Vidder Blog

Mark Hoover

Mark Hoover has been involved in the technology and market development of security and networking technologies over a period of almost 30 years, including Firewalls, VPNs, IP routing, ATM, Gigabit Ethernet Switching, and load balancers. Most recently, he has been a Venture Partner at Woodside Fund for two years. Prior to that he was the president of Acuitive, a strategic marketing consulting firm that helped define product and market strategies for start-ups, including Brocade, Alteon Websystems, Netscreen, Maverick Semiconductor, Redline Networks, and many others. He started his career at AT&T Bell Labs and moved to SynOptics/Bay Networks before founding Acuitive.
Find me on:

Recent Posts

Security and the “All or Nothing” Paradox

Posted by Mark Hoover on May 21, 2018 4:33:57 PM

Mental inertia. That’s what it is. I have noticed that most professionals contributing to enterprise network security continue to operate under the following tenets which have shaped their behaviors for decades:

  • The corporate network is vastly important.
  • It is critical to secure all aspects of this vastly important resource.
  • Embedding security into the network is the most efficient way to achieve the desired level of security in this vastly important environment.

Three decades of adhering to these tenets have resulted in highly connected global company operations, but at a very high cost accompanied by rapidly diminishing security.

Read More

Topics: network security, Vidder, CISO, security, innovator’s dilemma

MFA is too Important to be Moving Sideways

Posted by Mark Hoover on May 9, 2018 5:29:03 PM

According to the 2017 Verizon Data Breach Investigations Report “81% of hacking-related breaches leveraged either stolen and/or weak passwords.”    A solution to this problem is to use Multifactor Authentication to prevent a stolen password from being enough for an adversary to gain access to critical systems.  This has been true for a long time.  Yet MFA is still only used for specific use cases, like remote access. And even there, not universally.  Why is this?  It is because MFA has traditionally been what social scientists call “a pain-in-the-ass” for both users and IT.  

Read More

Topics: MFA, trusted access control, Multifactor Authentication, Endpoint Security, BYOD Security

The CIO’s Inevitable Strategic Withdrawal

Posted by Mark Hoover on Apr 13, 2018 5:43:25 PM

The corporate network, once a great enabler of business productivity, is rapidly becoming an obstacle. This is leaving CIOs with no choice but to make a strategic withdrawal away from defending global and integrated corporate networks, towards more secure-able and relevant perimeters.  There is no other way forward.

Read More

Topics: security, segmentation

Software Defined Perimeter: The Secret Service of TCP/IP Networks

Posted by Mark Hoover on Jul 12, 2016 4:05:44 PM

The rules for playing “protect the president” are simple: the “bodyguard” isolates the “president” and protects him from being hit by the “attackers.” These rules are logical and follow common sense.

Read More

Topics: software defined perimeter

Mea Culpa: Time To Build Security Into Connectivity

Posted by Mark Hoover on Apr 21, 2016 2:59:13 PM
How those of us who spent decades developing faster, easier, and more scalable networking technology have made the lives of our security counterparts a living hell.

I have been very lucky in my career. I started in Chemical Engineering but the labs were too smelly and dangerous for me. So, I switched to the relatively clean world of Electrical Engineering in my senior year. How’s that for career decision-making criteria?  But, it worked out. At some point I saw the value of Ethernet and TCP/IP to foster scale and ubiquity. I have been focused there pretty much ever since.  

Read More

Topics: cybersecurity, cyberattacks, software defined perimeter

The Rental IT Trend

Posted by Mark Hoover on Mar 23, 2016 9:58:35 AM

Whether it is homes, cars, or videotapes, the trade-off between buying and renting has been thoroughly discussed and analyzed. The right choice for any individual depends a lot on his or her specific situation and industry factors of the moment, such as interest rates, housing costs, and so on. 

Read More

Topics: cybersecurity, enterprise, software defined perimeter

Control the Flow for Security

Posted by Mark Hoover on Mar 14, 2016 10:44:35 AM

TCP/IP connectivity starts with a DNS look-up so that Endpoint A, seeking to establish a connection to Endpoint B, can determine B's IP address. Not knowing when a connection request may be coming, Endpoint B has to continually listen for the arrival of such requests. Not even knowing who the requester is, Endpoint B must respond to the connection request to establish a TCP connection. Only then can Endpoint B seek more information from Endpoint A to try to establish its identity, authorization, and trust.

Read More

Topics: Insider, cybersecurity, cyberattacks, security

Vidder 2016 Predictions: Fixing Virtual Silos and Securing the New Virtual IT

Posted by Mark Hoover on Dec 16, 2015 12:32:05 PM

There are two major areas where things are going to evolve rapidly in 2016.

Read More

About Vidder

Vidder is changing how modern day enterprises approach security in an increasingly untrusted IT landscape. PrecisionAccess™ enables secure, trusted access to critical business applications in today’s perimeterless enterprise. With PrecisionAccess, enterprises can continue to evolve their business ecosystem through major IT trends like cloud migration and outsourcing with assurance that their most valuable applications are safe.

Subscribe to Email Updates

Recent Posts