SlideShare a Scribd company logo
1 of 1
Tools and Technologies I've utilized with Smoothwall security solutions:
Linux & Scripting
• Linux command line tools, Python and bash scripting
• HTML, Perl, and CGI scripts; Apache web server; Squid proxy service
• PostgreSQL & SQLite databases
Networking & Firewalls
• Zone-based firewall and DMZ management, ACLs, port-forwarding; IDS & IPS
• Cisco ASAs, routers, and switches, VLANs, ISP connections
• Sonicwall firewalls, iptables, load balancers, and hardware failover
• SNMP, netstat, Wireshark, tcpdump, iPerf, security monitoring, logging, & reporting
Wireless & Mobile Devices
• RADIUS/AAA; WLAN assessment and connectivity
• Mobile Device Managment (MDM), Apple iOS & iPads; Android
• Google Apps & Chromebooks; Apple MacBooks
Security & Remote Access
• Anti-malware, anti-spam, e-mail relay, QoS, VoIP, DNS; DHCP
• PKI, certificate management, SSL/TLS, and L2TP & IPsec VPNs
• Web content filtering and policy management; proxy authentication
• Threat assessment & mitigation assistance (malware, DDOS, spam, etc.)
• SSH, RDP, VNC, PuTTY, Logmein, join.me, Skype; TeamViewer
Operating Systems & Client Infrastructure
• Windows XP/7/8, Windows 2003/2008/R2, Ubuntu Linux, and Mac OS X
• MS Active Directory, Novell eDirectory, Linux/Apple OpenDirectory; Kerberos/LDAP
• Amazon Web Services (EC2 instance provisioning), VMWare ESX
• SalesForce, Kyako, and MS Office (MS Word, MS Excel, etc.)

More Related Content

Similar to Detail

Introduction to information security field
Introduction to information security fieldIntroduction to information security field
Introduction to information security fieldAhmed Musaad
 
Daitan Group Company Overview
Daitan Group Company OverviewDaitan Group Company Overview
Daitan Group Company OverviewDaitan Group
 
Blueprint for creating a Secure IoT Product
Blueprint for creating a Secure IoT ProductBlueprint for creating a Secure IoT Product
Blueprint for creating a Secure IoT ProductGuy Vinograd ☁
 
Guy Jaszewski - In Depth Background Info
Guy Jaszewski - In Depth Background InfoGuy Jaszewski - In Depth Background Info
Guy Jaszewski - In Depth Background InfoGuy Jaszewski
 
Enterprise Network Monitoring Software by ServicePilot
Enterprise Network Monitoring Software by ServicePilotEnterprise Network Monitoring Software by ServicePilot
Enterprise Network Monitoring Software by ServicePilotServicePilot
 
CyberoamNGFWTechSheet
CyberoamNGFWTechSheetCyberoamNGFWTechSheet
CyberoamNGFWTechSheetMaliha Ali
 
CyberoamNGFWTechSheet
CyberoamNGFWTechSheetCyberoamNGFWTechSheet
CyberoamNGFWTechSheetBaqar kazmi
 
CyberoamNGFWTechSheet
CyberoamNGFWTechSheetCyberoamNGFWTechSheet
CyberoamNGFWTechSheetMaliha Ali
 
CyberoamNGFWTechSheet
CyberoamNGFWTechSheetCyberoamNGFWTechSheet
CyberoamNGFWTechSheetbakar kazmi
 
Mobile security chess board - attacks & defense
Mobile security chess board - attacks & defenseMobile security chess board - attacks & defense
Mobile security chess board - attacks & defenseBlueinfy Solutions
 
Hyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challengesHyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challengesKim Bookout
 
security and compliance in the cloud
security and compliance in the cloudsecurity and compliance in the cloud
security and compliance in the cloudAjay Rathi
 

Similar to Detail (20)

GTL RIM Offerings
GTL RIM OfferingsGTL RIM Offerings
GTL RIM Offerings
 
Introduction to information security field
Introduction to information security fieldIntroduction to information security field
Introduction to information security field
 
2012 Data Center Security
2012 Data Center Security2012 Data Center Security
2012 Data Center Security
 
Freedom infotech pvt. ltd. company profile
Freedom infotech pvt. ltd. company profileFreedom infotech pvt. ltd. company profile
Freedom infotech pvt. ltd. company profile
 
UTM Cyberoam
UTM Cyberoam UTM Cyberoam
UTM Cyberoam
 
Daitan Group Company Overview
Daitan Group Company OverviewDaitan Group Company Overview
Daitan Group Company Overview
 
Blueprint for creating a Secure IoT Product
Blueprint for creating a Secure IoT ProductBlueprint for creating a Secure IoT Product
Blueprint for creating a Secure IoT Product
 
Guy Jaszewski - In Depth Background Info
Guy Jaszewski - In Depth Background InfoGuy Jaszewski - In Depth Background Info
Guy Jaszewski - In Depth Background Info
 
TruWest
TruWestTruWest
TruWest
 
Enterprise Network Monitoring Software by ServicePilot
Enterprise Network Monitoring Software by ServicePilotEnterprise Network Monitoring Software by ServicePilot
Enterprise Network Monitoring Software by ServicePilot
 
CyberoamNGFWTechSheet
CyberoamNGFWTechSheetCyberoamNGFWTechSheet
CyberoamNGFWTechSheet
 
CyberoamNGFWTechSheet
CyberoamNGFWTechSheetCyberoamNGFWTechSheet
CyberoamNGFWTechSheet
 
CyberoamNGFWTechSheet
CyberoamNGFWTechSheetCyberoamNGFWTechSheet
CyberoamNGFWTechSheet
 
CyberoamNGFWTechSheet
CyberoamNGFWTechSheetCyberoamNGFWTechSheet
CyberoamNGFWTechSheet
 
CyberoamNGFWTechSheet
CyberoamNGFWTechSheetCyberoamNGFWTechSheet
CyberoamNGFWTechSheet
 
Mobile security chess board - attacks & defense
Mobile security chess board - attacks & defenseMobile security chess board - attacks & defense
Mobile security chess board - attacks & defense
 
Hyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challengesHyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challenges
 
Xaas infotech (2)
Xaas infotech (2)Xaas infotech (2)
Xaas infotech (2)
 
Webinar- Internet of Things: Application Frameworks in IoT
Webinar- Internet of Things: Application Frameworks in IoTWebinar- Internet of Things: Application Frameworks in IoT
Webinar- Internet of Things: Application Frameworks in IoT
 
security and compliance in the cloud
security and compliance in the cloudsecurity and compliance in the cloud
security and compliance in the cloud
 

Detail

  • 1. Tools and Technologies I've utilized with Smoothwall security solutions: Linux & Scripting • Linux command line tools, Python and bash scripting • HTML, Perl, and CGI scripts; Apache web server; Squid proxy service • PostgreSQL & SQLite databases Networking & Firewalls • Zone-based firewall and DMZ management, ACLs, port-forwarding; IDS & IPS • Cisco ASAs, routers, and switches, VLANs, ISP connections • Sonicwall firewalls, iptables, load balancers, and hardware failover • SNMP, netstat, Wireshark, tcpdump, iPerf, security monitoring, logging, & reporting Wireless & Mobile Devices • RADIUS/AAA; WLAN assessment and connectivity • Mobile Device Managment (MDM), Apple iOS & iPads; Android • Google Apps & Chromebooks; Apple MacBooks Security & Remote Access • Anti-malware, anti-spam, e-mail relay, QoS, VoIP, DNS; DHCP • PKI, certificate management, SSL/TLS, and L2TP & IPsec VPNs • Web content filtering and policy management; proxy authentication • Threat assessment & mitigation assistance (malware, DDOS, spam, etc.) • SSH, RDP, VNC, PuTTY, Logmein, join.me, Skype; TeamViewer Operating Systems & Client Infrastructure • Windows XP/7/8, Windows 2003/2008/R2, Ubuntu Linux, and Mac OS X • MS Active Directory, Novell eDirectory, Linux/Apple OpenDirectory; Kerberos/LDAP • Amazon Web Services (EC2 instance provisioning), VMWare ESX • SalesForce, Kyako, and MS Office (MS Word, MS Excel, etc.)