Hey! My name is Tony DeGonia. I am a Sales Engineer Solutions Architect Technical Marketer
with over 15 years of experience.

Thank you for taking the time to visit. Here, you’ll find insights into my career journey and professional endeavors. I trust you’ll find valuable information that resonates with you.

To ensure security and privacy, certain customer-identifying content is password protected. Gain access by registering for one of the three (3) account types outlined below. While all accounts are free, each offers different levels of access.

*Please note: Verification is required for Recruiter/Talent Acquisition accounts to ensure authenticity.

Your visit is appreciated, and I welcome any feedback or suggestions to enhance your experience. Thank you once again for stopping by.

Check Out My

Learning Series

Check out the subscriptions below.

Please take a moment to explore the different account options available on my website.

Access to premium content, including original articles, projects, and videos, requires logging in. While I aim to accommodate all visitors interested in viewing my content, I must also prioritize privacy and protect proprietary information.

Your understanding is greatly appreciated. I look forward to receiving notifications of your registration. Simply click the SIGNUP button at the bottom of the pricing box to create your free account. Thank you for your interest!

Basic Membership

$ 0 per year
  • All Public Content
  • All curated articles
  • All original articles
  • All video access
Articles

Recruiter Access

$ 0 per year
  • All Public Content
  • All curated articles
  • All original articles
  • All video access
  • All project access
  • Early access to new content
Everything

Advanced Level

$ 0 per year
  • All Public Content
  • All curated articles
  • All original articles
  • All video access
  • All project access
TECHIES

Original & Curated Articles

I have published articles in various industry blogs and publications. Additionally, I have curated a selection of articles on similar topics that are considered to be of the highest quality. These articles help me stay up-to-date on industry trends.

My References

My Competencies

With over two decades of practical, hands-on experiencespanning both operational and business aspects, I've had the privilege of learning from some of the industry's finest professionals. This journey has led me to become a recognized Subject Matter Expert (SME) in several technologies that are reshaping the landscape of cybersecurity.

Security Information and Event Management (SIEM)

Security information and event management (SIEM) technology supports threat detection, compliance and security incident management through the collection and analysis (both near real time and historical) of security events, as well as a wide variety of other event and contextual data sources. The core capabilities are a broad scope of log event collection and management, the ability to analyze log events and other data across disparate sources, and operational capabilities (such as incident management, dashboards and reporting).

Security information and event management (SIEM) technology supports threat detection, compliance, and security incident management through the collection and analysis (both near real-time and historical) of security events, as well as a wide variety of other event and contextual data sources. The core capabilities are a broad scope of log event collection and management, the ability to analyze log events and other data across disparate sources, and operational capabilities (such as incident management, dashboards, and reporting).

Managed detection and response (MDR) services are a collection of network-, host- and endpoint-based cybersecurity technologies that a third-party provider manages for a client organization. The provider typically installs technology on-premises at the client organization and provides additional external and automated threat hunting services.

MDRs improve cybersecurity by searching for threats and responding to them once detected. They also let users connect with the provider’s security experts, who can bolster the security skills of the client company’s IT department. This makes them ideal for businesses that don’t have a designated in-house threat detection team.

XDR, or Extended Detection and Response, represents an integrated suite of security tools designed to provide unified protection against cyber threats. This proactive approach seeks to detect, analyze, and respond to potential threats in real-time, covering the network, cloud, endpoint, and email security domains.

Threat management is a process used by cybersecurity professionals to prevent cyberattacks, detect cyber threats, and respond to security incidents. Why is threat management critical?

Most security teams face information fragmentation, leading to blind spots in security operations.

A next-generation firewall (NGFW) is part of the third generation of firewall technology that can be implemented in hardware or software. It can detect and block sophisticated attacks by enforcing security policies at the application, port, and protocol levels.

Cloud computing is the on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. Large clouds often have functions distributed over multiple locations, each of which is a data center. 

Podcasts & Videos!

My Career

By The Numbers

In Revenue (2018 - 2022)
$ 0 M
Years in Cybersecurity
0
Years in Technology
0
Customers Secured
0

Causes I Believe In