Ordr
John Chan has over 20 years of experience in technical writing. John began their career in 2000 as a Technical Writer for Juniper Networks, where they wrote two complex JUNOS software router configuration guides. John then worked as a Technical Writer for F5 Networks (formerly uRoam, Inc) in 2005, where they partnered with the engineering team and co-founder and VP of engineering to design and document FirePass. From 2007 to 2011, John worked as a Senior Technical Writer for Ericsson, Dell, and TechProse, where they wrote software configuration guides, online help, release notes, administration, and installation guides. In 2011 and 2012, they worked as a Technical Writer and Senior Technical Writer for Barracuda Networks and Dell respectively. In 2020, they took on the role of Technical Documentation Manager at Aktana. In 2021, they worked as a Documentation Manager (Cyber Security) at Axis Security. Currently, John is the Director, Training and Customer Success Communications at Ordr Inc.
John Chan attended Rensselaer Polytechnic Institute where they studied Communications. John has obtained four certifications: IBM Watson Campaign Automation - Technical Specialist from IBM in June 2019, Certified Scrum Product Owner from the Scrum Alliance, Dell Social Media and Community Professional from Dell.
This person is not in any offices
Ordr
3 followers
In the hyper-connected enterprise, in which everything from simple IoT devices to complex multi-million-dollar systems are connected, traditional security solutions simply aren't effective and cannot scale to secure them. Ordr solves this problem, providing enterprises with complete visibility and security over every connected device - from traditional IT devices to IoT, IoMT and OT. The Ordr Systems Control Engine is the only purpose-built solution that uses advanced machine learning to discover and classify all devices, fully profile device behavior and risks at massive scale, and automate action. Ordr is unique in its ability to automate security, from dynamically generating segmentation policies that enable only "sanctioned" device communications, to triggering appropriate quarantine, scan, block policies for every class of device directly through the organization’s network and security infrastructure.