Source Patch Management Experts for your Project, Phone Consult or Job

Submit an anonymous Inquiry -- Start receiving responses within a few hours

Have a need? Explain it here

Zintro does not display, sell or trade e-mail addresses

An eye iconForgot password?
Submit Inquiry

By clicking Submit Inquiry you agree to our TermsVIEW

or Request Pricing Information

How Zintro Works

  1. 1. Provide a clear description of your needs and your expectations of an expert, consultant or job candidate and Zintro will match it with the most relevant professionals in our platform.
  2. 2. Within a day or two typically 6 - 12 Experts, who have opted-in, will contact you with a brief explanation of their qualifications and how they can help.
  3. 3. You can communicate back and forth, qualify each other, connect and pay fees to Experts through Zintro.
  4. Zintro is free, anonymous and without obligation.

Loved by Thousands

Loved by thousands logos

Need Help?A phone icon1-877-236-7016

Recent Patch Management Inquiries

Area Icon

Bigfix

We are looking to speak with cios of medium and large companies that have experience using or have evaluated bigfix, inc. . .

  1. Profile Picture

    Todd |VP Technical Operations

    Sorry, no experience with BigFix. Lots of Internet Security/SaaS experience - if that's helpful....

    6.2 Days Later
  2. Profile Picture

    Andrei |Owner

    Sorry , i never worked with Big Fix , but regarding Internet Security; Network Security; Informatio...

    20 Days Later
  3. Profile Picture

    Brian |Principal

    CStoner, Thank you for your inquiry. I am not familiar with BigFix and cannot provide assistance in...

    26.3 Days Later
+3 Other Responses
Area Icon

It Security Analysis In Us

We are looking to consult with it security experts in the u.S who would be willing to take on a 6+ month project that requires firewall expertise (palo alto and checkpoint) . Has a cissp certification and can provide insight on infrastructure risk assessments

  1. Profile Picture

    Shankar |Security Solutions Strategist

    I would be interested in helping you out. I have had experience working with Firewalls , F5 load bal...

    2.6 Hours Later
  2. Profile Picture

    Bobinson |CEO

    Greetings from *****! We would like to understand more about the requirement and possib...

    1 Day Later
+5 Other Responses
Area Icon

It Security And Web Performance

We are looking to interview experts from the it security and web performance spaces in both fortune 1000 companies and government. Some of the relevant job titles are: web performance engineers network architects security architects security network engineers ciso's cio's cso's please send me your qualifications and experience and we would like to set up 30min-1hr phone calls with you.

  1. Profile Picture

    Chip |Managing Partner and Director of Researc

    Hello, Thank you for your inquiry. Please have a look at my profile and background and let me know...

    22 Minutes Later
  2. Profile Picture

    Usman |Systems And Network Engineer.

    Dear, thanks for showing your interest and i am willing to do this job. you can reach me at u.letsne...

    2 Days Later
  3. Profile Picture

    Michael |Ethical Hacker/InfoSec Consultant

    With over 20+ years in InfoSec at various levels from architect to CISO, I am confident I can provid...

    3 Days Later
+19 Other Responses
Area Icon

It Security Service

Hi all, we are looking to engage with experts who can share thier insights on the it security service market. We are looking for specific insights on:- -future trends in the market -top vendors in the market -contract dusrtaions, slas and kpis thanks and regards.

  1. Profile Picture

    Arnold |President

    I am very interested in this security project. Recently I completed an assignment on Cybersecurity a...

    23 Minutes Later
  2. Profile Picture

    Gary |Security Services Product Manager

    Hello, Currently, I am the Security Service Manager for the ***** Minnesota and have held positi...

    1 Hour Later
  3. Profile Picture

    Shyam |VP of Finance

    Very knowledgeable about IT security services having renegotiated a number of IT security contracts ...

    1 Hour Later
+20 Other Responses
Area Icon

Anonymous Hacker Arrests

“anonymous” hacker arrests the zintro blog needs you! i write the zintro blog. I am looking for your expert opinion on the question below and a written response that is one to three paragraphs long. Your response may be used in an article that i will write and post on the zintro site. If it is used, you will be named in the article and a link to your expert profile will be included. Your contribution is voluntary (there is no payment involved). Question: what does the recent news that several members of the hacker group “anonymous” have been arrested mean to the future of internet security? This is a great marketing opportunity to get your name and expert opinion published on our blog. Here is a sample: http://blog.Zintro.Com/2012/01/16/keystone-xl-pipeline-pros-and-cons/ if you are interested, please send me your response via znotes in the next day or two. Include your full name. If you have any questions, please let me know. Thank you! maureen aylward

  1. Profile Picture

    Pablo |Information Security Specialist

    What does the recent news that several members of the hacker group “Anonymous” have been arrested me...

    14 Minutes Later
  2. Profile Picture

    Aaron |Senior Application Developer

    Hello Maureen, How soon do you need the article and is it ok if it is over 3 paragraphs long say 4?...

    15 Minutes Later
  3. Profile Picture

    TAIYE |President & Founder

    Please contact me at your earliest convenience....

    29 Minutes Later
+10 Other Responses
Area Icon

Security Policy Orchestration

Looking for experts in the network security policy management & orchestration space. A 30 minute telephone consults is required. Preferably looking for us based candidates. Experts should know the us market in this area well, the different solutions available, have a good understanding of large enterprises need for such a solution, along with the key market risks and threats for these vendors.

    +undefined Other Responses
    Area Icon

    Technical Writing On Internet Security Architecture

    Hope this message finds you well!  we have a new research project that may fall within your area of expertise. We are seeking an experienced technical writer who could write a white paper on industrial internet security architecture project. We are looking for someone with technical knowledge who has experience writing white papers.  as a first step, could you please confirm this is within your area of expertise and you are interested in learning more about this engagement as i would like to connect you with one of our team leaders who can explain this engagement in more detail.  thank you in advance, and we are looking forward to hearing from you. 

    1. Profile Picture

      Robert |Principal

      I will be happy to speak with you on researching and authoring a White Paper on Industrial Internet ...

      46 Minutes Later
    2. Profile Picture

      Adam |Performance Development Professional

      I'd welcome the chance to help you achieve more, work less and *****n. I've spent years w...

      2.9 Hours Later
    3. Profile Picture

      Peter |Principal

      I think I fit the bill. I have Internet security and white paper writing experience....

      4.6 Hours Later
    +13 Other Responses
    Area Icon

    Wide Information Security Planning

    Execsense, a division of the financial times, is an exclusive digital network of career-driven thought leaders. We are seeking an expert to lead a 60-minute webinar on the topic of “strategies for ctos & cios on developing and executing an enterprise-wide information security plan” scheduled for 2/10 at 1 p.M. Est. The speaker will be responsible for compiling a basic 15-20-slide powerpoint for the presentation (template provided) and being available for the live recording or for a pre-record prior to that date. Speakers will be asked to sign a waiver, release and consent form that requires the speaker to provide their intellectual property for the purposes of presenting with us. While we will maintain a copyright of the final product (powerpoint our logos and recording of presentation), we will not hold a copyright on the intellectual property provided by the speaker and the speaker will be free to use such concepts in the future. The chosen speaker will receive compensation and tremendous professional exposure. Speakers will not be asked to pay any fees. Our lecturers have come from: mit sloan, sap, forbes, cornell university, ernst & young, deloitte, kpmg, new york university, and many more top organizations. For additional requirements or information, please send your resume and any relevant information, as well as this original posting. Thanks daniel

    1. Profile Picture

      Hussain |Manager IT Security

      Hi, I am interested, i am a lead implemented of ISMS, PCI DSS, ITIL, COBIT and CMMi, currently head...

      9.7 Hours Later
    2. Profile Picture

      Richard |Founder

      Daniel, I am available to discuss your requirements. It is not clear where a resume is to be sent....

      12.5 Hours Later
    3. Profile Picture

      Dan |VP, Enterprise Technology

      I have senior leadership in technology delivering products and services for Fortune 100 global compa...

      17 Hours Later
    +6 Other Responses
    Area Icon

    Pharma It Security

    Hi, i need sourcing specific insights on 'it security' from a pharmaceutical company point of view. Below are the key queries. 1. How the large pharmaceuticals companies procure 'it security' solutions? What are the recent trends being witnessed in the market? A. Bundled with it services? B. Software and hardware/devices are procured separately? C. Different suppliers for standard security solutions and high security (for research work) solutions? D. Engaging with a msp? 2. What are the key technology advancements? 3. Is there some instances where the companies have shifted to cloud based solutions? 4. What is virtual security operations center? How is it evolving? 5. How the direct sourcing of it services by business managers are evolving? 6. How the companies are assuring it security across the supply chain? Case studies. 7. Do the companies procure it security services or they procure it security solutions? 8. What are the key contract terms and slas? 9. What are the best practices? How the category is evolving? 10. What are the cost savings and negotiation opportunities? Thanks and regards, gaurav

      +undefined Other Responses
      Area Icon

      It Security Solution Resellers In Europe

      Eu resellers of it network security solutions in europe i work for a prominent expert network working in partnership with zintro. We would like to source multiple experts on behalf of an institutional investor. Specifically, we are looking for the following type of expert: our client would like to speak with resellers of network it security solutions within europe. Please respond back with your current/ recent employment history, contact info, or linkedin profile for reference.

      1. Profile Picture

        Lee |Consultant/Owner

        Hi, I am an Infrastructure consultant specializing in VMware vSphere and *****rity solution....

        48 Minutes Later
      2. Profile Picture

        Sergey |Systems Engineer

        Hello, I'm an IT consultant specializing in Exchange/Office365/Microsoft/Azure/Virtuzalition in Cana...

        1.6 Hours Later
      3. Profile Picture

        Paul |Sr. Information Security Manager

        I'm in the USA...

        2.7 Hours Later
      +6 Other Responses
      Area Icon

      Bigfix

      We are looking to speak with cios of medium and large companies that have experience using or have evaluated bigfix, inc. .

        +undefined Other Responses
        Area Icon

        Information Security And Privacy

        We are a leading webinar publisher (wholly owned by the financial times) and a authorized zintro partner. We are seeking an expert to lead a 60-minute webinar on the topic of “how information security and privacy will impact your bottom line as a gc”. The speaker will be responsible for compiling a basic 15-20-slide powerpoint for the presentation (template provided) and being available for the live recording or for a pre-record prior to that date. Speakers will be asked to sign a waiver, release and consent form that requires the speaker to provide their intellectual property for the purposes of presenting with us. While we will maintain a copyright of the final product (powerpoint with our logos and recording of presentation), we will not hold a copyright on the intellectual property provided by the speaker and the speaker will be free to use such concepts in the future. The chosen speaker will receive compensation and tremendous professional exposure. Speakers will not be asked to pay any fees. Our lecturers have come from: mit sloan, sap, columbia university, harvard business review, cornell university, ernst & young, deloitte, kpmg, new york university, and many more top organizations. For additional requirements or information contact me

        1. Profile Picture

          ANDREW R. |CTO/Chief Enterprise Architect & CSO

          I can certainly lead such a webinar....

          1.5 Hours Later
        2. Profile Picture

          Emanuel |Senior Disaster Recovery Planner

          Inforamtion Security and Privacy are at the top of the list for many *****. Technology and ...

          1.7 Hours Later
        3. Profile Picture

          Robert |Principal

          I would be happy to speak with you about such a webinar. I have been a Contributor to the "Computer ...

          1.9 Hours Later
        +7 Other Responses
        See More Inquiries

        Top Patch Management Experts

        See More Experts
        Share
        LinkedInTwitterFacebookGoogle+