Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

3/17/2014
01:39 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

FireHost Names New CEO

Founder and former CEO Chris Drake will be CTO

Dallas, TX – March 17, 2014 -- In a significant move resulting from mounting years of fast growth and widening market demand for its secure cloud offerings, FireHost, the secure cloud company, announced today the appointment of technology veteran Jim Lewandowski as its new chief executive officer (CEO). This move occurs in concert with founder and former CEO Chris Drake's decision to take the reins as the company's chief technology officer (CTO). Together, the CEO and CTO appointments accelerate FireHost's effort to grow, innovate, and deliver secure clouds that fill a void in a cloud provider market clamoring for greater, more effective security.

Lewandowski is a seasoned cloud and security veteran, bringing with him more than 25 years of executive leadership with companies like Rackspace, McAfee, Yahoo!, BMC Software, and IBM. He was most recently a senior vice president and general manager at Rackspace before establishing a technology consulting business.

Drake, who founded FireHost in 2009 and launched its secure cloud in 2011, has served as CEO since its inception. During his tenure, he led the technology development in addition to establishing its business presence around the world – a presence that has grown immensely in various industries, such as healthcare, retail, financial services, and the public sector. Along the way, the company has doubled revenue in each of the past three years.

Key Highlights

Lewandowski built a reputation leading great teams that delivered exceptional revenue and profit growth for a number of companies in the cloud, security, software, and enterprise markets. In addition to his work at Rackspace, he served as executive vice president of the Americas at McAfee, vice president of business and enterprise sales at Yahoo!, vice president of sales at BMC Software, and business unit executive for storage systems products at IBM.

Lewandowski already serves on FireHost's board of directors.

As the new CTO, Drake will concentrate more time on FireHost's innovation. The leadership changes announced today will fuel the company's growth as his team accelerates its technology innovation and delivers it to customers.

Under Drake's leadership, FireHost successfully expanded its secure cloud from the Americas to the European and Asia market, created FluidScale, the industry's only rebootless scaling technology, designed the highest-performing cloud infrastructure available, and blocked more than 100 million hack attempts against its customer base in 2013 via the company's unique Intelligent Security Model&trade.

FireHost has already established a much-needed position in the marketplace as the leader in secure clouds. The company's quick emergence results from its unflinching belief that cloud customers should not settle for poor security that exposes them to hacking disasters.

Quotes

Chris Drake, FireHost's new CTO

"I made the decision to become CTO because technology innovation has always been my passion. The need for security in the cloud is the most critical priority in the industry. This leadership change allows FireHost to double down on innovation to help customers capitalize on it faster. Jim's industry expertise, business sense and socket fit with our culture make it possible for me to reinforce the company's innovation engines while he continues our rapid growth to even higher levels. This leadership change comes at the right stage of FireHost's history, and we believe that the company is positioned extremely well."

Jim Lewandowski, FireHost's new CEO

"Settling for poor security or 'checkbox compliance' is unnecessary and unacceptable. We want to help businesses understand that they should no longer tolerate poor security from their hosting and cloud partners. We need the industry to think beyond insufficient, 'checkbox compliance' as an end-all solution. Compliance with security standards like PCI and others does not mean a company's data and applications are properly protected and secure. We only need to look at the latest, much publicized security breaches to see companies that thought PCI compliance meant they were protected, only to discover they were needlessly exposed to disastrous brand-damaging security breaches. FireHost provides industry-leading secure cloud computing that promises to protect customers' applications and data from malicious attacks. We are hyper focused on security innovation and uniquely positioned, with the right people, the right technology, and a dedication to protecting our customers from malicious security threats. For us, there is simply no compromise when it comes to providing enterprise-class security for cloud computing workloads."

Chris Drake's Blog Post: A Note to Our Customers & Friends

About FireHost

FireHost offers the most secure, managed cloud IaaS available, protecting sensitive data and brand reputations of some of the largest companies in the world. With private, cloud infrastructure built for security, compliance, performance and managed service, responsible businesses choose FireHost to reduce risk and improve the collection, storage and transmission of their most confidential data. FireHost's secure, managed cloud IaaS is available in Dallas, Phoenix, London, Amsterdam and Singapore, and offers robust, geographically redundant business continuity options across all sites. Based in Dallas, FireHost is the chosen secure private cloud service provider for brands that won't compromise on the security of their payment card, healthcare, and other regulated data. www.firehost.com

Follow FireHost on:

http://www.twitter.com/firehost

http://www.linkedin.com/company/firehost-inc

http://www.facebook.com/FireHost

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
10 Ways to Keep a Rogue RasPi From Wrecking Your Network
Curtis Franklin Jr., Senior Editor at Dark Reading,  7/10/2019
The Security of Cloud Applications
Hillel Solow, CTO and Co-founder, Protego,  7/11/2019
Where Businesses Waste Endpoint Security Budgets
Kelly Sheridan, Staff Editor, Dark Reading,  7/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Jim, stop pretending you're drowning in tickets."
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-13623
PUBLISHED: 2019-07-17
In NSA Ghidra through 9.0.4, path traversal can occur in RestoreTask.java (from the package ghidra.app.plugin.core.archive) via an archive with an executable file that has an initial ../ in its filename. This allows attackers to overwrite arbitrary files in scenarios where an intermediate analysis r...
CVE-2019-13624
PUBLISHED: 2019-07-17
In ONOS 1.15.0, apps/yang/web/src/main/java/org/onosproject/yang/web/YangWebResource.java mishandles backquote characters within strings that can be used in a shell command.
CVE-2019-13625
PUBLISHED: 2019-07-17
NSA Ghidra before 9.0.1 allows XXE when a project is opened or restored, or a tool is imported, as demonstrated by a project.prp file.
CVE-2019-3571
PUBLISHED: 2019-07-16
An input validation issue affected WhatsApp Desktop versions prior to 0.3.3793 which allows malicious clients to send files to users that would be displayed with a wrong extension.
CVE-2019-6160
PUBLISHED: 2019-07-16
A vulnerability in various versions of Iomega and LenovoEMC NAS products could allow an unauthenticated user to access files on NAS shares via the API.