Badges

User Activity

5 months ago
@Mark Kaplan I don't know when you had a look, but if it was a while ago it might be worth it just to check out their site. So many solutions to so many challenges out there.
5 months ago
@Tjeerd Saijoen have you had a look at New Relic yet?
5 months ago
@Mark Kaplan have you had a look at New Relic yet?
5 months ago
First question should be, do have have a specific requirement or business need you need to address? From there you need to look at the solutions and how they answer your questions.There are quite a few solutions out there, but the type of data they ingest and the type of…
5 months ago
I would say that you need to identify your greatest need or business unit that requires the best support first.With that information you start to identify what information you require - Fault, Configuration, Accounting/Assurance, Performance, Security.Also, what type of…
5 months ago
I think this is quite an open-ended question.Since cyber security is quite a vast world, it might be better to start small. Ask yourself what it is you are looking for or need. From there you can start asking specific questions based on that need. You should then be able to…
5 months ago
The first question is - what type of cloud service are you making use of? IaaS, PaaS, SaaS (Storage and/or Software)? Do you have specific business requirements, applications, etc. that will determine the type of data you require? What kind of metrics are you looking for…
12 months ago
ExtraHop Reveal (x) is a great solution and provides a lot of visibility and features from the get-go. Don't forget all the bundles you can add and triggers that can be built in for alerting and post analysis.The best way to manage cost is to implement a visibility layer…
12 months ago
Answered a question: How does EternalBlue work?
EternalBlue exploits a vulnerability in Microsoft's implementation of the Server Message Block (SMB) protocol. This vulnerability is denoted by entry CVE-2017-0144 in the Common Vulnerabilities and Exposures (CVE) catalog. The vulnerability exists because the SMB version 1…
12 months ago
Typically I ask what information is it that I need to solve a problem or adhere to compliance. It is with that information that you can start directing the conversation. It is also important to establish your budget, but be open to adjusting if see that you might have…
Over 1 year ago
Focused on log collection and analysis. IT Operations - Predict and prevent problems with log (trap/syslog/Windows Events/ AD logs/etc.) monitoring experience Security - Assists with threat detection, investigation and response IoT - Minimize unplanned downtime and avoid…
Over 1 year ago
Dynatrace and Splunk are two different solutions that provide insight from different perspectives. Dynatrace is installed on servers/applications to provide APM and Splunk is more a log and data analytics solution that processes logs (traps/syslog/Windows Events/Firewall…

Interesting Projects and Accomplishments