Affordably Source Computer Security Experts and Industry Participants for Market Research, Diligence and Projects

Submit an anonymous Project Description -- Start receiving responses within a few hours

Have a need? Explain it here






How Zintro Works

  1. 1. Provide a clear description of your needs and your expectations of an expert, consultant or job candidate and Zintro will match it with the most relevant professionals in our platform.
  2. 2. Within a day or two typically 6 - 12 Experts, who have opted-in, will contact you with a brief explanation of their qualifications and how they can help.
  3. 3. You can communicate back and forth, qualify each other, connect and pay fees to Experts through Zintro.
  4. Zintro is free, anonymous and without obligation.

Loved by Thousands

Loved by thousands logos

Need Help?A phone icon1-877-236-7016

Recent Computer Security Inquiries

Area Icon

Computer Security

Assist with protocols and develop collection tools; assist with data analysis, interpretation, reports; assist in writing final reports

  1. Profile Picture

    Lito |IT Consultant

    Hello I am an experienced *****yst and I am familiar with analysis tools. Would be good to talk,...

    6.7 Days Later
  2. Profile Picture

    Geoffrey |Consultant

    Have only now seen this Inquiry (21 Dec)! From limited *****lied, I doubt that my "data ...

    16 Days Later
+2 Other Responses
Area Icon

Computer Security In Insurance

Looking for experts in cyber security insurance law

  1. Profile Picture

    Rahul |Chief Technical Officer

    Thanks for your message. We have expertise and experience in Cyber Security domain including ISO 270...

    5.8 Hours Later
  2. Profile Picture

    Norman |Consultant

    Sir, There is no detail visible in your inquiry on Zintro thus difficult to know what to respond. I ...

    8.2 Hours Later
  3. Profile Picture

    Bryan |InfoSec

    I can help in external security. ...

    8.8 Hours Later
+6 Other Responses
Area Icon

Email Encryption Market

We are a us based investment firm that is looking to better understand the email encryption software market for enterprises. Key vendors include zix corp and proofpoint. We are looking to understand: 1) what are the key attributes that differentiate email encryption solutions from various vendors, including zix and proofpoint? 2) are there changes in encryption technology or new entrants who could threaten the incumbent position of vendors like zix? 3) can you discuss the default encryption provided with google (gmail) and office 365 (outlook)? Why would an enterprise in a high-security-requirements industry (government, healthcare, finance, etc.) find these defaults unsatisfactory and choose to pay for third-party email encryption through a vendor like zix? Good candidates would include: · customers of an email encryption solution at a large enterprise · former employees of zix and/or proofpoint · current or former employees of competitors to zix and/or proofpoint

  1. Profile Picture

    James |Security Evangelist

    Zix is a well establish incumbent with ***** users of Google or Microsoft cloud email/apps w...

    3.3 Hours Later
  2. Profile Picture

    Ken |Security / System Specialist

    All, This sounds like a very interesting position. I have ProofPoint expernece from the compliance s...

    4.1 Hours Later
  3. Profile Picture

    George Cristian |Partner, Executive Manager

    On short: Zix solution is best it you use G-Suite (*****) and Proofpoint if you company uses Offic...

    12.3 Hours Later
+25 Other Responses
Area Icon

Anti-malware

Exploit reported by google adwords bots - appears to be changing quickly all the time. Malware. Domain suspended in adwords. Our pages are being redirected and we cannot figure out how to fix the problem.

  1. Profile Picture

    Narendra |Director

    We are a consulting company in Cyber Security... m not clear as to what problem you are facing, plea...

    1.5 Days Later
  2. Profile Picture

    sheik |security analyst

    find the malware code and remove it! As per the google adwords or adsense policy, they won't pay if...

    1.5 Days Later
+3 Other Responses
Area Icon

Training On Ethical Hacking

I want to know about ethical hacking. Remote key logger, wireshark, etc. Which is more essential for our security purpose. Raja

  1. Profile Picture

    sheik |security analyst

    there were lot of monitoring tools! if you want to analyse *****ets- wireshard is essential! key...

    6.8 Hours Later
  2. Profile Picture

    Ran |Information Security Consultant

    Hello, Please have a look in the following info: ♦ Current Position: IT Consultant at ***** ♦ Pract...

    7.4 Days Later
+2 Other Responses
Area Icon

Encryption Virus

I don't know if you can help with this issue. I was subject to a ransom encryption virus. It impacted the back up drive as well. The ransom was paid and the link was taken down. Do you offer services to help decrypt without a key or back up?

  1. Profile Picture

    Johnathan |Information Security Analyst II

    *****'re probably out of luck. There's a slight chance if the malware left behind a key....

    1.5 Hours Later
  2. Profile Picture

    Clarence |Consultant

    Check historical backups they may be ok....

    1.8 Hours Later
  3. Profile Picture

    Eric |Managing Partner

    agree - how many ***** does the backup tree goes...hope it's more than 1...start with th...

    5.2 Hours Later
+4 Other Responses
Area Icon

Check Point Software Technologies Ltd. (chkp)

Want to figure out if i should buy checkpoint firewall or competing product

  1. Profile Picture

    Darren |Consultant

    I am available to talk regardnig you firewall selection question. Please forward the best way to co...

    2.9 Hours Later
  2. Profile Picture

    James |Principal

    Dear AB, I am quoting a "quick informal proposal" here. The answer to your question depends on a nu...

    3.4 Hours Later
  3. Profile Picture

    Samer |Managed Service Program Director

    Hello I work for Orange business services/france telecom and we use lots of checkpoint firewalls and...

    3.7 Hours Later
+9 Other Responses
Area Icon

Computer Security

Looking for analysts/experts to interview for an article about what companies should expect to pay for computing-related security expenses (i.E., software and services, not staff), based on company size, data security needs, and complexity of systems in place?

  1. Profile Picture

    Emad Sayed |Information Security Consultant

    I would be interested. Can you send me detailed *****t the work?...

    1.1 Hours Later
  2. Profile Picture

    Richard |Founder

    I am interested in your Computer Security Press Interview Inquiry for coyotemoon....

    1.1 Hours Later
  3. Profile Picture

    Michael |Head of Cyber and Co-Founder

    I can definitely assist you on this....

    1.3 Hours Later
+40 Other Responses
Area Icon

Ethical Hacking

I am looking to connect with one or more ethical hacking experts for expert testimony in a federal case

  1. Profile Picture

    Charles |Chief Executive Officer

    Hello, I am interested to learn more about your project and requirements. I believe I can be of si...

    1.2 Hours Later
  2. Profile Picture

    Hassen |IT security Consultant

    Hi , I'm very Interested in this offer .. Please contact me through zNote....

    2.1 Hours Later
  3. Profile Picture

    Iftikhar |System Security Expert

    Can you elaborate a bit more??...

    2.9 Hours Later
+5 Other Responses
Area Icon

Kaspersky

My company is deploying kaspersky and we are looking for a technical consultant to manage the project. This person needs to have experience with kaspersky security center 10 with both anti-virus and encryption using kaspersky security center – other like applications should not be considered – we want clearly someone with experience with our exact toolset.

  1. Profile Picture

    David |Owner

    I specifically have experience with Kaspersky Security Center 10. I have another client that has tha...

    4.8 Hours Later
  2. Profile Picture

    Adrian |Zintro Expert

    Hello, I have just received this inquiry from one of my colleagues that has an account on zintro fo...

    5.5 Days Later
+2 Other Responses
Area Icon

South African Cybersecurity Market & Trends

We are trying to understand the cybersecurity ecosystem in south africa, focusing on cyber training and consultation services - what is the awareness level of the cyber threat in south africa? Of the government and the general public - how does the government implement legislations and regulations regarding cyber security in the country? - how does the cyber security competitive landscape look like in south africa? Are there many local players? Do defense and cyber security giants show activity in the country? - who are the leading local vendors for cyber training and consultation services? - are there government initiatives regarding cyber security training? Educational programs? Military cyber training centers? We are willing to pay a generous honorarium for each 45 - 60 minute call. Thanks!

  1. Profile Picture

    Douglas |CEO

    I built the KPMG CyberSecurity practice and re-organized the global Deloitte cybersecurity practice....

    2.3 Hours Later
  2. Profile Picture

    Craig |Managing Director

    I had a look through the questions and yes we are actively involved in the cyber security training /...

    6.1 Days Later
+3 Other Responses
Area Icon

Computer Hacking

I've been hacked by someone or company. They stole everything i have. And i have gone threw everyone i could for help so i need an expert. My wife started this with spyware. She took pictures and documents from my computer and my phone that would convict her. I need to recover my info or find ways to see how she is doing this to catch her red handed. Every account i have or had she changes everything.

  1. Profile Picture

    Eric |

    Where are you located?...

    2.8 Days Later
  2. Profile Picture

    David |Zintro Expert

    Hi, Is there a number I can call you at? I do this for a living and can help you recover your valu...

    33.3 Days Later
+2 Other Responses
See More Inquiries

Top Computer Security Experts

See More Experts
Share
LinkedInTwitterFacebookGoogle+