Badges

155 Points
8 Years
Top 10

User Activity

About 7 years ago
Answered a question: ForeScout vs. Cisco ISE
Unfortunately I don't have any exposure to ISE As far as authentication of wireless devices on Forescout, it's easy to hijack and present a AD login page provided you allow the hijack traffic through the ACL's, as the appliance already has LDAP connections with your AD…
Almost 8 years ago
We have a number of mpls sites, but the majority of our sites are vpn... we don't send any data to public ip addresses, it's all on internal ip space.
About 8 years ago
Great review! For 3rd party integrations, their plugins are extensive. They have one for Splunk but of course will feed syslog without anything additional.
About 8 years ago
Why are you still using version 5.x? Upgrade to 7, many improvements have been made both functionally and Security.

Projects

About 7 years ago
Network Access Control - International Expansion
Network Access Control - International Expansion
About 7 years ago
Network Access Control - Athabasca / Horizon Expansion
Network Access Control - Athabasca / Horizon Expansion
About 7 years ago
Asset Vulnerability Management - Corporate
Asset Vulnerability Management
About 7 years ago
Asset Vulnerability Risk Identification - ICS/SCADA
Asset Vulnerability Risk Identification - ICS/SCADA
About 7 years ago
Asset Vulnerability Management - International
Asset Vulnerability Management - International

About me

My experience in the industrial environment, supporting a large number of users, has shown me that given the right attitude, and a commitment to excellent customer service, every opportunity to improve the IS environment has realized benefits throughout the business.

My educational background along with my diverse experience allows me to facilitate reliable solutions to problems quickly. I enjoy expanding my experience and acquire new skills as necessary to complete the task. I work well in a team or independently and am able to lead personnel effectively.

Specialties: Network Access Control
Vulnerability Management
Malware Management
Wireless Networking
Mobile Computing
Infrastructure
Switching / Routing
Emerging Technologies
Rugged Computing