IT Central Station is now PeerSpot: Here's why

Badges

2935 Points
2 Years
Expert
Moderator
Top 5
Leaderboard

User Activity

2 days ago
Hi @Dovid Gelber ​, Features to look for in a IPAM solutions Discovery and reporting of end devices, infrastructure and linkages Visual appeal Role based management DNS/DHCP integrated Customizability and integration Single pane of glass view of both physical and virtual…
3 days ago
Hi @Dovid Gelber ​, Few point that will help select a container security solution for any business Consider the entire ecosystem. Securing each container and its image is critical, but don’t ignore the rest of the container ecosystem. The orchestration platform, cloud…
3 days ago
Hi @Janet Staver ​, IP Address Management (IPAM) is used to plan, track and manage information associated with a network’s Internet Protocol address space. Using IPAM software, administrators can make sure the repository of assignable IP addresses stays up-to-date. IPAM…
6 days ago
9 days ago
Hi @reviewer1740369​, Hope this will be helpful when you have to take a call for exact differences. EDR Features:1. EDR includes real-time monitoring and detection of threats – including those that may not be easily recognized or defined by standard antivirus. Also, EDR is…
9 days ago
Hi @reviewer1740369​, When evaluating EDR vs. antivirus, it’s important to note that an Endpoint Detection and Response solution does all that the best antivirus product does – and more. Typically it is recommended other antivirus tools be removed when an EDR solution is…
13 days ago
@Jack Frano Thanks for the info
19 days ago
Replied to Thomas H Jones II What are your use cases for SaltStack?
@Thomas H Jones II , Thanks a lot for the response
20 days ago
Replied to Thomas H Jones II What are your use cases for SaltStack?
Dear @Thomas H Jones II , Thanks for your response. Will you be able to helps us with some use cases. Thanks in Advance.
20 days ago
Hi, @Kush Gupta, @Faycal Noushi, @AliceGolakiya, @Venek Otevrel ​@NishantSingh​, Will you be able to help @Vikas_Jain ​with some use cases of SaltStack? Thanks in advance.
24 days ago
Hi, Personally, I used the below tools and solved the purpose: - Teamviewer - Anydesk - Zoho Assist - Connectwise - VNC
27 days ago
Answered a question: Why do you need a CSPM?
HI, Cloud security presents different challenges compared to the risks of previous computing models. Cloud infrastructure is connected by necessity to the Internet. Because it allows for the near-instant transfer of any type of data, the Internet exposes anything…
27 days ago
Answered a question: Why do I need an MFT solution?
Hi, MFT or managed file transfer refers to software that enables users to manage file sharing between endpoints on a network. MFT solutions are used by organizations that need to transfer sensitive information. Compared to a simple FTP server, MFT software can support…
27 days ago
Hi, Enterprise agile planning (EAP) tools help organizations to make use of agile practices at scale to achieve enterprise-class agile development. This is achieved by supporting practices that are business-outcome-driven, customer-centric, collaborative and cooperative, as…
About 1 month ago
Zabbix would also be the right tool for container monitoring. The latest version 6.0 gives you more advantages and features.
About 1 month ago
Answered a question: Why use remote access tools?
Some of the benefits of Remote Access: Quick response times Cost savings Any device, any location Scripting Simplified help desk tasks Better remote working capabilities Security
About 1 month ago
Atlassian, Collabnet, MicroFocus and Planview.
About 1 month ago
M365, Slack, Asana, G Suite and Flock.
About 1 month ago
Hi, Believe the below are the top emerging trends looking at the present market outlook. Natural Language Processing (NLP) Enhanced Cybersecurity The Metaverse Low-code and No-code Technologies Hyper automation Quantum AI The Domain of Creativity Increasing Use of AI and…
About 1 month ago
Hi ,@Abdulla Pathan ​@Daniel Aramayo ​@Faustine Chisasa ​@MichaelZhang ​@Umair (Abu Mohaymin) Akhlaque ​@Jaikant S Rao ​@Dawn McClure ​ Can you give your insights on Is it better for organisations to slowly consolidate and demise tools in the process of optimisation, or,…
About 2 months ago
@TjeerdSaijoen , Thanks for the response can you help me with any use cases with riverbed. and the reason for suggesting the same.
About 2 months ago
@Faycal Noushi , Thanks a lot for your response
About 2 months ago
Replied to Shibu Babuchandran What is the best server monitoring solution?
@Evgeny Belenky  Zabbix is an open-source software tool to monitor the IT infrastructure such as networks, servers, virtual machines, and cloud services.  Zabbix collects and displays basic metrics.  Zabbix also offers automation capabilities, including automatic…
About 2 months ago
Zabbix
About 2 months ago
Hi @Netanya Carmi​, Please find my response below: 1. Maintains Strong Cybersecurity Practices 2. Follows Encryption Protocols 3. Meets Compliance Requirements 4. Reduces Your Costs 5. Simplifies Data Transfer with Workflows 6. Deploys on Multiple Platforms 7. Comes…
2 months ago
Hi @ERNEST KUZOE ​, Some of the use  cases are as below on which i have worked with some customers, Claims Registration and Processing Underwriting Regulatory Compliance Process and Business Analytics Policy Admin and Servicing Form Registration Policy Cancellation…
2 months ago
Hi @MichaelZhang ​,@Umair (Abu Mohaymin) Akhlaque ​@Jaikant S Rao ​@Jorge Ambrosio ​@Dawn McClure ​, Please share your views for the best ITSM tool and why. Thanks in advance.
3 months ago
Hi @Nilesh Pawar ​@Venkateswarlu Paturu ​@Celestine ​@Ram Chenna ​@Biswajit Mohanty, Can you please provide any inputs on how can Robotic Process Automation (RPA) help in automating tasks in the healthcare industry? Thanks in advance!
3 months ago
Answered a question: Why do organizations need CASB?
Cloud Access Security Brokers (CASB) are a security application that helps organizations manage and protect the data stored in the cloud. Benefits of a CASB:Many companies can benefit from a CASB auto-discovery feature that will automatically report upon all applications…
4 months ago
Below are some of the best Practices for Identity Access Management Eliminate High Risk Systems Routine Review and Removal of Orphaned Accounts Automate Onboarding and Offboarding Develop a Zero Trust Approach to Security Use Multi-factor Authentication Centralize Your…
4 months ago
Hi , Hope the below table explains in details about the advantage's and disadvantages. Advantages Disadvantages # Simplified deployments # Greater power requirements Streamlining the deployment of…
4 months ago
At the high level the main components would be:  - Storage virtualization - Compute virtualization - Networking virtualization - Advanced management capabilities (including automation)
4 months ago
Hope the below will be helpful Key differences between SIEM and XDR SIEM XDR Domain coverage Multi domain coverage: Single domain coverage: TDIR – Threat detection, investigation, and response (TDIR)…
4 months ago
Hi @Danielaramyo @Effort Moyo ​@reviewer1136580 ​@Ehsan-Zaidi, ​ Please share your opinion with our community.  Thanks!
4 months ago
@Brian Grover , Thanks for your response. any specific reason or case studies that you will be able to share.
4 months ago
Hi @HimanshuTejwani ​@Ram Chenna ​@Viktor Dolyna ​@Nilesh Pawar ​@Celestine ​@Biswajit Mohanty, ​ Can you please suggest @Mary Anne Halligan ​your advice on whether producing an Intelligent automation solution is better than developing plugins for SAP, Oracle, IBM,…
5 months ago
5 months ago
Hi @Julia Frohwein ​, Summit AI IT Management Suite is a NextGen tool, Providing the best option for Service Management and Asset Management. We have been using it in our organization for last couple of years. Some of the features are available below : Empower Users With…
5 months ago
@Chetan Woodun Thanks for your views.
5 months ago
@Alan, Thanks for your response.  Any suggestions on the tools/solutions that you have used?
5 months ago
Hi @Michael Bruen ​, Probably, the below data has already been published on PeerSpot and can help you identify the difference. Hope this helps. Please kindly share your views. https://www.peerspot.com/produ...
5 months ago
@Avraham Sonenthal Thanks for your views
5 months ago
Hi @Nilesh Pawar ​ @Celestine @Biswajit Mohanty ​@Ram Chenna ​@Venkateswarlu Paturu ​, Can you please suggest @Sangeeth Kannan R ​ on the feasibility of having the feature of "Exporting the bot as executable" and "Exporting the bot as a code"?
5 months ago
Hi @reviewer1767168 ​, Hope my below response will help you .Cloud computing is booming across a variety of industries, especially with the growth of remote work. Even though it’s a time-consuming process, the cloud can provide extensive financial benefits like budget…
5 months ago
@Bob Steadman , Agree to your view . Will you be able to share some insights the tool you feel were fitting your requirements and the reason.
5 months ago
@Manoj Gautam Thanks for sharing your views, so does that mean Securonix does not get integrated with EDR and other solutions.
5 months ago
Hi @Amar Yelane ​, Hope the below points answers your query. Do let me know you views. Some Factors for Successful Digital Transformation1. OrientationEstablish a new perspective to drive meaningful change. If your organization is built on the “inside out” model, meaning…
5 months ago
Hi@Evgeny Belenky ​ I hope the below mentioned response is appropriate to your query. VIRTUALIZATION: COMMON CHALLENGES AND SOLUTIONSMoving to a virtualized environment means turning one server into a host for a group of servers that all share the same resources.…
5 months ago
Hi @Evgeny Belenky​, Below are a few strategies if taken into account can reduce cybersecurity alert fatigue in SOC. 1. Threat intelligence 2. Native integration 3. Machine learning 4. Watchlists 5. UEBA (User and Entity Behavior Analytics) 6. Automation
5 months ago
Hi @Celestine ​@Nilesh Pawar, ​@Venkateswarlu Paturu, ​@Biswajit Mohanty, ​@Ram Chenna, Will the below point help in attributing which option to be used? 1. Ease of Implementation2. Ease of use3. Speed4. Technical Features5. Ownership Cost6. Scalability7. Architecture8.…
5 months ago
@Ariful Mondal , Thanks for your response.
5 months ago
Hi @Giusel, There are many tools that can integrate with SIEM platforms. With our SIEM team, we have integrated AD and security monitoring tools with Splunk & Securonix. To get further information, can you share which security monitoring tools are you using and plan to…
5 months ago
HI @DavidMateju​, Thanks for your response, can you let us know in more detail the reason for not outsourcing a PAM solution.
6 months ago
Hi @BaijuShah , Basically, you can decide the tool based on the below criteria. -Process monitoring -Compliance monitoring -Context monitoring -Beneficiary monitoring -Financial monitoring -Organizational monitoring -Results monitoring Some of the best end-user…
6 months ago
6 months ago
Will RPA become more integrated with AI and Machine Learning techniques in 2022?
6 months ago
@Celestine  Thanks for your response. 
6 months ago
Hi @Nilesh Pawar ​,@Venkateswarlu Paturu ​,@Celestine ​@Biswajit Mohanty ​ Happy New Year! Need your inputs & views on Robotic Process Automation (RPA) predictions for 2022. Thanks.
6 months ago
@reviewer1740369 , Thanks for your response.
6 months ago
Hi @Amar Yelane, Great document! I just have a query: will this practice be the same for all verticals when implementing RPA?
6 months ago
Hi @Willem De Jongh ​ Appreciate your response, will it be possible to share some use cases where in pay by use options have been implemented. 
6 months ago
Hi @Amar Yelane, Thanks for the article and for giving insights on the cost-benefit analysis of the RPA program, can you help us understand how can we do the Estimation of robots needed & what would be the Refinement of Benefits in such a scenario?
7 months ago
Thanks @Ram Chenna , for the detailed view.
7 months ago
Hi , @Ram Chenna ​,@Celestine ​,@Biswajit Mohanty ​,@Nilesh Pawar ,@reviewer1456176.  It will be of great help if you all can provide your inputs and help the community professionals.
7 months ago
Hi @reviewer1740369, This is something that I have been doing research for some time now, the question came at the right time.  The data that I could frame out is as below. I hope this helps you in some way. I'm also trying to prepare an article on the same topic shortly.…
7 months ago
Hi, Looks like the 4 players below are in the Leaders position: -Dynatrace-AppDynamic-New Relic-Datadog Anyone with a new update, please kindly share.
7 months ago
We can have multiple SOC models depending on the requirement and budget : Dedicated or Internal SOC The enterprise sets up its own cybersecurity team within its workforce. If you decide to run your own dedicated SOC, you’ll need the personnel and expertise to fulfill all…
7 months ago
HI @Khalid Qureshi​, There are many products in the market for Asset Management with ITIL-complaint features to manage the complete Asset Life cycle. Like Symphony Summit AI.  Manage Engine Service Desk Plus are the ones used by me at many organizations which have…
7 months ago
Hi, @Nilesh Pawar ​,@Venkateswarlu Paturu ​,@Biswajit Mohanty ​,@Celestine, looking for your expert view on RPA solution architecture.
7 months ago
Hi @Evgeny Belenky ​, The basic difference is mentioned below. TaskBots Front-end automation Best for: Repetitive, rules-based tasks that rely on structured data At the core of automation are Task Bots. These bots automate rules-based, repetitive tasks, in areas like…
7 months ago
Hi @Evgeny Belenky ​, Cognitive security can be interpreted as the application of AI technologies patterned on human thought processes to detect threats and protect physical and digital systems. Like other cognitive computing applications, self-learning security systems…
7 months ago
Hi@Evgeny Belenky ​, Would categorize the life cycle of RPA in basic 7 stages as mentioned below.  Stages of RPA Lifecycle: I. Discovery Phase It is the first and crucial phase of the RPA implementation roadmap that works with the combination of AI, human expertise, and…
7 months ago
Hi @Netanya Carmi ​, Had prepared some comparison factors between AWS and Azure for one of my presales discussions, hope this will hold some insights .So depending on the requirements from the client appropriate solutions can be proposed. Widely Azure Sentinel is what has…
7 months ago
Hi @Evgeny Belenky ​, HERE ARE THE STORAGE REQUIREMENTS FOR DEEP LEARNING Deep learning workloads are a special kind of beast: all DL data is considered hot data, which raises the dilemma of not being able to employ any sort of tiered storage management solution. This is…
7 months ago
Hi @George Bennett ​, Have used Jiffy.ai at one of my customer place with good feedback and closure of project as expected by the end users. Would present some of the feature Jiffy provides for document extraction below :  Document Processing is the conversion of…
7 months ago
Hi @Evgeny Belenky ​, Couple of tools that I have seen being used by my colleagues to name a few with the features Agile Project Management Tools Now let’s explore a list of top Agile project management tools for small and large businesses. 1. ProofHub ProofHub is a…
8 months ago
Hi @Jefferson Parala ​, You can decide on multiple solution in terms of features, capabilities & commercial impact, Solutions like Manage Engine ,Zabbix are best suited solutions for monitoring the infrastructure.
8 months ago
@Mike Bulyk , Very true managing the internal SOC resource with good talent becomes a challenge for organizations.
8 months ago
@Mohammad Al Bawab , Good and it really makes life easy and precision work to the next level.
8 months ago
@Srinivas MV , Yes very true it , it makes a major impact in the implementation and usage features.
8 months ago
Hello, Some of the practical scenarios where NLP can be used with RPA is as below. I have seen UiPath and Automation Anywhere using NLP. Practical Applications for NLP in RPA Support Ticket Processes: Within enterprise-level organizations, multiple trouble tickets are…
8 months ago
Hello, Below there are views on the pros and cons of Internal SOC and SOC-as-a-Service. Pros and cons of outsourced SOC: Outsourcing pros Trained personnel. The MSSP has experienced personnel immediately available, saving the organization the time and expense of hiring…
8 months ago
Hi @Tommy_Lee ​, The ALM tools decision will largely depend on the requirements and the capabilities one requires. Had some information's on some information on the tools which i would like to share.Hope this may be of some use to you. Tool…
8 months ago
Hi @Satish Singh, No single solution will 100% protect the environment. You need multiple layers of security working together, all the time, in addition to constant network monitoring. With that said, there are multiple ways to protect against advanced persistent threats.…
8 months ago
Answered a question: HIPAA Compliance with JIRA
Hi,  There are no ITSM  tools that are HIPAA compliant as per my knowledge. The tools need to be tuned and configured to be compliant with Standards for Privacy of Individually Identifiable Health Information and all the security policy as per HIPAA.  The controls that…
8 months ago
Hi @Netanya Carmi​, Below are some comparisons on features and Integrations.  Azure Monitor Splunk Full observability into your applications, infrastructure, and network. It provides sophisticated tools for collecting and analyzing…
8 months ago
Hi @Netanya Carmi ​, Key Differences Between a Windows Server and a Windows Desktop Here are the key differences between a Windows server and a Windows desktop. 1. Windows Server Supports More Memory One of the main differences between a Windows server and desktop is the…
8 months ago
Hi @Rony_Sklar ​, I would recommend Zabbix as it is a free and open-source tool. Zabbix is an open-source monitoring software tool for diverse IT components, including networks, servers, virtual machines (VMs) and cloud services. Zabbix provides monitoring metrics, among…
8 months ago
@Michael Wilczynska  Thanks Michael, yes there are many use cases that organizations are using across verticals helping them with minimal investment and start using the services with deploying services faster.
8 months ago
@Daniel Robus Thanks Daniel, and its true enterprises are gaining though RPAaaS in terms of commercial advantage and ease of operations.
8 months ago
Hi @Giusel ​, Some of the best practices that I feel is as below. 1. The SOC must enable end-to-end network control Your security operations center protects the enterprise from network threats, but you need to precisely define your network boundaries to achieve this. It…
9 months ago
Hi @reviewer1690515, AI & ML, if properly implemented within the HR domain, can greatly help. Some of the positive instances that are beneficial in every organization. • 24/7 availability. Chatbots, the friendly customer-facing feature of powerful behind-the-scenes…
9 months ago
Hi @Evgeny Belenky​, Intelligent Process Automation is basically an upgraded form of robotic process automation. Unlike RPA, intelligent process automation can understand context, learn, and iterate. IPA can also handle both unstructured and structured data and supports…
9 months ago
Hi @Willem De Jongh ​, That's great information, yes pay as use is the future which will cut down the operational cost .
9 months ago
Hi @Evgeny Belenky ​, Robotic process automation-as-a-service (RPAaaS) is a form of outsourcing where a service provider deploys a cloud-based software robot that uses automation, machine learning (ML), and computer vision to help clients accomplish repetitive and…
9 months ago
Hi @Evgeny Belenky ​, Done Well, RPA Leads To Increasingly Engaged Employees The motivation of employees, the constructive ambition needed to operate new machines and be part of a new ecosystem, requires communication from both business and IT leaders. The benefits of RPA…
9 months ago
Hi @Evgeny Belenky ​, Most common use cases where organizations can use RPA for ERP: Automated data entry in advanced ERP systems Executing document upload or download processes Filling a form on screen Comparing data fields on screen ERP integration with legacy…
9 months ago
@Evgeny Belenky  Sure will have a document on the same and share
9 months ago
Hi @Evgeny Belenky ​, An Interesting Agile principle adoption for the DevOps team. Hope the below is good to take on this interesting topic for discussion  XOps Began with DevOps Agile software development practices have been bubbling up to the business for some time.…
9 months ago
Hi @Chiheb Chebbi ​, Please find some of the automate deployment for Azure Sentiel. Do respond if there are more methods for knowledge sharing. Automate Azure Sentinel Deployment Azure Sentinel is a scalable, cloud-native, security information event management (SIEM)…
10 months ago
@Silas Sialuk Thanks for getting on touch with me. Can you share me your details on shibu.b@splinfo.com. So that i can connect you with My Zabbix Subject matter expert and revert.
10 months ago
Hi @Evgeny Belenky ​ In an increasingly digital world, businesses need to continually upgrade their processes to ensure a fast and efficient service. Many companies did this by migrating to the cloud, providing more computational and data agility. However, this cloud…
10 months ago
@Jack Frano The number of bots required needs to be determined with the number of process automation , frequency of utilization  . This will help investing in the right number of bots and bringing cost saving. There have been instances where a single bot is utilized only for…
10 months ago
@Celestine Yes very true, it has worked out well for us with some of our existing customers . Extending automation as a service to our customers has worked well and the billing has really improved .
10 months ago
Hi @Celestine ​, The way forward for expanding business in RPA is to go in as (RPAaaS) Robotic Process Automation as a Service.                             As a service provider and win faster. In 2020, small companies increased their spending on MSP services by more than…
10 months ago
In a broad perspective when you compare Camunda & Bonita they have the below features: Camunda features: BPM Workflow Automation Automation Project Management Task Management Bonita features: BPM Workflow Automation
10 months ago
Very good insights about correlation for security with performance.
10 months ago
Hi @Miriam Tover ​, Some of the few points that I feel needs improvements is below : -Automated machine learning-Extraction, transformation and loading-Data modeling-Building Splunk queries -Dashboard creation-Capacity data storage for Splunk data.-Tuning Splunk analytics…
10 months ago
Hi Nurit, Some of the best POC that can be implemented and decide on if it suits our requirement is to take any of the below: -VDI and Desktop-as-a-Service (DaaS)-Test and Development-Edge computing-Cloud migration-Backup and DR-Logging and analytics Mistakes to avoid…
10 months ago
Symphony Summit AI because  SummitAI Service Management is an ITIL verified solution that leverages the latest advances in AI, machine reasoning, analytics and automation. SummitAI helps CIOs and IT leaders of Enterprises and service providers unleash the productivity of IT…
10 months ago
Hi @Madison Sophia Bennett,  This is a very good query and my response is below: The way I look at this is as follows: if my requirement necessitates the below points, the project automation software should be integrated. - Collaboration. The ability to communicate and…
10 months ago
Hi Netanya, Basically , it all depends on the use cases for your environment and the business needs. Hope the below data may be relevant to you for identifying your needs and deciding on the appropriate product. Atlassian JIRA Product Limitations ■ Optimized for the…
10 months ago
HI @Ian McInally ​, Had made this comparison some time back, hope this helps you in deciding the tool. Why choose Jira Software Cloud over Azure DevOps (formerly VSTS)? See what makes Jira Software the #1 software development tool used by agile teams.…
10 months ago
Some of the Top use cases for SIEM:  1. Authentication activities Security use cases should ensure that only legitimate users have access to the network. Implement use cases to detect attacks such as Brute Force attacks that target user credentials. Monitor the frequency…
11 months ago
Thanks for sharing its very informative
11 months ago
Very informative
11 months ago
@Chiheb Chebbi, I hope the below test cases are helpful. Test 1 - Recon: Password SprayingTest 2 - Privilege Escalation (windows): Powershell Dropper AttacksTest 3 - Lateral Movement: PsExecTest 4 - Privilege Escalation (Linux): Failed SudoTest 5 - Malicious Code…
11 months ago
Had made a comparison some time back, Hope this will clarify which fits the requirement. Azure DevOps Jira 1 It is a tool provided by Microsoft to implement the DevOps lifecycle in business. It is a tool that provides project…
11 months ago
Some of the use cases that are important and a good start would be: - Authentication activities - Account management - Connection activities - Policy-related activities
11 months ago
Personally, the way I have analyzed is depending on the requirement of the organization and size of logs to be analyzed I have used the tools mentioned below for Small and medium-sized enterprises. Also, I do check for the below-mentioned minimum criteria: -Real-Time…
11 months ago
@Faustine Chisasa Thanks for your response. Yes integration with IOT, Docker and Kubernetes related to microservices are very much a necessity. We are creating a wish list for integration with Zabbix so that the next release 6.0 has all the Rest API and Plugins required…
11 months ago
SummitAI: An AI-driven IT and Enterprise Service Management Suite Technology that propels productivity is always at the forefront. SummitAI ensures that its AI-driven knowledge intelligence helps you unleash enterprise productivity, right after its implementation. SummitAI…
11 months ago
Maintaining full network visibility You can’t adequately understand your network’s performance if you don’t have full network visibility. Your company needs to be able to observe every bit of traffic that travels through your network, as well as monitor every connected…
11 months ago
Network Traffic Monitor: Benefits of Network Traffic Monitoring By monitoring network traffic with PRTG, you can: Avoid bandwidth and server performance bottlenecks Discover which applications use up your bandwidth Be proactive and deliver better quality of service to…
11 months ago
Splunk, ELK, AlienVault. depending on the requirement, outcome and budget.
11 months ago
Agile procurement is a way of purchasing services based on the outcome required rather than the product specification. Procuring solutions in an Agile way provide the opportunity for a more flexible and collaborative experience for both buyers and suppliers. Agile allows…
11 months ago
Zabbix is an open-source monitoring software tool for diverse IT components, including networks, servers, virtual machines (VMs) and cloud services. Zabbix provides monitoring metrics, among others network utilization, CPU load and disk space consumption. Zabbix monitoring…
11 months ago
H5 AUDITS - BUSINESS SOLUTIONS
11 months ago
Zabbix is an open-source monitoring software tool for diverse IT components, including networks, servers, virtual machines (VMs) and cloud services. Zabbix provides monitoring metrics, among others network utilization, CPU load and disk space consumption. Zabbix monitoring…
11 months ago
H5 has developed a solution that provides to the network administrators a business visibility via simple intuitive and complete views. H5 relies on a proven and standardized model which is easy to implement and with a low TCO (total cost of ownership). NetFlow & sFlow…
11 months ago
There is a license cost.  You pay for the support and professional services. Getting such a service helps implement Zabbix with the best practice and upgrade's in the future.  Unlike other tools, you don't worry about the number of devices being monitored as this is free…
About 1 year ago
Datadog: Unify logs, metrics, and traces from across your distributed infrastructure. Datadog is the leading service for cloud-scale monitoring. It is used by IT, operations, and development teams who build and operate applications that run on dynamic or hybrid cloud…
Over 1 year ago
Integrate Zabbix Monitoring Solution into your IT environment in accordance with corporate requirements and specifications.
Over 1 year ago
Contributed a review of Zabbix: Very mature, easy to scale, and free to use
Over 1 year ago
Zabbix is Open Source and comes at no cost....Be notified in case of any issues, guaranteed Send messages Let Zabbix fix issues automatically. Escalate problems according to flexible user-defined Service Levels. Customize messages based on recipient's role. Customize…

Projects

Over 1 year ago
NOC Implementation
NOC Implementation Ensure that critical incidents are managed effectively and professionally, resulting in the restoration of normal service quickly, efficiently and with minimal impact to customers Determine and mobilize the types of resources and levels of competencies…
Over 1 year ago
Managed Services Implementation
Managed Services Implementation Workload management among team members, including implementation of innovative ticket/case management techniques. Created and implemented a help desk call center to…
11 months ago
Monitoring Solution Implementation
The client is one of the major retail suppliers of Pharma products. It manages more than 120 + pharmacies in UAE with 24 hrs. service at many stores. The client needed to enhance their infrastructure capacity and implement availability and 100 % uptime of their…
11 months ago
Monitoring Solution Implementation
Monitoring Solution Implementation Client Requirements The client needed to enhance their infrastructure capacity and implement availability and 100 % uptime of their infrastructure to avoid untimed incidents and resources crunch. Client Challenge Areas Reactive…
11 months ago
Monitoring Solution Implementation with SIEM integration
Monitoring Solution Implementation with SIEM integration Client Challenge Areas The client needed to get full visibility into a complex hybrid Infrastructure environment while deriving insights that would help minimize costly performance issues. The Enterprise Monitoring &…
9 months ago
Satisfaction with Azure Sentinel - SIEM solution
A large retailer is currently using Azure Sentinel SIEM as its core cybersecurity analytics monitoring tool. There are several log sources running in Azure Cloud, including Azure PaaS and IaaS resources, on-premises infrastructure, and numerous SaaS applications used by the…

Reviews

Articles

10 months ago

Questions

5 months ago
Application Security
5 months ago
Security Information and Event Management (SIEM)
7 months ago
Privileged Access Management (PAM)
10 months ago
Network Monitoring Software

Answers

2 days ago
IP Address Management (IPAM) Tools
3 days ago
IP Address Management (IPAM) Tools
20 days ago
Configuration Management
24 days ago
Remote Access
27 days ago
Cloud Security Posture Management (CSPM)
27 days ago
Managed File Transfer (MFT)
27 days ago
Enterprise Agile Planning Tools
About 1 month ago
Container Monitoring
About 1 month ago
Remote Access
About 1 month ago
Enterprise Agile Planning Tools
About 1 month ago
Content Collaboration Platforms
About 1 month ago
AI Development Platforms
About 2 months ago
Server Monitoring
About 2 months ago
Managed File Transfer (MFT)
3 months ago
Cloud Access Security Brokers (CASB)
4 months ago
Security Information and Event Management (SIEM)
5 months ago
Network Monitoring Software
5 months ago
Robotic Process Automation (RPA)
7 months ago
Identity Management (IM)
7 months ago
Application Performance Management (APM)
7 months ago
Robotic Process Automation (RPA)
7 months ago
Data Loss Prevention (DLP)
7 months ago
Security Information and Event Management (SIEM)
7 months ago
Project Management Software
8 months ago
Robotic Process Automation (RPA)
8 months ago
Help Desk Software
8 months ago
Operating Systems (OS) for Business
8 months ago
Cloud Monitoring Software
8 months ago
Information Security and Risk Consulting Services
9 months ago
Applicant Tracking and Recruiting Software
9 months ago
Robotic Process Automation (RPA)
9 months ago
Robotic Process Automation (RPA)
9 months ago
Agile and DevOps Services
9 months ago
Security Information and Event Management (SIEM)
10 months ago
Customer Data Analysis
10 months ago
Robotic Process Automation (RPA)
10 months ago
Business Process Design
10 months ago
Log Management
10 months ago
Application Lifecycle Management (ALM) Suites
10 months ago
Security Information and Event Management (SIEM)
11 months ago
Security Information and Event Management (SIEM)
11 months ago
Application Lifecycle Management (ALM) Suites
11 months ago
Security Information and Event Management (SIEM)
11 months ago
Security Information and Event Management (SIEM)
11 months ago
Network Monitoring Software
11 months ago
Network Monitoring Software
11 months ago
SOC as a Service
11 months ago
Procurement Software
11 months ago
Network Monitoring Software

Comments

6 months ago
Robotic Process Automation (RPA)
6 months ago
Build Automation
10 months ago
Application Performance Management (APM)
11 months ago
Intrusion Detection and Prevention Software (IDPS)
11 months ago
Container Virtualization
Over 1 year ago
Network Monitoring Software

About me

Innovative and solutions focused IT Project Manager with more than 17+ years in network engineering and enterprise project solutions. Accustomed to provide leadership to diverse teams as well as providing technical/business liaison skills to business units. Experienced in driving technology solutions while maintaining a focus on internal and external customer satisfaction.