Analytics
1/17/2013
07:36 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Former PwC Consulting CEO Takes Reins At Anti-malware Startup TaaSERA

C. Scott Hartz has joined as CEO

CUPERTINO, CA – January 15, 2013 – TaaSERA, Inc., a security startup focused on advanced behavioral malware detection, today announced that C. Scott Hartz, former Chief Executive Officer of PricewaterhouseCoopers Consulting, has joined as its new CEO, effective November 2012. Similar to his previous executive leadership positions, Hartz will accelerate TaaSERA's business development and increase customer adoption among Fortune 500 enterprise companies. Hartz, who is a founding shareholder in TaaSERA, will also remain on the company's Board of Directors.

In addition to building the business and working to finalize the company's current fundraising round, Hartz will lead efforts to attract additional members for TaaSERA's Advisory Board. This includes the recent appointment of The Honorable Tom Ridge as the Chairman of the company's Advisory Board. Hartz will also play a role in the product development plans for the company, including the TAAS NetAnalyzerTM launch later this month.

TaaSERA was established in February 2012 through the acquisition of cloud and endpoint security provider Taasware, Inc. and licensed R&D technology for network malware detection from SRI International, formerly the Stanford Research Institute. TaaSERA was awarded its first foundational patent in December 2012. To date, the company has made six additional non-provisional patent filings. TaaSERA's six patents contain a total of 156 claims.

"TaaSERA brings a very innovative approach to the market to solve the evolving malware problem that businesses and government agencies are grappling with," said Hartz. "TaaSERA's approach of continuously monitoring real time network and endpoint environments for malicious behaviors, instead of monitoring for malicious code, is transformational for this industry and will better equip organizations to protect against advanced cyber threats. Because our technology identifies known malware behaviors, we can ultimately stop cyber criminals from attacking your enterprise, no matter which attack vector they take."

Hartz brings more than 40 years of strategy and technology consulting experience to TaaSERA and is widely recognized as a pioneer in leading transformational business solutions for Fortune 500 global enterprises. Hartz began his career in management consulting at Price Waterhouse and PricewaterhouseCoopers, eventually leading an organization that served more than 50% of the Fortune 500 enterprises on a worldwide basis. From 1995 to 2002, Hartz served as CEO of PwC Consulting and led the company's growth from under $500 million to more than $6 billion. Under his management, PwC Consulting gained a global leadership position serving multi-national companies in corporate transformation, e-business and e-markets, supply chain services, CRM, and enterprise resource planning. Since 2002, Hartz has served as CEO of The Hartz Group, an IT and technology consulting firm.

"Scott is one of the most successful businessmen I have met and brings over four decades of strategy and information technology experience to TaaSERA," said Kurt F. Buseck, Chairman and Chief Financial Officer at TaaSERA. "His proven leadership will be beneficial as we launch our products that serve major vertical markets including financial services, government, healthcare, retail, and critical infrastructure."

About TaaSERA

TaaSERA's malware behavior detection solutions have been built upon core technology used by a number of leading government agencies that identify previously unseen attacks as they happen. Unlike technologies that review signatures or other historical data, or assess potential vulnerabilities and analyze the impact of malware programs in non-production environments, TaaSERA's software solutions leverage patented behavior detection capabilities to highlight the emergence of previously unseen attacks as they are being carried out -- providing organizations with the specific information necessary to adjust defenses and mitigate vulnerabilities targeted by today's sophisticated threats.

Available in Q1 2013, TaaSERA products will provide an embedded source of strategic intelligence within a broad range of third party solutions and services. The TaaSERA Attack Warning and Response Engine (AWARE) improves the effectiveness of nearly every element in today's layered IT security defenses to boost protection of underlying business systems and information, and to prevent costly data breach incidents.

For more information, please visit us at www.taasera.com or follow us on Twitter.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7437
Published: 2015-03-29
Multiple integer overflows in potrace 1.11 allow remote attackers to cause a denial of service (crash) via large dimensions in a BMP image, which triggers a buffer overflow.

CVE-2013-7438
Published: 2015-03-29
Multiple buffer overflows in pbm212030 allow remote attackers to cause a denial of service (crash) or possible execute arbitrary code via a crafted PBM image, related to (1) stream line data, which triggers a heap-based buffer overflow, or (2) vectors related to an "internal intermediate heap-based ...

CVE-2014-5427
Published: 2015-03-29
Johnson Controls Metasys 4.1 through 6.5, as used in Application and Data Server (ADS), Extended Application and Data Server (aka ADX), LonWorks Control Server 85 LCS8520, Network Automation Engine (NAE) 55xx-x, Network Integration Engine (NIE) 5xxx-x, and NxE8500, allows remote attackers to read pa...

CVE-2014-5428
Published: 2015-03-29
Unrestricted file upload vulnerability in unspecified web services in Johnson Controls Metasys 4.1 through 6.5, as used in Application and Data Server (ADS), Extended Application and Data Server (aka ADX), LonWorks Control Server 85 LCS8520, Network Automation Engine (NAE) 55xx-x, Network Integratio...

CVE-2014-9205
Published: 2015-03-29
Stack-based buffer overflow in the PmBase64Decode function in an unspecified demonstration application in MICROSYS PROMOTIC stable before 8.2.19 and PROMOTIC development before 8.3.2 allows remote attackers to execute arbitrary code by providing a large amount of data.

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.