Expert Details
Application Security, Web Security, Network Security
ID: 719758
Maryland, USA
Expert was the chief architect of a family of products that form the core of an access control system for complex computer systems. The system provides API level reference monitoring, entitlements processing, and non-repudiation services as well as transparent protection for TCP/IP-based client-server applications as well as web-based applications.
Expert's experience in developing products for the computer software industry makes him intimately familiar with the challenges of computer security systems, as well as commercial offerings that can be brought to bear on these issues.
Expert has architected and implemented a comprehensive solution providing both transparent and direct protection of data. This includes secure transmission of data and secure storage. Extensive use of cryptography, auditing, and reporting can be employed in tracking, centralizing, implementing or improving existing data protection.
/
Expert was responsible the implementation of a product in customer settings that enabled approximately 20 clients to take security software into full deployment (company/campus-wide).
Education
| Year | Degree | Subject | Institution |
|---|---|---|---|
| Year: 1982 | Degree: MS | Subject: Computer Science Engineering | Institution: San Jose State University |
| Year: 1980 | Degree: BA | Subject: Talmudic Law | Institution: New Israel College |
Work History
| Years | Employer | Title | Department |
|---|---|---|---|
| Years: 2002 to 2005 | Employer: Undisclosed | Title: Software Engineering Manager | Department: Product Development |
Responsibilities:Expert develops and enhances the "Secured User" product family providing identity management, and seamless security for users, applications, systems, and networks. |
|||
| Years | Employer | Title | Department |
| Years: 2000 to 2002 | Employer: Undisclosed | Title: VP R/D | Department: Engineering |
Responsibilities:He developed the VACMAN Enterprise Security Suite, incorporating transparent web and application security. He implemented and managed deployments exceeding 250,000 users. |
|||
| Years | Employer | Title | Department |
| Years: 1996 to 1999 | Employer: Undisclosed | Title: VP Technology / RD | Department: Product Engineering |
Responsibilities:He designed and developed DCE/Sleuth (network monitor/decoder), and SnareWorks (security infrastructure), later acquired by Vasco Data Security. |
|||
| Years | Employer | Title | Department |
| Years: 1994 to 1995 | Employer: Landmark Systemss | Title: Principal Engineer | Department: Performance Engineering |
Responsibilities:Expert developed TMON/UNIX Performance series, distributed performance monitors. |
|||
| Years | Employer | Title | Department |
| Years: 1991 to 1993 | Employer: Strategic Software Group | Title: Principal Architect | Department: |
Responsibilities:He developed the first commercial UNIX performance monitor (later acquired by Landmark Systems). |
|||
| Years | Employer | Title | Department |
| Years: 1990 to 1991 | Employer: Open Software Foundation/X-Open | Title: Lecturer, Course Developer | Department: Education |
Responsibilities:Available upon request. |
|||
| Years | Employer | Title | Department |
| Years: 1988 to 1990 | Employer: A&T Systems | Title: Chief Architect | Department: |
Responsibilities:Available upon request. |
|||
| Years | Employer | Title | Department |
| Years: 1986 to 1988 | Employer: Locus Computing | Title: UNIX Kernel Developer | Department: |
Responsibilities:Available upon request. |
|||
Additional Experience
| Expert Witness Experience |
|---|
| Expert acted as an expert witness for a suit between IBM and Compuware covering patent infringement in the areas of UNIX performance engineering. |
Fields of Expertise
operating system, UNIX operating system, AIX operating system, access control system, computer security system, information security, software security system, data protection, internet security, computer network security, application security, security assessment, computer forensics, Linux operating system, Web development, World Wide Web programming, World Wide Web application, World Wide Web software, Internet firewall, intrusion detection, local-area network security, local-area network operating system, network security system, computer network