CISO Platform
  • Female
  • bangalore
  • India
  • CISOPlatform
Share on Facebook

CISO Platform's Friends

  • Prasanta Bhattacharjee
  • SUSHIL KUMAR SHARMA
  • Sanket Daptardar
  • Tushar Kanchan
  • Anand Anwekar
  • Rajesh R Nair
  • Dhananjay Rokde
  • Yatendra Kumar
  • Priyanka Aash
  • Amit Pradhan
  • Satish Papnoi
  • Rajit Kartha
  • Vishal Jaitak
  • Bikram Seth
  • Prashant Deo

CISO Platform's Discussions

Can anyone share their experiences with DNIF and aujas as they are their partner for implementation

Started Oct 4 0 Replies

Anyone can share their experiences with DNIF and aujas as they are their partner for implementation (question posted on behalf of a CISO member) Continue

Need Views on Concept Shifting The Security to Left

Started Sep 27 0 Replies

Concept Shifting the Security to Left.. to get views and is it practical? Also how and what tools & processes required for it to be successful ?  (question posted on behalf of a CISO member) Continue

Wanted To Get Feedback on Arcon, for Privilege Account/Access management

Started this discussion. Last reply by CISO Platform Sep 4. 1 Reply

Anyone using Arcon, for Privilege Account/Access management? Wanted to get feedback? (question posted on behalf of a CISO member) Continue

Has anybody tested Forescout solution to identify the complete repository of IT Inventory?

Started this discussion. Last reply by CISO Platform Sep 2. 3 Replies

Hello, has anybody tested Forescout solution to identify the complete repository of IT Inventory? How successful it is and what were your observations?  (question posted on behalf of a CISO member) Continue

 

Welcome, Priyanka Aash!

Profile Information

Company
CISOPlatform

Comment Wall (24 comments)

You need to be a member of CISO Platform to join the discussion!

Join CISO Platform

At 10:55am on April 15, 2013, Jayaramachandran Rajendran said…

Per the email address it was a She :)

So, looks like maintaining genuine identity on many areas still is a huge security and privacy concern.And how many are you are trying to address it withing technology?

And how many of you think that Spam can be used positively too?

At 2:16pm on April 13, 2013, Jayaramachandran Rajendran said…

Thank you! Surprised to recieve spams from this portal...Otherwise hope to get the best out of this networking portal..

 

At 12:06pm on March 19, 2013, Parasuram M R said…

Thank you very much !

At 7:51pm on March 18, 2013, Jaideep Khanduja said…

Thanks...

At 6:51pm on March 15, 2013, Sachin Kharade said…

Thanks....

At 5:49pm on March 14, 2013, Heramba Naik said…

Thanks to all.

"Information without Information Security is just like sending letter without an envelope".

At 2:53pm on February 11, 2013, Vaman Amarjeet G Kini said…

Thanks Priyanka 

At 2:17am on January 26, 2013, ashish bansal said…

Thank you Priyanka

At 3:48pm on January 23, 2013, G Aswathanarayana Rao said…

Thanks for inviting me

At 3:18pm on January 23, 2013, Pradeep K. Yadav said…

Thanks to All he earlier members and to you Priyanka.
Pradeep Yadav

CISO Platform's Blog

Learn More About the Key Use Cases Of Network ATP Technology

Posted on September 4, 2019 at 12:37pm 0 Comments

Advanced Threat Protection (ATP) is used to protect against sophisticated, highly skilled, well funded and motivated threat actor . The solution uncovers advance threats across Endpoints, Network, Email and Cloud. These solutions are used to detect advanced persistent threats that existing controls are not able to detect or are simply not capable of doing it.

Advance threat protection is not about a single security solution, It is about a combination of security…

Continue

Key Program Metrics of Endpoint Detection and Response (EDR)

Posted on September 4, 2019 at 11:28am 0 Comments

An emerging technology, Endpoint Detection and Response (EDR) constitutes a set of tools and solutions that enterprises use to detect, investigate and mitigate suspicious activities on hosts and endpoints. The term was originally called as Endpoint Threat Detection and Response (ETDR) but it is more popular as EDR.

Key Program Metrics:

Level of…

Continue

Key Program Metrics for Threat Intelligence (TI)

Posted on September 3, 2019 at 2:18pm 0 Comments

Threat Intelligence Program is a set of people, process and technology which enables you to proactively Identify, collect, enrich and analyze threat information, strategic and tactical, so that your organization is ever ready to defend and respond to any kind of cyber attacks. Threat intelligence as applied in conventional security is  any information that helps you tune your security defenses, build an effective response program for any contingency and also if required take preemptive…

Continue

How to choose your Security / Penetration Testing Vendor?

Posted on September 3, 2019 at 9:30am 0 Comments

A common question is why should we get a third party penetration testing company? Why not choose a team from your current technical group to handle the network security test? For one, security audits like traditional financial audits are better done by outside companies with no bias and partiality to anyone or anything within your organization. Another reason to hire a security testing company is that one may find it difficult to hire and retain Penetration Testers.…

Continue
 
 
 

© 2019   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service