Personal Information
Organization / Workplace
Greater Denver Area, Colorado United States
Industry
Technology / Software / Internet
Website
www.enterprisemanagement.com
About
Experienced and proven marketing professional with thirteen years of experience in the high-tech industry. Expertise in tactical planning and execution, campaign and project management, copywriting, and Website management. Successful track record of executing, analyzing, and improving marketing programs and increasing leads. Well versed in achieving marketing initiatives with limited staff and budget.
Specialties:
*Campaign management
*Marketing automation software (Marketo)
*Project management
*Webinar management, promotion and moderation
*Copywriting
*Partner marketing
*Marketing process improvements and best practices
*Website strategy, content development and maintenance
*Lead gener...
Tags
it research
it analysts
security
network management
cloud
it
business intelligence
big data
it management
cloud computing
workload automation
digital transformation
analytics
devops
artificial intelligence
automation
aiops
data
job scheduling
cyber security
aws
it automation
data management
itsm
network automation
sd-wan
it analytics
hybrid cloud
it analyts
application management
it operations
research
it service management
bmc software
observability
amazon web services
machine learning
it operations management
identity management
private cloud
bi
network operations
openstack
netsecops
sase
ibm
ai
threat detection
azure
network observability
privileged access management
access management
data breaches
network monitoring
security automation and orchestration
serviceops
multi-cloud
vmware
microservices
security operations
ciam
tls 1.3
public cloud
generative ai
zero trust
red hat
pandemic
enterprise management associates
itops
software-defined wan (sd-wan)
continuous delivery
workload mobility
cmdb
endpoint management
passwordless authentication
network engineering
enterprise service maagement
cloud migrations
dependency mapping
network analytics
cloud adoption
asset management
technology
security analytics
data warehousing
packet data
digital threats
endpoint data
systems management
naas
cisco
network visibility fabrics
network packet brokers
business service management
genai
wla
software-defined networking
hadoop
it transformation
microsoft azure
predictive analytics
saas
data centers
api
it infrastructure
hybrid infrastructure
google cloud
workflow orchestration
kubernetes
shadow it
sdn
digital business
amazon re:invent
infrastructure moitoring
data pipelines
cybersecurity
internet of things
information security
data center
iot
opentelemetry
serverless computing
virtual instruments
xangati
application workloads
virtualization
ai security
zerostack
lambda
governance
hybrid cloud security
data virtualization
hpe
capex
opex
draas
application developers
amazon
storage
incident management
desktop virtualization
mobility
application delivery
fluke networks
it managment
cisco prime
netdevops
internet performance monitorin
digital employee experience
dex
actian
marketing
web content
content marketing
content strategy
network as a service
apache hadoop
agentic ai
cloud native security
endpoint security
load testing
digital economy
ca technologies
fico
data governance
document security
data mining
it efficiency
embedded bi
mdm
mobile device managment
bmc
iot analytics
security awareness training
security awareness
network virtualization
risk management
software-defined storage
data warehouse
data lake
cluster management
akamai
customer identity
kaseya
analytics warehouse
managed detection and response
application delivery infrastructure
iitsm
application monitoring
contextual awareness
visibility infrastructure
bot attacks
time series databases
itsm automation
access governance
identity governance
it service modeling
data integration
network and application performance management
tls 1.3 encryption
it analyst
esm
deception technology
ztna
zero trust network access
cyber threat
threat intelligence
api security
secure coding
it asset management
itam
outages
open source
linux
devsecops
data analytics
microsoft
active directory
data scientists
databots
appdev
application development
wfh
work from home
covid
unified analytics
cloud security
service management
remote work
sap
alcatel-lucent
security managment
data engineering
security automation
security policy orchestrations
zero turst
data center networks
hybrid it
dns
dhcp
embedded analytics
digital experience management
digital experience
bad bots
it security
public clouds
mobile management
mobile
digital workspaces
ip address management
digital enterprise
aws relational database services
software defined packet brokers
apcon
security monitoring
critical incident response
digital enterprises
network performance management
business performance
xdr
application performance management
cloud networking
encryption
5g networks
ransomware attacks
dataops
unified endpoint management
wide-area network (wan)
streaming data
siem
security information and event management
cyberattacks
federated configuration management systems
configuration management databases
endpoint detection
hybrid work
micro focus
See more
Presentations
(231)Infographics
(6)Personal Information
Organization / Workplace
Greater Denver Area, Colorado United States
Industry
Technology / Software / Internet
Website
www.enterprisemanagement.com
About
Experienced and proven marketing professional with thirteen years of experience in the high-tech industry. Expertise in tactical planning and execution, campaign and project management, copywriting, and Website management. Successful track record of executing, analyzing, and improving marketing programs and increasing leads. Well versed in achieving marketing initiatives with limited staff and budget.
Specialties:
*Campaign management
*Marketing automation software (Marketo)
*Project management
*Webinar management, promotion and moderation
*Copywriting
*Partner marketing
*Marketing process improvements and best practices
*Website strategy, content development and maintenance
*Lead gener...
Tags
it research
it analysts
security
network management
cloud
it
business intelligence
big data
it management
cloud computing
workload automation
digital transformation
analytics
devops
artificial intelligence
automation
aiops
data
job scheduling
cyber security
aws
it automation
data management
itsm
network automation
sd-wan
it analytics
hybrid cloud
it analyts
application management
it operations
research
it service management
bmc software
observability
amazon web services
machine learning
it operations management
identity management
private cloud
bi
network operations
openstack
netsecops
sase
ibm
ai
threat detection
azure
network observability
privileged access management
access management
data breaches
network monitoring
security automation and orchestration
serviceops
multi-cloud
vmware
microservices
security operations
ciam
tls 1.3
public cloud
generative ai
zero trust
red hat
pandemic
enterprise management associates
itops
software-defined wan (sd-wan)
continuous delivery
workload mobility
cmdb
endpoint management
passwordless authentication
network engineering
enterprise service maagement
cloud migrations
dependency mapping
network analytics
cloud adoption
asset management
technology
security analytics
data warehousing
packet data
digital threats
endpoint data
systems management
naas
cisco
network visibility fabrics
network packet brokers
business service management
genai
wla
software-defined networking
hadoop
it transformation
microsoft azure
predictive analytics
saas
data centers
api
it infrastructure
hybrid infrastructure
google cloud
workflow orchestration
kubernetes
shadow it
sdn
digital business
amazon re:invent
infrastructure moitoring
data pipelines
cybersecurity
internet of things
information security
data center
iot
opentelemetry
serverless computing
virtual instruments
xangati
application workloads
virtualization
ai security
zerostack
lambda
governance
hybrid cloud security
data virtualization
hpe
capex
opex
draas
application developers
amazon
storage
incident management
desktop virtualization
mobility
application delivery
fluke networks
it managment
cisco prime
netdevops
internet performance monitorin
digital employee experience
dex
actian
marketing
web content
content marketing
content strategy
network as a service
apache hadoop
agentic ai
cloud native security
endpoint security
load testing
digital economy
ca technologies
fico
data governance
document security
data mining
it efficiency
embedded bi
mdm
mobile device managment
bmc
iot analytics
security awareness training
security awareness
network virtualization
risk management
software-defined storage
data warehouse
data lake
cluster management
akamai
customer identity
kaseya
analytics warehouse
managed detection and response
application delivery infrastructure
iitsm
application monitoring
contextual awareness
visibility infrastructure
bot attacks
time series databases
itsm automation
access governance
identity governance
it service modeling
data integration
network and application performance management
tls 1.3 encryption
it analyst
esm
deception technology
ztna
zero trust network access
cyber threat
threat intelligence
api security
secure coding
it asset management
itam
outages
open source
linux
devsecops
data analytics
microsoft
active directory
data scientists
databots
appdev
application development
wfh
work from home
covid
unified analytics
cloud security
service management
remote work
sap
alcatel-lucent
security managment
data engineering
security automation
security policy orchestrations
zero turst
data center networks
hybrid it
dns
dhcp
embedded analytics
digital experience management
digital experience
bad bots
it security
public clouds
mobile management
mobile
digital workspaces
ip address management
digital enterprise
aws relational database services
software defined packet brokers
apcon
security monitoring
critical incident response
digital enterprises
network performance management
business performance
xdr
application performance management
cloud networking
encryption
5g networks
ransomware attacks
dataops
unified endpoint management
wide-area network (wan)
streaming data
siem
security information and event management
cyberattacks
federated configuration management systems
configuration management databases
endpoint detection
hybrid work
micro focus
See more