Analytics
1/17/2013
07:36 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Former PwC Consulting CEO Takes Reins At Anti-malware Startup TaaSERA

C. Scott Hartz has joined as CEO

CUPERTINO, CA – January 15, 2013 – TaaSERA, Inc., a security startup focused on advanced behavioral malware detection, today announced that C. Scott Hartz, former Chief Executive Officer of PricewaterhouseCoopers Consulting, has joined as its new CEO, effective November 2012. Similar to his previous executive leadership positions, Hartz will accelerate TaaSERA's business development and increase customer adoption among Fortune 500 enterprise companies. Hartz, who is a founding shareholder in TaaSERA, will also remain on the company's Board of Directors.

In addition to building the business and working to finalize the company's current fundraising round, Hartz will lead efforts to attract additional members for TaaSERA's Advisory Board. This includes the recent appointment of The Honorable Tom Ridge as the Chairman of the company's Advisory Board. Hartz will also play a role in the product development plans for the company, including the TAAS NetAnalyzerTM launch later this month.

TaaSERA was established in February 2012 through the acquisition of cloud and endpoint security provider Taasware, Inc. and licensed R&D technology for network malware detection from SRI International, formerly the Stanford Research Institute. TaaSERA was awarded its first foundational patent in December 2012. To date, the company has made six additional non-provisional patent filings. TaaSERA's six patents contain a total of 156 claims.

"TaaSERA brings a very innovative approach to the market to solve the evolving malware problem that businesses and government agencies are grappling with," said Hartz. "TaaSERA's approach of continuously monitoring real time network and endpoint environments for malicious behaviors, instead of monitoring for malicious code, is transformational for this industry and will better equip organizations to protect against advanced cyber threats. Because our technology identifies known malware behaviors, we can ultimately stop cyber criminals from attacking your enterprise, no matter which attack vector they take."

Hartz brings more than 40 years of strategy and technology consulting experience to TaaSERA and is widely recognized as a pioneer in leading transformational business solutions for Fortune 500 global enterprises. Hartz began his career in management consulting at Price Waterhouse and PricewaterhouseCoopers, eventually leading an organization that served more than 50% of the Fortune 500 enterprises on a worldwide basis. From 1995 to 2002, Hartz served as CEO of PwC Consulting and led the company's growth from under $500 million to more than $6 billion. Under his management, PwC Consulting gained a global leadership position serving multi-national companies in corporate transformation, e-business and e-markets, supply chain services, CRM, and enterprise resource planning. Since 2002, Hartz has served as CEO of The Hartz Group, an IT and technology consulting firm.

"Scott is one of the most successful businessmen I have met and brings over four decades of strategy and information technology experience to TaaSERA," said Kurt F. Buseck, Chairman and Chief Financial Officer at TaaSERA. "His proven leadership will be beneficial as we launch our products that serve major vertical markets including financial services, government, healthcare, retail, and critical infrastructure."

About TaaSERA

TaaSERA's malware behavior detection solutions have been built upon core technology used by a number of leading government agencies that identify previously unseen attacks as they happen. Unlike technologies that review signatures or other historical data, or assess potential vulnerabilities and analyze the impact of malware programs in non-production environments, TaaSERA's software solutions leverage patented behavior detection capabilities to highlight the emergence of previously unseen attacks as they are being carried out -- providing organizations with the specific information necessary to adjust defenses and mitigate vulnerabilities targeted by today's sophisticated threats.

Available in Q1 2013, TaaSERA products will provide an embedded source of strategic intelligence within a broad range of third party solutions and services. The TaaSERA Attack Warning and Response Engine (AWARE) improves the effectiveness of nearly every element in today's layered IT security defenses to boost protection of underlying business systems and information, and to prevent costly data breach incidents.

For more information, please visit us at www.taasera.com or follow us on Twitter.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-4807
Published: 2014-11-22
Sterling Order Management in IBM Sterling Selling and Fulfillment Suite 9.3.0 before FP8 allows remote authenticated users to cause a denial of service (CPU consumption) via a '\0' character.

CVE-2014-6183
Published: 2014-11-22
IBM Security Network Protection 5.1 before 5.1.0.0 FP13, 5.1.1 before 5.1.1.0 FP8, 5.1.2 before 5.1.2.0 FP9, 5.1.2.1 before FP5, 5.2 before 5.2.0.0 FP5, and 5.3 before 5.3.0.0 FP1 on XGS devices allows remote authenticated users to execute arbitrary commands via unspecified vectors.

CVE-2014-8626
Published: 2014-11-22
Stack-based buffer overflow in the date_from_ISO8601 function in ext/xmlrpc/libxmlrpc/xmlrpc.c in PHP before 5.2.7 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code by including a timezone field in a date, leading to improper XML-RPC encoding...

CVE-2014-8710
Published: 2014-11-22
The decompress_sigcomp_message function in epan/sigcomp-udvm.c in the SigComp UDVM dissector in Wireshark 1.10.x before 1.10.11 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet.

CVE-2014-8711
Published: 2014-11-22
Multiple integer overflows in epan/dissectors/packet-amqp.c in the AMQP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allow remote attackers to cause a denial of service (application crash) via a crafted amqp_0_10 PDU in a packet.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?