Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Careers & People

11:55 AM
Dark Reading
Dark Reading
Products and Releases

iSheriff Names John Mutch Chief Executive Officer

Former CEO of BeyondTrust, Peregrine Systems & HNC Software Joins Cloud Security Leader

Redwood Shores, Calif. – January 12, 2016iSheriff, a leading cloud security company, today announced John Mutch as its new Chief Executive Officer (CEO) and a member of its board of directors, effective immediately. As CEO, Mutch is responsible for the future direction of the organization and leading the company’s overall operations, with direct oversight of sales, marketing, professional services, research and development (R&D) and corporate strategy.

Mutch has been an operating executive and investor in the technology industry for more than 30 years. His expertise spans many categories of Software, Services, Security and Infrastructure products and as a CEO, he has completed more than 30 technology company acquisitions and created over $4 billion dollars in shareholder value. Most recently, Mutch served as President and CEO of BeyondTrust Software, a privately held security software company focused on the Global 2000.

“Security is the digital foundation of the global economy and is a critical capability for every organization,” said Mutch. “iSheriff represents the next generation of Cloud Security-as-a-Service companies, built with the cloud in mind from the start and with a much more comprehensive, integrated and easier to use product design. I am genuinely excited to build a new leader in this emerging and dynamic category.”

Prior to BeyondTrust, Mutch was appointed to the Board of Directors of Peregrine Systems by the U.S. Bankruptcy court and helped that company emerge from bankruptcy proceedings. He then served as CEO of Peregrine, successfully restructuring the company, culminating in its sale to HP for $425 million dollars. Previous to Peregrine, he served as CEO of HNC Software, a leading enterprise analytics software provider. After executing the spin out of its Retek subsidiary, valued at $3 billion dollars and distributed to its shareholders in a tax free dividend, HNC was sold to Fair Isaac Corporation in August of 2002 for $825 million. Preceding HNC, Mutch served in executive sales and marketing roles at Microsoft Corporation. He holds an M.B.A. from the University of Chicago and a B.S. from Cornell University, where he served on the advisory board for the undergraduate school of business.

“We are thrilled to have an individual and executive of John Mutch’s caliber leading iSheriff,” said James Socas, chairman of iSheriff’s Board of Directors. “John has the software industry credentials, contacts and vision to build an important security company in a new category.”

The world of computing is poised for rapid change, and the security industry will need to change with it. Today, there are an estimated two billion computers and another two billion smartphones that require cyber-security protection. It is estimated that by 2020, 25-30 billion Internet of Things (IoT) devices will also be connected to the Internet, with almost a third of them focused on business-to-business (B2B) use. As these devices become more integrated into daily life and mission critical processes from healthcare to industrial automation, the personal, financial and operational data they carry will be increasingly targeted for attack.

“These new, connected devices face the same security risks as networked PCs and smartphones, but often have not been designed to the same information security standards. This requires a new approach to device security, one that can protect the broad range of connected devices deployed, does not depend on the processing power of the device to provide protection, can manage myriad devices and set their security policies from a single console,” continued Mutch. "The security of not only our businesses, but the devices we use on a daily basis is of the utmost importance and I'm very pleased to be joining iSheriff at this critical time in cyber security industry. Clearly, security products that leverage the power of the cloud are best positioned to protect our networks going forward."


About iSheriff

iSheriff is a leading cloud-based, enterprise device security platform used by more than 3,000 organizations around the world. Our global cloud network, award winning security, and SaaS delivery model provide an integrated service to protect all enterprise devices – including laptops, servers, tablets, point of sale devices, industrial equipment and emerging “internet of things” technologies. Simply put, iSheriff delivers more powerful security that is easier to manage and more cost efficient than our competition. We are proud to be recognized by leading analysts and industry publications, including SC Magazine, Network Computing and IDC. In February 2015, Virus Bulletin's VB100 independent comparative testing named iSheriff the most effective solution against new and emerging malware.

For more information on iSheriff, please visit www.isheriff.com and follow the company on Twitter at @isheriffinc.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Unreasonable Security Best Practices vs. Good Risk Management
Jack Freund, Director, Risk Science at RiskLens,  11/13/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-11-17
KairosDB through 1.2.2 has XSS in view.html because of showErrorMessage in js/graph.js, as demonstrated by view.html?q= with a '"sampling":{"value":"<script>' substring.
PUBLISHED: 2019-11-17
An issue was discovered in Xorux Lpar2RRD 6.11 and Stor2RRD 2.61, as distributed in Xorux 2.41. They do not correctly verify the integrity of an upgrade package before processing it. As a result, official upgrade packages can be modified to inject an arbitrary Bash script that will be executed by th...
PUBLISHED: 2019-11-17
An integer overflow in the search_in_range function in regexec.c in Oniguruma 6.x before 6.9.4_rc2 leads to an out-of-bounds read, in which the offset of this read is under the control of an attacker. (This only affects the 32-bit compiled version). Remote attackers can cause a denial-of-service or ...
PUBLISHED: 2019-11-17
iTerm2 through 3.3.6 has potentially insufficient documentation about the presence of search history in com.googlecode.iterm2.plist, which might allow remote attackers to obtain sensitive information, as demonstrated by searching for the NoSyncSearchHistory string in .plist files within public Git r...
PUBLISHED: 2019-11-17
jhead 3.03 is affected by: heap-based buffer over-read. The impact is: Denial of service. The component is: ReadJpegSections and process_SOFn in jpgfile.c. The attack vector is: Open a specially crafted JPEG file.