Firewalls

Sanjay Gurav

At Batlivala and Karani Securities, Sanjay Gurav implemented synchronized security to have the best defenses to coordinated attacks which keep changing rapidly.

Sandeep Jamdagni

At Ashiana Housing, Sandeep Jamdagni, built a complete security system and policy to ensure users are aware of threats and the systems and networks are secure.

Mohd Imran

L&T Financial Services revamped the security architecture with multiple layer defense with proactive security monitoring that includes perimeter security, intrusion prevention system, web application security and endpoint security to ensure applications, computers, data, and network is defended from emerging cyber-threats, attack, unauthorized access or damage.

Mahesh Chandra Srivastava

At IFFCO TOKIO General Insurance Company, Mahesh Chandra Srivastava designed a solution based on next-gen firewalls with existing firewalls in the outer perimeter of DC so that they can have two-tier security. They have converged all three firewalls into single NGFW with redundancy, catering to three internet gateways from three ISPs for DC.

Sanjeev Lamba

Sanjeev Lamba led the consolidation of IT teams for better control over IT infra and end user services at UNOMinda Group.

Fortinet introduces ML capabilities to its FortiWeb web application firewall

The new innovations to FortiWeb provide a dramatic increase in detecting web application threats with nearly 100 percent accuracy.

AMP appoints data scientist to cyber team to meet ‘audacious’ target

Last year, AMP’s cyber team took a “fairly audacious target” to the board: bring down the number of cyber security vulnerabilities across the company by ten to 15 per cent every month.

Cisco’s David Goeckeler talks security, networking, software and SD-WAN outlook

Goeckeler, Cisco executive vice president and general manager, masterminds the company’s network and security strategy which now features ever more emphasis on software.

Cloud security doesn’t raise alarm bells: Jay Chaudhry, Zscaler

The shiny network appliances in organizations’ security infra are irrelevant as cloud is now a professionally managed utility, says Jay Chaudhry, founder & CEO at Zscaler.

Why you need centralized logging and event log management

Collecting too much log data overwhelms systems and staff. Centralized event log management lets you filter for the most significant security data.

Robust security with 99.99 percent uptime – LogMeIn CISO tells us how it’s done

From taming the DevOps beast to building a highly resilient architecture, Gerald Beuchelt, CISO at LogMeIn shares his strategy to thrive in the rapidly changing threat landscape.

Why blockchain isn’t always the answer

Blockchain vendors are touting the technology as a solution to many security (and other) problems. Consider costs and alternatives before jumping on the bandwagon.