Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Careers & People

11:55 AM
Dark Reading
Dark Reading
Products and Releases

iSheriff Names John Mutch Chief Executive Officer

Former CEO of BeyondTrust, Peregrine Systems & HNC Software Joins Cloud Security Leader

Redwood Shores, Calif. – January 12, 2016iSheriff, a leading cloud security company, today announced John Mutch as its new Chief Executive Officer (CEO) and a member of its board of directors, effective immediately. As CEO, Mutch is responsible for the future direction of the organization and leading the company’s overall operations, with direct oversight of sales, marketing, professional services, research and development (R&D) and corporate strategy.

Mutch has been an operating executive and investor in the technology industry for more than 30 years. His expertise spans many categories of Software, Services, Security and Infrastructure products and as a CEO, he has completed more than 30 technology company acquisitions and created over $4 billion dollars in shareholder value. Most recently, Mutch served as President and CEO of BeyondTrust Software, a privately held security software company focused on the Global 2000.

“Security is the digital foundation of the global economy and is a critical capability for every organization,” said Mutch. “iSheriff represents the next generation of Cloud Security-as-a-Service companies, built with the cloud in mind from the start and with a much more comprehensive, integrated and easier to use product design. I am genuinely excited to build a new leader in this emerging and dynamic category.”

Prior to BeyondTrust, Mutch was appointed to the Board of Directors of Peregrine Systems by the U.S. Bankruptcy court and helped that company emerge from bankruptcy proceedings. He then served as CEO of Peregrine, successfully restructuring the company, culminating in its sale to HP for $425 million dollars. Previous to Peregrine, he served as CEO of HNC Software, a leading enterprise analytics software provider. After executing the spin out of its Retek subsidiary, valued at $3 billion dollars and distributed to its shareholders in a tax free dividend, HNC was sold to Fair Isaac Corporation in August of 2002 for $825 million. Preceding HNC, Mutch served in executive sales and marketing roles at Microsoft Corporation. He holds an M.B.A. from the University of Chicago and a B.S. from Cornell University, where he served on the advisory board for the undergraduate school of business.

“We are thrilled to have an individual and executive of John Mutch’s caliber leading iSheriff,” said James Socas, chairman of iSheriff’s Board of Directors. “John has the software industry credentials, contacts and vision to build an important security company in a new category.”

The world of computing is poised for rapid change, and the security industry will need to change with it. Today, there are an estimated two billion computers and another two billion smartphones that require cyber-security protection. It is estimated that by 2020, 25-30 billion Internet of Things (IoT) devices will also be connected to the Internet, with almost a third of them focused on business-to-business (B2B) use. As these devices become more integrated into daily life and mission critical processes from healthcare to industrial automation, the personal, financial and operational data they carry will be increasingly targeted for attack.

“These new, connected devices face the same security risks as networked PCs and smartphones, but often have not been designed to the same information security standards. This requires a new approach to device security, one that can protect the broad range of connected devices deployed, does not depend on the processing power of the device to provide protection, can manage myriad devices and set their security policies from a single console,” continued Mutch. "The security of not only our businesses, but the devices we use on a daily basis is of the utmost importance and I'm very pleased to be joining iSheriff at this critical time in cyber security industry. Clearly, security products that leverage the power of the cloud are best positioned to protect our networks going forward."


About iSheriff

iSheriff is a leading cloud-based, enterprise device security platform used by more than 3,000 organizations around the world. Our global cloud network, award winning security, and SaaS delivery model provide an integrated service to protect all enterprise devices – including laptops, servers, tablets, point of sale devices, industrial equipment and emerging “internet of things” technologies. Simply put, iSheriff delivers more powerful security that is easier to manage and more cost efficient than our competition. We are proud to be recognized by leading analysts and industry publications, including SC Magazine, Network Computing and IDC. In February 2015, Virus Bulletin's VB100 independent comparative testing named iSheriff the most effective solution against new and emerging malware.

For more information on iSheriff, please visit www.isheriff.com and follow the company on Twitter at @isheriffinc.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/5/2020
How AI and Automation Can Help Bridge the Cybersecurity Talent Gap
Peter Barker, Chief Product Officer at ForgeRock,  6/1/2020
Cybersecurity Spending Hits 'Temporary Pause' Amid Pandemic
Kelly Jackson Higgins, Executive Editor at Dark Reading,  6/2/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: What? IT said I needed virus protection!
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-06-05
The Elementor Page Builder plugin before 2.9.9 for WordPress suffers from a stored XSS vulnerability. An author user can create posts that result in a stored XSS by using a crafted payload in custom links.
PUBLISHED: 2020-06-05
The Elementor Page Builder plugin before 2.9.9 for WordPress suffers from multiple stored XSS vulnerabilities. An author user can create posts that result in stored XSS vulnerabilities, by using a crafted link in the custom URL or by applying custom attributes.
PUBLISHED: 2020-06-05
In Combodo iTop a menu shortcut name can be exploited with a stored XSS payload. This is fixed in all iTop packages (community, essential, professional) in version 2.7.0 and iTop essential and iTop professional in version 2.6.4.
PUBLISHED: 2020-06-05
In Combodo iTop, dashboard ids can be exploited with a reflective XSS payload. This is fixed in all iTop packages (community, essential, professional) for version 2.7.0 and in iTop essential and iTop professional packages for version 2.6.4.
PUBLISHED: 2020-06-05
In the cheetah free wifi 5.1 driver file liebaonat.sys, local users are allowed to cause a denial of service (BSOD) or other unknown impact due to failure to verify the value of a specific IOCTL.