Hey! My name is Tony DeGonia. I am a Sales Engineer Solutions Architect Technical Marketer
with over 15 years of experience.

Thank you for taking the time to visit my website.

This platform provides a comprehensive overview of my career journey, professional achievements, and current projects. Here, you will find detailed insights into my work, including updates on recent initiatives and advancements in my field. I trust you will find the content both informative and engaging, reflecting the depth and breadth of my professional experience.

The website has recently undergone a transition from a login-based access model for various user types to a revenue-driven approach. This change is designed to support my career transition as I seek new employment opportunities, while also streamlining access to valuable resources and content to enhance your overall experience.

I am pleased to introduce three new sections on the site:

  1. Learning Series: Explore basic and advanced courses on networking and cybersecurity, tailored to a range of expertise levels.
  2. Consulting Services: Learn more about the diverse consulting services I now offer through Tony DeGonia.com Consulting Services.
  3. E-Commerce Section: Browse and select services of interest, build estimates, place orders, and for existing clients, access features such as invoice payments, project status updates, and upcoming enhancements.

Your visit is greatly appreciated. I welcome any feedback or suggestions you may have to help improve the site. I am committed to ensuring this platform meets your needs and expectations. Thank you once again for your support and for exploring my work.

 

Ask Jamieson (AI),

Is there something you can’t find on my website? Ask Jamieson (AI). He will gladly answer any question you have regarding IT, Networking or Cybersecurity. Please limit your questions to 1000 characters or less to save time and preserve resources.

Ask Jamieson
Name
Name
First
Last

Check Out My

Learning Series

Original & Curated Articles

I have published articles in various industry blogs and publications. Additionally, I have curated a selection of articles on similar topics that are considered to be of the highest quality. These articles help me stay up-to-date on industry trends.

My References

My Competencies

With over two decades of practical, hands-on experiencespanning both operational and business aspects, I've had the privilege of learning from some of the industry's finest professionals. This journey has led me to become a recognized Subject Matter Expert (SME) in several technologies that are reshaping the landscape of cybersecurity.

Security Information and Event Management (SIEM)

Security information and event management (SIEM) technology supports threat detection, compliance and security incident management through the collection and analysis (both near real time and historical) of security events, as well as a wide variety of other event and contextual data sources. The core capabilities are a broad scope of log event collection and management, the ability to analyze log events and other data across disparate sources, and operational capabilities (such as incident management, dashboards and reporting).

Security information and event management (SIEM) technology supports threat detection, compliance, and security incident management through the collection and analysis (both near real-time and historical) of security events, as well as a wide variety of other event and contextual data sources. The core capabilities are a broad scope of log event collection and management, the ability to analyze log events and other data across disparate sources, and operational capabilities (such as incident management, dashboards, and reporting).

Managed detection and response (MDR) services are a collection of network-, host- and endpoint-based cybersecurity technologies that a third-party provider manages for a client organization. The provider typically installs technology on-premises at the client organization and provides additional external and automated threat hunting services.

MDRs improve cybersecurity by searching for threats and responding to them once detected. They also let users connect with the provider’s security experts, who can bolster the security skills of the client company’s IT department. This makes them ideal for businesses that don’t have a designated in-house threat detection team.

XDR, or Extended Detection and Response, represents an integrated suite of security tools designed to provide unified protection against cyber threats. This proactive approach seeks to detect, analyze, and respond to potential threats in real-time, covering the network, cloud, endpoint, and email security domains.

Threat management is a process used by cybersecurity professionals to prevent cyberattacks, detect cyber threats, and respond to security incidents. Why is threat management critical?

Most security teams face information fragmentation, leading to blind spots in security operations.

A next-generation firewall (NGFW) is part of the third generation of firewall technology that can be implemented in hardware or software. It can detect and block sophisticated attacks by enforcing security policies at the application, port, and protocol levels.

Cloud computing is the on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. Large clouds often have functions distributed over multiple locations, each of which is a data center. 

My Career

By The Numbers

In Revenue (2018 - 2022)
$ 0 M
Years in Cybersecurity
0
Years in Technology
0
Customers Secured
0

Podcasts &

Videos

Explore the collection of how-to videos and podcasts featured on my website. These resources showcase the evolution of my presentation and training skills over the past year. I invite you to review them to gain insight into the breadth and depth of my expertise. Enjoy!

Causes I Believe In