Tech with JD
  • Portfolio
  • Cloud Computing
    • Microsoft Azure
  • Infrastructure Solution
    • Microsoft Windows Server
    • Linux Server Administration
    • Virtual Desktop Infrastructure
    • Hyper Converged Infrastructure
  • Cybersecurity Solution
    • Data Loss Prevention
    • Next Generation Firewall
    • Web Application Firewall
    • Privileged Access Management
    • Endpoint Detection & Response
  • Projects
    • Enterprise Projects
    • Python Networking
    • Research Articles
  • Contact Me
Tech with JD Techie
Tech with JD Techie
  • Portfolio
  • Cloud Computing
    • Microsoft Azure
  • Infrastructure Solution
    • Microsoft Windows Server
    • Linux Server Administration
    • Virtual Desktop Infrastructure
    • Hyper Converged Infrastructure
  • Cybersecurity Solution
    • Data Loss Prevention
    • Next Generation Firewall
    • Web Application Firewall
    • Privileged Access Management
    • Endpoint Detection & Response
  • Projects
    • Enterprise Projects
    • Python Networking
    • Research Articles
  • Contact Me

Jadhusan

51 posts
Tech Enthusiastic!
Read More
  • 3 minute read
MMicrosoft Azure

Microsoft Azure: Setting up Routing through Virtual Machines

  • byJadhusan
  • December 27, 2022
Learn how to set up a secure and scalable network infrastructure in Azure using PowerShell commands. This step-by-step…
Read More
  • 2 minute read
MMicrosoft Azure

Microsoft Azure: Getting Started with Virtual Machines and Containers

  • byJadhusan
  • December 6, 2022
Description Dive into the world of Azure virtual machines and containers with this comprehensive guide. In the first…
Read More
  • 5 minute read
MMicrosoft Azure

Microsoft Azure: Configuring Virtual Networks

  • byJadhusan
  • November 24, 2022
Description Build and secure your network infrastructure in Azure with the second blog in this series. Explore the…
Read More
  • 3 minute read
EEndpoint Detection & Response

SentinelOne EDR: Exploring the Advanced EDR Solution

  • byJadhusan
  • November 8, 2022
Table of Content Introduction SentinelOne is a next-generation endpoint protection and response platform that offers advanced threat detection…
Read More
  • 7 minute read
WWeb Application Firewall

Imperva WAF: On-premises Configuration

  • byJadhusan
  • October 25, 2022
Table of Content Introduction – On Premise Solution Imperva Web Application Firewall (WAF) is a security solution that…
Read More
  • 5 minute read
PPrivileged Access Management

BeyondTrust: An Overview of Password Safe

  • byJadhusan
  • October 5, 2022
Table of Content Introduction BeyondTrust Privileged Access Management (PAM) is a solution that helps organizations to secure, manage,…
Read More
  • 5 minute read
NNext Generation Firewall

Palo Alto NGFW: Overlook and Easy Configuration

  • byJadhusan
  • September 28, 2022
Table of Content Introduction I recently had the opportunity to explore and work with the Palo Alto Networks…
Read More
  • 4 minute read
WWeb Application Firewall

Imperva DAM: Overview of DAM Solution.

  • byJadhusan
  • September 10, 2022
Table of Content Introduction Imperva DAM is an advanced solution specifically designed to safeguard and monitor sensitive data…
Read More
  • 5 minute read
DData Loss Prevention

Digital Guardian: Exploring the DLP Solution

  • byJadhusan
  • August 26, 2022
As technology continues to advance, so do the threats to our online security. From cyberattacks to data breaches,…
Read More
  • 6 minute read
PPrivileged Access Management

Osirium: Overall of PAM Solution

  • byJadhusan
  • August 15, 2022
Table of Content Introduction Osirium PAM (Privileged Access Management) is a security solution that helps organizations to secure,…
Tweets by darkmoon___24

Administration Azure Cloud Cybersecurity DAM DLP EDR Firewall HCI Implementation Infrastructure IPsecTunneling Linux MCT Microsoft Networking PAM Products Programming Project Python Security Server VDI WAF Windows

Tech with JD
© 2020 Jadhusan-S. All rights reserved.