Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

3/17/2014
01:39 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

FireHost Names New CEO

Founder and former CEO Chris Drake will be CTO

Dallas, TX – March 17, 2014 -- In a significant move resulting from mounting years of fast growth and widening market demand for its secure cloud offerings, FireHost, the secure cloud company, announced today the appointment of technology veteran Jim Lewandowski as its new chief executive officer (CEO). This move occurs in concert with founder and former CEO Chris Drake's decision to take the reins as the company's chief technology officer (CTO). Together, the CEO and CTO appointments accelerate FireHost's effort to grow, innovate, and deliver secure clouds that fill a void in a cloud provider market clamoring for greater, more effective security.

Lewandowski is a seasoned cloud and security veteran, bringing with him more than 25 years of executive leadership with companies like Rackspace, McAfee, Yahoo!, BMC Software, and IBM. He was most recently a senior vice president and general manager at Rackspace before establishing a technology consulting business.

Drake, who founded FireHost in 2009 and launched its secure cloud in 2011, has served as CEO since its inception. During his tenure, he led the technology development in addition to establishing its business presence around the world – a presence that has grown immensely in various industries, such as healthcare, retail, financial services, and the public sector. Along the way, the company has doubled revenue in each of the past three years.

Key Highlights

Lewandowski built a reputation leading great teams that delivered exceptional revenue and profit growth for a number of companies in the cloud, security, software, and enterprise markets. In addition to his work at Rackspace, he served as executive vice president of the Americas at McAfee, vice president of business and enterprise sales at Yahoo!, vice president of sales at BMC Software, and business unit executive for storage systems products at IBM.

Lewandowski already serves on FireHost's board of directors.

As the new CTO, Drake will concentrate more time on FireHost's innovation. The leadership changes announced today will fuel the company's growth as his team accelerates its technology innovation and delivers it to customers.

Under Drake's leadership, FireHost successfully expanded its secure cloud from the Americas to the European and Asia market, created FluidScale, the industry's only rebootless scaling technology, designed the highest-performing cloud infrastructure available, and blocked more than 100 million hack attempts against its customer base in 2013 via the company's unique Intelligent Security Model&trade.

FireHost has already established a much-needed position in the marketplace as the leader in secure clouds. The company's quick emergence results from its unflinching belief that cloud customers should not settle for poor security that exposes them to hacking disasters.

Quotes

Chris Drake, FireHost's new CTO

"I made the decision to become CTO because technology innovation has always been my passion. The need for security in the cloud is the most critical priority in the industry. This leadership change allows FireHost to double down on innovation to help customers capitalize on it faster. Jim's industry expertise, business sense and socket fit with our culture make it possible for me to reinforce the company's innovation engines while he continues our rapid growth to even higher levels. This leadership change comes at the right stage of FireHost's history, and we believe that the company is positioned extremely well."

Jim Lewandowski, FireHost's new CEO

"Settling for poor security or 'checkbox compliance' is unnecessary and unacceptable. We want to help businesses understand that they should no longer tolerate poor security from their hosting and cloud partners. We need the industry to think beyond insufficient, 'checkbox compliance' as an end-all solution. Compliance with security standards like PCI and others does not mean a company's data and applications are properly protected and secure. We only need to look at the latest, much publicized security breaches to see companies that thought PCI compliance meant they were protected, only to discover they were needlessly exposed to disastrous brand-damaging security breaches. FireHost provides industry-leading secure cloud computing that promises to protect customers' applications and data from malicious attacks. We are hyper focused on security innovation and uniquely positioned, with the right people, the right technology, and a dedication to protecting our customers from malicious security threats. For us, there is simply no compromise when it comes to providing enterprise-class security for cloud computing workloads."

Chris Drake's Blog Post: A Note to Our Customers & Friends

About FireHost

FireHost offers the most secure, managed cloud IaaS available, protecting sensitive data and brand reputations of some of the largest companies in the world. With private, cloud infrastructure built for security, compliance, performance and managed service, responsible businesses choose FireHost to reduce risk and improve the collection, storage and transmission of their most confidential data. FireHost's secure, managed cloud IaaS is available in Dallas, Phoenix, London, Amsterdam and Singapore, and offers robust, geographically redundant business continuity options across all sites. Based in Dallas, FireHost is the chosen secure private cloud service provider for brands that won't compromise on the security of their payment card, healthcare, and other regulated data. www.firehost.com

Follow FireHost on:

http://www.twitter.com/firehost

http://www.linkedin.com/company/firehost-inc

http://www.facebook.com/FireHost

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27218
PUBLISHED: 2020-11-28
In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an attacker can send a request with a body that is ...
CVE-2020-29367
PUBLISHED: 2020-11-27
blosc2.c in Blosc C-Blosc2 through 2.0.0.beta.5 has a heap-based buffer overflow when there is a lack of space to write compressed data.
CVE-2020-26245
PUBLISHED: 2020-11-27
npm package systeminformation before version 4.30.5 is vulnerable to Prototype Pollution leading to Command Injection. The issue was fixed with a rewrite of shell sanitations to avoid prototyper pollution problems. The issue is fixed in version 4.30.5. If you cannot upgrade, be sure to check or sani...
CVE-2017-15682
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to inject malicious JavaScript code resulting in a stored/blind XSS in the admin panel.
CVE-2017-15683
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to create a site with specially crafted XML that allows the retrieval of OS files out-of-band.