Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

9/18/2006
12:10 PM
50%
50%

eEye Appoints New Execs

eEye Digital Security names new CEO and CTO; appoints security industry veteran as sales VP

ALISO VIEJO, Calif. -- eEye Digital Security(r), the leading developer of endpoint security and vulnerability management software solutions, as well as the industry's foremost contributor to security research and education, today announced multiple changes in the company's executive management team in order to position the company for future growth. Ross Brown, who joined eEye in September as the company's chief operating officer, moved into the chief executive officer role in June, while co-founder and chief hacking officer Marc Maiffret has added the chief technology officer title. Former CEO and CTO Firas Bushnaq, who assumes the role of chairman for eEye's board of directors, will remain deeply involved with the company he co-founded.

Brown is also announcing the appointment of Kamal Arafeh as senior vice president of worldwide sales and marketing, who will be responsible for eEye's global sales and marketing operations and expanding the company's channel program, while maintaining the exceptional service levels eEye's customers currently enjoy.

"Kamal brings years of solid experience in sales and channel activities and is an ideal complement to our strong management team," Brown said. "We have aggressive growth plans and his expertise will be invaluable as we continue to set new standards in enterprise security innovation for our partners and our customers."

Arafeh brings more than 18 years of extensive experience in building sales distribution channels and developing business partnerships, and has built a reputation for leading high-growth sales organizations into new markets in the software, hardware and services industries. He most recently was with Astaro, a network security company, where he was responsible for all aspects of operations in the Americas and Asia-Pacific regions. In addition, Kamal was responsible for reconfiguring the company's sales and marketing strategy, attracting and managing a first class sales team, directly resulting in over 200% growth annually.

He has also served as vice president of worldwide sales at Vernier Networks, a wireless security company. Prior to his role at Vernier, Arafeh held an executive position in sales and marketing at McAfee/Network Associates, where he grew its channel sales operations 200 percent over a four-year period. He has also held management positions at Roxio, Netcentives and Texas Instruments.

"eEye is in an excellent position as the security industry's leading risk management company," Arafeh said. "It's world-class research, which complements its award-winning product line, addresses today's most pressing needs in enterprise security. I look forward to working with eEye's extensive list of FORTUNE 500 customers and channel partners to assist the company's increasing global presence and market momentum."

Brown, who has led the company's day-to-day operations over the last year, has sharpened eEye's focus on the channel and has expanded the company's global sales and field operations to accelerate eEye's already considerable momentum in both new and established markets. Maiffret, who co-founded eEye and originally coined the title chief hacking officer, is adding the CTO designation to formalize his role in leading eEye's product development and vulnerability research efforts.

"Ross has shown over and over again that he possesses the attributes needed to successfully capitalize on the increasing momentum eEye has built globally, as well as to position our solutions in the market as customer needs have changed with the evolving threat landscape," Bushnaq said of Brown, while adding, "Marc and I have worked together for years to grow our vision of securing enterprise networks and his genius in leveraging research toward product innovation is what makes our company a proven success."

eEye Digital Security

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
New 'Nanodegree' Program Provides Hands-On Cybersecurity Training
Nicole Ferraro, Contributing Writer,  8/3/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15820
PUBLISHED: 2020-08-08
In JetBrains YouTrack before 2020.2.6881, the markdown parser could disclose hidden file existence.
CVE-2020-15821
PUBLISHED: 2020-08-08
In JetBrains YouTrack before 2020.2.6881, a user without permission is able to create an article draft.
CVE-2020-15823
PUBLISHED: 2020-08-08
JetBrains YouTrack before 2020.2.8873 is vulnerable to SSRF in the Workflow component.
CVE-2020-15824
PUBLISHED: 2020-08-08
In JetBrains Kotlin before 1.4.0, there is a script-cache privilege escalation vulnerability due to kotlin-main-kts cached scripts in the system temp directory, which is shared by all users by default.
CVE-2020-15825
PUBLISHED: 2020-08-08
In JetBrains TeamCity before 2020.1, users with the Modify Group permission can elevate other users' privileges.