“I've had the privilege of working with Karthick, and his expertise in networking, security, and advanced routing protocols is truly impressive. Whether it’s deploying SD-WAN, fine-tuning BGP/OSPF, implementing Secure Web Gateways, or optimizing deep packet inspection (DPI), He always brings innovative solutions and a keen eye for security. His deep understanding of encapsulation protocols and intelligent overlays ensures seamless and secure network operations.”
About
Activity
-
We’re excited to welcome Tanvee Gaikwad to the Sales team at Atomicwork! 🎊 Tanvee is someone who never thought she’d end up in sales during those…
We’re excited to welcome Tanvee Gaikwad to the Sales team at Atomicwork! 🎊 Tanvee is someone who never thought she’d end up in sales during those…
Liked by Karthick Srivatsan
-
In today's distributed work environment, a superficial Zero Trust approach just won't cut it. Learn how to build a truly resilient security posture…
In today's distributed work environment, a superficial Zero Trust approach just won't cut it. Learn how to build a truly resilient security posture…
Liked by Karthick Srivatsan
-
NetScaler has always led the transformation in SSL/TLS crypto standards over the last 2 decades. We are announcing the technology leadership for the…
NetScaler has always led the transformation in SSL/TLS crypto standards over the last 2 decades. We are announcing the technology leadership for the…
Liked by Karthick Srivatsan
Experience & Education
Licenses & Certifications
Patents
-
SYSTEMS AND METHODS FOR APPLICATION PRE-LAUNCH
Filed US 20200145385
Embodiments described include systems and methods for management and pre-establishment of network application and secure communication sessions. Session logs may be analyzed to identify an application or secure communication sessions likely to be accessed, and prior to receiving a request to establish the session, an intermediary (e.g. another device such as an intermediary appliance or other device, or an intermediary agent on a client such as a client application) may pre-establish the…
Embodiments described include systems and methods for management and pre-establishment of network application and secure communication sessions. Session logs may be analyzed to identify an application or secure communication sessions likely to be accessed, and prior to receiving a request to establish the session, an intermediary (e.g. another device such as an intermediary appliance or other device, or an intermediary agent on a client such as a client application) may pre-establish the session, performing any necessary handshaking or credential or key exchange processes. When the session is subsequently requested (e.g. in response to a user request), the system may immediately begin using the pre-established session. This pre-establishment may be coordinated within the enterprise providing load balancing and scheduling of session establishment to prevent large processing loads at any one point in time.
Other inventorsSee patent -
System and method of providing increased data optimization based on traffic priority on connection
Issued US US 20170214625 A1
An appliance o for evicting data based on traffic priority of data is described. The appliance has one or more processors and includes a compression history manager configured to acquire traffic priority information of data, the data being conveyed over a connection and to assign a compression history set based on the traffic priority information of the data. The compression history manager is also configured to, if cache space does not exist to store the data and another compression history…
An appliance o for evicting data based on traffic priority of data is described. The appliance has one or more processors and includes a compression history manager configured to acquire traffic priority information of data, the data being conveyed over a connection and to assign a compression history set based on the traffic priority information of the data. The compression history manager is also configured to, if cache space does not exist to store the data and another compression history set corresponds to lower traffic priority in a cache queue, evict data from the other compression history set corresponding to lower traffic priority.
Other inventors -
-
INTELLIGENT AND DYNAMIC OVERLAY TUNNEL FORMATION VIA AUTOMATIC DISCOVERY OF CITRIVITY/SDWAN PEER IN THE DATAPATH IN A PURE PLUG AND PLAY ENVIRONMENT WITH ZERO NETWORKING CONFIGURATION
Filed US 20200213151
Described embodiments provide systems and methods of forming overlay tunnels for delivery of data between networked devices. A first intermediary device may transmit, responsive to a connection request from a client, a request having a source IP address corresponding to a first virtual IP address of the first device and a first payload including first security hash information to be processed by a second intermediary device. The first device may receive, from the second intermediary device, a…
Described embodiments provide systems and methods of forming overlay tunnels for delivery of data between networked devices. A first intermediary device may transmit, responsive to a connection request from a client, a request having a source IP address corresponding to a first virtual IP address of the first device and a first payload including first security hash information to be processed by a second intermediary device. The first device may receive, from the second intermediary device, a response. The response may have a source IP address corresponding to the IP address of the server and a second payload including a virtual IP address of the second device, responsive to second security hash information corresponding to the first security hash information. The first device may establish an overlay tunnel using the first virtual IP address and the second virtual IP address for communicating data between the client and the server.
-
SYSTEM AND APPARATUS FOR ENHANCED QOS, STEERING AND POLICY ENFORCEMENT FOR HTTPS TRAFFIC VIA INTELLIGENT INLINE PATH DISCOVERY OF TLS TERMINATING NODE
Filed US 20200177564
Described embodiments provide systems and apparatuses for enhanced quality of service, steering and policy enforcement for https traffic via intelligent in-line path discovery of a TLS terminating node. The system may include a first network device having a secure connection traversing through the first network device, and in communication with a second network device. The first network device and the second network device may be intermediary to a client device and a server. The first network…
Described embodiments provide systems and apparatuses for enhanced quality of service, steering and policy enforcement for https traffic via intelligent in-line path discovery of a TLS terminating node. The system may include a first network device having a secure connection traversing through the first network device, and in communication with a second network device. The first network device and the second network device may be intermediary to a client device and a server. The first network device may determine that the second network device terminates the secure connection. The first network device may receive key generation information of the secure connection from the second network device following determining the second network device terminates the secure connection. The first network device may decipher packet(s) of the secure connection destined for the device or the server using the received key generation information, to regulate network traffic of the secure connection at the first network device.
Other inventorsSee patent
Honors & Awards
-
Citrix Q4 2019 SALES AND SERVICES Excellence Award for largest Citrix SD-WAN deal
Citrix Systems
Award Description :: Solutions Architect (WorldWide) - Karthick helped lead the technical engagement on the largest SD-WAN deal at Citrix, working collaboratively with Sales to win a great compete deal. As a strong interface between sales and the SD-WAN engineering team Karthick created the much needed articulation and sense of urgency across teams aligning against customer requirements. As the SD-WAN SME, Karthick built confidence with the customer, while solidifying the Citrix SD-WAN + CVAD…
Award Description :: Solutions Architect (WorldWide) - Karthick helped lead the technical engagement on the largest SD-WAN deal at Citrix, working collaboratively with Sales to win a great compete deal. As a strong interface between sales and the SD-WAN engineering team Karthick created the much needed articulation and sense of urgency across teams aligning against customer requirements. As the SD-WAN SME, Karthick built confidence with the customer, while solidifying the Citrix SD-WAN + CVAD value proposition as a unique differentiator to win the deal.
Languages
-
Tamil
Full professional proficiency
-
Hindi
Full professional proficiency
-
Kannada
Full professional proficiency
-
Telugu
Full professional proficiency
-
English
Full professional proficiency
Recommendations received
14 people have recommended Karthick
Join now to viewMore activity by Karthick
-
The shift toward a post-quantum world is not a distant future — its already shaping how we build and secure applications today. At NetScaler, we are…
The shift toward a post-quantum world is not a distant future — its already shaping how we build and secure applications today. At NetScaler, we are…
Liked by Karthick Srivatsan
-
A snippet from the attached article: “When customers license Microsoft software, they aren’t just buying tools — they’re buying into a system where…
A snippet from the attached article: “When customers license Microsoft software, they aren’t just buying tools — they’re buying into a system where…
Liked by Karthick Srivatsan
-
🚀 Securing access just got smarter - JumpCloud is now an official Chrome Enterprise partner ! 🚀 💪 With JumpCloud’s Conditional Access and Chrome…
🚀 Securing access just got smarter - JumpCloud is now an official Chrome Enterprise partner ! 🚀 💪 With JumpCloud’s Conditional Access and Chrome…
Shared by Karthick Srivatsan
-
Securing your distributed workforce can be tough. With employees accessing critical apps from anywhere on any device, how do you ensure compliance…
Securing your distributed workforce can be tough. With employees accessing critical apps from anywhere on any device, how do you ensure compliance…
Liked by Karthick Srivatsan
-
We're at the Mac Admins Conference today, soaking up knowledge and sharing insights with the brightest minds in macOS management and security! One…
We're at the Mac Admins Conference today, soaking up knowledge and sharing insights with the brightest minds in macOS management and security! One…
Liked by Karthick Srivatsan
-
At StrataPrime, we're always looking for new ways to give our clients even more value. That's why we're super excited to share some big news: we've…
At StrataPrime, we're always looking for new ways to give our clients even more value. That's why we're super excited to share some big news: we've…
Liked by Karthick Srivatsan
-
What if the future of #AI security depends less on quick fixes—and more on the questions we dare to ask? I had the privilege of a mutual…
What if the future of #AI security depends less on quick fixes—and more on the questions we dare to ask? I had the privilege of a mutual…
Liked by Karthick Srivatsan
-
JumpCloud has once again been recognized as a leader across multiple categories in the G2 Summer 2025 Reports, driven by the incredible feedback of…
JumpCloud has once again been recognized as a leader across multiple categories in the G2 Summer 2025 Reports, driven by the incredible feedback of…
Liked by Karthick Srivatsan
-
Exciting news! 🎉 JumpCloud has been recognized by The Software Report as the #4 Cybersecurity Company of 2025! We're thrilled to be acknowledged…
Exciting news! 🎉 JumpCloud has been recognized by The Software Report as the #4 Cybersecurity Company of 2025! We're thrilled to be acknowledged…
Liked by Karthick Srivatsan
-
The IT landscape for MSPs is rapidly evolving: multi-vendor environments are the new normal. Managing diverse OS, productivity suites, and client…
The IT landscape for MSPs is rapidly evolving: multi-vendor environments are the new normal. Managing diverse OS, productivity suites, and client…
Liked by Karthick Srivatsan
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More