Affordably Source Home Area Networks (han) Experts and Industry Participants for Market Research, Diligence and Projects

Submit an anonymous Project Description -- Start receiving responses within a few hours

Have a need? Explain it here






How Zintro Works

  1. 1. Provide a clear description of your needs and your expectations of an expert, consultant or job candidate and Zintro will match it with the most relevant professionals in our platform.
  2. 2. Within a day or two typically 6 - 12 Experts, who have opted-in, will contact you with a brief explanation of their qualifications and how they can help.
  3. 3. You can communicate back and forth, qualify each other, connect and pay fees to Experts through Zintro.
  4. Zintro is free, anonymous and without obligation.

Loved by Thousands

Loved by thousands logos

Need Help?A phone icon1-877-236-7016

Recent Home Area Networks (han) Inquiries

Area Icon

Technical Writing On Internet Security Architecture

Hope this message finds you well!  we have a new research project that may fall within your area of expertise. We are seeking an experienced technical writer who could write a white paper on industrial internet security architecture project. We are looking for someone with technical knowledge who has experience writing white papers.  as a first step, could you please confirm this is within your area of expertise and you are interested in learning more about this engagement as i would like to connect you with one of our team leaders who can explain this engagement in more detail.  thank you in advance, and we are looking forward to hearing from you. 

  1. Profile Picture

    Robert |Columnist

    I will be happy to speak with you on researching and authoring a White Paper on Industrial Internet ...

    46 Minutes Later
  2. Profile Picture

    Adam |Performance Development Professional

    I'd welcome the chance to help you achieve more, work less and *****n. I've spent years w...

    2.9 Hours Later
  3. Profile Picture

    Peter |Principal

    I think I fit the bill. I have Internet security and white paper writing experience....

    4.6 Hours Later
+13 Other Responses
Area Icon

Network Security Auditing

We need a seasoned security expert to come physically to our los angeles based center and perform a security audit and network evaluation. We have need of an experience professional to do a full network discovery with an emphasis on uncovering potential vulnerabilities and inherent design flaws with our layout. Scope of work to include an external penetration test as well as internal auditing with recommendations and a plan of action to be laid out.

  1. Profile Picture

    Ryan |President

    I ***** compliance for my clients domestic and *****h encompasses full securit...

    29 Minutes Later
  2. Profile Picture

    Satyen |Zintro Expert

    Hi, I am based in LA and Security expert to conduct Security Assessment, Security Audit and Assessm...

    7.7 Hours Later
  3. Profile Picture

    PRakash |Information security sme

    Hi, We offer Virtual CISO services which include various *****rity services with continu...

    12.3 Hours Later
+8 Other Responses
Area Icon

Cyber Security Services Project

We are looking for multiple participants based in canada. Our client is conducting this market research study and would like to invite you to participate in our research to learn how companies choose third party providers for managed security services. They are looking for participants who recently evaluated third party managed security providers. This is for a paid 1-hour phone interview. **please note that we are only interested in your personal point of view and are not seeking confidential information. This is not a sales solicitation. All the information you provide us is kept strictly confidential. It is used for classification purposes only. Kindly respond to the questions below as to your relevance in this space: 1. Have you recently participated in the evaluation of third-party managed security providers? Yes/no 2. For the managed security service you evaluated, which of the following best describes the scope of services you were seeking from the third party: a. Standard security – my own it staff monitors, manages and resolves incidents or problems, plus manages moves / adds / changes b. Fully managed security – a service provider proactively monitors, manages and resolves incidents or problems, plus manages moves / adds / changes c. Neither

  1. Profile Picture

    Jonathan |Senior Manager

    1. Yes 2. B...

    2.5 Days Later
  2. Profile Picture

    Jeffrey L. |CEO | Founder | Principal Cybersecurity

    1. Yes 2. A...

    2.5 Days Later
  3. Profile Picture

    Jim |Sr. Cyber Security Principal Architect

    I have 23 years experience in Cybersecurity....

    2.5 Days Later
+303 Other Responses
Area Icon

Microsoft Tmg Southern Africa

Need expert tmg trainer from southern africa, for a training job of around 2 weeks. Willing to pay about n$30 000 (not including transport and accommodation)

  1. Profile Picture

    Simon |Mr

    Hi Sounds interesting I'm based in the UK, please look me up on LinkedIn...

    4 Hours Later
  2. Profile Picture

    Adeniyi |CEO

    I can help you build network security and build a protected web link.At my company we have experts i...

    4.3 Hours Later
  3. Profile Picture

    Jason |Ceo

    Expert network and infrastructural architect and security expert here....

    2.4 Days Later
+3 Other Responses
Area Icon

Anonymous Hacker Arrests

“anonymous” hacker arrests the zintro blog needs you! i write the zintro blog. I am looking for your expert opinion on the question below and a written response that is one to three paragraphs long. Your response may be used in an article that i will write and post on the zintro site. If it is used, you will be named in the article and a link to your expert profile will be included. Your contribution is voluntary (there is no payment involved). Question: what does the recent news that several members of the hacker group “anonymous” have been arrested mean to the future of internet security? This is a great marketing opportunity to get your name and expert opinion published on our blog. Here is a sample: http://blog.Zintro.Com/2012/01/16/keystone-xl-pipeline-pros-and-cons/ if you are interested, please send me your response via znotes in the next day or two. Include your full name. If you have any questions, please let me know. Thank you! maureen aylward

  1. Profile Picture

    Pablo |Information Security Specialist

    What does the recent news that several members of the hacker group “Anonymous” have been arrested me...

    14 Minutes Later
  2. Profile Picture

    Aaron |Senior Application Developer

    Hello Maureen, How soon do you need the article and is it ok if it is over 3 paragraphs long say 4?...

    15 Minutes Later
  3. Profile Picture

    TAIYE |President & Founder

    Please contact me at your earliest convenience....

    29 Minutes Later
+10 Other Responses
Area Icon

Cyber Security

Contribute to the zintro blog! i am an independent writer for zintro. I am looking for your expert opinion on the question below and a written response that is one to three paragraphs. Your response may be used in an article that i will write and post on the zintro blog site. If your response is used, you will be named in the article and a link to your expert profile will be included. Your contribution is voluntary and provides you with a great marketing opportunity to get your name and expert opinion published. Here is a sample blog: http://blog.Zintro.Com/ question: from sony to lockheed martin to pbs, cyber attacks are on the rise and increasing in sophistication. Even the us government announced that a cyber attack by a foreign government constitutes an act of war. How can companies, governments, and institutions protect themselves? How will cyber security change to meet the rising threats? If you are interested, please send me your response via znotes in the next day or two. If you have any questions, please let me know. Thank you. Maureen aylward

  1. Profile Picture

    James |President

    You cannot keep out a determined hacker. The biggest threat to security is between the keyboard and ...

    29 Minutes Later
  2. Profile Picture

    Ricardo |Co-Founder & CTO / Principal Information

    Hi Maureen, I've got another similar message from you but unfortunately I was out and was unable to...

    34 Minutes Later
  3. Profile Picture

    Hadi |Head of Security Strategy & GRC

    Hi, I am interested in helping you write the article and can input into this based on my experience ...

    1.5 Hours Later
+22 Other Responses
Area Icon

Security Approval Program - Cryptographic Modules

We are interested in speaking with experts on information technology security approval programs for cryptographic module. We would like more information on the fips 140-2 standard and what changes the fips 140-3 standard will bring at levels 1 and 2. This would be for a 1-hour paid phone consultation. To show your relevance in this space, please answer with a few brief statements the questions below 1. What is the level or extent of your experience in this space? 2. Do you have experience selling fips 140-2 compliant cryptographic algorithms and maintenance services? 3. Would you be able to discuss any changes to the value provided by a cryptographic module as well as any changes in the ease (or lack thereof) of implementing a cryptographic module between the two standards? 4. Can you speak on what sort of adoption rates we can see for fips 140-3 and over what time period? **please note that we are only interested in your personal point of view and are not seeking confidential information. ***referrals are highly appreciated

  1. Profile Picture

    Tammy |Vice President

    Not a fit...

    1.1 Hours Later
  2. Profile Picture

    New |

    Yes, I'd love to...

    1.3 Hours Later
  3. Profile Picture

    Jim |Sr. Cyber Security Principal Architect

    Yes I have plenty of a deep-rooted knowledge of FIP-*****. I would be happy to do this consulting...

    1.4 Hours Later
+23 Other Responses
Area Icon

Trends & Preferences Of Managed Cybersecurity Services

Scope: the main objective of this study is to understand the trends and preferences for managed cybersecurity services for “global 2000” companies the study intends to understand: • key managed cyber security services being consumed by large corporations – “global 2000” companies • key features or capabilities preferred in the managed cyber security services being consumed (for managed detection and response, threat intelligence service, siem as a service, threat hunting, vulnerability management, and penetration testing • preferred pricing models / price points for managed cyber security services • estimated distribution of companies (from global 2000) between those undertaking end-to-end cybersecurity transformation, and those undertaking limited/targeted cybersecurity transformation focus geography: us, western europe (uk, germany, france) business focus: • managed cybersecurity services (managed detection and response, threat intelligence, siem, threat hunting, vulnerability management, penetration testing) number of experts: 5 timeframe: 20th january, 2021 expert job title(s): • from managed security service providers (mssps) and cybersecurity consulting companies (sample set of people): - account managerso sales managers/directors/vps - manager (threat intelligence sales) - cybersecurity sales specialist - any other relevant/related roles • from channel partners for mssps and consulting companies - senior manager (corporate sales) - strategic account manager - others relevant/related roles • other independent consultants and experts managed cybersecurity (especially for “global 2000” companies’ segment) * we need to include current and former employees from the following companies: - mssps (priority list of companies): fireye inc., secureworks inc., red canary, crowdstrike, deepwatch inc. - consulting companies (priority list of companies): ey, deloitte, accenture, pwc, mandiant - can include (second priority) other such mssps and consulting companies that provide managed cybersecurity services to "global 2000" companies. Survey type: telephonic survey duration: approx. 30-35 minutes screening questions: 1. Would you be able to share insights on the (based on the key pointers for discussion mentioned) below? Key pointers for discussion: • key managed cyber security services being consumed by large corporations – “global 2000” companies • key features or capabilities preferred in the cyber security services being consumed (for managed detection and response, threat intelligence service, managed siem, threat hunting, vulnerability management, and penetration testing • preferred pricing models / price points of the managed cyber security services • differences in preferences of services, between companies undertaking end-to-end cybersecurity transformation, and those undertaking limited/targeted cybersecurity transformation

  1. Profile Picture

    Fabrizio |Information Security Architect and CISO

    Happy to consult...

    23.7 Hours Later
  2. Profile Picture

    Scott |Director of IT

    Hello, would be happy to provide cyber security info and managed services info about a smaller non-p...

    23.7 Hours Later
  3. Profile Picture

    Salil |President/CEO & Founder

    Happy to consult....

    23.8 Hours Later
+96 Other Responses
Area Icon

Network Attached Storage (nas)

Looking for evaluators/users of avere systems, netapp flexcache, alacritech, and violin memory vcache.

  1. Profile Picture

    Charles |Chief Executive Officer

    Hello *****, Thank you for your inquiry and project request. I believe I can be of service to you...

    27 Minutes Later
  2. Profile Picture

    Michael |Senior Account Executive

    *****- I would like to schedule a preliminary call with you to get an understanding of what you ne...

    41 Minutes Later
  3. Profile Picture

    Ryan |Solutions Architect

    We may be able to help. We just implemented (4) 3270's with 1TB of FlexCache each @ a customer here ...

    1 Hour Later
+6 Other Responses
Area Icon

Cyber Security In South Africa

We are trying to understand the cybersecurity ecosystem in south africa, focusing on cyber training and consultation services - what is the awareness level of the cyber threat in south africa? Of the government and the general public - how does the government implement legislations and regulations regarding cyber security in the country? - how does the cyber security competitive landscape look like in south africa? Are there many local players? Do defense and cyber security giants show activity in the country? - who are the leading local vendors for cyber training and consultation services? - are there government initiatives regarding cyber security training? Educational programs? Military cyber training centers? We are willing to pay a generous honorarium for each 45 - 60 minute call. Thanks!

  1. Profile Picture

    Shyam |CFO Advisor

    we are amidst investing in a South african Cyber training company and I am well versed and can disc...

    6.5 Hours Later
  2. Profile Picture

    Ramamurthy |Owner & CEO

    I am a Cyber Security specialist conducting IS audits, consultancy in IS Policy and other online sec...

    10.2 Hours Later
  3. Profile Picture

    Dr Venkat |Global Consultant

    I have some idea ,but need to work with one of our local partners in South Africa ...

    7.1 Days Later
+11 Other Responses
Area Icon

Bluecoat Proxy

My company wants to hire someone to fix our problems with ssl. Thank you

  1. Profile Picture

    And |Technical presale, Security solution man

    Hello, I have a good experience in Content and Network solutions such as BlueCoat, Websense, McAfee....

    1 Day Later
  2. Profile Picture

    Vijay |Release Management, Quality Management,

    I have worked on Enterprise and Network Security and have a good exposure to them. But I am based ou...

    1.5 Days Later
  3. Profile Picture

    Ran |Information Security Consultant

    Hello, I'll be happy to be of a service. Please have a look in the following info: ♦ Current Positi...

    42 Days Later
+4 Other Responses
Area Icon

Cyber Security

We require a subject matter expert in cyber security, more specifically ransomware as a guest/keynote speaker in a webinar planned for sept 22. The sme must have relevant experience in online & data security, solid communication skills and good understanding of ransomware attacks.

  1. Profile Picture

    John |President & Chief Forensic Examiner

    I was part of *****r which took down Cryptolocker and I run the Ransomware Working Group, a...

    1.3 Hours Later
  2. Profile Picture

    Raghavan |Principal

    I bring in SME expertise in malware security trends (trojan and ransomware) and have architected sec...

    3.3 Hours Later
  3. Profile Picture

    Anthony |Principal Consultant

    I am a software development professional with 20+ years in Med Device, Healthcare IT space. I held ...

    3.4 Hours Later
+17 Other Responses
See More Inquiries

A HAN is a network contained within a user's home that connects a person's digital devices, from multiple computers and their peripheral devices to telephones, VCRs, televisions, video games, home security systems, "smart" appliances, fax machines and other digital devices that are wired into the network.

Top Home Area Networks (han) Experts

See More Experts
Share
LinkedInTwitterFacebookGoogle+