Sorell Slaymaker, Principal Consulting Analyst
Sorell Slaymaker has 30 years of experience designing, building, securing, and operating IP networks and the communication services that run across them. His mission is to help make communication easier, cheaper and more secure since he believes that the more we communicate, the better we are. Prior to joining TechVision Research, Sorell was an Evangelist for 128 Technology which is a routing and security software company. Prior to that, Sorell was a Gartner analyst covering enterprise networking, security, and communications.
Sorell is an IT Architect with a focus on network, security, and communications architecture and he specializes in IT Architecture – Network Architecture, SIP Trunking, Contact Centers, Unified Communications, and Security Architecture.
At TechVision Research, Sorell is focusing on the following areas of specialty
- IP Networking – Data Center, SD-WAN, Cloud Internetworking, WLAN, Internet
- Unified Communications – Contact Center, Conferencing, Telephony, SIP Trunking
- Enterprise Architecture – TOGAF, Zachman, Blueprint & Reference frameworks
- Network Security – 802.1X, LDAP, VPN, Firewalls, IDS/IPS, Federation, Event Correlation
- IP Networking
- Unified Communications
- Enterprise Architecture
- Network Security
- Zero Trust Network Security
- Contact Center Infrastructure
- Unified Communications
Recently Published Research
Zero Trust Network Security
Legacy network security architectures operate on the outdated assumption that everything on the inside of an organization’s private network can be trusted. With market trends of mobility and cloud plus the ever increasing security threats, enterprises can no longer trust anyone or anything. Given the increased network attack surface, the speed and sophistication of attacks, and insider threats, a Zero Trust Networking (ZTN) architecture must be adopted.
ZTN is more than using an Identity and Access Management (IAM) to validate a user or device which is allowed onto a network. ZTN is utilizing IAM to control where every user, device, application, and data are allowed to go on the network, starting at the very edge.
This research note examines all the compelling reasons why every organization must move to a ZTN architecture and the current best practices in adopting ZTN. Since this market is at the early adopter stage, products are new and only offer point solutions for a specific part of the network; data center, WLAN, SD-WAN, VPN, MDM, cloud.