Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

6/23/2015
01:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Pulse Secure Appoints Sudhakar Ramakrishna as Chief Executive Officer and Board Member

Former Citrix SVP and GM Brings Nearly 25 Years of Strategy, Business Management and Team Building Experience

SAN JOSE, CALIF. – June 23, 2015 – Pulse Secure, a leading provider of access and mobile security solutions to the enterprise and service providers, today announced that Sudhakar Ramakrishna has been appointed CEO and a member of the Board of Directors, effective immediately.

Ramakrishna brings nearly 25 years of industry-related experience that includes product and marketing strategies, business management and domain expertise across a wide spectrum of software and security technologies, including cloud-based architectures and solutions. Most recently, Ramakrishna was the senior vice president and general manager for the Citrix Enterprise and Service Provider Division. In that role, he had profit and loss (P&L) responsibility for a portfolio of approximately $2.5 billion covering virtualization, cloud networking, mobile platforms and cloud services solutions.

“Sudhakar is the ideal CEO to lead Pulse Secure’s rapidly evolving business,” said Al Zollar, Pulse Secure Executive Chairman and executive partner of Siris Capital Group, LLC. “His deep-rooted expertise in the enterprise networking space is a perfect match for Pulse Secure. During Sudhakar’s career, he has thrived – not only in innovating and growing revenue extensively, but also with a proven track record of leading world-class organizations by identifying and building exceptional talent, developing strong corporate cultures and delivering customer growth with purpose. We couldn’t be any happier to have such a proven leader at the helm.”

The appointment of Ramakrishna further exemplifies Pulse Secure’s commitment to the enterprise and service provider segments and being the leader in next generation secure access solutions. The announcement comes on the heels of tremendous company momentum, including the launch of a new channel program, Pulse Secure Connect Now. Pulse Secure’s products were also recognized by InfoSec’s Global Excellence program for NAC, SSL/VPN and BYOD solutions as well as the by the Govies for Access Control Software and Controllers. The company protects more than 20,000 enterprise customers, 18 million endpoints and owns more than 200 patents.

“In the era of mobility and the cloud, with amorphous and ever changing enterprise boundaries, secure access to infrastructure and applications is a key business challenge for organizations of all sizes,” Ramakrishna said. “I look forward to working with the Pulse Secure team and extending its legacy of delivering innovative solutions to address critical and evolving security needs of customers and delivering great user experiences.”

Before Citrix, Ramakrishna served as President of Products and Services at Polycom, where he was responsible for the company’s $1.4 billion voice and video collaboration products, global services and operations team. He previously held product and business leadership roles at Motorola, 3Com and U.S. Robotics.

For information on Pulse Secure, please visit www.pulsesecure.net.

 

About Pulse Secure

Pulse Secure, LLC is a leading provider of access and mobile security solutions to both enterprises and service providers. Enterprises from every vertical and of all sizes utilize the company’s Pulse virtual private network (VPN), network access control and mobile security products to enable end user mobility securely and seamlessly in their organizations. Pulse Secure’s mission is to enable open, integrated enterprise system solutions that empower business productivity through seamless mobility.

 

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: We need more votes, check the obituaries.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3272
PUBLISHED: 2021-01-27
jp2_decode in jp2/jp2_dec.c in libjasper in JasPer 2.0.24 has a heap-based buffer over-read when there is an invalid relationship between the number of channels and the number of image components.
CVE-2021-3317
PUBLISHED: 2021-01-26
KLog Server through 2.4.1 allows authenticated command injection. async.php calls shell_exec() on the original value of the source parameter.
CVE-2013-2512
PUBLISHED: 2021-01-26
The ftpd gem 0.2.1 for Ruby allows remote attackers to execute arbitrary OS commands via shell metacharacters in a LIST or NLST command argument within FTP protocol traffic.
CVE-2021-3165
PUBLISHED: 2021-01-26
SmartAgent 3.1.0 allows a ViewOnly attacker to create a SuperUser account via the /#/CampaignManager/users URI.
CVE-2021-1070
PUBLISHED: 2021-01-26
NVIDIA Jetson AGX Xavier Series, Jetson Xavier NX, TX1, TX2, Nano and Nano 2GB, L4T versions prior to 32.5, contains a vulnerability in the apply_binaries.sh script used to install NVIDIA components into the root file system image, in which improper access control is applied, which may lead to an un...