This document contains a summary of Santosh K L's contact information, work experience, skills, and qualifications. Some key details include:
- Over 6 years of experience in technical services, process management, team management, and client servicing roles.
- Most recent role as a Technical Services Engineer at Curvature Singapore supporting Cisco products such as switches, routers, and firewalls.
- Previous experience as a Senior Network Engineer at Dimension Data Bangalore supporting firewall and security products from Checkpoint, Palo Alto, Cisco, and others.
- Skilled in network security, routing, switching, firewall configuration and troubleshooting, and team leadership.
The document provides a summary of Nagabhushana Rao P's qualifications and experience as a network architect. It details his 9 years of experience in infrastructure administration including networking, virtualization strategies, server consolidation, and working with various technologies like Citrix, SAP, and SharePoint. It also lists his various technical certifications and proficiency in English, Hindi, and Telugu.
Palo alto networks pcnse6 study guide feb 2015Silva_2
This document provides study materials and guidance for the Palo Alto Networks Certified Network Security Engineer (PCNSE6) certification exam. It outlines the six main topics covered on the exam, including architecture and design, core concepts, logs and reports, management, networking, and policies. For each topic, it lists the learning objectives and recommends study materials such as administrator guides, course materials, and documentation. It also provides sample exam questions for each topic along with answers. The goal of this document is to help candidates efficiently prepare for the PCNSE6 exam.
Palo Alto Networks PAN-OS 4.0 New Featureslukky753
The PA-5000 series are new next generation firewalls with throughput of up to 20Gbps. They use multiple CPUs, RAM, and hardware acceleration engines to provide security functions. The PA-5000 architecture includes a control plane for management and a high throughput data plane. GlobalProtect provides secure remote access by creating a VPN tunnel between remote clients and gateways, and enforces security policies based on host information profiles gathered from endpoints. PAN-OS 4.0 provides more granular security policies and controls, an improved user interface, and networking enhancements such as active/active high availability and IPv6 support. New security features include botnet detection, enhanced intrusion prevention signatures, and client certificate authentication for captive portals.
The document summarizes a partnership solution between Palo Alto Networks and Net Optics that provides next-generation firewall security with expanding scalability. The solution uses Palo Alto Networks PA-5000 Series firewalls, Net Optics Bypass switches, and Net Optics xBalancers. This allows customers to easily scale their deployment as needs grow while maintaining network uptime through high availability features. The Net Optics devices monitor the firewalls and balance traffic across multiple firewalls to prevent overburdening and ensure continuity of operations.
Palo Alto Networks - инновационная платформа сетевой безопасности ядром которой является next generation firewall, на базе уникальной, разработанной PA Networks технологии App-ID, обеспечивает безопасность сети на уровне приложений, пользователей и контента с использованием как физической так и виртуальной архитектуры. Решения сетевой защиты PAN соответствуют самым высоким требованиям к сетевой безопасности, как по производительности так и по функциональности, и являются безусловными лидерами отрасли, что подтверждено отчетами Gartner, количеством пользователей и растущим объемом продаж компании.
This document provides an overview of the Palo Alto Networks next generation firewall solution. It describes the key technologies of App-ID, User-ID and Content-ID that provide increased visibility and control of applications, users and content. It then summarizes the product range, deployment options, management, usability, functionality and security profiles. The firewall uses a single-pass parallel processing architecture to perform multiple functions simultaneously without significant performance impacts.
Palo alto networks next generation firewallsCastleforce
The document summarizes Palo Alto Networks next-generation firewalls which can identify applications, users, and content to provide visibility and granular control. This helps address challenges of uncontrolled use of internet applications in enterprises. The firewalls can see through ports and protocols to classify over 900 applications using techniques like App-ID, User-ID, and Content-ID. This gives IT unprecedented control over network activities.
The document provides a summary of Nagabhushana Rao P's qualifications and experience as a network architect. It details his 9 years of experience in infrastructure administration including networking, virtualization strategies, server consolidation, and working with various technologies like Citrix, SAP, and SharePoint. It also lists his various technical certifications and proficiency in English, Hindi, and Telugu.
Palo alto networks pcnse6 study guide feb 2015Silva_2
This document provides study materials and guidance for the Palo Alto Networks Certified Network Security Engineer (PCNSE6) certification exam. It outlines the six main topics covered on the exam, including architecture and design, core concepts, logs and reports, management, networking, and policies. For each topic, it lists the learning objectives and recommends study materials such as administrator guides, course materials, and documentation. It also provides sample exam questions for each topic along with answers. The goal of this document is to help candidates efficiently prepare for the PCNSE6 exam.
Palo Alto Networks PAN-OS 4.0 New Featureslukky753
The PA-5000 series are new next generation firewalls with throughput of up to 20Gbps. They use multiple CPUs, RAM, and hardware acceleration engines to provide security functions. The PA-5000 architecture includes a control plane for management and a high throughput data plane. GlobalProtect provides secure remote access by creating a VPN tunnel between remote clients and gateways, and enforces security policies based on host information profiles gathered from endpoints. PAN-OS 4.0 provides more granular security policies and controls, an improved user interface, and networking enhancements such as active/active high availability and IPv6 support. New security features include botnet detection, enhanced intrusion prevention signatures, and client certificate authentication for captive portals.
The document summarizes a partnership solution between Palo Alto Networks and Net Optics that provides next-generation firewall security with expanding scalability. The solution uses Palo Alto Networks PA-5000 Series firewalls, Net Optics Bypass switches, and Net Optics xBalancers. This allows customers to easily scale their deployment as needs grow while maintaining network uptime through high availability features. The Net Optics devices monitor the firewalls and balance traffic across multiple firewalls to prevent overburdening and ensure continuity of operations.
Palo Alto Networks - инновационная платформа сетевой безопасности ядром которой является next generation firewall, на базе уникальной, разработанной PA Networks технологии App-ID, обеспечивает безопасность сети на уровне приложений, пользователей и контента с использованием как физической так и виртуальной архитектуры. Решения сетевой защиты PAN соответствуют самым высоким требованиям к сетевой безопасности, как по производительности так и по функциональности, и являются безусловными лидерами отрасли, что подтверждено отчетами Gartner, количеством пользователей и растущим объемом продаж компании.
This document provides an overview of the Palo Alto Networks next generation firewall solution. It describes the key technologies of App-ID, User-ID and Content-ID that provide increased visibility and control of applications, users and content. It then summarizes the product range, deployment options, management, usability, functionality and security profiles. The firewall uses a single-pass parallel processing architecture to perform multiple functions simultaneously without significant performance impacts.
Palo alto networks next generation firewallsCastleforce
The document summarizes Palo Alto Networks next-generation firewalls which can identify applications, users, and content to provide visibility and granular control. This helps address challenges of uncontrolled use of internet applications in enterprises. The firewalls can see through ports and protocols to classify over 900 applications using techniques like App-ID, User-ID, and Content-ID. This gives IT unprecedented control over network activities.
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks VMworld
VMworld 2013
Bilal Malik, Palo Alto Networks
Adina Simu, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Biswajeeban Padhy is a networking professional with over 5 years of experience in networking and security roles. He has technical certifications including CCNA, CCNA Security, and CCNP. He has expertise in firewalls, VPNs, routing, switching, and more. Currently he works as a senior security engineer for Punjab National Bank, where his responsibilities include monitoring and maintaining security devices, performing traffic analysis, and resolving issues.
The document discusses the results of analyzing network traffic across 60 enterprises. It found that HTTP has become the universal protocol and video consumes the most bandwidth. Most common threats exploit popular applications. Next generation firewalls are needed that can identify applications, users, and threats to better manage risks and allow business benefits of internet applications.
This document contains the resume of Manjesh N, who is seeking a position as a Network Security Engineer. It outlines his skills and experience in networking, security, and various certifications. His experience includes over 8 years providing technical support for networking and security products from Arbor, SonicWALL, and Dell. He has extensive hands-on experience with firewalls, routers, switches, and other networking devices.
Advanced threat security - Cyber Security For The Real WorldCisco Canada
Cisco delivers intelligent cybersecurity for the real world, providing one of the industry's most comprehensive advanced threat protection portfolio of solutions and services that are integrated, pervasive, continuous and open.
Cisco's threat-centric approach to security reduces complexity, while providing unmatched visibility, continuous control and advanced threat protection across the entire attack continuum, allowing customers to act smarter and more quickly -- before, during, and after an attack.
More information on security here: http://bit.ly/1paUnZV
1) The document discusses Fortinet's Secure SD-WAN solution which provides integrated next generation firewall and SD-WAN capabilities in a single appliance. It delivers application visibility, automated response, and continuous trust assessment across hybrid WANs.
2) Fortinet's Secure SD-WAN solution helps enterprises overcome challenges with traditional MPLS WANs which can degrade cloud application performance. It provides improved application performance, cost savings, rapid provisioning, and advanced security.
3) The solution is powered by FortiGate appliances and FortiOS and provides capabilities like application-aware routing, traffic engineering, unified policy management, and zero touch deployment.
This document contains a summary of a networking professional with over 5 years of experience in networking operations and system administration. The professional is currently a senior network engineer at CSS Corp. Pvt. Ltd. in Chennai. Key skills and experience include Cisco and Juniper certifications, networking administration, troubleshooting, VPN configuration, and network security. Location preferences include Bangalore, Kerala, and Gulf regions.
This document provides an overview of Palo Alto Networks next-generation firewall technology. It discusses how traditional firewalls do not provide visibility and control over applications. Next-gen firewalls can identify applications, users, and threats within encrypted traffic using techniques like App-ID, User-ID, and Content-ID. The document also describes Palo Alto Networks hardware models and their performance capabilities for handling firewall and threat prevention workloads. It highlights key next-gen firewall features like real-time threat analysis, application control, and safe enablement of network applications.
The document is a specifications sheet for the Palo Alto Networks PA-4000 Series next-generation firewall that provides application identification, user identification, and content identification. The PA-4000 Series includes the PA-4020, PA-4050, and PA-4060 firewall platforms that deliver firewall throughput between 2-10 Gbps and support up to 2 million sessions. The firewalls are targeted for high-speed internet gateways and datacenter deployments.
The document discusses Fortinet's Secure SD-WAN solution, including how it integrates next generation firewall capabilities into the SD-WAN architecture. It provides an overview of Fortinet's SD-WAN features such as application awareness, automated failover, simplified management, and high performance. The document also highlights how Fortinet's SD-WAN solution was recommended by NSS Labs for its security effectiveness, quality of experience, and total cost of ownership.
Palo Alto Networks has evolved its security platform through three generations:
1) The next-generation firewall provided network security and cloud-delivered threat prevention services.
2) The security operating platform added advanced endpoint protection, cloud security, and automation capabilities across the platform.
3) The application framework introduced an application programming interface to integrate Palo Alto Networks applications with third-party and custom applications to enable prevention of cyberattacks through automation.
Palo Alto Networks produces next-generation firewalls that can identify applications inside encrypted traffic and allow fine-grained security policies based on applications rather than just ports. The document discusses Palo Alto Networks' products including their firewall appliances of various sizes, their management platform Panorama, their cloud-based malware analysis service WildFire, and their VPN client GlobalProtect. It presents the advantages of the company's approach over traditional firewalls that cannot inspect encrypted traffic or apply policies based on application identification.
Strong Authentication & SMS / skyguide ProjectSylvain Maret
“Zero-footprint” SMS strong authentication secures sensitive services a compagny headquartered in Geneva and is responsible for civil and military air traffic
control in both Swiss and delegated portions of airspace from neighbor countries.
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...Erin Sweeney
You face an increasing number of cyber threats that are difficult to detect and defeat. Beating them might seem like Mission: Impossible. It's not.
Palo Alto Networks and Splunk with their next-generation, best-of-breed technologies have developed a joint solution to make defeating these threats Mission: Possible. Join us on Tuesday, June 30, in Santa Clara for a workshop providing hands-on exposure to both technologies. You'll walk away knowing how to:
Prevent known and unknown threats at both the network and endpoint through a wide range of integrated technologies including: firewall, application visibility and control, cloud-based malware analysis, advanced endpoint protection, mobile workforce security, and data loss prevention (Palo Alto Networks)
Harness all the raw log files and event data generated by any user, system, or application in your IT infrastructure (aka "big data") to quickly perform Security Information Event Management (SIEM)-like use cases including: advanced threat and anomaly detection, incident investigations and forensics, and security/compliance reporting and analytics (Splunk)
Automatically pass data on threats from Splunk to Palo Alto Networks to enable automated remediation
Are you a security or networking professional looking to get hands-on experience with these next-generation technologies? Don't let your network self-destruct.
This project discusses Palo Alto Firewall and cybersecurity challenges based on the author's internship experience. The overall goal was how to protect the company from cyber threats on Palo Alto networks. Network security plays an important role in information technology. Various governments and companies take steps to prevent cybercrimes, but cyber security remains a major concern. The report focuses on challenges in cyber security and the latest security techniques. It also describes solutions provided by Palo Alto Networks and tools used to simulate the project.
Cisco Meraki offers a complete cloud-managed IT solution including wireless, switching, security, mobility management, and communications products. All products are centrally managed through a web-based dashboard for ease of deployment and management. Meraki provides these solutions to over 60 service providers globally to offer turnkey managed services for small and medium businesses as well as bespoke enterprise solutions. Key benefits of Meraki for service providers include simplified deployment, differentiated service offerings, and increased profit margins.
Key Policy Considerations When Implementing Next-Generation FirewallsAlgoSec
This presentation examines next-generation firewalls, and provides practical advice on how to effectively and efficiently manage policies in a multi-product and even multi-vendor, defense-in-depth architecture.
By watching this webcast you will learn answers to the following questions:
-What constitutes a next-generation firewall and what problems does it solve?
What are the deployment options for next-generation firewalls?
What do policies in a defense-in-depth architecture look like?
How can you efficiently manage next-generation firewalls AND traditional firewall policies?
And much more
Increasing mobile usage and device choice have exposed the unnecessary complexity and limited device support of legacy Remote Access solutions. It has also left a security hole as users circumvent corporate policy in a borderless network. This session will focus on how the AnyConnect Secure Mobility solution combines Cisco's web security and next-generation remote access technology to deliver a robust and secure enterprise mobility solution. Customers will benefit from context-aware, comprehensive and preemptive security policy enforcement, an intelligent, seamless and always-on connectivity and secure mobility across today's proliferating managed and unmanaged mobile devices. At the end of the session, attendees will have an in-depth understanding of the Cisco AnyConnect Secure Mobility solution, which integrates the Cisco AnyConnect Client, the Cisco Adaptive Service Appliance (ASA) and the Cisco Web Security Appliance (WSA). Attendees will understand recommended AnyConnect Security Mobility architectures and understand the implementation of the new solution based on current security installations.
Palo Alto Networks provides next-generation firewalls that can address all network security needs through application identification and control. Some key points:
- Founded in 2005 and now has over 1,000 employees and 11,000 enterprise customers.
- Traditional firewalls cannot adequately address today's applications that use encryption and advanced evasion techniques. Palo Alto's firewall identifies applications regardless of port or protocol to enforce fine-grained security policies.
- The firewall incorporates features like application control, user identification, content scanning, and wildfire malware analysis to safely enable applications and protect against both known and unknown threats.
The document provides a summary of Naitik Bhatt's career objective, qualifications, certifications, core competencies, technical skills, and work experience in network engineering. It details his educational background which includes a B.E in Electronics and Telecommunications. It also lists his networking certifications such as CCNA, CCNP, and Palo Alto Networks. Further, it describes his work experience of over 7 years with companies like Cisco, Alphaserve Technologies, Hewlett Packard, and Microsense, where he has gained expertise in routing, switching, firewall configuration and troubleshooting.
Finto Thomas is an Information Technology Security Consultant with over 8.5 years of experience advising large businesses and Fortune 500 companies. He has expertise in network and security architectural design, implementation, and review. Some of his skills include cyber threat intelligence, penetration testing, firewall configuration, and cloud/mobile security. He is certified in CISSP, several Cisco certifications, ITIL, and IBM Qradar. He has worked as a Project Manager at IBM India and held security roles at Wipro and Trimax Data Centre.
VMworld 2013: VMware NSX with Next-Generation Security by Palo Alto Networks VMworld
VMworld 2013
Bilal Malik, Palo Alto Networks
Adina Simu, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Biswajeeban Padhy is a networking professional with over 5 years of experience in networking and security roles. He has technical certifications including CCNA, CCNA Security, and CCNP. He has expertise in firewalls, VPNs, routing, switching, and more. Currently he works as a senior security engineer for Punjab National Bank, where his responsibilities include monitoring and maintaining security devices, performing traffic analysis, and resolving issues.
The document discusses the results of analyzing network traffic across 60 enterprises. It found that HTTP has become the universal protocol and video consumes the most bandwidth. Most common threats exploit popular applications. Next generation firewalls are needed that can identify applications, users, and threats to better manage risks and allow business benefits of internet applications.
This document contains the resume of Manjesh N, who is seeking a position as a Network Security Engineer. It outlines his skills and experience in networking, security, and various certifications. His experience includes over 8 years providing technical support for networking and security products from Arbor, SonicWALL, and Dell. He has extensive hands-on experience with firewalls, routers, switches, and other networking devices.
Advanced threat security - Cyber Security For The Real WorldCisco Canada
Cisco delivers intelligent cybersecurity for the real world, providing one of the industry's most comprehensive advanced threat protection portfolio of solutions and services that are integrated, pervasive, continuous and open.
Cisco's threat-centric approach to security reduces complexity, while providing unmatched visibility, continuous control and advanced threat protection across the entire attack continuum, allowing customers to act smarter and more quickly -- before, during, and after an attack.
More information on security here: http://bit.ly/1paUnZV
1) The document discusses Fortinet's Secure SD-WAN solution which provides integrated next generation firewall and SD-WAN capabilities in a single appliance. It delivers application visibility, automated response, and continuous trust assessment across hybrid WANs.
2) Fortinet's Secure SD-WAN solution helps enterprises overcome challenges with traditional MPLS WANs which can degrade cloud application performance. It provides improved application performance, cost savings, rapid provisioning, and advanced security.
3) The solution is powered by FortiGate appliances and FortiOS and provides capabilities like application-aware routing, traffic engineering, unified policy management, and zero touch deployment.
This document contains a summary of a networking professional with over 5 years of experience in networking operations and system administration. The professional is currently a senior network engineer at CSS Corp. Pvt. Ltd. in Chennai. Key skills and experience include Cisco and Juniper certifications, networking administration, troubleshooting, VPN configuration, and network security. Location preferences include Bangalore, Kerala, and Gulf regions.
This document provides an overview of Palo Alto Networks next-generation firewall technology. It discusses how traditional firewalls do not provide visibility and control over applications. Next-gen firewalls can identify applications, users, and threats within encrypted traffic using techniques like App-ID, User-ID, and Content-ID. The document also describes Palo Alto Networks hardware models and their performance capabilities for handling firewall and threat prevention workloads. It highlights key next-gen firewall features like real-time threat analysis, application control, and safe enablement of network applications.
The document is a specifications sheet for the Palo Alto Networks PA-4000 Series next-generation firewall that provides application identification, user identification, and content identification. The PA-4000 Series includes the PA-4020, PA-4050, and PA-4060 firewall platforms that deliver firewall throughput between 2-10 Gbps and support up to 2 million sessions. The firewalls are targeted for high-speed internet gateways and datacenter deployments.
The document discusses Fortinet's Secure SD-WAN solution, including how it integrates next generation firewall capabilities into the SD-WAN architecture. It provides an overview of Fortinet's SD-WAN features such as application awareness, automated failover, simplified management, and high performance. The document also highlights how Fortinet's SD-WAN solution was recommended by NSS Labs for its security effectiveness, quality of experience, and total cost of ownership.
Palo Alto Networks has evolved its security platform through three generations:
1) The next-generation firewall provided network security and cloud-delivered threat prevention services.
2) The security operating platform added advanced endpoint protection, cloud security, and automation capabilities across the platform.
3) The application framework introduced an application programming interface to integrate Palo Alto Networks applications with third-party and custom applications to enable prevention of cyberattacks through automation.
Palo Alto Networks produces next-generation firewalls that can identify applications inside encrypted traffic and allow fine-grained security policies based on applications rather than just ports. The document discusses Palo Alto Networks' products including their firewall appliances of various sizes, their management platform Panorama, their cloud-based malware analysis service WildFire, and their VPN client GlobalProtect. It presents the advantages of the company's approach over traditional firewalls that cannot inspect encrypted traffic or apply policies based on application identification.
Strong Authentication & SMS / skyguide ProjectSylvain Maret
“Zero-footprint” SMS strong authentication secures sensitive services a compagny headquartered in Geneva and is responsible for civil and military air traffic
control in both Swiss and delegated portions of airspace from neighbor countries.
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...Erin Sweeney
You face an increasing number of cyber threats that are difficult to detect and defeat. Beating them might seem like Mission: Impossible. It's not.
Palo Alto Networks and Splunk with their next-generation, best-of-breed technologies have developed a joint solution to make defeating these threats Mission: Possible. Join us on Tuesday, June 30, in Santa Clara for a workshop providing hands-on exposure to both technologies. You'll walk away knowing how to:
Prevent known and unknown threats at both the network and endpoint through a wide range of integrated technologies including: firewall, application visibility and control, cloud-based malware analysis, advanced endpoint protection, mobile workforce security, and data loss prevention (Palo Alto Networks)
Harness all the raw log files and event data generated by any user, system, or application in your IT infrastructure (aka "big data") to quickly perform Security Information Event Management (SIEM)-like use cases including: advanced threat and anomaly detection, incident investigations and forensics, and security/compliance reporting and analytics (Splunk)
Automatically pass data on threats from Splunk to Palo Alto Networks to enable automated remediation
Are you a security or networking professional looking to get hands-on experience with these next-generation technologies? Don't let your network self-destruct.
This project discusses Palo Alto Firewall and cybersecurity challenges based on the author's internship experience. The overall goal was how to protect the company from cyber threats on Palo Alto networks. Network security plays an important role in information technology. Various governments and companies take steps to prevent cybercrimes, but cyber security remains a major concern. The report focuses on challenges in cyber security and the latest security techniques. It also describes solutions provided by Palo Alto Networks and tools used to simulate the project.
Cisco Meraki offers a complete cloud-managed IT solution including wireless, switching, security, mobility management, and communications products. All products are centrally managed through a web-based dashboard for ease of deployment and management. Meraki provides these solutions to over 60 service providers globally to offer turnkey managed services for small and medium businesses as well as bespoke enterprise solutions. Key benefits of Meraki for service providers include simplified deployment, differentiated service offerings, and increased profit margins.
Key Policy Considerations When Implementing Next-Generation FirewallsAlgoSec
This presentation examines next-generation firewalls, and provides practical advice on how to effectively and efficiently manage policies in a multi-product and even multi-vendor, defense-in-depth architecture.
By watching this webcast you will learn answers to the following questions:
-What constitutes a next-generation firewall and what problems does it solve?
What are the deployment options for next-generation firewalls?
What do policies in a defense-in-depth architecture look like?
How can you efficiently manage next-generation firewalls AND traditional firewall policies?
And much more
Increasing mobile usage and device choice have exposed the unnecessary complexity and limited device support of legacy Remote Access solutions. It has also left a security hole as users circumvent corporate policy in a borderless network. This session will focus on how the AnyConnect Secure Mobility solution combines Cisco's web security and next-generation remote access technology to deliver a robust and secure enterprise mobility solution. Customers will benefit from context-aware, comprehensive and preemptive security policy enforcement, an intelligent, seamless and always-on connectivity and secure mobility across today's proliferating managed and unmanaged mobile devices. At the end of the session, attendees will have an in-depth understanding of the Cisco AnyConnect Secure Mobility solution, which integrates the Cisco AnyConnect Client, the Cisco Adaptive Service Appliance (ASA) and the Cisco Web Security Appliance (WSA). Attendees will understand recommended AnyConnect Security Mobility architectures and understand the implementation of the new solution based on current security installations.
Palo Alto Networks provides next-generation firewalls that can address all network security needs through application identification and control. Some key points:
- Founded in 2005 and now has over 1,000 employees and 11,000 enterprise customers.
- Traditional firewalls cannot adequately address today's applications that use encryption and advanced evasion techniques. Palo Alto's firewall identifies applications regardless of port or protocol to enforce fine-grained security policies.
- The firewall incorporates features like application control, user identification, content scanning, and wildfire malware analysis to safely enable applications and protect against both known and unknown threats.
The document provides a summary of Naitik Bhatt's career objective, qualifications, certifications, core competencies, technical skills, and work experience in network engineering. It details his educational background which includes a B.E in Electronics and Telecommunications. It also lists his networking certifications such as CCNA, CCNP, and Palo Alto Networks. Further, it describes his work experience of over 7 years with companies like Cisco, Alphaserve Technologies, Hewlett Packard, and Microsense, where he has gained expertise in routing, switching, firewall configuration and troubleshooting.
Finto Thomas is an Information Technology Security Consultant with over 8.5 years of experience advising large businesses and Fortune 500 companies. He has expertise in network and security architectural design, implementation, and review. Some of his skills include cyber threat intelligence, penetration testing, firewall configuration, and cloud/mobile security. He is certified in CISSP, several Cisco certifications, ITIL, and IBM Qradar. He has worked as a Project Manager at IBM India and held security roles at Wipro and Trimax Data Centre.
Varun Bhatia is a network security engineer seeking a responsible position to contribute to organizational goals. He has a bachelor's degree in computer science and holds Cisco CCIE-Security and PCNSE certifications. He has over 3 years of experience in network engineering roles, including configuring Cisco routers, switches, firewalls, and VPNs. Currently he works as a security implementation and design analyst, where he drafts security plans, contributes to design discussions, and ensures BT security requirements are considered in new services. He is proficient in English and Hindi and aims to continuously acquire new skills.
This document is a resume for Faheem Iqbal Ansari. It summarizes his objective to utilize his technical, management, and interpersonal skills in the field of information technology. It then lists his professional experience implementing IT infrastructure solutions including unified communications, contact centers, networking, security, and Microsoft/Cisco integration projects for various organizations in Pakistan. His technical skills and professional certifications from Cisco, Juniper, Microsoft, and other vendors are also outlined.
This document provides a summary of Tianqiang Yu's work experience and skills. He has over 8 years of experience in IT, networking, customer service, and technical support. Some of his key experiences include routing and switching, security, F5 load balancing, and Palo Alto firewalls. He is proficient in network administration, routing protocols, security technologies, and has experience supporting corporate clients and managing teams. He has certifications in Cisco CCNP, CCNA, and is working towards Cisco CCIE Security. He is currently working as a Security Operations Engineer for Citizens Bank, where he is responsible for network and security operations support.
Mostafa Khattab is a network security engineer with over 5 years of experience in IT and network engineering. He is currently seeking a new network engineer position. He has worked as a team leader for network and security at Network International in Egypt since 2015, where he performs tasks such as network administration, security implementation, and documentation. Prior to this, from 2012 to 2015, he worked as a corporate customer maintenance engineer at Etisalat Misr, where he resolved connectivity issues and designed new network infrastructures. He has a B.Sc. in Engineering from Cairo University with a grade of 70.12%.
The document provides a summary of Jatinder Singh's skills and experience. It lists his contact information and then outlines his 8 years of experience in information technology and network and security administration. It details his expertise in areas like routing protocols, L2 technologies, VLAN configuration, access lists, port security, and VPN tunnels. It also lists his technical skills and certifications in areas like Cisco, Windows, firewalls, antivirus software, and networking.
Varma KSN has over 5 years of experience as a network administrator and engineer. He has worked with Cisco routers, switches, firewalls and Checkpoint firewalls. He has expertise in network security areas like VLAN configuration, inter-VLAN routing, firewall configuration, VPN configuration, and network protocols like OSPF, EIGRP and RIP. He holds certifications like CCNA, CCSA and CEH. He is looking for a challenging position as a network engineer where he can use his experience for the organization's benefit.
This document contains information about the candidate's work experience, technical skills, certifications, education, and personal details. It summarizes the candidate's experience in several areas including network design, configuration and troubleshooting of routing protocols, firewalls, switches, and wireless networks. The candidate has worked on projects involving SDH, CCTV, Cisco routers, firewalls, switches, fiber optics, LAN implementation, and automation and instrumentation.
Abhishek Rao is seeking a position in network security with over 6 years of experience managing firewalls like Checkpoint, Cisco ASA, Juniper SRX, and Fortigate. He has a B.Tech in computer science and is currently working as a network security analyst for Disney through ATOS. Prior experience includes roles managing network security for the Reserve Bank of India and Hero Motocorp. He has certifications in Checkpoint security and technical skills including firewall configuration, VPN implementation, and security policy development.
- Overall five plus years experience in Network security, Cloud and Virtualisation domain.
- Mainly worked in Operations,Technical Assistance Centre (TAC) and Security Operations Centre (SOC).
- Expertise in Next Generation Firewalls, Next Generation Intrusion Prevention Systems, Proxy
Servers, Load Balancers, Hypervisors, Operating Systems and Scripting.
- Experience in Implementation and Post-Implementation support in various network security
technologies.
- Well-known of Cisco products, F5, Checkpoint and Mcafee products.
- Knowledge of Vulnerability Assessment, AWS cloud, SIEM products, Network Protocols, Network
tools.
Ejaz Ahmad is an IT operations professional with over 12 years of experience in areas such as IT infrastructure management, information security, systems administration, and project delivery. He has worked for companies such as ArcelorMittal India and Hing Agro Industries, managing their IT departments and infrastructure. He has expertise in technologies from Cisco, Microsoft, and VMware and aims to leverage his experience to deliver solutions and increase profitability.
The document provides a summary of a candidate's experience working as a network engineer for over 4 years. It summarizes technical skills and qualifications including a CCNA certification. Project experience is described monitoring over 5500 branches and 7000 ATMs for a major bank, including responsibilities like network monitoring, troubleshooting, and ensuring SLA compliance. Academic qualifications of a Bachelor's degree and technical skills including routing, switching, VLANs, and protocols are highlighted at a high level.
This document contains contact information and a summary of the technical skills and work experience of Krishnamoorthi Ramasamy. It lists his addresses, phone numbers, and email, and provides an overview of his 5.6+ years of hands-on experience in enterprise networking and security, including designing, implementing, and supporting various network and security products and solutions. It also details his employment history and roles at several companies from 2011 to the present, where he has worked on projects involving networking, security, firewalls, VPNs, and more.
This document contains a summary of Samer Sammour's professional experience and qualifications. It lists his certifications and education, as well as his experience in roles such as Juniper Networks Advanced Services/Resident Engineer Manager, Technical Operations Manager, Network Engineer, and IP Backbone Engineer. The summary highlights his expertise in areas such as broadband and routing networks, MPLS, VPNs, routing protocols, firewalls, and voice over IP systems.
Mohammed Ahmed Awad is a highly skilled network engineer with over 15 years of experience designing, implementing, and maintaining networks and security systems for hospitals, government projects, and companies. He has extensive expertise with Cisco routers, switches, firewalls, and wireless networks. Awad holds several technical certifications including CCNA, CCPS, and PMP and seeks a new challenging role utilizing his skills and experience.
The document describes the roles and responsibilities of a Network & Security Support Engineer – Level 2/3 Support. Key responsibilities include:
- Providing tele-support via phone, email and remote access for clients in Australia at level 2/3 support for firewalls, security, routing and switching technologies.
- Designing and deploying firewalls from Palo Alto and Cisco, including managing advanced features like IPS, URL filtering, and DDoS protection on Palo Alto firewalls.
- Migrating clients from other vendors to Palo Alto Networks and managing the full project lifecycle.
- Designing and deploying IPsec VPN and familiarity with authentication and authorization technologies like LDAP, RADIUS, and
Hayat Azizi has over 17 years of experience in information technology including system administration, security, project management, and technical support. She currently works as a System Administrator for ManTech International supporting the Department of Defense Standard Procurement System. Previously she held positions as a System Analyst for the Drug Enforcement Administration and Network Security Engineer for the Department of Homeland Security through contracts with ASRC Federal and Verizon Business. She has a Bachelor's degree in Information Systems and certifications in ITIL, Security+, and is pursuing additional certifications.
IT Professional with over 15 years of experience in planning, engineering, administration, maintenance, optimization , analysis and troubleshooting for various network technologies including VoIP, wireless and data center for medium to global enterprise environments which includes proficiency in routing, routing protocols, switching, WLAN, VPN, WiFi, security, firewalls, network performance and security assessment as well as post-assessment reports and recommendations.
The document provides details about Iftekharul Islam including his contact information, education background, certifications, relevant experience, and technical skills. He has almost 9 years of experience in networking, security, and infrastructure roles. His experience includes planning, designing, implementing, and troubleshooting routing, switching, firewalls, VPNs, and other security technologies.
1. Santosh K L
Contact No.: +65 8236 8734, +91- 9686263949
E-Mail: kl.san20@gmail.com
To seek challenging assignment and responsibility, with an opportunity for growth and career
advancement as successful achievements.
An astute, multifaceted, results-oriented leader with an experience of 6+ years in Technical services, Process Management,
Team Management & Client Servicing.
Been associated with IBM India Pvt. Ltd, Bangalore as Operations Professional & Sr. Systems engineer with Larsen & Toubro
InfoTech.
Proficient at managing & leading large teams for running successful process operations & experience of developing
procedures, service standards for quality excellence.
A thorough professional with a proactiveattitude, capableof thinking in and out of the box, generating new design solutions
and ideas.
An exemplary team leader with proven abilities in resolving critical escalated issues of team members.
Possess excellent interpersonal, communication and organizational skills with proven abilities in team management,
customer relationship management and planning.
Process Management
Mapping client’s requirements & coordinating in developing, implementing the required service specified by the client.
Creating & implementing workflows to facilitate structured support in relevant areas and issues.
Sending reports to top management and maintaining agreed SLA with customers & thereby focusing on maximizing customer
satisfaction with quality adherence.
Team Management
Identifying and implementing strategies for building team effectiveness by promoting a spirit of cooperation between team
members.
Creating and sustainingan environment that fastens development opportunities and motivating the employees for enhancing
the existing performance levels.
Maintaining the attrition levels and developing career progression plans.
Professional Experience
Dec 2016 till present, Curvature Singapore as Technical services engineer
Workingas Technical services engineer supportingmainlyCisco products suchasSwitches, Routers, ASA, Firepower, ISE, IPS
etc…
Performhardwarediagnosticsfor customer queries suspectinghardwareissues and raiseRMAaccordingly for replacement.
Configuringvirtual firewallsin cisco ASAfor network traffic isolation,troubleshootingand configuring high availability with
Active/active & active/standby failover.
Deployingsite-to-siteIPsec vpn,managingCertificate Authority server for PKI based authentications, Configuring Remote
Access IPSEC VPN using cisco VPN client.
Proactivenetwork monitoring with cisco IPS sensor.IPS sensor initialization with deployingin promiscuous,inline&
inlinevlan pairmodes.
2. Configuring and troubleshooting dynamic routing protocols OSPF, EIGRP and BGP.
Configuring and troubleshooting VLANs, VTP, STP, RSTP, etherchannel etc…
Perform day-to-day operations for managing and network and security devices in a complex multi -vendor environment.
Implement next-generation identity and accesscontrol platform,which enablesenterprises to enforcecompliance, enhance
infrastructure security and streamline service operations using Cisco ISE, which uses RADIUS and TACACS+ protocols.
Manager VPN sessions, interface throughput, configure HA, IPsec site-to-site VPN etc... Using ASDM.
TroubleshootASAconnection issuesusing packet tracer feature in ASDM and keep track of real time logs using ASDM log
viewer.
Configure and troubleshoot DNS, DHCP, NTP and syslog servers.
Administer and troubleshoot OSPF, EIGRP and BGP routing protocols on Cisco routers.
Prevent loop occurrence when switches areinterconnected via multiple paths using STP.
Configurelayer 2 security featureslikePortsecurity,DHCP snooping,IPsourceGuard and dynamic ARP inspection in Cisco
switches.
Mar 2015 till Dec 2016, Dimension Data Bangalore as Senior Network Engineer-Security
Working as Senior Network Security TAC engineer supportingmultiplevendor products such asCheckpointR77 firewall, Palo
Alto firewall, Bluecoat ProxySG, Cisco ASA, Cisco ISE, Infoblox IPAM.
Administration & troubleshooting ProxySG 510 which includes policy management using VPM, web caching, content
filtering, authentication & access logging using Reporter toolkit & HTTPS traffic interception.
DeployingPalo Alto firewall rightfrominstalling on VMware platform to configuring the necessary features as defined by
customer.
RegisteringPANfirewall for downloading regular updates for antivirus, URL filtering and PAN OS updates for keeping the
firewall up to date for protection against threats.
ConfiguringZones to isolate the security levels to inside, outside and DMZ networks as part of basic security of network.
Create multipleVirtual Routersto routedifferentcustomer traffic based on routing information in virtual routers which is
similar to VRF in Cisco terminology.
Setting up dynamic routing in PAN firewall using OSPF.
Design security policies on PAN firewall for controlling what traffic needs to be allowed or blocked based on customer
requirements.
ConfigureOutbound SSL decryption on firewall, URL filtering for blocking malicious websites based on categories or the
content.
Deploy Global Protect (Client VPN) for secure access over internet with encryption and site to site VPN tunnel using VTI.
Organise Captive portal for the end users to authenticate before establishing connection to internet.
Experience in configuring & troubleshooting dynamic routing protocols like OSPF and EIGRP.
OSPF route filtering based on Route-type, advertising router, interface, next-hop etc…
Optimizing OSPF by tuning Hello-interval, Dead-interval and retransmit-interval.
Worked on Checkpoint R76 & R77 GAIA platform which includes administration of checkpoint components such as
Smartdashboard, SmartviewTracker and SmartUpdate etc...
Hands on experience in troubleshooting MDS (Multi Domain Server) & DMS (Domain Management Server) for managing
complex network security infrastructure using Checkpoint firewall which includes VSX & clustering.
Active/standby failover setup on all the DMZ, security & vpn zones firewalls.
Failover & redundancy setup for internet facing routers with HSRP protocol & QOS for priority based traffic routing.
Configuring and troubleshooting dynamic routing protocols OSPF, EIGRP and BGP.
Configuring and troubleshooting VLANs, VTP, STP, RSTP, etherchannel etc…
Deployingsiteto siteIPsec vpn,managing Certificate Authority server for PKI based authentications, Configuring Remote
Access IPSEC VPN using cisco VPN client.
Managing end user authentication using AAA services with Cisco ISE integrated with Active Directory.
Sep 2013 to Mar 2015, L&T InfoTech Bangalore as Systems Engineer
Chevron Texaco Corp, Singapore
As senior systems engineer I’mexposed to a complicated setup of network security infrastructurewhich includes more than
1000+ firewalls across globe.
Identify and control users regardless of IP address,location or device usingPalo Alto (PA) firewall.
3. Perform day to day operations for managing and network and security devices in a complex multi -vendor environment.
Implement next-generation identity and accesscontrol platformwhich enables enterprises to enforce compliance, enhance
infrastructure security and streamline service operations using Cisco ISE which uses RADIUS and TACACS+ protocols.
Manager VPN sessions, interface throughput, configure HA, IPsec site-to-site VPN etc... Using ASDM.
TroubleshootASAconnection issuesusing packet tracer feature in ASDM and keep track of real time logs using ASDM log
viewer.
Configure and troubleshoot DNS, DHCP, NTP and syslog servers.
Administer and troubleshoot OSPF, EIGRP and BGP routing protocols on Cisco routers.
Prevent loops from being formed when switches are interconnected via multiple paths using STP.
Configurelayer 2 security featureslikePortsecurity,DHCP snooping,IPsourceGuard and dynamic ARP inspection in Cisco
switches.
Perform network maintenance activities with proper change management approvals with scheduled downtime window.
Upgradenetwork and security devicesto keep the devices up to datewith latestfeatures and fixingknown vulnerabilities to
ensure no security flaws.
In depth understanding of latest attack strategies like Advanced Persistent Threats (APT), Polymorphic attacks, blended
threats, phishing & social engineering.
Wideknowledgeon cisco Iron port for URL filtering based on categories and for http & https traffic redirection via cisco
IronPort.
Extensive knowledge on FIREEYE product which is Next Generation Threat Protection (NGTP) solution that provides
automated threatforensicsand dynamic malwareprotectionagainstadvanced cyber threats, such as advanced persistent
threats and spear phishing.
Training juniors in Network routing & switching, Network security and assisting them in their respective projects.
Feb 2010 to Jan 2013, IBM India Pvt. Ltd. Bangalore as Operations Professional
Deploying and troubleshooting dynamic routing protocols such as RIP, OSPF, and EIGRP etc…
Configuringand troubleshootingNAT,Modular policyframework (MPF),advanced protocol inspection of FTP, HTTP, IM, DNS
etc…
Configuringvirtual firewallsin cisco ASAfor network traffic isolation,troubleshootingand configuring high availability with
Active/active & active/standby failover.
Deployingsiteto siteIPsec vpn,managing Certificate Authority server for PKI based authentications, Configuring Remote
Access IPSEC VPN using cisco VPN client.
Proactivenetwork monitoring with cisco IPS sensor.IPS sensor initialization with deployingin promiscuous,inline&
inlinevlan pairmodes.
IPS signaturetuning based on customer requirements to avoid malicious traffic.CustomHTTP, Atomic IP & String TCP
Signatures creation to block unnecessary traffic.
Blockingand rate limitingnetwork traffic based on Application ResponseController (ARC) feature in cisco IPS.
ImplementingACL’s on IOS routers and ciscoASAfirewall to filter certain traffic.Deep packetinspection using MQC filtering
tool.
Securing dynamic routing protocols using authentication & route filtering.
Mitigating against different attack vectors such as Fragmentation attacks, port security, VLAN hopping attacks, DHCP
snooping, IP spoofing etc…
Plan,schedule,and implementnetwork upgrades,implementations, and migrations in a timely manner, and during times
that will have the minimum impact on the users of the affected networks & systems.
Be available, on-call, to rapidly troubleshoot any problems resulting from the changes.
Relevant professional experience including working knowledge of the following technologies:
a) TCP/IP networking including IP classes, subnets, multicast, NAT
b) DNS and DHCP Network troubleshooting.
c) Microsoft OS and Server technologies
d) Mitigating attack vectors such as CAM table overflow, BPDU guard etc…
4. TECHNICAL PROFICIENCY
ASA: ASA configuration,NAT(static,dynamic and policy Natand Nat exemption) Access Control
Lists,Failover (Active-Active and Active-Standby), Security Contexts, Configuration of Modular
Policy framework, Configuring transparentfirewall.
VPN: Implementation of IPsec Site-to-Site VPN, GRE over IPsec,DMVPN, Remote Access VPN, SSL
VPN (clientless and Anyconnect), Easy VPN, GET VPN.
Identity Management: Security Protocols (TACACS+ AND RADIUS), Cisco ACS Configuration,Authentication Proxy,
Cut-through Proxy and DownloadableACL.
Web Security Appliance: Cisco WSA configuration such as web traffic redirection,BlockingURLs
ISE: ConfiguringAAA with ISE, Integration with AD, MAB with VLAN authorization,Configurewired
and wireless 802.1x,CWA for wired and wireless etc...
IPS: Inlineand Promiscuous Modeconfiguration,InterfacePair,Vlan Pair. Tuningexistingand
configuringnew custom signature.
WLC: Configuration and troubleshootingof WLC, ManagingAP from Wireless LAN controller.
Routing Protocols: Configuringand troubleshootingStatic, RIP,OSPF, EIGRP, Default Route, Summarization,
Authentication, Route Filtering,Distribution List, and BGP Basic.
Switching Protocols: Configuringand troubleshootingVLAN, and PRIVATE VLAN, VLAN Trunking (IEEE 802.1Q and
ISL) VTP, STP (SpanningTree Protocol) security mechanism(BPDU guard, ROOT guard, BPDU
filter) and Ether Channel,Switch Port Security, DHCP Snooping. HSRP, VRRP, GLBP
configuration.
Advanced security & Mitigating Network attack
Control Planeprotection, Broadcastcontrol,TCP intercept, uRPF, IP, ARP, Mac Spoofing
attacks,Fragmentation, , Smurf, Syn, Mac flooding,VLAN Hopping attack.
Operating Systems: Windows XP/2003/2008/Vista/7. Windows server 2003/2008 (Worked on AD & Exchange
server 2003 & 2007).
Certifications
Cisco Certified Internetwork Expert Security (Lab & Written) 39816
Microsoft Certified Systems Engineer (MCSE 2003)
Microsoft Certified Technology Specialist (MCTS – SharePoint server 2010 configuring)
Professional Courses
(I) Microsoft Certified Systems Engineer (MCSE)
(II) Cisco Certified Network Associate (CCNA)
(III) Red Hat Certified Engineer (RHCE)
(IV) Checkpoint Firewall administration.
5. 2009 Bachelors of Engineering from Sir M Visveswaraya Institute of Technology Bangalore
Date of Birth : 30th December 1987
Address : #13, 18th Street, Kanakanagar,RT Nagar post, Bangalore – 560032
CCIE Security v4 number : 39816
Languages known : English,Hindi,Kannada,Telugu
Passportnumber : JF682226
Date of Expiry : 20.02.2021
I hereby declare that the above written particulars are true to the best of my knowledge and belief.
Place: Bangalore
Santosh K L