Affordably Source Intrusion Prevention Systems (ips) Experts and Industry Participants for Market Research, Diligence and Projects

Submit an anonymous Project Description -- Start receiving responses within a few hours

Have a need? Explain it here






How Zintro Works

  1. 1. Provide a clear description of your needs and your expectations of an expert, consultant or job candidate and Zintro will match it with the most relevant professionals in our platform.
  2. 2. Within a day or two typically 6 - 12 Experts, who have opted-in, will contact you with a brief explanation of their qualifications and how they can help.
  3. 3. You can communicate back and forth, qualify each other, connect and pay fees to Experts through Zintro.
  4. Zintro is free, anonymous and without obligation.

Loved by Thousands

Loved by thousands logos

Need Help?A phone icon1-877-236-7016

Recent Intrusion Prevention Systems (ips) Inquiries

Area Icon

Network Security Msp

Looking for insight and perspective as to best practices and kpi metrics for the managed service provider space focused on network security. Specifically what kpis drive valuation and current market multiples applied managed service revenues (recurring), professional service revenue (1x or project based work), and hardware associated revenue (pass-through).

  1. Profile Picture

    Bobby |Sr. System Engineer and Technology Solut

    Hello, I think the project description needs some *****, especially the target market. Layo...

    6.6 Hours Later
  2. Profile Picture

    Anand |Managing Partner

    Worked in Verizon as technology head and managed Network security for fortune companies. The KPI's ...

    15.7 Hours Later
  3. Profile Picture

    Simon |Security Consultant

    Hi, Largely depends on what you are trying to do. There are a number of KPIs that can be put in p...

    16.9 Hours Later
+7 Other Responses
Area Icon

Openvpn

Need to configure a tunnel between two data centers ... Open vpn is installed and awaiting configuration.

  1. Profile Picture

    Vikas |Consultant

    Hi, Do you want to establish secure channel between your company and some other provider? Please pr...

    1.2 Days Later
  2. Profile Picture

    Md Probal |Network Engineer

    Hi, I am interested to work on this project. Please let me know the following details - - Servers'...

    12.1 Days Later
+5 Other Responses
Area Icon

Security Policy Orchestration

Looking for experts in the network security policy management & orchestration space. A 30 minute telephone consults is required. Preferably looking for us based candidates. Experts should know the us market in this area well, the different solutions available, have a good understanding of large enterprises need for such a solution, along with the key market risks and threats for these vendors.

  1. Profile Picture

    Aaron |Zintro Expert

    Depending on your specific questions, I would love to help. Let me know if you'd like to set up a ca...

    3.5 Hours Later
  2. Profile Picture

    Scottard |Executive Security Strategist

    Hi, Saw your inquiry, I would like to assist you. I have over 20 years writing and automating s...

    3.5 Hours Later
  3. Profile Picture

    Ubaid |Expert Senior Consultant

    Hi, I can help you, I have more than 10 years of experiences in *****rity , technical sec...

    3.9 Hours Later
+19 Other Responses
Area Icon

Cyber Security Services Project

We are looking for multiple participants based in canada. Our client is conducting this market research study and would like to invite you to participate in our research to learn how companies choose third party providers for managed security services. They are looking for participants who recently evaluated third party managed security providers. This is for a paid 1-hour phone interview. **please note that we are only interested in your personal point of view and are not seeking confidential information. This is not a sales solicitation. All the information you provide us is kept strictly confidential. It is used for classification purposes only. Kindly respond to the questions below as to your relevance in this space: 1. Have you recently participated in the evaluation of third-party managed security providers? Yes/no 2. For the managed security service you evaluated, which of the following best describes the scope of services you were seeking from the third party: a. Standard security – my own it staff monitors, manages and resolves incidents or problems, plus manages moves / adds / changes b. Fully managed security – a service provider proactively monitors, manages and resolves incidents or problems, plus manages moves / adds / changes c. Neither

  1. Profile Picture

    Jonathan |Senior Manager

    1. Yes 2. B...

    2.5 Days Later
  2. Profile Picture

    Jeffrey L. |CEO | Founder | Principal Cybersecurity

    1. Yes 2. A...

    2.5 Days Later
  3. Profile Picture

    Jim |Sr. Cyber Security Principal Architect

    I have 23 years experience in Cybersecurity....

    2.5 Days Later
+303 Other Responses
Area Icon

Network Security Auditing

We need a seasoned security expert to come physically to our los angeles based center and perform a security audit and network evaluation. We have need of an experience professional to do a full network discovery with an emphasis on uncovering potential vulnerabilities and inherent design flaws with our layout. Scope of work to include an external penetration test as well as internal auditing with recommendations and a plan of action to be laid out.

  1. Profile Picture

    Ryan |President

    I ***** compliance for my clients domestic and *****h encompasses full securit...

    29 Minutes Later
  2. Profile Picture

    Satyen |Zintro Expert

    Hi, I am based in LA and Security expert to conduct Security Assessment, Security Audit and Assessm...

    7.7 Hours Later
  3. Profile Picture

    PRakash |Information security sme

    Hi, We offer Virtual CISO services which include various *****rity services with continu...

    12.3 Hours Later
+8 Other Responses
Area Icon

Virtual Private Networks

I need advise and a consultant to set up a small open vpn and router configuration for a office in the caribbean we have 3 persons in the road looking for sales and need to get access to the office pbx

  1. Profile Picture

    Eric |Security Engineer

    Hi- This sounds like an interesting project. Do you have any ideas on what kind of equipment you m...

    5.3 Hours Later
  2. Profile Picture

    Md Probal |Network Engineer

    Hi, You need to have either an windows server 2012 or 2008 and you can install OpenVPN on ***** ...

    7.5 Hours Later
  3. Profile Picture

    Preston |CEO

    Would love to help you solve your issue. How can I reach you? ...

    1.2 Days Later
+8 Other Responses
Area Icon

Senior Network

We have an immediate opening with one of our client. Kindly confirm your interest by replying to this inquiry with your updated resume and convenient time/number to discuss further. You can mail me via zintroin case if you are not currently available or not interested in the below position, i apologize for the inconvenience and request you to forward my mail to your friends or colleagues whom you feel would excel this opportunity job title   :senior network engineer (10 + yrs) location    :san ramon , ca terms       :long term contract  role summary/purpose: -senior network engineer responsible for implementing, operating and supporting multi-tenant, scalable network solutions. -the role will routinely review, analyze and recommend network improvements to ensure that the network can scale with the needs of the applications and services riding on it.   job description  - routing expertise – cisco & juniper routers and switches - ibgp, ebgp, ospf, is-is with hands-on experience managing enterprise wan - mpls, ipsec tunnel, ssl vpn, firewall, and dns - firewall & dns expertise - palo alto & f5 firewall - infoblox dns & ipam solutions - project management – must know agile to drive teams backlog - track and update the user stories to ensure the project(sprint iteration) is delivered with agreed content on time - monitor and optimize network performance and assure network security in a high availability environment. -work with telecom providers to report, troubleshoot, and resolve wan related issues. - enforce and execute user policies and procedures regarding the use of network resources. - provide on-call support to the first level support  requirements:  - bachelor's degree in information systems, information technology, computer science or engineering from an accredited college or university or equivalent experience - minimum 5+ years of experience supporting large enterprise network infrastructure (e.G. At a fortune 500 company) - must have 1-2 years of project management experience in agile methodology to help drive the day-to-day backlog\ 

  1. Profile Picture

    John |Founder

    JOHN D. DAUS 2053 Crossing ***** Vienna, VA ***** Phone: ***** Email: *****...

    1.6 Hours Later
  2. Profile Picture

    Walid |Network Architect

    Resume attached...

    5.4 Hours Later
  3. Profile Picture

    Navin |Vice President

    Hello, We can help you. Let us know. Navin...

    45.9 Days Later
+7 Other Responses
Area Icon

Email Encryption Market

We are a us based investment firm that is looking to better understand the email encryption software market for enterprises. Key vendors include zix corp and proofpoint. We are looking to understand: 1) what are the key attributes that differentiate email encryption solutions from various vendors, including zix and proofpoint? 2) are there changes in encryption technology or new entrants who could threaten the incumbent position of vendors like zix? 3) can you discuss the default encryption provided with google (gmail) and office 365 (outlook)? Why would an enterprise in a high-security-requirements industry (government, healthcare, finance, etc.) find these defaults unsatisfactory and choose to pay for third-party email encryption through a vendor like zix? Good candidates would include: · customers of an email encryption solution at a large enterprise · former employees of zix and/or proofpoint · current or former employees of competitors to zix and/or proofpoint

  1. Profile Picture

    James |Security Evangelist

    Zix is a well establish incumbent with ***** users of Google or Microsoft cloud email/apps w...

    2.3 Hours Later
  2. Profile Picture

    Ken |Security / System Specialist

    All, This sounds like a very interesting position. I have ProofPoint expernece from the compliance s...

    3.1 Hours Later
  3. Profile Picture

    George Cristian |Partner, Executive Manager

    On short: Zix solution is best it you use G-Suite (*****) and Proofpoint if you company uses Offic...

    11.3 Hours Later
+25 Other Responses
Area Icon

Technical Writing On Internet Security Architecture

Hope this message finds you well!  we have a new research project that may fall within your area of expertise. We are seeking an experienced technical writer who could write a white paper on industrial internet security architecture project. We are looking for someone with technical knowledge who has experience writing white papers.  as a first step, could you please confirm this is within your area of expertise and you are interested in learning more about this engagement as i would like to connect you with one of our team leaders who can explain this engagement in more detail.  thank you in advance, and we are looking forward to hearing from you. 

  1. Profile Picture

    Robert |Columnist

    I will be happy to speak with you on researching and authoring a White Paper on Industrial Internet ...

    46 Minutes Later
  2. Profile Picture

    Adam |Performance Development Professional

    I'd welcome the chance to help you achieve more, work less and *****n. I've spent years w...

    2.9 Hours Later
  3. Profile Picture

    Peter |Principal

    I think I fit the bill. I have Internet security and white paper writing experience....

    4.6 Hours Later
+13 Other Responses
Area Icon

Network Security Testing Market

We are a well established investment firm based in the us. We're looking to do some market research in the penetration testing space and would like to speak to people who have assessed, purchased, or used vendors such as core security, cigital, netspi or digital defense. We’d prefer to speak to those in the financial or retail verticals if possible. Below are some questions to ask prospective experts to help us select the ones we’d like to engage with: 1. Are you a key decision maker who manages or oversees penetration testing? 2. Do your penetration testing needs focus more around network security or application security, or both? 3. Have you chosen to utilize a penetration testing service such as core security, cigital, netspi or digital defense? 4. Please state your current title and employer. Thank you.

  1. Profile Picture

    Richard |Executive Chair

    I've sponsored and purchased both network *****ing and *****rity assessment s...

    8.3 Hours Later
  2. Profile Picture

    Anand |Managing Partner

    Have been a decision maker for the *****ing for many of the customers. Have worked with C...

    10.7 Hours Later
  3. Profile Picture

    John |Director, IT Security & Controls

    As the CISO for a publicly traded global medical devi ce manufacturer, I'm the key decision maker an...

    4.7 Days Later
+11 Other Responses
Area Icon

Anonymous Hacker Arrests

“anonymous” hacker arrests the zintro blog needs you! i write the zintro blog. I am looking for your expert opinion on the question below and a written response that is one to three paragraphs long. Your response may be used in an article that i will write and post on the zintro site. If it is used, you will be named in the article and a link to your expert profile will be included. Your contribution is voluntary (there is no payment involved). Question: what does the recent news that several members of the hacker group “anonymous” have been arrested mean to the future of internet security? This is a great marketing opportunity to get your name and expert opinion published on our blog. Here is a sample: http://blog.Zintro.Com/2012/01/16/keystone-xl-pipeline-pros-and-cons/ if you are interested, please send me your response via znotes in the next day or two. Include your full name. If you have any questions, please let me know. Thank you! maureen aylward

  1. Profile Picture

    Pablo |Information Security Specialist

    What does the recent news that several members of the hacker group “Anonymous” have been arrested me...

    14 Minutes Later
  2. Profile Picture

    Aaron |Senior Application Developer

    Hello Maureen, How soon do you need the article and is it ok if it is over 3 paragraphs long say 4?...

    15 Minutes Later
  3. Profile Picture

    TAIYE |President & Founder

    Please contact me at your earliest convenience....

    29 Minutes Later
+10 Other Responses
Area Icon

Cyber Security

Contribute to the zintro blog! i am an independent writer for zintro. I am looking for your expert opinion on the question below and a written response that is one to three paragraphs. Your response may be used in an article that i will write and post on the zintro blog site. If your response is used, you will be named in the article and a link to your expert profile will be included. Your contribution is voluntary and provides you with a great marketing opportunity to get your name and expert opinion published. Here is a sample blog: http://blog.Zintro.Com/ question: from sony to lockheed martin to pbs, cyber attacks are on the rise and increasing in sophistication. Even the us government announced that a cyber attack by a foreign government constitutes an act of war. How can companies, governments, and institutions protect themselves? How will cyber security change to meet the rising threats? If you are interested, please send me your response via znotes in the next day or two. If you have any questions, please let me know. Thank you. Maureen aylward

  1. Profile Picture

    James |President

    You cannot keep out a determined hacker. The biggest threat to security is between the keyboard and ...

    29 Minutes Later
  2. Profile Picture

    Ricardo |Co-Founder & CTO / Principal Information

    Hi Maureen, I've got another similar message from you but unfortunately I was out and was unable to...

    34 Minutes Later
  3. Profile Picture

    Hadi |Head of Security Strategy & GRC

    Hi, I am interested in helping you write the article and can input into this based on my experience ...

    1.5 Hours Later
+22 Other Responses
See More Inquiries

An Intrusion Prevention System is a network security device that monitors network and/or system activities for malicious or unwanted behavior and can react, in real-time, to block or prevent those activities. Network-based IPS, for example, will operate in-line to monitor all network traffic for malicious code or attacks . When an attack is detected, it can drop the offending packets while still allowing all other traffic to pass. Intrusion prevention technology is considered by some to be an extension of intrusion detection (IDS) technology. The term "Intrusion Prevention System" was coined by Andrew Plato who was a technical writer and consultant for *NetworkICE. Intrusion prevention systems (IPS) evolved in the late 1990s to resolve ambiguities in passive network monitoring by placing detection systems in-line. Early IPS were IDS that were able to implement prevention commands to firewalls and access control changes to routers. This technique fell short operationally for it created a race condition between the IDS and the exploit as it passed through the control mechanism. Inline IPS can be seen as an improvement upon firewall technologies (snort inline is integrated into one), IPS can make access control decisions based on application content, rather than IP address or ports as traditional firewalls had done. However, in order to improve performance and accuracy of classification mapping, most IPS use destination port in their signature format. As IPS systems were originally a literal extension of intrusion detection systems, they continue to be related. Intrusion prevention systems may also serve secondarily at the host level to deny potentially malicious activity. There are advantages and disadvantages to host-based IPS compared with network-based IPS. In many cases, the technologies are thought to be complementary. An Intrusion Prevention system must also be a very good Intrusion Detection system to enable a low rate of false positives. Some IPS systems can also prevent yet to be discovered attacks, such as those caused by a Buffer overflow.

Top Intrusion Prevention Systems (ips) Experts

See More Experts
Share
LinkedInTwitterFacebookGoogle+