Absolute provides endpoint visibility and control to help self-healing endpoint security and always-connected IT asset management to protect devices, data, applications, and users — on and off the corporate network. Bridging the gap between security and IT operations, only Absolute gives enterprises visibility they can act on to protect every endpoint, remediate vulnerabilities, and ensure compliance in the face of insider and external threats. Absolute’s patented Persistence technology is already embedded in the firmware of PC and mobile devices and trusted by over 12,000 customers worldwide.
Company Location: | Company Website
This Is I.T. - 09.06.12
With Speaker: Guy Helmer
September 7th, 2012
Technical leadership of architecture, requirements, feature and functional design, implementation details, and troubleshooting for cross-platform network activity monitoring and data-loss-prevention in the Absolute SaaS platform. Expertise in Windows and Mac kernel drivers, networking stacks, and filesystems; network traffic analysis; text analysis; Java and Python web services deployed using Docker containers in Kubernetes; SQL and MongoDB databases. Advocacy in adopting and implementing agile methodologies.
Occasional advisor on technology analysis / due diligence and venture capital funding / startup company funding.
Undergraduate and graduate teaching experience including Enterprise Cybersecurity Management, Advanced Business Programming using Python for data analysis and Git collaboration tools, Network Management and Network Security (oriented to business), Intermediate Business Programming (emphasizing Java), and Advanced Telecommunications & Networks (emphasizing cloud computing), Distributed systems theory, and Java network programming.
Longtime open-source advocate and community participant in projects including FreeBSD, Squid, MinGW, and (in the distant past) TeX and LaTeX.
Ph.D. research leveraging agent technologies, machine learning, and fault-tree analysis of attacks in distributed intrusion detection systems, and high-performance computing using clusters of commodity computers using bleeding-edge networks at Ames Laboratory.
Past experience in network engineering, system programming, administration, and security of campus-wide LAN and WAN networks.