Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operations

9/30/2016
04:15 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

FireMon Welcomes New President & CEO, Satin H. Mirchandani

Security management vendor forges ahead with new CEO at the helm

OVERLAND PARK, KS and DALLAS, TX – September 27, 2016 – FireMon, the market leader in security management and risk assessment software, has today announced the appointment of Satin H. Mirchandani as President & CEO. Satin will lead the company as it continues to grow faster than the market and increase the already substantial enterprise customer list. 

“FireMon created the network security policy management market and continues to lead through innovation and a strong focus on customer satisfaction. The talent, professionalism, and discipline I’ve seen the team demonstrate are instrumental to the ability to execute quickly and accurately.  It’s no surprise FireMon is experiencing double-digit growth in all regions and renewal rates greater than 90%.  These numbers highlight both the current momentum and the future opportunity,” said Mirchandani.

Mirchandani’s goals for global growth are focused on creating the footprint and resources of a local company in each major market, as well as a continued commitment to FireMon’s channel partners. “My first enterprise software experience was with a company that focused on the IT channel (VARs, distributors) – I learned the unique value of a trusted advisor who is a domain expert,” Mirchandani continued. “For many customers—and, in security specifically —the channel is simply irreplaceable.  FireMon is fortunate to have partnered with the best of the best.  As such, I intend to continue investing heavily in the education, enablement and growth of our channel partners.”

An industry veteran, Mirchandani credits his days with McKinsey and Company for giving him a passion for “identifying and solving complex problems that are mission critical to customers,” which is a perfect fit for FireMon’s mission and focus.  His track record as founder, CEO and technology executive includes leading MessageOne and MD Buyline to successful exits, serving as VP of Global Services at Dell, and driving the IPO process for pcOrder.com.  

About FireMon: FireMon solutions deliver continuous visibility into and control over network security infrastructure, policies, and risk. Using the FireMon Security Intelligence Platform, today’s enterprise organizations, government agencies, and managed services providers dramatically improve effectiveness of network defenses, optimizing investments and speeding response to changing business demands. For more information, visit http://www.firemon.com.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
What the FedEx Logo Taught Me About Cybersecurity
Matt Shea, Head of Federal @ MixMode,  6/4/2021
Edge-DRsplash-10-edge-articles
A View From Inside a Deception
Sara Peters, Senior Editor at Dark Reading,  6/2/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-32552
PUBLISHED: 2021-06-12
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-16 package apport hooks, it could expose private data to other local users.
CVE-2021-32553
PUBLISHED: 2021-06-12
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-17 package apport hooks, it could expose private data to other local users.
CVE-2021-32554
PUBLISHED: 2021-06-12
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the xorg package apport hooks, it could expose private data to other local users.
CVE-2021-32555
PUBLISHED: 2021-06-12
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the xorg-hwe-18.04 package apport hooks, it could expose private data to other local users.
CVE-2021-32556
PUBLISHED: 2021-06-12
It was discovered that the get_modified_conffiles() function in backends/packaging-apt-dpkg.py allowed injecting modified package names in a manner that would confuse the dpkg(1) call.