How a GoogleUpdater got its start This 1+ minute video introduces the concept of provenance chains, tracking how one instance of the GoogleUpdater program got started. […]
In today’s digital world, ensuring a seamless and optimal user experience is crucial for businesses to thrive. With the increasing dependence on digital technologies, monitoring and […]
How a GoogleUpdater got its start This 1+ minute video introduces the concept of provenance chains, tracking how one instance of the GoogleUpdater program got started. […]
Introduction Modern operating systems have rich logging capabilities, useful for detecting a wide range of security threats. While the Federal Government mandates standards for configuring these […]
Ennetix’s vision has always been to build a solution that combines performance (application and network) and security insights on a unified observability platform. Based on our […]
This series of blog posts is intended to capture some significant events and inventions that shaped the evolution of networks as they exist today. As an […]
In Dorothy Denning’s seminal 1986 paper “An Intrusion-Detection Model”, she introduces her core concept in her second sentence: “The model is based on the hypothesis that […]
Ashok Madanahalli brings 30+ years of experience in networking and cybersecurity at industry leaders such as Riverbed, Check Point, Extreme Networks, and FORE Systems where he built and led high-performance teams delivering product and market share leadership. At Riverbed, Ashok served as Vice President of Product Management (WAN Optimization and SD-WAN) leading the business transformation to Cloud and SaaS. He has also led Firewall/VPN/UTM and IDS/IPS solutions. Ashok holds a master’s degree in engineering from University of Oklahoma and a bachelor’s degree from National Institute of Technology, Durgapur, India.
FOUNDER AND DIRECTOR OF ENGINEERING
Trevor Gudmundsen
Trevor leads Ennetix’s efforts on full-stack design and development of the company’s analytics pipeline. He manages the operations of Ennetix platforms across its customer base.
Todd pioneered the field of network security monitoring in the 1990s with the development of the first widely deployed intrusion detection system, the Network Security Monitor (NSM). In addition to network-based security, he has developed intrusion detection sensors for Windows, Linux, and macOS. Todd is currently focused on bringing innovative network and endpoint security monitoring solutions to Ennetix’s xVisor platform.
Pulak Chowdhury, Founder and CTO, Ph.D., Computer Science, UC Davis
Pulak brings a unique combination of deep networking technology background with advanced research work in Computer Sciences. He provides overall architectural direction and drivers the development activities on xVisor with a highly talented team.
Prof. Dr. Bis Mukherjee, Founder and President (also Distinguished Professor, UC Davis), Ph.D., Electrical Engineering, University of Washington, Seattle, B.Tech. (Hons.), Electronics Engineering, Indian Institute of Technology, Kharagpur
Acknowledged authority in pioneering network technologies for 35+ years. His pioneering contributions in the networking world include:
Network Intrusion Detection System (1990)
Firewall (1989)
Dynamic bandwidth allocation for EPON/FTTH (2002)
Optical-wireless integration (2007), now 5G Fronthaul
1
We use information collected through cookies and similar technologies to improve your experience on our site, analyse how you use it and for marketing purposes.
We and our partners use information collected through cookies and similar technologies to improve your experience on our site, analyse how you use it and for marketing purposes. Because we respect your right to privacy, you can choose not to allow some types of cookies. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. In some cases, data obtained from cookies is shared with third parties for analytics or marketing reasons. You can exercise your right to opt-out of that sharing at any time by disabling cookies.
These cookies and scripts are necessary for the website to function and cannot be switched off. They are usually only set in response to actions made by you which amount to a request for services, suchas setting your privacy preferences, logging in or filling in forms. You can set your browser to block oralert you about these cookies, but some parts of the site will not then work. These cookies do notstore any personally identifiable information.
Analytics
These cookies and scripts allow us to count visits and traffic sources, so we can measure and improve the performance of our site. They help us know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies and scripts, we will not know when you have visited our site.
Embedded Videos
These cookies and scripts may be set through our site by external video hosting services likeYouTube or Vimeo. They may be used to deliver video content on our website. It’s possible for the video provider to build a profile of your interests and show you relevant adverts on this or other websites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies or scripts it is possible that embedded video will not function as expected.
Google Fonts
Google Fonts is a font embedding service library. Google Fonts are stored on Google's CDN. The Google Fonts API is designed to limit the collection, storage, and use of end-user data to only what is needed to serve fonts efficiently. Use of Google Fonts API is unauthenticated. No cookies are sent by website visitors to the Google Fonts API. Requests to the Google Fonts API are made to resource-specific domains, such as fonts.googleapis.com or fonts.gstatic.com. This means your font requests are separate from and don't contain any credentials you send to google.com while using other Google services that are authenticated, such as Gmail.
Marketing
These cookies and scripts may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies and scripts, you will experience less targeted advertising.