Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


02:06 PM
Dark Reading
Dark Reading
Products and Releases

Lancope Appoints Tim (TK) Keanini As CTO

Most recently, Keanini served as CTO of nCircle Network Security

ATLANTA, September 23, 2013 – Lancope, Inc., a leader in network visibility and security intelligence, announces the appointment of Tim (TK) Keanini as chief technology officer (CTO). Keanini brings nearly 25 years of network and security experience to his new role, including positions at Cisco and nCircle. He will lead the evolution and positioning of Lancope's technology architecture toward software-defined networking (SDN), along with other key product roadmap initiatives such as providing security in the private and public cloud.

"TK possesses an incredible amount of industry expertise and has a burning passion to help us further define the evolving market requirements to keep our products and services state of the art," said Mike Potts, president and CEO of Lancope. "Between his time spent with Cisco, his impactful tenure as CTO of nCircle, and significant contributions to various security standards and patents, TK has always stayed on the cutting edge of security. We are honored to have him on board as we continue to improve today's position of cyber security one customer at a time."

Most recently, Keanini served as CTO of nCircle Network Security (recently acquired by Tripwire). During his 12 years at nCircle, he drove product innovation that defined the vulnerability management and configuration compliance market, establishing one of the industry's leading vulnerability research organizations. He also created a formal intellectual property program that helped spark innovation and protect the company's long-term product strategy.

Before joining nCircle, Keanini served as Vice President of Network Services for Morgan Stanley Online, building and securing a highly available online trading system that had no reported outages or security incidents while in production. While at Morgan Stanley, he also planned, built and managed multiple data centers from the ground up. Previously, Keanini was a systems engineer at Cisco, advising top financial institutions on the design and architecture of their data networking infrastructure.

"Throughout my career, I have remained heavily involved in the latest security developments and innovations from around the world," said Keanini. "Lancope brings a very unique perspective and technology to the industry, enabling organizations to leverage their existing infrastructure and assets to more thoroughly protect their networks. I look forward to helping Lancope's talented and driven team bring the benefits of its behavioral-based monitoring solution to many more organizations across the globe."

Keanini is a Certified Information Systems Security Professional (CISSP), and has served as a leader in the development of various security standards including CVE, CPE, CCE and CVSS to name a few. Keanini is also a highly visible security expert on social media, growing top tier press coverage for nCircle by 32% in 2012. He is frequently invited to speak at industry conferences held by organizations including RSA, SANS and BSides.

For further details on Lancope's leadership team, go to: http://www.lancope.com/company-overview/management/.

About Lancope

Lancope, Inc. is a leading provider of network visibility and security intelligence to defend enterprises against today's top threats. By collecting and analyzing NetFlow, IPFIX and other types of flow data, Lancope's StealthWatch® System helps organizations quickly detect a wide range of attacks from APTs and DDoS to zero-day malware and insider threats. Through pervasive insight across distributed networks, including mobile, identity and application awareness, Lancope accelerates incident response, improves forensic investigations and reduces enterprise risk. Lancope's security capabilities are continuously enhanced with threat intelligence from the StealthWatch Labs research team. For more information, visit www.lancope.com.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-11-28
In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an attacker can send a request with a body that is ...
PUBLISHED: 2020-11-27
blosc2.c in Blosc C-Blosc2 through 2.0.0.beta.5 has a heap-based buffer overflow when there is a lack of space to write compressed data.
PUBLISHED: 2020-11-27
npm package systeminformation before version 4.30.5 is vulnerable to Prototype Pollution leading to Command Injection. The issue was fixed with a rewrite of shell sanitations to avoid prototyper pollution problems. The issue is fixed in version 4.30.5. If you cannot upgrade, be sure to check or sani...
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to inject malicious JavaScript code resulting in a stored/blind XSS in the admin panel.
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to create a site with specially crafted XML that allows the retrieval of OS files out-of-band.