A senior technologist with 25+ years in the computer industry, a strong business acumen, and deep technical knowledge.
I continually work to develop and maintain technical leadership in Rocky Mountain region driving solutions with global Enterprise customers.
Building Hybrid Cloud solutions based on a open technology solutions, Cloud technology is taking over the industry but a open approach to what is best for every customer. Jeff has an extensive background in layer 1-7 networking solutions with experience in many of the modern challenges that face IT organization today: Application Delivery, Virtualization, Application Security, Secure Remote Access, and Mobility Datacenter Consolidation.
By identifying key priorities before a breach, ZT infrastructure managers can contribute meaningfully to the success of the organization’s ZT strategy.
Contemporary zero trust infrastructure often centers on outside-the-perimeter resources, challenging security leaders who are looking to establish resilient environments.
Zero trust networks provide visibility into key issues, including segmentation, secure access to data, applications, and identity and device resources.
The network plays a unique role in the shift from traditional perimeter-based security strategies to zero trust, spanning four key categories.