Analytics
1/17/2013
07:36 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Former PwC Consulting CEO Takes Reins At Anti-malware Startup TaaSERA

C. Scott Hartz has joined as CEO

CUPERTINO, CA – January 15, 2013 – TaaSERA, Inc., a security startup focused on advanced behavioral malware detection, today announced that C. Scott Hartz, former Chief Executive Officer of PricewaterhouseCoopers Consulting, has joined as its new CEO, effective November 2012. Similar to his previous executive leadership positions, Hartz will accelerate TaaSERA's business development and increase customer adoption among Fortune 500 enterprise companies. Hartz, who is a founding shareholder in TaaSERA, will also remain on the company's Board of Directors.

In addition to building the business and working to finalize the company's current fundraising round, Hartz will lead efforts to attract additional members for TaaSERA's Advisory Board. This includes the recent appointment of The Honorable Tom Ridge as the Chairman of the company's Advisory Board. Hartz will also play a role in the product development plans for the company, including the TAAS NetAnalyzerTM launch later this month.

TaaSERA was established in February 2012 through the acquisition of cloud and endpoint security provider Taasware, Inc. and licensed R&D technology for network malware detection from SRI International, formerly the Stanford Research Institute. TaaSERA was awarded its first foundational patent in December 2012. To date, the company has made six additional non-provisional patent filings. TaaSERA's six patents contain a total of 156 claims.

"TaaSERA brings a very innovative approach to the market to solve the evolving malware problem that businesses and government agencies are grappling with," said Hartz. "TaaSERA's approach of continuously monitoring real time network and endpoint environments for malicious behaviors, instead of monitoring for malicious code, is transformational for this industry and will better equip organizations to protect against advanced cyber threats. Because our technology identifies known malware behaviors, we can ultimately stop cyber criminals from attacking your enterprise, no matter which attack vector they take."

Hartz brings more than 40 years of strategy and technology consulting experience to TaaSERA and is widely recognized as a pioneer in leading transformational business solutions for Fortune 500 global enterprises. Hartz began his career in management consulting at Price Waterhouse and PricewaterhouseCoopers, eventually leading an organization that served more than 50% of the Fortune 500 enterprises on a worldwide basis. From 1995 to 2002, Hartz served as CEO of PwC Consulting and led the company's growth from under $500 million to more than $6 billion. Under his management, PwC Consulting gained a global leadership position serving multi-national companies in corporate transformation, e-business and e-markets, supply chain services, CRM, and enterprise resource planning. Since 2002, Hartz has served as CEO of The Hartz Group, an IT and technology consulting firm.

"Scott is one of the most successful businessmen I have met and brings over four decades of strategy and information technology experience to TaaSERA," said Kurt F. Buseck, Chairman and Chief Financial Officer at TaaSERA. "His proven leadership will be beneficial as we launch our products that serve major vertical markets including financial services, government, healthcare, retail, and critical infrastructure."

About TaaSERA

TaaSERA's malware behavior detection solutions have been built upon core technology used by a number of leading government agencies that identify previously unseen attacks as they happen. Unlike technologies that review signatures or other historical data, or assess potential vulnerabilities and analyze the impact of malware programs in non-production environments, TaaSERA's software solutions leverage patented behavior detection capabilities to highlight the emergence of previously unseen attacks as they are being carried out -- providing organizations with the specific information necessary to adjust defenses and mitigate vulnerabilities targeted by today's sophisticated threats.

Available in Q1 2013, TaaSERA products will provide an embedded source of strategic intelligence within a broad range of third party solutions and services. The TaaSERA Attack Warning and Response Engine (AWARE) improves the effectiveness of nearly every element in today's layered IT security defenses to boost protection of underlying business systems and information, and to prevent costly data breach incidents.

For more information, please visit us at www.taasera.com or follow us on Twitter.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-0360
Published: 2014-04-23
Memory leak in Cisco IOS before 15.1(1)SY, when IKEv2 debugging is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCtn22376.

CVE-2012-1317
Published: 2014-04-23
The multicast implementation in Cisco IOS before 15.1(1)SY allows remote attackers to cause a denial of service (Route Processor crash) by sending packets at a high rate, aka Bug ID CSCts37717.

CVE-2012-1366
Published: 2014-04-23
Cisco IOS before 15.1(1)SY on ASR 1000 devices, when Multicast Listener Discovery (MLD) tracking is enabled for IPv6, allows remote attackers to cause a denial of service (device reload) via crafted MLD packets, aka Bug ID CSCtz28544.

CVE-2012-3062
Published: 2014-04-23
Cisco IOS before 15.1(1)SY, when Multicast Listener Discovery (MLD) snooping is enabled, allows remote attackers to cause a denial of service (CPU consumption or device crash) via MLD packets on a network that contains many IPv6 hosts, aka Bug ID CSCtr88193.

CVE-2012-3918
Published: 2014-04-23
Cisco IOS before 15.3(1)T on Cisco 2900 devices, when a VWIC2-2MFT-T1/E1 card is configured for TDM/HDLC mode, allows remote attackers to cause a denial of service (serial-interface outage) via certain Frame Relay traffic, aka Bug ID CSCub13317.

Best of the Web