Posts by Jim Frey

Most Recent
by Doug Madory
by Rosalind Whitley
by Phil Gervasi
by Christoph Pfister
by Doug Madory, Job Snijders
by Phil Gervasi
by Phil Gervasi
by Phil Gervasi
by Doug Madory
by Avi Freedman
by David Klein
by Leon Adato
Leon Adato
Principal Tech Evangelist
Lauren Basile
Senior Product Marketing Manager
Avi Freedman
Co-founder & CEO
Phil Gervasi
Director of Tech Evangelism
Eric Hian-Cheong
Senior Product Marketing Manager
Mike Ho
VP of Engineering
Aaron Kagawa
Technical Product Manager
David Klein
CMO
Doug Madory
Director of Internet Analysis
Josh Mayfield
Senior Director of Product Marketing
Christoph Pfister
Chief Product Officer
Justin Ryburn
Field CTO
Greg Villain
Director, Technical Product Management
Rosalind Whitley
Director, Product Marketing - Cloud
Jim Frey

About Jim Frey

Jim has 24 years of experience in network and infrastructure management products and services, straddling both enterprise and service provider sectors. At Kentik, Jim is responsible for channel and alliance partnership development.

Prior to joining Kentik, Jim was an independent industry analyst, working as VP Research at Enterprise Management Associates (EMA). During his 6.5 years at EMA, Jim covered the ever evolving landscape of enterprise network and infrastructure management tools, technologies, and practices via direct primary research, practitioner dialogue, and technical product studies.

Before that, Jim spent six years with NetScout Systems as Vice President of Marketing, where he was responsible for global programs including product marketing, solution marketing, field events, sales training, marketing communications, press & analyst relations, channel marketing, and competitive analysis. Other prior experiences include working as Vice President of Strategic Marketing at Micromuse, Director of Product Marketing at Objective Systems Integrators (acquired by Agilent Technologies) and six years working at Cabletron Systems on the SPECTRUM line of products in program, product, and partner management roles.

Jim holds an M.Sc. in Computer and Information Sciences from RPI, and a B.Sc. in Geological Engineering from the Colorado School of Mines.

How Important is the Internet to Enterprises Today?

March 20, 2017

After presenting at the recent CIOArena conference in Atlanta, Kentik VP of Strategic Alliances Jim Frey came away with a number of insights about the adoption of digital business operations in the enterprise. In his first in a series of related posts, Jim looks at audience survey responses indicating how reliant enterprises — even those that aren’t digital natives or located in tech industry hotspots — have become on the Internet for core elements of their business.

Read More

Partnering with A10 Networks for DDoS Defense

January 17, 2017

While Kentik Detect’s ground-breaking DDoS detection is field-proven to catch 30% more attacks than legacy systems, our DDoS capabilities aren’t limited to standalone detection. We’re also actively working with leading mitigation providers to create end-to-end DDoS protection solutions. So we’re excited to be partnering with A10 Networks, whose products help defend some of the largest networks in the world, to enable seamless integration of Kentik Detect with A10 Thunder TPS mitigation.

Read More

Big Data for NetFlow Analysis

September 6, 2016

Cisco Live 2016 gave us a chance to meet with BrightTalk for some video-recorded discussions on hot topics in network operations. This post focuses on the first of those videos, in which Kentik’s Jim Frey, VP Strategic Alliances, talks about the complexity of today’s networks and how Big Data NetFlow analysis helps operators achieve timely insight into their traffic.

Read More

Using Kentik Detect to Find Current Attacks

December 15, 2015

With massive data capacity and analytical flexibility, Kentik Detect makes it easy to actively explore network traffic. In this post we look at how to use this capability to rapidly discover and analyze interesting and potentially important DDoS and other attack vectors. We start with filtering by source geo, then zoom in on a time-span with anomalous traffic. By looking at unique source IPs and grouping traffic by destination IP we find both the source and the target of an attack.

Read More
We use cookies to deliver our services.
By using our website, you agree to the use of cookies as described in our Privacy Policy.