“Mo is a highly collaborative leader with strong technical and business acumen. He's a strategic thinker that is calm under fire, influential, and is consistently positive in the face of both opportunities and challenges. I thoroughly enjoy working with him. ”
About
With nearly 25 years of experience in the networking and IT security industries, I am a…
Activity
-
#Cisco is dead, long live Cisco! I sat down with Dan Meyer from SDxCentral to share my thoughts on what this week's massive reorg and layoff may…
#Cisco is dead, long live Cisco! I sat down with Dan Meyer from SDxCentral to share my thoughts on what this week's massive reorg and layoff may…
Shared by Mauricio Sanchez
-
5 leadership trainings and 3 DiSC workshops in the month of June had me busy and thrilled to be teaching such talented professionals. I went hard…
5 leadership trainings and 3 DiSC workshops in the month of June had me busy and thrilled to be teaching such talented professionals. I went hard…
Liked by Mauricio Sanchez
-
Returning from holiday and getting back into the swing of work and home chores can be rough. 😩 That may signify that it's time to redefine…
Returning from holiday and getting back into the swing of work and home chores can be rough. 😩 That may signify that it's time to redefine…
Liked by Mauricio Sanchez
Experience
Education
-
California Polytechnic State University-San Luis Obispo
Graduated with distinction
Thesis: Iterations in TCP/IP - Ethernet Network Optimization - A study in TCP/IP offloading techniques for x86 platforms. -
Graduated cum laude
-
-
Publications
-
Virus Throttle as Basis for ProActive Defense
MMM-ACNS 2007 Proceedings, SpringerLink
Patents
-
Packet Processing With Adjusted Access Control List
Issued US 8,675,652
Network devices and methods are provided for packet processing. One method includes using logic embedded in an application specific integrated circuit on a network device to dynamically adjust an access control list. According to the method, the access control list is adjusted in response to information received from a checking functionality related to packets received by the network device from a particular port. The method also includes handling packets later received from the particular port…
Network devices and methods are provided for packet processing. One method includes using logic embedded in an application specific integrated circuit on a network device to dynamically adjust an access control list. According to the method, the access control list is adjusted in response to information received from a checking functionality related to packets received by the network device from a particular port. The method also includes handling packets later received from the particular port according to the adjusted access control list.
Other inventorsSee patent -
Packet Monitoring
Issued US 8,416,773
Network devices, systems, and methods are provided for packet processing. One network device includes a network chip having logic and a number of network ports for the device for receiving and transmitting packets therefrom. The logic is encoded with application specific integrated circuit (ASIC) primitives to check header fields and payload content in the packets.
Other inventorsSee patent -
Packet processing with adjusted access control list
Issued US 8,340,091
Network devices and methods are provided for packet processing. One method includes using logic embedded in an application specific integrated circuit on a network device to dynamically adjust an access control list. According to the method, the access control list is adjusted in response to information received from a checking functionality related to packets received by the network device from a particular port. The method also includes handling packets later received from the particular port…
Network devices and methods are provided for packet processing. One method includes using logic embedded in an application specific integrated circuit on a network device to dynamically adjust an access control list. According to the method, the access control list is adjusted in response to information received from a checking functionality related to packets received by the network device from a particular port. The method also includes handling packets later received from the particular port according to the adjusted access control list.
Other inventors -
Virus/Worm Throttle Threshold
Issued US 8,203,941
One embodiment disclosed relates to a network device that includes at least one port to connect to a network and at least one throttle that limits a rate of connections made from the device. An auto-adaptive thresholding mechanism determines a threshold for the throttle. The mechanism may be tunable to various aggressiveness levels. Another embodiment disclosed relates to a network apparatus including multiple ports capable of making connections and multiple throttle instantiations. Each…
One embodiment disclosed relates to a network device that includes at least one port to connect to a network and at least one throttle that limits a rate of connections made from the device. An auto-adaptive thresholding mechanism determines a threshold for the throttle. The mechanism may be tunable to various aggressiveness levels. Another embodiment disclosed relates to a network apparatus including multiple ports capable of making connections and multiple throttle instantiations. Each throttle instantiation is associated with a port or group of ports. Threshold levels for each throttle instantiation are independently set. The ports may be physical ports or may be logical ports.
-
Remote Access to Intrusion Prevention System
Issued US 8,045,550
Network devices, systems, and methods are provided for packet processing. One network device includes a network chip having a number of network ports for the device. The network chip includes logic to select original data packets, based on a set of criteria, received from or destined to a particular port on the device and to tunnel the selected data packets to a second network device having a different destination address to that of the selected data packets.
Other inventors -
Packet Processing
Issued US 7,849,503
Network devices, systems, and methods are provided for packet processing. One method includes receiving a checking functionality rule set as an input to a distribution algorithm. The method includes bifurcating and providing configuration instructions, as an output from the distribution algorithm, to a first logic plane associated with a first logical entity and a second logic plane associated with a second logical entity. A collaboration algorithm is used to provide processing coordination…
Network devices, systems, and methods are provided for packet processing. One method includes receiving a checking functionality rule set as an input to a distribution algorithm. The method includes bifurcating and providing configuration instructions, as an output from the distribution algorithm, to a first logic plane associated with a first logical entity and a second logic plane associated with a second logical entity. A collaboration algorithm is used to provide processing coordination between the first logical entity and the second logical entity.
Other inventorsSee patent -
Remote Client Remediation
Issued US 7,792,990
Embodiments of the invention may include network devices, systems, and methods, including executable instructions and/or logic, for remote client remediation. One method includes identifying a client needing remediation, tunnel-encapsulating packets originating from the client during remediation, and forwarding the tunnel-encapsulated packets to a remote remediation functionality different from an original destination address of the packets and having membership in a remediation VLAN different…
Embodiments of the invention may include network devices, systems, and methods, including executable instructions and/or logic, for remote client remediation. One method includes identifying a client needing remediation, tunnel-encapsulating packets originating from the client during remediation, and forwarding the tunnel-encapsulated packets to a remote remediation functionality different from an original destination address of the packets and having membership in a remediation VLAN different from the original VLAN.
Other inventorsSee patent -
Network device applying kalman filter
Issued US 7,693,975
Systems, methods, and device are provided for network and network device management. One method embodiment includes receiving information associated with a network device. The method further includes analyzing the network information using a Kalman filter.
-
Method and apparatus for controlling connection rate of network hosts
Issued US 7,506,372
A method for controlling data connections of host devices in a network includes creating a record of the number of attempted data connections from a host device through a connection device and the time of the most recent data connection attempt from the host device through the connection device. The difference between the current time that data from the host device is received by the connection device and the recorded time of the most recent data connection attempt by the host device is…
A method for controlling data connections of host devices in a network includes creating a record of the number of attempted data connections from a host device through a connection device and the time of the most recent data connection attempt from the host device through the connection device. The difference between the current time that data from the host device is received by the connection device and the recorded time of the most recent data connection attempt by the host device is determined. Data is forwarded to its destination address if the difference between the current time and the recorded time is greater than a predetermined threshold time.
Other inventors -
Selecting cached RSA keys in response to RSA key requests
Issued US 7,483,537
A method of responding to a request for a key of a first length is provided. According to the method, the request for the key of the first length is received. Moreover, it is determined whether any one of a plurality of cached keys satisfies the request. If any one of the plurality of cached keys satisfies the request, a cached key of the first length is selected. Also, the selected cached key is removed from the plurality of cached keys. Thus, in response to the request, the selected cached…
A method of responding to a request for a key of a first length is provided. According to the method, the request for the key of the first length is received. Moreover, it is determined whether any one of a plurality of cached keys satisfies the request. If any one of the plurality of cached keys satisfies the request, a cached key of the first length is selected. Also, the selected cached key is removed from the plurality of cached keys. Thus, in response to the request, the selected cached key of the first length is provided.
Languages
-
English
Native or bilingual proficiency
-
Spanish
Native or bilingual proficiency
-
German
Elementary proficiency
Recommendations received
9 people have recommended Mauricio
Join now to viewMore activity by Mauricio
-
This week, I connected with Nancy Liu at SDxCentral to discuss my new report on the #CNAPP market. For the first time, we've released market share…
This week, I connected with Nancy Liu at SDxCentral to discuss my new report on the #CNAPP market. For the first time, we've released market share…
Shared by Mauricio Sanchez
-
Flying back from vacation this past Sunday, I saw first-hand the impact of the Crowdstrike-induced outage with long lines of upset customers, large…
Flying back from vacation this past Sunday, I saw first-hand the impact of the Crowdstrike-induced outage with long lines of upset customers, large…
Shared by Mauricio Sanchez
-
My journey with Skyhigh Security (including McAfee, Intel Security, Intel) has come to a close. Nearly 20 years ago, I embarked on this cybersecurity…
My journey with Skyhigh Security (including McAfee, Intel Security, Intel) has come to a close. Nearly 20 years ago, I embarked on this cybersecurity…
Liked by Mauricio Sanchez
-
My latest blog reflects on this week's HPE Discover 2024 in Vegas. #HPE looking to catch #AI lightning in the bottle with new #NVIDIA-based stack…
My latest blog reflects on this week's HPE Discover 2024 in Vegas. #HPE looking to catch #AI lightning in the bottle with new #NVIDIA-based stack…
Shared by Mauricio Sanchez
-
🌟 Unexpected Reunions 🌟 So there I was, navigating the buzzing halls of the HPE Discover Aruba Atmosphere event, when I bumped into an old friend…
🌟 Unexpected Reunions 🌟 So there I was, navigating the buzzing halls of the HPE Discover Aruba Atmosphere event, when I bumped into an old friend…
Liked by Mauricio Sanchez
-
After publishing my 1Q24 data earlier this month, sat down with Nancy Liu from SDxCentral to share a couple more details on the ever changing…
After publishing my 1Q24 data earlier this month, sat down with Nancy Liu from SDxCentral to share a couple more details on the ever changing…
Shared by Mauricio Sanchez
-
Just arrived in Vegas for #HPEDiscover. My first job out of college was at #HP as a software engineer at the small but mighty #ProCurve networking…
Just arrived in Vegas for #HPEDiscover. My first job out of college was at #HP as a software engineer at the small but mighty #ProCurve networking…
Posted by Mauricio Sanchez
-
Managed services are a tough biz for those providers not willing to evolve. Doing just networking is a race to the bottom but focusing on areas where…
Managed services are a tough biz for those providers not willing to evolve. Doing just networking is a race to the bottom but focusing on areas where…
Shared by Mauricio Sanchez
-
Many technology markets have hit the skids of late but #SASE still shined in 1Q24. How long can the party last? If you’re a client, check out my…
Many technology markets have hit the skids of late but #SASE still shined in 1Q24. How long can the party last? If you’re a client, check out my…
Shared by Mauricio Sanchez
-
Tomorrow I drop into a webinar to present my thoughts on where I think the future of wide-area enterprise networking is going. Beyond today's…
Tomorrow I drop into a webinar to present my thoughts on where I think the future of wide-area enterprise networking is going. Beyond today's…
Shared by Mauricio Sanchez
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Mauricio Sanchez in United States
-
Mauricio Sanchez
Software Engineer
-
Mauricio Sanchez
-
Mauricio Sanchez
Founder of the Sanchez & Rivera Family of Companies | National Speaker| Industry Leader
-
Mauricio Sánchez
-
Mauricio Sanchez
301 others named Mauricio Sanchez in United States are on LinkedIn
See others named Mauricio Sanchez