David Guest | Solution Architect and Technology Evangelist

An opening quote icon

I translate technobabble into plain English.

David Guest profile headshot
circle mask

As Kocho’s Solution Architect and Technology Evangelist, I’m responsible for a lot of different things.

I’ve worked in identity and security for the last 20+ years and have worked with technologies including Unix, Linux, IBM, Novell, and many others. This wide range of experience helps me design and implement great solutions on behalf of our clients.

I’m responsible for putting together solutions around identity, security, Microsoft 365, and other cloud services. All the while making sure that our clients understand the current trends around technology, such as identity in the Cloud (and on-premises).

I’m a regular presenter at our events and Microsoft roadshows, presenting to large and small audiences, and trying to turn technobabble into something resembling English.

My ‘Become greater’ ambition is to see that our clients are well-advised and can implement their strategy to become greater through technology.

Quote icon

I feel great when heading downhill on snow, ideally under a blue sky, completing a long run or making a last-ditch tackle.

tag icon

Featured

Resources and insights from David Guest

""
  • Blog

Securing your path to passwordless authentication: A quick guide to modern sign-on methods

10-minute Read

Closer shot of man in white shirt with glasses and headset staring at laptop screen
  • On Demand

The Microsoft Technology Update

Gain up-to-date knowledge on the features and functionality of Microsoft’s key identity and security technologies.

play icon

45-minute Watch

Alternate close up of woman's hands using stylus and tablet
  • On Demand

Understanding and enabling decentralised identity – Microsoft Expert Webinar

Give your users ultimate authority over their data to reduce risk, effectively verify, and improve transparency and auditability.

play icon

30-minute Watch

Close up of hands using stylus on a tablet
  • On Demand

Microsoft extended detection and response (XDR) demo

Give your users ultimate authority over their data to reduce risk, effectively verify, and improve transparency and auditability.

play icon

30-minute Watch

High angle shot of three white staircases
  • On Demand

Understanding Microsoft’s information protection and compliance tools

Find out how you can reduce the risk of a costly and reputationally damaging data breach.

play icon

37-minute Watch

Woman wearing glasses with black hair in denim jacket pointing at whiteboard
  • On Demand

Identity and zero trust for the new hybrid world

Dave Guest walks you through the key steps required to manage identities in complex environments – through the lens of zero trust.

play icon

42-minute Watch

Redheaded woman in plaid shirt and arm tattoo working on desktop
  • On Demand

A guide to deploying passwordless authentication

Discover how passwordless authentication works, why it is a must for organisations to achieve robust security, and how to deploy it for yourself.

play icon

27-minute Watch

Close up of man with thick curly hair and black framed glasses
  • On Demand

Microsoft security tools to protect financial and professional services in the remote working world

Learn how to enable secure and compliant access for remote collaboration, file sharing, and more.

play icon

60-minute Watch

Man swimming in choppy surf
  • On Demand

Why migrate from ADFS to Azure authentication?

Understand the pros and cons of ADFS authentication vs. pass-through authentication and password hash sync.

play icon

9-minute Watch

Close up of hands holding orange and pink post-it notes
  • Blog

How the SolarWinds breach highlights the dangers of federated authentication – and what you can do to protect against it

6-minute Read

""
  • Blog

How to maximise value with Azure infrastructure

5-minute Read

Close up shot of hand putting post-it notes on a whiteboard
  • Blog

How and why to move to Azure Information Protection (AIP) unified labeling

7-minute Read

""
  • Blog

What is SCIM and how do I make the magic happen?

9-minute Read

Bearded man with dark hair smiling through two sets of shoulders
  • Blog

Decentralised identity: A beginner's guide

5-minute Read

Overlapping concentric brown rings
  • Blog

The Azure AD Application Proxy: What it is, what it can do, and how it can help you…

4-minute Read

Nigel Lambourn holding red whiteboard pen
  • Blog

Cloud computing and compliance for the financial sector

3-minute Read