We just raised a $30M Series A: Read our story

Badges

User Activity

8 months ago
Return on investment on over all product solution cost. especially hardware cost. when the licence increase due to jumpbox concept Hardware requirement also increase. secondly customisation duration cycle sd be reduse. 
Over 1 year ago
Capability                               Cylance                   Carbon Black Leverages local ML Model        Yes                          No Leverages cloud ML Model.      Not required but      No                                               adds to efficacy…
Over 1 year ago
This is one of the Identity theft issue, which means some one hack your password or account and do activity which he she is not suppose to do. basic reason of hack of your identity or password is Social engineering. second reason is system has week privilege access…
Over 1 year ago
Answered a question: How does EternalBlue work?
“EternalBlue” exploit that targeted open server message block (SMB) ports and was used to great effect in the recent WannaCry ransomware attack. Attacks leveraging the EternalBlue exploit generally follow this pattern: A vulnerable system with an open, unpatched port is…
Over 1 year ago
Answered a question: What is Mimikatz?
Protection against ransomware requires a multi-layered approach, with both preventative measures and recoverability capabilities. Due to the variety of attack methods, there is no single silver bullet that will provide comprehensive protection. As no protection is 100%…
Over 1 year ago
Answered a question: How do you backup a SAN?
There are many ways to BAckup SAN, its all depend on your company policy and industry best practice you follow.  1) Image copies 2) Disk-to-disk backups 3) Serverless backups 4) LAN-less backups My recommendation is Cloudberry MSP360 because of the following features.…
Over 1 year ago
Most Important feature is Prevention – First, this means Effectiveness, Simplicity and Performance. Additional Question to be ask to ERD solution provider. Predictive Advantage? Prevention First, Zero touch approach Easy Deployment and Management Low Performance Impact…
Over 1 year ago
ARCON | UBA is a robust tool that helps security and risk assessment teams to build a unified governance framework. The solution helps in monitoring users’ access to systems across the network. It collects and correlates detailed information about users’ activities logs and…
Over 1 year ago
If companies are not mindful of what the remote workforce is doing with confidential information, serious IT crimes such as data breaches, credential abuse, and data exfiltration can go unnoticed. Therefore, learning and predicting risky user behavior patterns is central if…
Over 1 year ago
YOU are right that earlier vulnerability assessment was very basic and done as reactive manner, after that proactive manner was introduce where it use to compare with best practice and industry threats. But now in this world of ZERO day attack we really need very Advance and…
Over 1 year ago
What I have seen and experience is every company is good at one thing which is native strength. My experience says that 3rd party backup is always good than native platform backup due to security and BCP reason. 0365 is Cloud base so you need the solution also should be…
Over 1 year ago
Over 1 year ago
Cylance: One of the fastest growing vendors in the Endpoint Security market, Cylance has built its reputation on the back of proactive and preventive antivirus technology based on artificial intelligence, machine learning, and algorithmic science. Headquartered in Irvine,…

Reviews

Questions

Over 1 year ago
Privileged Access Management (PAM)

Answers

8 months ago
User Activity Monitoring
Over 1 year ago
Endpoint Detection and Response (EDR)
Over 1 year ago
Endpoint Detection and Response (EDR)
Over 1 year ago
Endpoint Detection and Response (EDR)
Over 1 year ago
Backup and Recovery Software
Over 1 year ago
Endpoint Detection and Response (EDR)
Over 1 year ago
User Behavior Analytics - UEBA
Over 1 year ago
Backup and Recovery Software
Over 1 year ago
Endpoint Protection for Business (EPP)

About me

Paresh Makwana has more than 20 years of Data center and Cyber Security experience in financial services and has a very close working relationship with most of the CIO/CISO of banks, financial institutions, Technology vendors, and government regulators.
For the past 20 years, Paresh has been working with financial institutions to help them assess their business, operational and technical challenges, select the right Technology, vendors/partners, better understand their IT & IS TCO, and grow their customer base. His understanding of a range business, market, regulatory, and investment related issues enable him to work closely with financial institutions, consultants, vendors, and government agencies on various multi-disciplinary initiatives.
Qualifications: ( Academic & Other certifications )
Smart Cities & Critical Infrastructure Security Professional (SCCISP)
Certified Information Systems Security Professional (CISSP)
Microsoft Certified System Engineer ( MCSE)
Information Technology Infrastructure Library (ITIL)
Certified BS 7799 Lead Auditor - BSI
Diploma in Cyber Law (Mumbai Law University)
Diploma in Banking & Finance (IIBF)
Relevant Experience

● Design controls and procedures to ensure management and audit
compliance.
● Create and Implement Corporate Security Policies. Creating Security
Awareness.
● Setup and stabilize IT services, service desk, SLA management, Outage
management
● Aligning IT with business, Strategic Outsourcing and cost management
● Business Process Improvement & Organizational Efficiency and
Effectiveness
● Domain expert: Managing critical Infrastructure, application and Cyber
Security for BFSI and Critical Infrustructure.

Interesting Projects and Accomplishments