Fortinet
Director, Global Marketing and Strategic Services
Fortinet Jun 2016 - Feb 2019
Director, Strategic Programs
Verizon Business Jan 2015 - Jun 2016
Senior Product Manager, Security Platforms Lead
Verizon Business Apr 2014 - Jan 2015
Cyber Security Product Manager, Us Public Sector and Critical Infrastructure
Fortinet Dec 2008 - Apr 2014
Senior Systems Engineer
Education:
Harvard Extension School 2015 - 2016
Keller Graduate School of Management of Devry University 2006 - 2013
Master of Business Administration, Masters, Management
Skills:
Firewalls Network Security Network Architecture Networking Cloud Computing Fortinet Vpn Wireless Security Linux Intrusion Detection Load Balancing Routing Protocols Xml Application Security Web Application Security Bgp Ipsec Os X Information Assurance Cloud Architecture Product Marketing Carrier Grade Firewall Multi Tenant Design Deep Packet Inspection Tcl Python Physical Security Security Management Operations Management Technical Writing Technical Documentation High Availability Itil Iso Security Operations It Management Complex Design Unifying Business and Security Goals Backbone Security Virtual Environment Security and Architecture Internet Routing Teaching Skills Visionary Creative Strategy Creative Problem Solving Project Management Email Security Scope Management Stata Rstudio
- Sunnyvale CA, US Jonathan Q. Nguyen-Duy - Fairfax VA, US Michael Craig Woolfe - Ashburn VA, US
International Classification:
H04L 29/06 H04L 29/08
Abstract:
The present invention relates to a method for managing IoT devices by a security fabric. A method is provided for managing IoT devices comprises collecting, by analyzing tier, data of Internet of Things (IoT) devices from a plurality of data sources, abstracting, by analyzing tier, profiled element baselines (PEBs) of IoT devices from the data, wherein each PEB includes characteristics of IoT devices; retrieving, by executing tier, the PEBs from the analyzing tier, wherein the executing tier is configured to control network traffic of IoT devices of a private network; generating, by the executing tier, security policies for IoT devices from PEBs of the IoT devices; and controlling, by the executing tier, network traffic of the IoT devices of the private network to comply with the security policies
- Sunnyvale CA, US Jonathan Q. Nguyen-Duy - Fairfax VA, US Michael Craig Woolfe - Ashburn VA, US
International Classification:
H04L 29/06 H04L 29/08
Abstract:
The present invention relates to a method for managing IoT devices by a security fabric. A method is provided for managing IoT devices comprises collecting, by analyzing tier, data of Internet of Things (IoT) devices from a plurality of data sources, abstracting, by analyzing tier, profiled element baselines (PEBs) of IoT devices from the data, wherein each PEB includes characteristics of IoT devices; retrieving, by executing tier, the PEBs from the analyzing tier, wherein the executing tier is configured to control network traffic of IoT devices of a private network; generating, by the executing tier, security policies for IoT devices from PEBs of the IoT devices; and controlling, by the executing tier, network traffic of the IoT devices of the private network to comply with the security policies
- Sunnyvale CA, US Jonathan Q. Nguyen-Duy - Fairfax VA, US Michael Craig Woolfe - Ashburn VA, US
International Classification:
H04L 29/06 H04L 29/08 H04L 12/947
Abstract:
The present invention relates to a method for managing IoT devices by a security fabric. A method is provided for managing IoT devices comprises collecting, by analyzing tier, data of Internet of Things (IoT) devices from a plurality of data sources, abstracting, by analyzing tier, profiled element baselines (PEBs) of IoT devices from the data, wherein each PEB includes characteristics of IoT devices; retrieving, by executing tier, the PEBs from the analyzing tier, wherein the executing tier is configured to control network traffic of IoT devices of a private network; generating, by the executing tier, security policies for IoT devices from PEBs of the IoT devices; and controlling, by the executing tier, network traffic of the IoT devices of the private network to comply with the security policies
Youtube
The Hajj 1997 (Michael Wolfe ABC News Special)
The Hajj with Michael Wolfe was a 22-minute ABC Friday Night News Spec...
Duration:
21m 56s
"Chill" The Michael Wolff Trio at Birdland T...
"Chill" live from the premiere of Bounce by Michael Wolff. This clip ...
Duration:
5m 57s
Mike Hookem tells all on Woolfe scuffle
Mike Hookem explains what 'really happened' during a 'silly tussle' wi...
Duration:
5m 22s
Time Of The Wolf - HD Trailer
Academy Award Nominated Filmmaker Michael Haneke's brilliant apocalypt...
Duration:
2m
Michael Cunningham on Virginia Woolf & The Ho...
Michael Cunningham discusses his reasons for deleting the original end...
Duration:
2m 39s
Michael Wood - In search of Beowulf
Historian Michael Wood returns to his first great love, the Anglo-Saxo...
Michael Woolfe (2000-2004), Jan Gibbs (1973-1976), Karen McCroan (1997-1999), Brenda Purnell (1975-1979), Susan Chiellini (1975-1977), Ed Aborn (1985-1988)