BackgroundCheck.run
Search For

Kevin M Seguin, 494232 33Rd Ave W, Seattle, WA 98199

Kevin Seguin Phones & Addresses

4232 33Rd Ave W, Seattle, WA 98199    206-2589981   

Germantown, TN   

9417 Great Hills Trl, Austin, TX 78759    512-3728841   

8020 Brienne Dr, Round Rock, TX 78681    512-2466206    512-2466226   

Bowling Green, OH   

Columbus, OH   

8020 Brienne Dr, Round Rock, TX 78681    512-2466206   

Work

Company: Extrahop networks, inc. Address: 300 Elliott Ave W Ste 550, Seattle, WA 98119 Phones: 206-3837638 Position: Engineer Industries: Computer Related Services

Education

Degree: Associate degree or higher

Mentions for Kevin M Seguin

Career records & work history

Lawyers & Attorneys

Kevin Seguin Photo 1

Kevin Seguin - Lawyer

ISLN:
1001139374
Admitted:
2021

Kevin Seguin resumes & CV records

Resumes

Kevin Seguin Photo 40

Vanderbilt University Law School

Location:
801 east 10Th St, Tucson, AZ 85719
Industry:
Law Practice
Work:
East End Prep Jul 2016 - May 2018
Teacher
Hillwood High School Jul 2013 - Feb 2015
English Teacher
Adp Feb 2010 - Sep 2011
District Manager
Feb 2010 - Sep 2011
Vanderbilt University Law School
Education:
Vanderbilt University 2004 - 2008
Bachelors, Bachelor of Arts, English, History
Skills:
Talent Management, Sales Management, College Recruiting, Strategic Planning, Social Media, Team Building, Technical Recruiting, Temporary Placement, Data Analysis, Powerpoint, Building Relationships, Public Speaking, Project Management, B2B, Microsoft Excel, Onboarding, Hiring, Performance Management, Financial Analysis, Marketing Strategy
Kevin Seguin Photo 41

Kevin Seguin

Location:
Seattle, WA
Industry:
Computer Software
Skills:
Linux, Tcp/Ip, Python, Enterprise Software, Software Development, Unix, Sql, Distributed Systems, C, Software Engineering, Ssl, Saas, Internet Protocol Suite, Go, Application Performance Management

Publications & IP owners

Us Patents

Combining Passive Network Analysis And Active Probing

US Patent:
2023008, Mar 23, 2023
Filed:
Apr 4, 2022
Appl. No.:
17/712521
Inventors:
- Seattle WA, US
Benjamin Thomas Higgins - Shoreline WA, US
Michael Kerber Krause Montague - Lake Forest Park WA, US
Kevin Michael Seguin - Seattle WA, US
International Classification:
H04L 43/0876
H04L 43/062
H04L 67/30
H04L 43/12
Abstract:
Embodiments are directed monitoring network traffic using network monitoring computers. Metrics may be determined based on monitoring network traffic associated with entities in the network such that the metrics may be included in profiles associated each entity. The profiles may be compared with other profiles in a context database based on the metrics included in each profile and each other profile. In response to the profiles being unmatched by other profiles one or more active probes may be performed to collect other metrics that may be used to update profiles. In response to the one or more profiles being matched by the other profiles in the context database, a timestamp associated with the other profiles may be updated to a current time value. Reports that include information associated with the entities and the profiles or the updated profiles may be generated.

Detecting Injection Attacks Using Passive Network Monitoring

US Patent:
2020038, Dec 3, 2020
Filed:
May 28, 2019
Appl. No.:
16/424387
Inventors:
- Seattle WA, US
Jesse Abraham Rothstein - Seattle WA, US
Xue Jun Wu - Seattle WA, US
Michael Kerber Krause Montague - Lake Forest Park WA, US
Kevin Michael Seguin - Seattle WA, US
International Classification:
H04L 29/06
H04L 12/26
Abstract:
Embodiments are directed to monitoring network traffic using network monitoring computers (NMCs). NMCs may determine requests provided to a server based on a first portion of network traffic. NMCs may determine suspicious requests based on characteristics of the provided requests. NMCs may employ the characteristics of the suspicious requests to provide correlation information that is associated with the suspicious requests. NMCs may determine dependent actions associated with the server based on a second portion of the network traffic and the correlation information. And, in response to determining anomalous activity associated with the evaluation of the dependent actions, NMCs may provide reports associated with the anomalous activity.

Trigger Based Recording Of Flows With Play Back

US Patent:
2015003, Feb 5, 2015
Filed:
Oct 20, 2014
Appl. No.:
14/518996
Inventors:
- Seattle WA, US
Kevin Michael Seguin - Seattle WA, US
Assignee:
ExtraHop Networks, Inc. - Seattle WA
International Classification:
H04L 12/26
H04L 12/861
US Classification:
370235, 370241
Abstract:
The various embodiments provide selective real-time monitoring of one or more flows of packets over a network, real-time buffering of packets for the one or more monitored flows, real-time recording of packets for one or more monitored flows and its corresponding buffered packets based on initiation of at least one trigger, and real-time analysis of the one or more recorded flows of packets regarding at least the occurrence of the at least one trigger. One or more flows of packets may be selected for monitoring by an administrator or an automated process based on different factors. In at least one of the various embodiments, the one or more monitored flows of packets are tagged and threaded so that they are separately accessible in a ring buffer.

Trigger Based Recording Of Flows With Play Back

US Patent:
2014026, Sep 18, 2014
Filed:
Mar 15, 2013
Appl. No.:
13/831908
Inventors:
- Seattle WA, US
Kevin Michael Seguin - Seattle WA, US
Assignee:
ExtraHop Networks, Inc. - Seattle WA
International Classification:
H04L 12/26
US Classification:
370230, 370241
Abstract:
The various embodiments provide selective real-time monitoring of one or more flows of packets over a network, real-time buffering of packets for the one or more monitored flows, real-time recording of packets for one or more monitored flows and its corresponding buffered packets based on initiation of at least one trigger, and real-time analysis of the one or more recorded flows of packets regarding at least the occurrence of the at least one trigger. One or more flows of packets may be selected for monitoring by an administrator or an automated process based on different factors. In at least one of the various embodiments, the one or more monitored flows of packets are tagged and threaded so that they are separately accessible in a ring buffer.

NOTICE: You may not use BackgroundCheck or the information it provides to make decisions about employment, credit, housing or any other purpose that would require Fair Credit Reporting Act (FCRA) compliance. BackgroundCheck is not a Consumer Reporting Agency (CRA) as defined by the FCRA and does not provide consumer reports.