AD

Alan DeKok

On the record
Represented by:
Share profile 
Link:
Bio
Edit

Hi, I’m Alan.
RADIUS is my life’s work
I have been working on RADIUS systems since 1997. I started FreeRADIUS in 1999, as an open source implementation of the RADIUS protocol.

Under my stewardship over the last 25 years, FreeRADIUS has grown to be the de-facto standard for RADIUS deployments in ISPs, Universities, and Enterprises. Today, FreeRADIUS is the most used RADIUS server on the internet, authenticating 100s of millions of users every day.

As one of the world’s top authorities on the RADIUS protocol, I have authored many of the IETF standards in the space. Due to my deep involvement in the standards bodies, our RADIUS product is usually one step ahead of the competition in supporting new standards.

Over the last 25 years, I have grown an elite team of world class engineers who routinely tackle large complex systems which serve millions of users. We design and build multiple RADIUS systems a week. Our team can solve any RADIUS problem you have.

  • Rethinking Upskilling: Avoiding Common IT Manager Mistakes
    Alan challenges the rush to integrate AI tools for juniors, advocating for foundational learning. He emphasizes hiring for critical thinking over specific tech skills. "Mindset isn't teachable, but technology is," Alan notes. His approach has led to exceptional retention at InkBridge, supporting critical infrastructure for major companies. Alan offers strategies to avoid common upskilling pitfalls and enhance team growth.
  • InkBridge CEO Highlights Importance of Multifactor Authentication
    Alan emphasizes that new regulations mandate MFA for critical systems. He explains, "MFA ensures a real person logs in, as passwords are often cached on devices." Using SMS or TOTP, MFA changes passwords with each login, enhancing security without significant overhead for infrequent activities.
  • Zero Trust Security: A Rising Necessity in Modern Cyber Defense
    Alan explains, "Zero Trust is gaining traction due to increasing attack sophistication." He highlights benefits like enhanced security and drawbacks such as user frustration. Best practices include strong MFA, network segmentation, and continuous validation. Alan emphasizes, "Proper implementation reduces friction between security and usability."
Headshots