain of Creativity Increasing Use of AI and…
Almost 2 years ago
Hi ,@Abdulla Pathan ​@Daniel Aramayo ​@Faustine Chisasa ​@MichaelZhang ​@Umair (Abu Mohaymin) Akhlaque ​@Jaikant S Rao ​@Dawn McClure ​ Can you give your insights on Is it better for organisations to slowly consolidate and demise tools in the process of optimisation, or…
Almost 2 years ago
@TjeerdSaijoen , Thanks for the response can you help me with any use cases with riverbed. and the reason for suggesting the same.
Almost 2 years ago
@Faycal Noushi , Thanks a lot for your response
Almost 2 years ago
Replied to Shibu Babuchandran What is the best server monitoring solution?
@Evgeny Belenky  Zabbix is an open-source software tool to monitor the IT infrastructure such as networks, servers, virtual machines, and cloud services.  Zabbix collects and displays basic metrics.  Zabbix also offers automation capabilities, including automatic network…
Almost 2 years ago
Zabbix
Almost 2 years ago
Hi @Netanya Carmi​ Please find my response below: 1. Maintains Strong Cybersecurity Practices 2. Follows Encryption Protocols 3. Meets Compliance Requirements 4. Reduces Your Costs 5. Simplifies Data Transfer with Workflows 6. Deploys on Multiple Platforms 7. Comes With an…
About 2 years ago
Hi @ERNEST KUZOE ​ Some of the use  cases are as below on which i have worked with some customers, Claims Registration and Processing Underwriting Regulatory Compliance Process and Business Analytics Policy Admin and Servicing Form Registration Policy Cancellation Regards…
About 2 years ago
Hi @MichaelZhang ​,@Umair (Abu Mohaymin) Akhlaque ​@Jaikant S Rao ​@Jorge Ambrosio ​@Dawn McClure ​, Please share your views for the best ITSM tool and why. Thanks in advance.
About 2 years ago
Hi @Nilesh Pawar ​@Venkateswarlu Paturu ​@Celestine ​@Ram Chenna ​@Biswajit Mohanty, Can you please provide any inputs on how can Robotic Process Automation (RPA) help in automating tasks in the healthcare industry? Thanks in advance!
About 2 years ago
Answered a question: Why do organizations need CASB?
Cloud Access Security Brokers (CASB) are a security application that helps organizations manage and protect the data stored in the cloud Benefits of a CASB:Many companies can benefit from a CASB auto-discovery feature that will automatically report upon all applications…
About 2 years ago
Below are some of the best Practices for Identity Access Management Eliminate High Risk Systems Routine Review and Removal of Orphaned Accounts Automate Onboarding and Offboarding Develop a Zero Trust Approach to Security Use Multi-factor Authentication Centralize Your…
About 2 years ago
Hi Hope the below table explains in details about the advantage's and disadvantages. Advantages Disadvantages # Simplified deployments # Greater power requirements Streamlining the deployment of services is one of the…
About 2 years ago
At the high level the main components would be:  - Storage virtualization - Compute virtualization - Networking virtualization - Advanced management capabilities (including automation)
About 2 years ago
Hope the below will be helpful Key differences between SIEM and XDR SIEM XDR Domain coverage Multi domain coverage: Single domain coverage: TDIR – Threat detection, investigation, and response (TDIR) – Compliance…
About 2 years ago
Hi @Danielaramyo @Effort Moyo ​@reviewer1136580 ​@Ehsan-Zaidi, ​ Please share your opinion with our community.  Thanks!
About 2 years ago
@Brian Grover , Thanks for your response. any specific reason or case studies that you will be able to share.
About 2 years ago
Hi @HimanshuTejwani ​@Ram Chenna ​@Viktor Dolyna ​@Nilesh Pawar ​@Celestine ​@Biswajit Mohanty, ​ Can you please suggest @Mary Anne Halligan ​your advice on whether producing an Intelligent automation solution is better than developing plugins for SAP, Oracle, IBM, Microsoft…
About 2 years ago
About 2 years ago
Hi @Julia Frohwein ​ Summit AI IT Management Suite is a NextGen tool, Providing the best option for Service Management and Asset Management. We have been using it in our organization for last couple of years. Some of the features are available below : Empower Users With A…
About 2 years ago
About 2 years ago
@Chetan Woodun Thanks for your views.
About 2 years ago
@Alan, Thanks for your response.  Any suggestions on the tools/solutions that you have used?
About 2 years ago
Hi @Michael Bruen ​, Probably, the below data has already been published on PeerSpot and can help you identify the difference. Hope this helps. Please kindly share your views. https://www.peerspot.com/produ...
About 2 years ago
@Avraham Sonenthal Thanks for your views
About 2 years ago
Hi @Nilesh Pawar ​ @Celestine @Biswajit Mohanty ​@Ram Chenna ​@Venkateswarlu Paturu ​, Can you please suggest @Sangeeth Kannan R ​ on the feasibility of having the feature of "Exporting the bot as executable" and "Exporting the bot as a code"?
About 2 years ago
Hi @reviewer1767168 ​ Hope my below response will help you .Cloud computing is booming across a variety of industries, especially with the growth of remote work. Even though it’s a time-consuming process, the cloud can provide extensive financial benefits like budget…
About 2 years ago
@Bob Steadman , Agree to your view . Will you be able to share some insights the tool you feel were fitting your requirements and the reason.
Over 2 years ago
Over 2 years ago
@Manoj Gautam Thanks for sharing your views, so does that mean Securonix does not get integrated with EDR and other solutions.
Over 2 years ago
Hi @Amar Yelane ​ Hope the below points answers your query. Do let me know you views. Some Factors for Successful Digital Transformation1. OrientationEstablish a new perspective to drive meaningful change. If your organization is built on the “inside out” model, meaning…
Over 2 years ago
Hi@Evgeny Belenky ​ I hope the below mentioned response is appropriate to your query VIRTUALIZATION: COMMON CHALLENGES AND SOLUTIONSMoving to a virtualized environment means turning one server into a host for a group of servers that all share the same resources.…
Over 2 years ago
Hi @Evgeny Belenky​, Below are a few strategies if taken into account can reduce cybersecurity alert fatigue in SOC. 1. Threat intelligence 2. Native integration 3. Machine learning 4. Watchlists 5. UEBA (User and Entity Behavior Analytics) 6. Automation
Over 2 years ago
Hi @Celestine ​@Nilesh Pawar, ​@Venkateswarlu Paturu, ​@Biswajit Mohanty, ​@Ram Chenna Will the below point help in attributing which option to be used? 1. Ease of Implementation2. Ease of use3. Speed4. Technical Features5. Ownership Cost6. Scalability7. Architecture8.…
Over 2 years ago
@Ariful Mondal , Thanks for your response.
Over 2 years ago
Hi @Giusel There are many tools that can integrate with SIEM platforms. With our SIEM team, we have integrated AD and security monitoring tools with Splunk & Securonix. To get further information, can you share which security monitoring tools are you using and plan to…
Over 2 years ago
HI @DavidMateju​, Thanks for your response, can you let us know in more detail the reason for not outsourcing a PAM solution.
Over 2 years ago
Hi @BaijuShah  Basically, you can decide the tool based on the below criteria. -Process monitoring -Compliance monitoring -Context monitoring -Beneficiary monitoring -Financial monitoring -Organizational monitoring -Results monitoring Some of the best end-user experience…
Over 2 years ago
Over 2 years ago
Will RPA become more integrated with AI and Machine Learning techniques in 2022?
Over 2 years ago
@Celestine  Thanks for your response. 
Over 2 years ago
Hi @Nilesh Pawar ​,@Venkateswarlu Paturu ​,@Celestine ​@Biswajit Mohanty ​ Happy New Year! Need your inputs & views on Robotic Process Automation (RPA) predictions for 2022. Thanks.
Over 2 years ago
@reviewer1740369 , Thanks for your response.
Over 2 years ago
Hi @Amar Yelane, Great document! I just have a query: will this practice be the same for all verticals when implementing RPA?
Over 2 years ago
Hi @Willem De Jongh ​ Appreciate your response, will it be possible to share some use cases where in pay by use options have been implemented. 
Over 2 years ago
Hi @Amar Yelane, Thanks for the article and for giving insights on the cost-benefit analysis of the RPA program, can you help us understand how can we do the Estimation of robots needed & what would be the Refinement of Benefits in such a scenario?
Over 2 years ago
Thanks @Ram Chenna , for the detailed view.
Over 2 years ago
Hi , @Ram Chenna ​,@Celestine ​,@Biswajit Mohanty ​,@Nilesh Pawar ,@reviewer1456176.  It will be of great help if you all can provide your inputs and help the community professionals.
Over 2 years ago
Hi @reviewer1740369 This is something that I have been doing research for some time now, the question came at the right time.  The data that I could frame out is as below. I hope this helps you in some way. I'm also trying to prepare an article on the same topic shortly.…
Over 2 years ago
Hi, Looks like the 4 players below are in the Leaders position: -Dynatrace-AppDynamic-New Relic-Datadog Anyone with a new update, please kindly share.
Over 2 years ago
We can have multiple SOC models depending on the requirement and budget Dedicated or Internal SOC The enterprise sets up its own cybersecurity team within its workforce. If you decide to run your own dedicated SOC, you’ll need the personnel and expertise to fulfill all SOC…
Over 2 years ago
HI @Khalid Qureshi​ There are many products in the market for Asset Management with ITIL-complaint features to manage the complete Asset Life cycle. Like Symphony Summit AI.  Manage Engine Service Desk Plus are the ones used by me at many organizations which have delivered…
Over 2 years ago
Hi, @Nilesh Pawar ​,@Venkateswarlu Paturu ​,@Biswajit Mohanty ​,@Celestine, looking for your expert view on RPA solution architecture.
Over 2 years ago
Hi @Evgeny Belenky ​ The basic difference is mentioned below. TaskBots Front-end automation Best for: Repetitive, rules-based tasks that rely on structured data At the core of automation are Task Bots. These bots automate rules-based, repetitive tasks, in areas like…
Over 2 years ago
Hi @Evgeny Belenky ​ Cognitive security can be interpreted as the application of AI technologies patterned on human thought processes to detect threats and protect physical and digital systems. Like other cognitive computing applications, self-learning security systems…
Over 2 years ago
Hi@Evgeny Belenky ​ Would categorize the life cycle of RPA in basic 7 stages as mentioned below.  Stages of RPA Lifecycle: I. Discovery Phase It is the first and crucial phase of the RPA implementation roadmap that works with the combination of AI, human expertise, and…
Over 2 years ago
Hi @Netanya Carmi ​ Had prepared some comparison factors between AWS and Azure for one of my presales discussions, hope this will hold some insights .So depending on the requirements from the client appropriate solutions can be proposed. Widely Azure Sentinel is what has be…
Over 2 years ago
Hi @Evgeny Belenky ​ HERE ARE THE STORAGE REQUIREMENTS FOR DEEP LEARNING Deep learning workloads are a special kind of beast: all DL data is considered hot data, which raises the dilemma of not being able to employ any sort of tiered storage management solution. This is…
Over 2 years ago
Hi @George Bennett ​ Have used Jiffy.ai at one of my customer place with good feedback and closure of project as expected by the end users. Would present some of the feature Jiffy provides for document extraction below :  Document Processing is the conversion of paper-based…
Over 2 years ago
Hi @Evgeny Belenky ​ Couple of tools that I have seen being used by my colleagues to name a few with the features Agile Project Management Tools Now let’s explore a list of top Agile project management tools for small and large businesses. 1. ProofHub ProofHub is a smart…
Over 2 years ago
Hi @Jefferson Parala ​, You can decide on multiple solution in terms of features, capabilities & commercial impact, Solutions like Manage Engine ,Zabbix are best suited solutions for monitoring the infrastructure.
Over 2 years ago
@Mike Bulyk , Very true managing the internal SOC resource with good talent becomes a challenge for organizations.
Over 2 years ago
@Mohammad Al Bawab , Good and it really makes life easy and precision work to the next level.
Over 2 years ago
@Srinivas MV , Yes very true it , it makes a major impact in the implementation and usage features.
Over 2 years ago
Hello Some of the practical scenarios where NLP can be used with RPA is as below. I have seen UiPath and Automation Anywhere using NLP. Practical Applications for NLP in RPA Support Ticket Processes: Within enterprise-level organizations, multiple trouble tickets are…
Over 2 years ago
Hello Below there are views on the pros and cons of Internal SOC and SOC-as-a-Service. Pros and cons of outsourced SOC: Outsourcing pros Trained personnel. The MSSP has experienced personnel immediately available, saving the organization the time and expense of hiring and…
Over 2 years ago
Hi @Tommy_Lee ​ The ALM tools decision will largely depend on the requirements and the capabilities one requires. Had some information's on some information on the tools which i would like to share.Hope this may be of some use to you. Tool Description Pros…
Over 2 years ago
Hi @Satish Singh No single solution will 100% protect the environment. You need multiple layers of security working together, all the time, in addition to constant network monitoring. With that said, there are multiple ways to protect against advanced persistent threats.…
Over 2 years ago
Answered a question: HIPAA Compliance with JIRA
Hi,  There are no ITSM  tools that are HIPAA compliant as per my knowledge. The tools need to be tuned and configured to be compliant with Standards for Privacy of Individually Identifiable Health Information and all the security policy as per HIPAA.  The controls that HIPAA…
Over 2 years ago
Hi @Netanya Carmi​ Below are some comparisons on features and Integrations.  Azure Monitor Splunk Full observability into your applications, infrastructure, and network. It provides sophisticated tools for collecting and analyzing telemetry that…
Over 2 years ago
Hi @Netanya Carmi ​ Key Differences Between a Windows Server and a Windows Desktop Here are the key differences between a Windows server and a Windows desktop. 1. Windows Server Supports More Memory One of the main differences between a Windows server and desktop is the…
Over 2 years ago
Hi @Rony_Sklar ​ I would recommend Zabbix as it is a free and open-source tool. Zabbix is an open-source monitoring software tool for diverse IT components, including networks, servers, virtual machines (VMs) and cloud services. Zabbix provides monitoring metrics, among…
Over 2 years ago
@Michael Wilczynska  Thanks Michael, yes there are many use cases that organizations are using across verticals helping them with minimal investment and start using the services with deploying services faster.
Over 2 years ago
@Daniel Robus Thanks Daniel, and its true enterprises are gaining though RPAaaS in terms of commercial advantage and ease of operations.
Over 2 years ago
Hi @Giusel ​ Some of the best practices that I feel is as below. 1. The SOC must enable end-to-end network control Your security operations center protects the enterprise from network threats, but you need to precisely define your network boundaries to achieve this. It is a…
Over 2 years ago
Hi @reviewer1690515 AI & ML, if properly implemented within the HR domain, can greatly help. Some of the positive instances that are beneficial in every organization. • 24/7 availability. Chatbots, the friendly customer-facing feature of powerful behind-the-scenes…
Over 2 years ago
Hi @Evgeny Belenky​ Intelligent Process Automation is basically an upgraded form of robotic process automation. Unlike RPA, intelligent process automation can understand context, learn, and iterate. IPA can also handle both unstructured and structured data and supports some…
Over 2 years ago
Hi @Willem De Jongh ​, That's great information, yes pay as use is the future which will cut down the operational cost .
Over 2 years ago
Hi @Evgeny Belenky ​ Robotic process automation-as-a-service (RPAaaS) is a form of outsourcing where a service provider deploys a cloud-based software robot that uses automation, machine learning (ML), and computer vision to help clients accomplish repetitive and…
Over 2 years ago
Hi @Evgeny Belenky ​ Done Well, RPA Leads To Increasingly Engaged Employees The motivation of employees, the constructive ambition needed to operate new machines and be part of a new ecosystem, requires communication from both business and IT leaders. The benefits of RPA…
Over 2 years ago
Hi @Evgeny Belenky ​ Most common use cases where organizations can use RPA for ERP: Automated data entry in advanced ERP systems Executing document upload or download processes Filling a form on screen Comparing data fields on screen ERP integration with legacy…
Over 2 years ago
@Evgeny Belenky  Sure will have a document on the same and share
Over 2 years ago
Hi @Evgeny Belenky ​ An Interesting Agile principle adoption for the DevOps team. Hope the below is good to take on this interesting topic for discussion  XOps Began with DevOps Agile software development practices have been bubbling up to the business for some time. Since…
Over 2 years ago
Hi @Chiheb Chebbi ​ Please find some of the automate deployment for Azure Sentiel. Do respond if there are more methods for knowledge sharing. Automate Azure Sentinel Deployment Azure Sentinel is a scalable, cloud-native, security information event management (SIEM) and…
Over 2 years ago
@Silas Sialuk Thanks for getting on touch with me. Can you share me your details on shibu.b@splinfo.com. So that i can connect you with My Zabbix Subject matter expert and revert.
Over 2 years ago
Hi @Evgeny Belenky ​ In an increasingly digital world, businesses need to continually upgrade their processes to ensure a fast and efficient service. Many companies did this by migrating to the cloud, providing more computational and data agility. However, this cloud…
Over 2 years ago
@Jack Frano The number of bots required needs to be determined with the number of process automation , frequency of utilization  . This will help investing in the right number of bots and bringing cost saving. There have been instances where a single bot is utilized only for…
Over 2 years ago
@Celestine Yes very true, it has worked out well for us with some of our existing customers . Extending automation as a service to our customers has worked well and the billing has really improved .
Over 2 years ago
Hi @Celestine ​, The way forward for expanding business in RPA is to go in as (RPAaaS) Robotic Process Automation as a Service                             As a service provider and win faster. In 2020, small companies increased their spending on MSP services by more than…
Over 2 years ago
In a broad perspective when you compare Camunda & Bonita they have the below features: Camunda features: BPM Workflow Automation Automation Project Management Task Management Bonita features: BPM Workflow Automation
Over 2 years ago
Very good insights about correlation for security with performance.
Over 2 years ago
Hi @Miriam Tover ​ Some of the few points that I feel needs improvements is below : -Automated machine learning-Extraction, transformation and loading-Data modeling-Building Splunk queries -Dashboard creation-Capacity data storage for Splunk data.-Tuning Splunk analytics…
Over 2 years ago
Hi Nurit Some of the best POC that can be implemented and decide on if it suits our requirement is to take any of the below: -VDI and Desktop-as-a-Service (DaaS)-Test and Development-Edge computing-Cloud migration-Backup and DR-Logging and analytics Mistakes to avoid…
Over 2 years ago
Symphony Summit AI because  SummitAI Service Management is an ITIL verified solution that leverages the latest advances in AI, machine reasoning, analytics and automation. SummitAI helps CIOs and IT leaders of Enterprises and service providers unleash the productivity of IT…
Over 2 years ago
Hi @Madison Sophia Bennett,  This is a very good query and my response is below The way I look at this is as follows: if my requirement necessitates the below points, the project automation software should be integrated. - Collaboration. The ability to communicate and…
Over 2 years ago
Hi Netanya Basically , it all depends on the use cases for your environment and the business needs. Hope the below data may be relevant to you for identifying your needs and deciding on the appropriate product. Atlassian JIRA Product Limitations ■ Optimized for the team…
Over 2 years ago
HI @Ian McInally ​ Had made this comparison some time back, hope this helps you in deciding the tool. Why choose Jira Software Cloud over Azure DevOps (formerly VSTS)? See what makes Jira Software the #1 software development tool used by agile teams.…
Over 2 years ago
Some of the Top use cases for SIEM:  1. Authentication activities Security use cases should ensure that only legitimate users have access to the network. Implement use cases to detect attacks such as Brute Force attacks that target user credentials. Monitor the frequency of…
Over 2 years ago
Thanks for sharing its very informative
Over 2 years ago
Very informative
Over 2 years ago
@Chiheb Chebbi I hope the below test cases are helpful. Test 1 - Recon: Password SprayingTest 2 - Privilege Escalation (windows): Powershell Dropper AttacksTest 3 - Lateral Movement: PsExecTest 4 - Privilege Escalation (Linux): Failed SudoTest 5 - Malicious Code Execution:…
Over 2 years ago
Had made a comparison some time back, Hope this will clarify which fits the requirement Azure DevOps Jira 1 It is a tool provided by Microsoft to implement the DevOps lifecycle in business. It is a tool that provides project management for…
Over 2 years ago
Some of the use cases that are important and a good start would be: - Authentication activities - Account management - Connection activities - Policy-related activities
Over 2 years ago
Personally, the way I have analyzed is depending on the requirement of the organization and size of logs to be analyzed I have used the tools mentioned below for Small and medium-sized enterprises. Also, I do check for the below-mentioned minimum criteria -Real-Time…
Over 2 years ago
@Faustine Chisasa Thanks for your response. Yes integration with IOT, Docker and Kubernetes related to microservices are very much a necessity. We are creating a wish list for integration with Zabbix so that the next release 6.0 has all the Rest API and Plugins required…
Over 2 years ago
SummitAI: An AI-driven IT and Enterprise Service Management Suite Technology that propels productivity is always at the forefront. SummitAI ensures that its AI-driven knowledge intelligence helps you unleash enterprise productivity, right after its implementation. SummitAI…
Over 2 years ago
Maintaining full network visibility You can’t adequately understand your network’s performance if you don’t have full network visibility. Your company needs to be able to observe every bit of traffic that travels through your network, as well as monitor every connected…
Over 2 years ago
Network Traffic Monitor: Benefits of Network Traffic Monitoring By monitoring network traffic with PRTG, you can Avoid bandwidth and server performance bottlenecks Discover which applications use up your bandwidth Be proactive and deliver better quality of service to your…
Over 2 years ago
Splunk, ELK, AlienVault. depending on the requirement, outcome and budget.
Over 2 years ago
Agile procurement is a way of purchasing services based on the outcome required rather than the product specification. Procuring solutions in an Agile way provide the opportunity for a more flexible and collaborative experience for both buyers and suppliers Agile allows…
Over 2 years ago
Zabbix is an open-source monitoring software tool for diverse IT components, including networks, servers, virtual machines (VMs) and cloud services. Zabbix provides monitoring metrics, among others network utilization, CPU load and disk space consumption. Zabbix monitoring…
Over 2 years ago
H5 AUDITS - BUSINESS SOLUTIONS
Over 2 years ago
Zabbix is an open-source monitoring software tool for diverse IT components, including networks, servers, virtual machines (VMs) and cloud services. Zabbix provides monitoring metrics, among others network utilization, CPU load and disk space consumption. Zabbix monitoring…
Over 2 years ago
H5 has developed a solution that provides to the network administrators a business visibility via simple intuitive and complete views. H5 relies on a proven and standardized model which is easy to implement and with a low TCO (total cost of ownership) NetFlow & sFlow The…
Over 2 years ago
There is a license cost.  You pay for the support and professional services. Getting such a service helps implement Zabbix with the best practice and upgrade's in the future.  Unlike other tools, you don't worry about the number of devices being monitored as this is free…
Almost 3 years ago
Datadog: Unify logs, metrics, and traces from across your distributed infrastructure. Datadog is the leading service for cloud-scale monitoring. It is used by IT, operations, and development teams who build and operate applications that run on dynamic or hybrid cloud…
About 3 years ago
Integrate Zabbix Monitoring Solution into your IT environment in accordance with corporate requirements and specifications.
About 3 years ago
Contributed a review of Zabbix: Very mature, easy to scale, and free to use
Over 3 years ago
Zabbix is Open Source and comes at no cost....Be notified in case of any issues, guaranteed Send messages Let Zabbix fix issues automatically. Escalate problems according to flexible user-defined Service Levels. Customize messages based on recipient's role. Customize…

Projects

Over 3 years ago
NOC Implementation
NOC Implementation Ensure that critical incidents are managed effectively and professionally, resulting in the restoration of normal service quickly, efficiently and with minimal impact to customers Determine and mobilize the types of resources and levels of competencies…
Over 3 years ago
Managed Services Implementation
Managed Services Implementation Workload management among team members, including implementation of innovative ticket/case management techniques. Created and implemented a help desk call center to…
Over 2 years ago
Monitoring Solution Implementation
The client is one of the major retail suppliers of Pharma products. It manages more than 120 + pharmacies in UAE with 24 hrs. service at many stores The client needed to enhance their infrastructure capacity and implement availability and 100 % uptime of their…
Over 2 years ago
Monitoring Solution Implementation
Monitoring Solution Implementation Client Requirements The client needed to enhance their infrastructure capacity and implement availability and 100 % uptime of their infrastructure to avoid untimed incidents and resources crunch Client Challenge Areas Reactive…
Over 2 years ago
Monitoring Solution Implementation with SIEM integration
Monitoring Solution Implementation with SIEM integration Client Challenge Areas The client needed to get full visibility into a complex hybrid Infrastructure environment while deriving insights that would help minimize costly performance issues. The Enterprise Monitoring &amp…
Over 2 years ago
Satisfaction with Azure Sentinel - SIEM solution
A large retailer is currently using Azure Sentinel SIEM as its core cybersecurity analytics monitoring tool. There are several log sources running in Azure Cloud, including Azure PaaS and IaaS resources, on-premises infrastructure, and numerous SaaS applications used by the…

Reviews

SymphonyAI IT Service Management Logo
Over 1 year ago
SymphonyAI IT Service Management

Articles

Questions

About 1 year ago
Cloud Operations Analytics
About 2 years ago
Application Security Tools

Answers

About 1 year ago
IP Address Management (IPAM) Tools
About 1 year ago
Application Security Testing (AST)
About 1 year ago
Cloud Security Posture Management (CSPM)
About 1 year ago
Cloud Security Posture Management (CSPM)
About 1 year ago
Cloud Security Posture Management (CSPM)
Over 1 year ago
Secure Access Service Edge (SASE)
Over 1 year ago
Anti-Malware Tools
Over 1 year ago
Application Lifecycle Management (ALM) Suites
Almost 2 years ago
Robotic Process Automation (RPA)
Almost 2 years ago
Cloud and Data Center Security
Almost 2 years ago
Robotic Process Automation (RPA)
Almost 2 years ago
Endpoint Detection and Response (EDR)
Almost 2 years ago
IP Address Management (IPAM) Tools
Almost 2 years ago
Container Security
Almost 2 years ago
IP Address Management (IPAM) Tools
Almost 2 years ago
Configuration Management
Almost 2 years ago
Remote Access
Almost 2 years ago
Cloud Security Posture Management (CSPM)
Almost 2 years ago
Managed File Transfer (MFT)
Almost 2 years ago
Enterprise Agile Planning Tools
Almost 2 years ago
Container Monitoring
Almost 2 years ago
Remote Access
Almost 2 years ago
Enterprise Agile Planning Tools
Almost 2 years ago
Content Collaboration Platforms
Almost 2 years ago
AI Development Platforms
Almost 2 years ago
Server Monitoring
Almost 2 years ago
Managed File Transfer (MFT)
About 2 years ago
Process Automation
About 2 years ago
Cloud Access Security Brokers (CASB)
About 2 years ago
Security Information and Event Management (SIEM)
About 2 years ago
Network Monitoring Software
Over 2 years ago
Robotic Process Automation (RPA)
Over 2 years ago
Robotic Process Automation (RPA)
Over 2 years ago
Robotic Process Automation (RPA)
Over 2 years ago
Identity Management (IM)
Over 2 years ago
Application Performance Monitoring (APM) and Observability
Over 2 years ago
Robotic Process Automation (RPA)
Over 2 years ago
Data Loss Prevention (DLP)
Over 2 years ago
Security Information and Event Management (SIEM)
Over 2 years ago
Robotic Process Automation (RPA)
Over 2 years ago
Project Management Software
Over 2 years ago
Robotic Process Automation (RPA)
Over 2 years ago
Help Desk Software
Over 2 years ago
Log Management
Over 2 years ago
Operating Systems (OS) for Business
Over 2 years ago
Cloud Monitoring Software
Over 2 years ago
Information Security and Risk Consulting Services
Over 2 years ago
Applicant Tracking and Recruiting Software
Over 2 years ago
Robotic Process Automation (RPA)
Over 2 years ago
Robotic Process Automation (RPA)
Over 2 years ago
Agile and DevOps Services
Over 2 years ago
Security Information and Event Management (SIEM)
Over 2 years ago
Customer Data Analysis
Over 2 years ago
Robotic Process Automation (RPA)
Over 2 years ago
Business Process Design
Over 2 years ago
Log Management
Over 2 years ago
Help Desk Software
Over 2 years ago
Application Lifecycle Management (ALM) Suites
Over 2 years ago
Security Information and Event Management (SIEM)
Over 2 years ago
Security Information and Event Management (SIEM)
Over 2 years ago
Application Lifecycle Management (ALM) Suites
Over 2 years ago
Security Information and Event Management (SIEM)
Over 2 years ago
Security Information and Event Management (SIEM)
Over 2 years ago
Help Desk Software
Over 2 years ago
Network Monitoring Software
Over 2 years ago
Network Monitoring Software
Over 2 years ago
SOC as a Service
Over 2 years ago
Procurement Software
Over 2 years ago
Application Performance Monitoring (APM) and Observability
Over 2 years ago
Network Monitoring Software
Over 2 years ago
Application Performance Monitoring (APM) and Observability

Comments

Over 1 year ago
Workload Automation
Over 2 years ago
Robotic Process Automation (RPA)
Over 2 years ago
Build Automation
Over 2 years ago
Application Performance Monitoring (APM) and Observability
Over 2 years ago
Intrusion Detection and Prevention Software (IDPS)
Over 2 years ago
Container Virtualization
About 3 years ago
Application Performance Monitoring (APM) and Observability
Over 3 years ago
Application Performance Monitoring (APM) and Observability

About me

Innovative and solutions focused IT Project Manager with more than 17+ years in network engineering and enterprise project solutions. Accustomed to provide leadership to diverse teams as well as providing technical/business liaison skills to business units. Experienced in driving technology solutions while maintaining a focus on internal and external customer satisfaction.