Risk
7/19/2006
01:35 AM
Connect Directly
RSS
E-Mail
50%
50%

PortAuthority Names VP

PortAuthority Technologies has named former Juniper Networks sales executive Ron DiBiase as its VP of worldwide sales

PALO ALTO, Calif. -- PortAuthority Technologies, Inc.,™ the leader in Information Leak Prevention, today announced that it has named former Juniper Networks sales executive Ron DiBiase as its vice president of worldwide sales.

PortAuthority Technologies is a growing leader in the Information Leak Prevention and Content Monitoring/Filtering markets. It delivers security solutions that reliably and accurately control the unauthorized distribution of sensitive information for data privacy, confidential information protection, and compliance with regulations such as Sarbanes-Oxley (SOX), the Health Insurance Portability and Accountability Act (HIPAA), the Payment Card Industry (PCI) Data Security Standard, and the Gramm-Leach-Bliley Act (GLBA). With 27 patents pending, only PortAuthority stops information leaks by continually monitoring internal and outbound communications and delivering policy enforcement in a real-time and accurate manner.

“The addition of this proven sales leader to PortAuthority Technologies’ executive team further adds to our growing corporate capabilities,” said PortAuthority Technologies CEO Peter Foley. “Ron has repeatedly demonstrated his ability to be successful in the IT enterprise sales arena and in growing successful channel programs. We will rely on his knowledge and expertise as we continue to grow and deliver our innovative products to enterprises to address their needs for having full visibility and control of their data to accurately prevent data breaches and information leaks.”

“I am thrilled to join PortAuthority Technologies at this very exciting time for the company,” said DiBiase. “The company’s customer and industry traction is growing, and I’m pleased to leverage my sales and channel expertise to contribute to its success. PortAuthority Technologies is the pioneer and technology leader for information leak prevention for external and internal leaks, extending comprehensive information leak prevention beyond email to prevent breaches in outgoing encrypted web communications, file transfers, and instant messaging.”

PortAuthority Technologies Inc.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Must Reads - September 25, 2014
Dark Reading's new Must Reads is a compendium of our best recent coverage of identity and access management. Learn about access control in the age of HTML5, how to improve authentication, why Active Directory is dead, and more.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2003-1598
Published: 2014-10-01
SQL injection vulnerability in log.header.php in WordPress 0.7 and earlier allows remote attackers to execute arbitrary SQL commands via the posts variable.

CVE-2011-4624
Published: 2014-10-01
Cross-site scripting (XSS) vulnerability in facebook.php in the GRAND FlAGallery plugin (flash-album-gallery) before 1.57 for WordPress allows remote attackers to inject arbitrary web script or HTML via the i parameter.

CVE-2012-0811
Published: 2014-10-01
Multiple SQL injection vulnerabilities in Postfix Admin (aka postfixadmin) before 2.3.5 allow remote authenticated users to execute arbitrary SQL commands via (1) the pw parameter to the pacrypt function, when mysql_encrypt is configured, or (2) unspecified vectors that are used in backup files gene...

CVE-2014-2640
Published: 2014-10-01
Cross-site scripting (XSS) vulnerability in HP System Management Homepage (SMH) before 7.4 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

CVE-2014-2641
Published: 2014-10-01
Cross-site request forgery (CSRF) vulnerability in HP System Management Homepage (SMH) before 7.4 allows remote authenticated users to hijack the authentication of unspecified victims via unknown vectors.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Chris Hadnagy, who hosts the annual Social Engineering Capture the Flag Contest at DEF CON, will discuss the latest trends attackers are using.