Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

8/18/2015
09:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

GuardiCore Expands Executive Leadership Team

Industry veterans from Check Point, Imperva, IXIA and CTERA Join GuardiCore to Accelerate Expansion of Data Center Active Attack Security

Tel Aviv, Israel – August 18, 2015 – GuardiCore, the internal data center breach detection and response innovator, today announced the appointment of two industry leaders who will accelerate the growth and the market adoption of its solution.  GuardiCore’s product detects, analyzes and responds in real time to threats after they have penetrated the perimeter.  In advance of the general availability of its product, the company today announces Sharon Besser joining as Vice President, Products and Herve Bourgeois joining as Vice President, Sales, EMEA.

“Modern data centers are missing defense in depth, and firewalls are not enough to detect and respond to threats,” said Pavel Gurvich, GuardiCore CEO. “Traffic rates inside modern data centers are exploding, and conventional security techniques such as IDS, AV and Sandboxing simply don’t work there, leaving the data center insecure.

We are redefining this space with an out-of-the-box approach which calls for an outstanding team. Herve and Sharon bring the right industry experience and leadership to do just that.”

A year ago, GuardiCore announced $11 million funding from top tier VCs Battery Ventures and Greylock.  Already, customer and industry response to GuardiCore’s unique approach to internal data center attack security has been very positive. These executive additions will continue the forward momentum of the company.

Hervé has 30 years of experience in building and leading exceptional enterprise sales operations and strategies, including eight years as VP Sales EMEA of Check Point Software Technologie, the leading internet security company, where he grew revenues from zero to over $300M per year in Europe, Middle East and Africa. Prior to joining GuardiCore, Hervé served as VP Sales EMEA & Asia Pacific at CTERA, a leader in the emerging Cloud Storage Gateways market.

Sharon is an accomplished data and network security expert with a successful track record combining deep technical hands-on excellence with market vision to incubate new solutions and develop next generation technologies.  Sharon was the co-founder of Publicom (acquired by Comsec), co-founder of EyeOTee Inc., VP Technologies at Net Optics, acquired by IXIA, VP of products strategy at Imperva, Director of security solutions at Check Point and Director of security products at Websense, through the acquisition of Port Authority Technologies.

About GuardiCore:

Founded in 2013 and funded by Battery Ventures, Greylock IL and strategic investors, GuardiCore has the passion, knowledge and means to transform security inside data centers and clouds. With GuardiCore, enterprises gain real time visibility, understanding and response to illicit activity within the data center in minutes not months.

Leveraging threat deception and application-level network visualization, Guardicore’s distributed inner breach detection and automated attack mitigation solution is uniquely designed to address the security challenges across virtual, high traffic, high volume data center environments. For more information, or to set a meeting at VMworld US, San Francisco, August 30 to Sept. 3, visit www.GuardiCore.com.

 

 

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/10/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
Researcher Finds New Office Macro Attacks for MacOS
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/7/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-16275
PUBLISHED: 2020-08-10
A cross-site scripting (XSS) vulnerability in the Credential Manager component in SAINT Security Suite 8.0 through 9.8.20 could allow arbitrary script to run in the context of a logged-in user when the user clicks on a specially crafted link.
CVE-2020-16276
PUBLISHED: 2020-08-10
An SQL injection vulnerability in the Assets component of SAINT Security Suite 8.0 through 9.8.20 allows a remote, authenticated attacker to gain unauthorized access to the database.
CVE-2020-16277
PUBLISHED: 2020-08-10
An SQL injection vulnerability in the Analytics component of SAINT Security Suite 8.0 through 9.8.20 allows a remote, authenticated attacker to gain unauthorized access to the database.
CVE-2020-16278
PUBLISHED: 2020-08-10
A cross-site scripting (XSS) vulnerability in the Permissions component in SAINT Security Suite 8.0 through 9.8.20 could allow arbitrary script to run in the context of a logged-in user when the user clicks on a specially crafted link.
CVE-2020-15139
PUBLISHED: 2020-08-10
In MyBB before version 1.8.24, the custom MyCode (BBCode) for the visual editor doesn't escape input properly when rendering HTML, resulting in a DOM-based XSS vulnerability. The weakness can be exploited by pointing a victim to a page where the visual editor is active (e.g. as a post or Private Mes...