Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


08:55 PM
Dark Reading
Dark Reading
Products and Releases

Xceedium Inc. Names Glenn C. Hazard Chairman And CEO

Hazard has a strong track record having served as CEO at both venture-funded and publicly held companies

Reston, VA – July 21st, 2010 - Xceedium Inc., the leading provider of Zero Trust Access Control solutions for 3rd party vendors, contractors and privileged IT users accessing critical infrastructure and sensitive data, today announced that veteran technology executive Glenn C. Hazard has been named chairman and chief executive officer (CEO).

With more than 30 years experience in the technology industry, Hazard brings to Xceedium a strong track record having served as CEO at both venture-funded and publicly-held companies. As Xceedium’s CEO, Hazard is responsible for driving the company’s strategic vision and expansion, leveraging its strong traction in U.S. federal government and commercial sectors.

Before joining Xceedium, Hazard served as the Managing Partner of Zero-G Inc., a venture management company that invested in and managed early stage technology companies. Prior to that, he was chairman and CEO of NetSec, Inc., a managed security services provider, which was acquired by MCI, now Verizon Business. While at NetSec, Hazard led the company’s global expansion and built a strong federal government and commercial customer base including 9 of the 15 Executive departments of the federal government and 7 of the Global 10 corporations.

Prior to that, he was chairman and CEO of FTP Software, Inc., a public company providing Internet networking technology and connectivity software. In addition, he spent 17 years with AT&T Corporation, serving in a variety of executive-level roles in sales, marketing and general management. Hazard currently serves on the board of several high-technology companies.

"We are very excited to have Glenn leading Xceedium into its next phase of growth. He is the ideal combination of seasoned technology executive and savvy leader that the Board was looking for, and we are thrilled to have attracted such a world-class talent,” said F. Morgan Rodd, managing partner at ArrowPath Venture Partners, an Xceedium investor. “Glenn’s emphasis on growing companies, his personal integrity and straightforward style has won the respect of customers, employees and investors alike.”

Hazard said: “Xceedium is a powerful company with a strong customer base, cutting edge technology and enormously talented employees. It is ideally positioned to take advantage of the next wave in the never-ending effort to safeguard government and corporate computer networks. Xceedium’s Zero Trust Access Control solutions are addressing fundamental changes in the user trust model that are driving new requirements around access, containment and audit for compliance and risk management. I look forward to aggressively growing the company by continuing to create value for our customers, partners, and employees.”

Leading enterprises and government agencies rely on the Xceedium GateKeeper appliance to enforce privileged access policies, monitor individual user sessions, record activities, and provide concise reports necessary for audit and compliance. By using Xceedium GateKeeper’s Zero Trust Access Control solution to enforce fine-grained network level control, organizations’ critical assets are now protected from malicious and unintentional exploits, whether the user is from outside or within the organization.

About Xceedium Xceedium Inc., is the leading provider of Zero Trust Access Control solutions for managing access to critical infrastructure and sensitive data by privileged users, 3rd-party vendors, and contractors.

Employing unique and patent-pending technologies, the Xceedium GateKeeper hardened appliance enables organizations to extend and manage access while safeguarding business critical assets, demonstrating compliance and decreasing business risk. Its key differentiators lie in its ability to enforce policy by identity, contain users based on the user’s explicit privileges, and record users for audit and compliance. Deployed in the largest enterprise, and federal government environments, Xceedium’s ever-expanding client base includes household names in financial services, healthcare, pharmaceutical, retail, MSP and other key verticals.

Headquartered in New Jersey with offices in Virginia, Xceedium has been honored with a number of prestigious industry awards, including recognition by Forrester Research as a “Hot Company to Watch,” by Gartner, Inc. as a “Cool Vendor in Infrastructure Protection 2009,” and by Red Herring as a “Top 100 Global Company.” For more information, visit www.xceedium.com, or email [email protected]

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-11-28
An issue was discovered in the Linux kernel before 5.2.6. On NUMA systems, the Linux fair scheduler has a use-after-free in show_numa_stats() because NUMA fault statistics are inappropriately freed, aka CID-16d51a590a8c.
PUBLISHED: 2020-11-28
An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel before 5.7.5. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check, aka CID-c444eb564fb1.
PUBLISHED: 2020-11-28
An issue was discovered in mm/mmap.c in the Linux kernel before 5.7.11. There is a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe.
PUBLISHED: 2020-11-28
An issue was discovered in kmem_cache_alloc_bulk in mm/slub.c in the Linux kernel before 5.5.11. The slowpath lacks the required TID increment, aka CID-fd4d9c7d0c71.
PUBLISHED: 2020-11-28
An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. Uninitialized memory leaks to userspace, aka CID-bcf85fcedfdd.