Analytics
1/17/2013
07:36 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Former PwC Consulting CEO Takes Reins At Anti-malware Startup TaaSERA

C. Scott Hartz has joined as CEO

CUPERTINO, CA – January 15, 2013 – TaaSERA, Inc., a security startup focused on advanced behavioral malware detection, today announced that C. Scott Hartz, former Chief Executive Officer of PricewaterhouseCoopers Consulting, has joined as its new CEO, effective November 2012. Similar to his previous executive leadership positions, Hartz will accelerate TaaSERA's business development and increase customer adoption among Fortune 500 enterprise companies. Hartz, who is a founding shareholder in TaaSERA, will also remain on the company's Board of Directors.

In addition to building the business and working to finalize the company's current fundraising round, Hartz will lead efforts to attract additional members for TaaSERA's Advisory Board. This includes the recent appointment of The Honorable Tom Ridge as the Chairman of the company's Advisory Board. Hartz will also play a role in the product development plans for the company, including the TAAS NetAnalyzerTM launch later this month.

TaaSERA was established in February 2012 through the acquisition of cloud and endpoint security provider Taasware, Inc. and licensed R&D technology for network malware detection from SRI International, formerly the Stanford Research Institute. TaaSERA was awarded its first foundational patent in December 2012. To date, the company has made six additional non-provisional patent filings. TaaSERA's six patents contain a total of 156 claims.

"TaaSERA brings a very innovative approach to the market to solve the evolving malware problem that businesses and government agencies are grappling with," said Hartz. "TaaSERA's approach of continuously monitoring real time network and endpoint environments for malicious behaviors, instead of monitoring for malicious code, is transformational for this industry and will better equip organizations to protect against advanced cyber threats. Because our technology identifies known malware behaviors, we can ultimately stop cyber criminals from attacking your enterprise, no matter which attack vector they take."

Hartz brings more than 40 years of strategy and technology consulting experience to TaaSERA and is widely recognized as a pioneer in leading transformational business solutions for Fortune 500 global enterprises. Hartz began his career in management consulting at Price Waterhouse and PricewaterhouseCoopers, eventually leading an organization that served more than 50% of the Fortune 500 enterprises on a worldwide basis. From 1995 to 2002, Hartz served as CEO of PwC Consulting and led the company's growth from under $500 million to more than $6 billion. Under his management, PwC Consulting gained a global leadership position serving multi-national companies in corporate transformation, e-business and e-markets, supply chain services, CRM, and enterprise resource planning. Since 2002, Hartz has served as CEO of The Hartz Group, an IT and technology consulting firm.

"Scott is one of the most successful businessmen I have met and brings over four decades of strategy and information technology experience to TaaSERA," said Kurt F. Buseck, Chairman and Chief Financial Officer at TaaSERA. "His proven leadership will be beneficial as we launch our products that serve major vertical markets including financial services, government, healthcare, retail, and critical infrastructure."

About TaaSERA

TaaSERA's malware behavior detection solutions have been built upon core technology used by a number of leading government agencies that identify previously unseen attacks as they happen. Unlike technologies that review signatures or other historical data, or assess potential vulnerabilities and analyze the impact of malware programs in non-production environments, TaaSERA's software solutions leverage patented behavior detection capabilities to highlight the emergence of previously unseen attacks as they are being carried out -- providing organizations with the specific information necessary to adjust defenses and mitigate vulnerabilities targeted by today's sophisticated threats.

Available in Q1 2013, TaaSERA products will provide an embedded source of strategic intelligence within a broad range of third party solutions and services. The TaaSERA Attack Warning and Response Engine (AWARE) improves the effectiveness of nearly every element in today's layered IT security defenses to boost protection of underlying business systems and information, and to prevent costly data breach incidents.

For more information, please visit us at www.taasera.com or follow us on Twitter.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7421
Published: 2015-03-02
The Crypto API in the Linux kernel before 3.18.5 allows local users to load arbitrary kernel modules via a bind system call for an AF_ALG socket with a module name in the salg_name field, a different vulnerability than CVE-2014-9644.

CVE-2014-8160
Published: 2015-03-02
net/netfilter/nf_conntrack_proto_generic.c in the Linux kernel before 3.18 generates incorrect conntrack entries during handling of certain iptables rule sets for the SCTP, DCCP, GRE, and UDP-Lite protocols, which allows remote attackers to bypass intended access restrictions via packets with disall...

CVE-2014-9644
Published: 2015-03-02
The Crypto API in the Linux kernel before 3.18.5 allows local users to load arbitrary kernel modules via a bind system call for an AF_ALG socket with a parenthesized module template expression in the salg_name field, as demonstrated by the vfat(aes) expression, a different vulnerability than CVE-201...

CVE-2015-0239
Published: 2015-03-02
The em_sysenter function in arch/x86/kvm/emulate.c in the Linux kernel before 3.18.5, when the guest OS lacks SYSENTER MSR initialization, allows guest OS users to gain guest OS privileges or cause a denial of service (guest OS crash) by triggering use of a 16-bit code segment for emulation of a SYS...

CVE-2014-8921
Published: 2015-03-01
The IBM Notes Traveler Companion application 1.0 and 1.1 before 201411010515 for Window Phone, as distributed in IBM Notes Traveler 9.0.1, does not properly restrict the number of executions of the automatic configuration option, which makes it easier for remote attackers to capture credentials by c...

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.