Badges

User Activity

3 days ago
PAM, PIM and PAS and acronyms are related to the same thing: (PAM) solutions control and monitor access “privileged access” by these special users. In an enterprise environment, “privileged access” is a term used to designate special access or abilities above and beyond…
14 days ago
Next-Generation Antivirus (NGAV) uses a combination of artificial intelligence, behavioural detection, machine learning algorithms, and exploit mitigation, so known and unknown threats can be anticipated and immediately prevented. NGAV is cloud-based, which allows it to be…
About 2 months ago
FortiGate VM  FortiGate-VM delivers the same FortiOS and FortiGuard real-time threat intelligence as the hardware models, in a virtual form factor. FortiGate-VM offers flexible licensing and provisioning for virtual network deployments. Support for multiple…
About 2 months ago
We are not a user, but a service provider. ExtraHop is an enterprise cyber analytics company. ExtraHop analyzes all network interactions in real-time and leverage machine learning to identify threats, deliver critical applications.Currently, most organizations have…
2 months ago
AI & ML helps in proactive threat intelligence modules, risk rating. Also, to automate operations. For eg CyberArk has a module names PTA ( privilege threat analytics )
3 months ago
Hi, Is there a special use case you are looking for? Please refer to these links below to know more about Fortinet AI updates https://www.fortinet.com/corpo... https://www.fortinet.com/produ...
3 months ago
Okta price list is competitive. It is available online. For special pricing depends on projects, size, nature of the deal- Okta business is always available to support
3 months ago
What is zero trust? Assume zero trust when someone or something requests access to work assets. You must first verify their trustworthiness before granting access. Zero Trust is rapidly becoming the security model of choice for many organisations; however, security leaders…
4 months ago
Hi, Both FT and PA have compelling features for large Enterprises. I would like to add a few good points about Fortinetwhich might be helpful ( from my 13 years of engagement with them as Distributor and Partner) Fortinet:  Have higher throughput; which comes with…
5 months ago
Good to read reviews from customers
5 months ago
Crowdstrike USPs compared to CB and SentinelOne: 1. Very powerful Machine Learning AV 2. Device Control 3. Vulanrablity Assessment ( Sentinel One have the partial capability ) 4. AWS Partner Competency 5. Leaders and having a high rating in all major Analyst reviews…
5 months ago
Ease of use ( with less training ) for the workforce of any and system knowledge. The vast amount of possible integrations and proactive security by Adaptive MFA.

Reviews

Questions

Answers

3 days ago
Privileged Access Management (PAM)
14 days ago
Endpoint Detection and Response (EDR)
About 2 months ago
Network Traffic Analysis (NTA)
2 months ago
Privileged Access Management (PAM)
3 months ago
Identity and Access Management as a Service (IDaaS) (IAMaaS)
5 months ago
Identity and Access Management as a Service (IDaaS) (IAMaaS)

Comments

5 months ago
Identity and Access Management as a Service (IDaaS) (IAMaaS)

About me

Founder & Managing Director at FOX DATA DUBAI
IT Security Sector Business Management, Technical Sales and Channel Management Professional
20 Years of Work Experience, over 14 Years in the Middle East, based in Dubai
Strong knowledge in IAM, PAM, MFA, PKI, UEM, Endpoint, Network and Application Security Business
Multiple Competence: BU Management, Account Management, Channel/ Vendor Management