Personal Information
Organization / Workplace
Beijing City, China China
Occupation
Solution General Manager, Security at Dimension Data
Industry
Technology / Software / Internet
About
Over ten year’s relevant experience in Computer and IP Network and Security related areas
PMI Certified Project Management Professional received in August 2007
Cisco Certified Internetwork Expert in Security received in July 2005
Cisco Certified Internetwork Expert in Routing and Switching received in April 2004
Microsoft Certified System Engineer received in 2001
Familiar with Cisco/ Palo Alto/ Bluecoat/ Checkpoint/ Juniper/ McAfee/ Tipping Point/ F5 security products
In-depth experience with Router, Switch, Firewall, Intrusion Detection Systems, VPN gateway, Security auditing and Application filtering toolsets
Likes
(31)Public Cloud Security Blueprint
Amazon Web Services
•
4 years ago
M2M Telematics & Predictive Analytics White Paper by Gopalakrishna
Gopalakrishna Palem
•
10 years ago
Telematics In China
bensya
•
11 years ago
Cloud computing security issues and challenges
Kresimir Popovic
•
12 years ago
Cloud Computing- Proposal (Autosaved)
Zuhair Haroon khan
•
9 years ago
A study on security issues in cloud based e learning
Manimaran A
•
8 years ago
Issues of cloud security and its implications
eSAT Publishing House
•
9 years ago
Literature Review: Security on cloud computing
Suranga Nisiwasala
•
8 years ago
Cloud Computing Security
Dhaval Dave
•
11 years ago
Security challenges of cloud computing
Md. Hasibur Rashid
•
10 years ago
Cloud Security Issues 1.04.10
Rugby7277
•
14 years ago
security Issues of cloud computing
prachupanchal
•
9 years ago
Issues in cloud computing
ronak patel
•
12 years ago
Cloud computing-security-issues
Aleem Mohammed
•
9 years ago
Investigative analysis of security issues and challenges in cloud computing and their counter measures
IAEME Publication
•
9 years ago
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
Venkateswar Reddy Melachervu
•
10 years ago
Cloud Computing Security Issues
Discover Cloud Computing
•
13 years ago
Journey Through The Cloud - Security Best Practices
Amazon Web Services
•
8 years ago
Planning and Deploying an Effective Vulnerability Management Program
Sasha Nunke
•
15 years ago
Implementing Vulnerability Management
Argyle Executive Forum
•
9 years ago
Asset, Vulnerability, Threat, Risk & Control
Muhammad Faisal Naqvi, CISSP, CISA, AMBCI, ITIL, ISMS LA n Master
•
13 years ago
How to Test Security and Vulnerability of Your Android and iOS Apps
Bitbar
•
10 years ago
Black Hat 2014: Don’t be a Target: Everything You Know About Vulnerability Prioritization is Wrong
Skybox Security
•
9 years ago
Risk Assessment Process NIST 800-30
timmcguinness
•
17 years ago
What's Wrong with Vulnerability Management & How Can We Fix It
Skybox Security
•
8 years ago
Web Application Security Vulnerability Management Framework
jpubal
•
9 years ago
Info Security - Vulnerability Assessment
Marcelo Silva
•
11 years ago
Eight Steps to an Effective Vulnerability Assessment
Sirius
•
8 years ago
Personal Information
Organization / Workplace
Beijing City, China China
Occupation
Solution General Manager, Security at Dimension Data
Industry
Technology / Software / Internet
About
Over ten year’s relevant experience in Computer and IP Network and Security related areas
PMI Certified Project Management Professional received in August 2007
Cisco Certified Internetwork Expert in Security received in July 2005
Cisco Certified Internetwork Expert in Routing and Switching received in April 2004
Microsoft Certified System Engineer received in 2001
Familiar with Cisco/ Palo Alto/ Bluecoat/ Checkpoint/ Juniper/ McAfee/ Tipping Point/ F5 security products
In-depth experience with Router, Switch, Firewall, Intrusion Detection Systems, VPN gateway, Security auditing and Application filtering toolsets