Search
Close this search box.
Tony DeGonia - U.S. Army Veteran | Senior Sales Engineer | Solutions Architect | Changer of Landscapes.

Hey! My name is Tony DeGonia. I am a Sales Engineer Solutions Architect Technical Marketer
with over 15 years of experience.

Welcome to my website.

I am glad you have taken the time to stop by. This website contains content about my career and work life. I hope you enjoy the site and that it provides value to you.

As a part of the website’s security, all customer-identifying content is password protected. You can gain access by signing up with one of the three (3) account types below. All three (3) account types are free, but each has different access levels. 

*Note: If you sign up for a Recruiter/Talent Acquisition login, please know that I will run verification to ensure that it’s true.

Once again, thank you for visiting, and please let me know if there is anything I can do to improve your visit.

Please take a moment to review the various levels of accounts you can create on my website. 

Everyone who visits and wishes to see premium content, such as original articles, projects, or videos, must log in to view said content. I want to accommodate everyone who wishes to check out my content. However, I must be cautious, as much of the content is proprietary, and posting it on the open internet would not be appropriate.  

I appreciate your understanding and am excited to get notified of your registration. You can create your free account by clicking the SIGNUP button at the bottom of the pricing box.

Basic Level

Free
  • All curated articles
  • All original articles
  • All video access
Articles

Recruiter Access

Free
  • All curated articles
  • All original articles
  • All video access
  • All project access
  • Early access to new content
Popular

Advanced Level

Free
  • All curated articles
  • All original articles
  • All video access
  • All project access
Projects

My Competencies

With over 20 years of practical hands-on experience from both an Operations and Business standpoint. I have had the privilege of learning from some of the best people in the industry. Thus becoming a named Subject Matter Expert (SME) in a few technologies that are redefining the direction of Cybersecurity.

Security Information and Event Management (SIEM)

Security information and event management (SIEM) technology supports threat detection, compliance and security incident management through the collection and analysis (both near real time and historical) of security events, as well as a wide variety of other event and contextual data sources. The core capabilities are a broad scope of log event collection and management, the ability to analyze log events and other data across disparate sources, and operational capabilities (such as incident management, dashboards and reporting).

Security information and event management (SIEM) technology supports threat detection, compliance, and security incident management through the collection and analysis (both near real-time and historical) of security events, as well as a wide variety of other event and contextual data sources. The core capabilities are a broad scope of log event collection and management, the ability to analyze log events and other data across disparate sources, and operational capabilities (such as incident management, dashboards, and reporting).

Managed detection and response (MDR) services are a collection of network-, host- and endpoint-based cybersecurity technologies that a third-party provider manages for a client organization. The provider typically installs technology on-premises at the client organization and provides additional external and automated threat hunting services.

MDRs improve cybersecurity by searching for threats and responding to them once detected. They also let users connect with the provider’s security experts, who can bolster the security skills of the client company’s IT department. This makes them ideal for businesses that don’t have a designated in-house threat detection team.

XDR, or Extended Detection and Response, represents an integrated suite of security tools designed to provide unified protection against cyber threats. This proactive approach seeks to detect, analyze, and respond to potential threats in real-time, covering the network, cloud, endpoint, and email security domains.

Threat management is a process used by cybersecurity professionals to prevent cyberattacks, detect cyber threats, and respond to security incidents. Why is threat management critical?

Most security teams face information fragmentation, leading to blind spots in security operations.

A next-generation firewall (NGFW) is part of the third generation of firewall technology that can be implemented in hardware or software. It can detect and block sophisticated attacks by enforcing security policies at the application, port, and protocol levels.

Cloud computing is the on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. Large clouds often have functions distributed over multiple locations, each of which is a data center. 

My References

Let's Learn Together!

My Career

By The Numbers

$ 0 M

Revenue

Sales opportunities closed over fifteen years.

0

Years

Specialization in Cybersecurity

0

Years

Experience in Technology.

0 +

Customers

Secured in my fifteen years in Cybersecurity.

Previous

Employers

download
Scroll to Top

Login