I look forward to connecting with you.

Your submission was successful!

We will contact you shortly.
Usually, it takes up to 24h to process the request.

I truly appreciate you visiting my page

I’ve been working with MSPs, MSSPs, and enterprises to solve a single challenge: Security Monitoring, Response, and Recovery. Okay, three challenges—but important ones!

Hello, hello! Ever wondered how an IT Security help desk newbie could rise to the role of CISO at a global law firm? I’m Kevin Nejad, founder and CEO of Vijilan Security, and I’ve done just that. Over the years, I’ve had the pleasure of working with IT security consultants, small IT solution providers, and managed services providers (MSPs), all the way up to C-level senior executives at Fortune 500 companies like Philip Morris, Altria, Kraft Heinz, Mondelez International, and Rogers Communications, as well as leading tech firms like EDS and HPE.

I’ve been fortunate to have a diverse career path, starting as an IT security help desk professional and working my way up to becoming the Chief Information Security Officer (CISO) at global international law firms. Along the way, I’ve gained extensive experience in incident response and digital forensics.

My experience also includes managing SIEMs, implementing SIEMs, and operating SOCs. I understand the cybersecurity monitoring challenges we all face, and I’m here to help you find the right solutions—because who doesn’t love a good cybersecurity puzzle?

The Challenges Our MSPs Partners Faced Before Joining Vijilan (and How We Saved the Day)

The very first thing I started noticing was MSPs’ dissatisfaction with their existing SIEM and SOC providers. It was like a bad relationship—they just weren't getting the support they needed.

What I discovered is that many MSPs are frustrated with their current Security Information and Event Management (SIEM) and Security Operations Center (SOC) providers. It’s usually over common and easily solvable issues—like having the same argument over and over again!

Inefficient Tools:

Legacy SOC providers take too long to address tickets because of inefficient tools and systems—it's like trying to fix a leaky faucet with a spoon!

Unhappy Engineers:

Engineers are frustrated with their current SIEM and SOC vendors, feeling like chefs forced to cook with rusty spoons. Inefficient and unreliable tools are draining their morale and productivity

High Costs:

Decision makers in charge of expenses are concerned about the high costs of security monitoring services, especially when it comes to meeting compliance requirements and ensuring scalability.

Lack of Integration:

Current SIEM and SOC vendors lack the necessary support and integrations with the technologies our engineers use and manage. This shortfall is causing frustration and inefficiency.

The Challenges Enterprises Face
Issues with Visibility and Log Collection

Ever since I started working with clients through our MSP/MSSP ecosystem and technology alliance partners like CrowdStrike and Cribl on log and data management issues, I’ve discovered many challenges these organizations face. One major challenge is consolidation and visibility. These companies deal with several significant issues in their security operations, such as:

Enterprises encounter several critical issues in their security operations, such as:

Incomplete Log Collection:

A lot of companies struggle to collect logs from all the on-premises and cloud equipment and devices they own, resulting in gaps in their security monitoring.

Lack of Visibility:

A lack of comprehensive visibility across on-premises and cloud services frequently makes it difficult to identify and mitigate problems.

Unresponsive MSPs and MSSP:

Businesses frequently get dissatisfied with their MSPs or MSSPs for two reasons: inadequate assistance and slow responses.

Vendor Complexity :

Resolving simple security issues usually requires collaborating with multiple providers, which increases complexity and slows down the process.

Our Solutions

XDR, or Extended Detection and Response
Be Vigilant Against Virtual Threats

Our XDR solution combines many security technologies into a single, cohesive platform to provide comprehensive visibility and protection across the entire IT environment. This includes on-premises devices such as firewalls, servers, and security appliances, as well as cloud applications and cloud security products. Examples include email gateways like Mimecast or Proofpoint, authentication technologies like Okta, Cisco Duo, and Microsoft Entra, and Microsoft Office.

 
What I Can Do to Help?

Holistic Threat Detection:

The first thing we do for enterprises is merge and correlate data from various security levels into a single repository, including logs from servers, endpoints, networks, and the cloud. Our XDR platform creates a cohesive image of security risks

Automated Response:

Reduce potential harm and reaction times by using automation to quickly respond to threats across all assets, including networks, devices, applications, data, users, and cloud services.

Enhanced Visibility:

We also began assisting analysts with proactive threat hunting and investigation, made possible by our ability to provide visibility into every facet of your IT infrastructure through extensive analytics and reporting.

Improved Efficiency

Then we expedited security operations and freed up the team so they could focus on actual threats, we implemented our solution, which reduces false positives and alert fatigue. Our advanced analytics and continuous monitoring provide deep insights and real-time threat intelligence.

Managed Extended Detection and Response (mXDR)
Reduce the Time Expended Against Extremely Persistent Attacks.

Our mXDR service offers a comprehensive, fully managed security solution that combines state-of-the-art technology with experienced supervision to protect your business 24/7.

Benefits:

Immediate Incident Response

Remove threat actors from your environment as soon as possible and prevent them from attempting to penetrate it again by implementing Vijilan's ThreatRemediate services.

Quick Recovery

To avoid exposure, Vijilan detects and contains incidents at scale to reduce exposure and persistent attacks 24 hours a day, seven days a week.

Least Possible Business Disruption:

Resuming business operations as soon as possible.

Effective Recovery at a Low Cost:

Restart operations as soon as possible by reducing the usual recovery time from weeks or months to days, hours and in some situations in minutes without any interruptions.

Ongoing Assistance:

In order to maintain the safety of your environment after the recovery time, Vijilan Services monitors security threats and takes appropriate action.

Why Choose Vijilan Security?

Technology and Knowledge Combined

Status-Checking and Reaction

Staffed around-the-clock to monitor, detect, and respond to threats, our Security Operations Center (SOC) is located in the United States.

Industry Partnerships

We work with the most advanced technology and provide excellent security solutions.

Personalized Solutions

Our solutions are made to meet the unique needs of MSPs/MSSPs and enterprises.

Proactive Threat Hunting

Using state-of-the-art threat intelligence and analytics, we actively search out threats and eradicate them before they have an opportunity to cause any harm.

Oh, do you wonder why I talk a lot about protection? Watch this short video the CrowdStrike team made of me. Protection is in our DNA at Vijilan.
A Personal Vow

Protecting Your Business

As the CEO and founder of Vijilan Security, I pledge to make sure your company’s safety and security. I personally interact with MSPs and businesses to learn about your particular problems and collaborate with you to identify and apply the best solutions. At Vijilan, we work hard to provide you the greatest protection and assistance available so you can focus on what you do best.

Follow on LinkedIn

Experience

Founder and CEO

Vijilan Security, LLC · Full-time

Oct 2014 - Present

Co-Founder

Cyber Incident

Oct 2011 - Oct 2014 ·

Chief Information Security Officer

White & Case LLP

Jun 2008 - Oct 2011

Information Security Project Manager

Hewlett Packard Enterprise

2006 - 2008

Senior Security Data Scientist

Altria

2004 - 2006

Incident response and digital forensics

Philip Morris International

Aug 2001 - Aug 2004

Network Security & fraud Analyst

Rogers Communications

Sep 1996 - Oct 2000

Licenses & certifications

DIGITAL TRANSFORMATION: PLATFORM STRATEGIES FOR SUCCESS

Emeritus

Issued Sep 2020

Digital Transformation

MIT Sloan Executive Education

Issued Sep 2020

Certified Information Systems Security Professional (CISSP)

ISC2

Issued May 2014

Microsoft Certified Systems Engineer (MCSE)

Microsoft

Issued Sep 2004

Microsoft Certified Systems Administrator (MCSA)

Microsoft

Issued Sep 2003

Certified Information Systems Security Professional (CISSP)

ISC2

Credential ID 67980

ISO 27001 Foundation - Information Security Certification

BSI

Education

Carnegie Mellon University

Information System, Computer Software Engineering

2006

New York University

Information Security

2003

York University

Bachelor of Applied Science,

1992 - 1996

The Wharton School

Business Analytics

2020

my hobbies

American Muscle cars

Hot rods

Rat rods

Frenchies

Regarding Security in Vijilan

Vijilan is a U.S.-based LLC specializing in cybersecurity threat management. We provide managed IT security services to the government, healthcare, education, manufacturing, and finance sectors in partnership with Managed Service Providers (MSPs) and Managed Security Services Providers (MSSPs). Vijilan delivers managed extended detection and response (mXDR) and extended detection and response (XDR) to clients in the Americas, Asia-Pacific, the Middle East, and Europe.

Drop me a note! Let's have a chat and see how we can make some cyber magic together.

Your submission was successful!

We will contact you shortly.
Usually, it takes up to 24h to process the request.

Enhance your security posture using Vijilan’s XDR and mXDR solutions. Help us defend your company’s continuity and resilience from cyberattacks. Let’s work together to protect your business from the most recent and sophisticated cyberthreats.

cookie
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.