Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


10:25 PM
Dark Reading
Dark Reading
Products and Releases

Identropy Sets Its Sights On The Emerging IDaaS Market

Expands management team

MOONACHIE, New Jersey, May 15, 2012– Identropy, a leading provider of Identity and Access Management (IAM) services, today announced it has expanded its management team with the addition of Carl Aloi as Chief Financial Officer, Steve Curtis as Vice President of Services and Tom Neckel as Vice President of Sales. As a result of these new hires, Ranjeet Vidwans has been promoted to Vice President of Marketing and Business Development, and Christopher Hydak will now serve as Vice President of Products. With $4 million in Series A funding (announced earlier this year) and the addition of top-notch talent to its management team, Identropy is strongly positioned to capitalize on the growing market opportunity for Identity as a Service (IDaaS).

As a CFO with deep roots in information technology, Carl Aloi will be responsible for maintaining Identropy’s financial discipline and risk posture. Prior to Identropy, Carl was Chief Operating Officer at the American Thoracic Society, where he led operations and finance. Before that, Carl served as Vice President of Finance for AppLabs Technologies, where he was instrumental in the growth of AppLabs and the acquisition of IS Integration Limited. Prior to that, Carl served as Controller for several technology companies after beginning his career at Kelly, Lee, and Company CPA Firm. Carl holds a BSBA and MBA from Rider University and is a CPA in the state of New Jersey.

With 15 years experience developing, selling, and delivering technology services toFortune 1000 enterprise clients, Steve Curtis will lead Identropy’s Services team. Prior to Identropy, Steve founded Rencana, a boutique consulting firm specializing in Identity and Access Management. While at Rencana, Steve published the seminal study on IAM Total Cost of Ownership, which analyzed the TCO of major IAM product vendors. Prior to Rencana, Steve was a Director at PricewaterhouseCoopers, where he held a variety of positions before leading its IAM practice for the Southwest US. Steve has a BBA from the University of Wisconsin-Madison, and an MBA from UCLA.

As Vice President of Sales for Identropy, Tom will drive the strategy and execution of Identropy’s revenue plan. Tom joins Identropy from Oracle, where he was a top performer, and a member of Oracle’s elite 1% club (top 1% globally). Tom came to Oracle via its 2005 acquisition of Oblix, a provider of Web Access Management solutions. While at Oblix, Tom helped revitalize the east coast, earning Salesperson of the Year honors in 2004. He holds a BA in Political Science from Miami University.

“I am incredibly excited about the addition of Steve, Tom and Carl to the Identropy team,” said Victor Barris, CEO, Identropy. “People are always a company’s most valuable resource, and we are extremely fortunate to find such highly skilled individuals whose passion, commitment to excellence, and domain expertise are in line with our corporate culture. I am delighted they are now a part of the Identropy team, their experience, and expertise will ensure our continued growth.”

About Identropy

Identropy is a leading provider of Identity and Access Management (IAM) services thatenable organizations to derive maximum value from their IAM initiatives in the most cost-effective manner. Providing domain expertise across the entire IAM lifecycle, Identropy's Advisory, Implementation and Identity-as-a-Service (IDaaS) service offerings have already benefited more than 100 organizations. Its innovative Secure Co-Sourced Unified Identity (SCUID) platform is a set of Cloud-based deployment and management offerings that enable organizations to reduce the cost and complexity, optimize day-to-day management, and accelerate time-to-value of IAM investments. Founded in 2006, Identropy is a privatelyheld company. For more information visit www.identropy.com.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-01-28
IBM MQ 7.5, 8.0, 9.0, 9.1, 9.2 LTS, and 9.2 CD could allow a remote attacker to execute arbitrary code on the system, caused by an unsafe deserialization of trusted data. An attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 186509.
PUBLISHED: 2021-01-28
IBM QRadar SIEM 7.4.0 to 7.4.2 Patch 1 and 7.3.0 to 7.3.3 Patch 7 could allow a remote attacker to execute arbitrary commands on the system, caused by insecure deserialization of user-supplied content by the Java deserialization function. By sending a malicious serialized Java object, an attacker co...
PUBLISHED: 2021-01-28
A cross-site request forgery vulnerability exists in the GACL functionality of OpenEMR 5.0.2 and development version 6.0.0 (commit babec93f600ff1394f91ccd512bcad85832eb6ce). A specially crafted HTTP request can lead to the execution of arbitrary requests in the context of the victim. An attacker can...
PUBLISHED: 2021-01-28
Cross-site scripting vulnerability in Aterm WF800HP firmware Ver1.0.9 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors.
PUBLISHED: 2021-01-28
Cross-site request forgery (CSRF) vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors.