John DominguezJohn Dominguez

John Dominguez

Senior Director of Product Marketing

Expertise
  • Cybersecurity product marketing, messaging, and content creation
  • Building and leading product marketing teams in fast-growing markets
Education
  • BA in Economics and International Relations, Dartmouth College
  • MBA in Marketing and Strategy, Ross School of Business at the University of Michigan

Certifications
About the author

John Dominguez is a Senior Director of Product Marketing at Reach Security. He has over 13 years experience in cybersecurity product marketing, technology messaging and positioning, go-to-market strategy and campaigns, content creation, and product launches. In his previous role at Splunk, John led security product marketing throughout five years of rapid growth with coverage across nine products and services, including Splunk SOAR, SIEM, UEBA, Attack Analyzer, Mission Control, AI Assistant for Security, Security Essentials, Splunk Threat Research Team, and Splunk SURGe. Prior to Splunk, John spent seven years at Cisco marketing endpoint security, intrusion prevention, firewall, threat intelligence, and malware analysis products.

Articles by

John Dominguez

All articles
arrow rightarrow right
Proactively Identify and Eliminate Defensive Weaknesses with Cybersecurity Domain-Specific AI

You can use AI to help you detect and correct defensive weaknesses in the form of exposures, misconfigurations, underutilized security tool capabilities, and configuration drift. There are advantages to knowing where you’re weak before an attacker does, and then quickly fixing it. Domain-specific cybersecurity models can help you fully understand your environment and the exposures present, and ideally, automate the remediation process for rapid security hardening.

Network Security Policy Management (NSPM): Keeping Policy and Reality Aligned

Traditional NSPM tools excel at defining and enforcing policies but struggle to verify that those configurations remain intact. Once deployed, policies can drift quietly for weeks or months, only surfacing when an incident or audit exposes the discrepancy. Reach Security extends NSPM beyond policy management into policy assurance – ensuring that what’s configured always matches what’s intended.

EAP and XDR: An Essential Marriage of Proactive and Reactive Security Operations

In cybersecurity, detection and response are table stakes. Attackers are faster, techniques more subtle, and the cost of even small missteps on the part of the defender is growing. To truly shift from reactive defense to proactive protection, teams need something more: continuous exposure assessment, management, and prevention.

Getting Started with Reach

To join the community of customers enjoying the benefits of Reach and learn more about how it can transform your security posture, visit:

Just Released: TAG Cyber's ROI analysis of the Reach platform
Read the Report
arrow rightarrow right