Analytics
1/8/2014
01:55 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Arbor Networks Appoints Matthew Moynahan President

Prior to joining Arbor Networks, Moynahan was president and chief executive officer of Veracode

BURLINGTON, Mass., January 8, 2014 – Arbor Networks, Inc. today announced the appointment of Matthew Moynahan to the position of President, replacing Colin Doherty. Mr. Moynahan had been senior vice president of product management and corporate development at Arbor since 2012.

Over the course of his 23-year career, Mr. Moynahan has held a variety of executive and leadership positions within both fast growing private and very large public companies. Prior to joining Arbor Networks, Matt was president and chief executive officer of Veracode, a leader in application security. Previously, he served as a vice president at Symantec in several roles, including the consumer products and client and host (server) security divisions.

"I'm excited by the opportunity to lead this great team. The solution portfolio is dynamic and exciting, but the company culture that Colin has fostered is what truly makes this a special place to work," said Mr. Moynahan. "The company is well positioned, united around our strategy and committed to delivering for our customers, partners and each other."

Mr. Doherty joined Arbor in 2007, first as VP of worldwide sales and then as president for the past four years. Arbor underwent a period of unprecedented growth and expansion under his leadership, highlighted by the 2010 acquisition by Danaher and culminating with the launch of Arbor CloudSM services for multi-layered DDoS protection and acquisition of Packetloop, expanding Arbor's presence in the advanced threat market.

"2013 was a transformative year for the company. Arbor is now delivering a broad, integrated set of network visibility; threat detection and mitigation; incident response and forensics capabilities that help customers see, understand and solve their most critical security challenges," said Mr. Doherty. "Matt has been instrumental in developing our strategy and has the right blend of business, technical and managerial experience to lead Arbor in its next stage of growth."

"I am confident that Matt's blend of experience, skills and entrepreneurial spirit will serve Arbor well as we establish a key leadership position in the growing advanced threat market," said Robert Piconi, Danaher's Group Executive for the Test & Measurement Communications Platform. "I want to thank Colin not only for his exceptional leadership within Arbor, but the integrity and thoughtfulness he brought to the job every day."

About Arbor Networks

Arbor Networks, Inc. helps secure the world's largest enterprise and service provider networks from DDoS attacks and advanced threats. Arbor is the world's leading provider of DDoS protection in the enterprise, carrier and mobile market segments, according to Infonetics Research. Arbor's advanced threat solutions deliver comprehensive network visibility through a combination of packet capture and NetFlow technology, enabling the rapid detection and mitigation of malware and malicious insiders. Arbor also delivers market leading analytics for dynamic incident response, historical analysis, visualization and forensics. Arbor strives to be a "force multiplier", making network and security teams the experts. Our goal is to provide a richer picture into networks and more security context - so customers can solve problems faster and help reduce the risk to their business.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-5242
Published: 2014-10-21
Directory traversal vulnerability in functions/suggest.php in Banana Dance B.2.6 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the name parameter in a get_template action.

CVE-2012-5243
Published: 2014-10-21
functions/suggest.php in Banana Dance B.2.6 and earlier allows remote attackers to read arbitrary database information via a crafted request.

CVE-2012-5702
Published: 2014-10-21
Multiple cross-site scripting (XSS) vulnerabilities in dotProject before 2.1.7 allow remote attackers to inject arbitrary web script or HTML via the (1) callback parameter in a color_selector action, (2) field parameter in a date_format action, or (3) company_name parameter in an addedit action to i...

CVE-2013-7406
Published: 2014-10-21
SQL injection vulnerability in the MRBS module for Drupal allows remote attackers to execute arbitrary SQL commands via unspecified vectors.

CVE-2014-2531
Published: 2014-10-21
SQL injection vulnerability in xhr.php in InterWorx Web Control Panel (aka InterWorx Hosting Control Panel and InterWorx-CP) before 5.0.14 build 577 allows remote authenticated users to execute arbitrary SQL commands via the i parameter in a search action to the (1) NodeWorx , (2) SiteWorx, or (3) R...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.