Welcome!

News Feed Item

Continual Growth and High Demand for Security Analytics Drives Securonix Expansion

Cybersecurity Provider Strengthens Management Team and Expands North American Presence

LOS ANGELES, CA -- (Marketwired) -- 05/14/14 -- Citing increased demand for its industry-leading security analytics platform featuring advanced threat detection and monitoring, Los Angeles-based Securonix has expanded with new North American offices in San Francisco, New Jersey, Atlanta and Washington, DC.

To support its rapid development, the company has named two industry veterans to newly created roles on Securonix's team -- David Swift, Principal Architect and Joe Riggins, Senior Solutions Architect.

"The market for IT security solutions continues to grow and expand as a number of high profile security breaches demonstrates the high cost of not protecting business-critical systems, data and applications," said Sachin Nayyar, CEO, Securonix. "Our growth reflects high demand for Securonix products and services from Global 2000 organizations seeking to protect against hackers and the insider threats to a company's core operations."

Swift has more than 28 years of technology industry experience, including senior security architect, analyst and engineering roles with a broad range of technology companies including Accuvant, Perot Systems and Fortinet. He has worked with global firms to develop and improve IT security by implementing and optimizing log collection and analysis through use case driven big data security analytic solutions.

Swift's specialties include a broad knowledge of SIEM technology, understanding the security principles needed to produce real, actionable results for companies. As a highly respected industry expert, Swift speaks on the subject matter often and has been published multiple times to offer his insight on successful log management and SIEM strategies.

Riggins brings more than seven years of Military and Law Enforcement experience as well as over 15 years of experience investigating corporate incidents and securing enterprise infrastructures. He has applied his wealth of experience to high-tech crime fighting and securing enterprise networks. Prior to Securonix, Mr. Riggins held multiple management positions at ManTech, HBGary, Guidance Software, Network Associates, and IBM Global Professional Services.

Riggins was involved in the investigation of Enterprise Corporate incidents, analysis of advanced system compromise techniques, and the development of Enterprise risk mitigation infrastructures. Riggins has performed countless 911 network intrusion investigations in the critical infrastructure and protection (CIP) space to include defense, aerospace, healthcare, telecommunications, energy, financial and government. He has served as a liaison for local and federal law enforcement investigations.

"We have attracted the highest caliber of experienced and talented professionals to help take Securonix to the next level of rapid growth," added Nayyar. "We believe our new subject matter expert additions and offices will fuel further expansion for the rest of 2014 and beyond."

Continuing to emerge as a standout player in the fast-growing enterprise security market, Securonix is well respected in the industry and has established innovative partnerships with HP ArcSight, Lieberman Software and other global technology providers.

Securonix is the industry-leading platform for security analytics that provides advanced monitoring and threat detection capabilities. With a powerful Anomaly Detection Engine, the Securonix platform analyzes identity, access, activity and transaction data from critical applications or existing security tools to detect high-risk events, activities, users, accounts and access for focused, proactive threat identification and risk mitigation.

The company's recently introduced Data Exfiltration Intelligence application is the industry's first true data exfiltration detection and prevention solution with a "user-centric" threat detection model made up of identity, access, and activity risk factors that are continuously monitored for abnormal or high-risk changes and correlated with any data leak prevention (DLP) events.

Securonix is continuing to hire for a variety of positions including sales and security analysts. For more information, visit http://www.securonix.com/company/jobopenings/

About Securonix
Securonix is working to radically transform all areas of data security with actionable security intelligence. Our purpose-built advanced security analytics technology mines, enriches, analyzes, scores and visualizes customer data into actionable intelligence on the highest risk threats from within and outside their environment. Using signature-less anomaly detection techniques that track users, account, and system behavior Securonix is able to automatically and accurately detect the most advanced data security, insider threats and fraud attacks. Globally customers are using Securonix to address the most basic and complex needs around advanced persistent threat detection and monitoring, high privileged activity monitoring, enterprise and web fraud detection, application risk monitoring, and access risk management. For more information visit www.securonix.com.

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform. In his session at @ThingsExpo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and shared the must-have mindsets for removing complexity from the develo...
The IETF draft standard for M2M certificates is a security solution specifically designed for the demanding needs of IoT/M2M applications. In his session at @ThingsExpo, Brian Romansky, VP of Strategic Technology at TrustPoint Innovation, explained how M2M certificates can efficiently enable confidentiality, integrity, and authenticity on highly constrained devices.
In today's uber-connected, consumer-centric, cloud-enabled, insights-driven, multi-device, global world, the focus of solutions has shifted from the product that is sold to the person who is buying the product or service. Enterprises have rebranded their business around the consumers of their products. The buyer is the person and the focus is not on the offering. The person is connected through multiple devices, wearables, at home, on the road, and in multiple locations, sometimes simultaneously...
Basho Technologies has announced the latest release of Basho Riak TS, version 1.3. Riak TS is an enterprise-grade NoSQL database optimized for Internet of Things (IoT). The open source version enables developers to download the software for free and use it in production as well as make contributions to the code and develop applications around Riak TS. Enhancements to Riak TS make it quick, easy and cost-effective to spin up an instance to test new ideas and build IoT applications. In addition to...
Identity is in everything and customers are looking to their providers to ensure the security of their identities, transactions and data. With the increased reliance on cloud-based services, service providers must build security and trust into their offerings, adding value to customers and improving the user experience. Making identity, security and privacy easy for customers provides a unique advantage over the competition.
CenturyLink has announced that application server solutions from GENBAND are now available as part of CenturyLink’s Networx contracts. The General Services Administration (GSA)’s Networx program includes the largest telecommunications contract vehicles ever awarded by the federal government. CenturyLink recently secured an extension through spring 2020 of its offerings available to federal government agencies via GSA’s Networx Universal and Enterprise contracts. GENBAND’s EXPERiUS™ Application...
SYS-CON Events announced today that Isomorphic Software will exhibit at DevOps Summit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Isomorphic Software provides the SmartClient HTML5/AJAX platform, the most advanced technology for building rich, cutting-edge enterprise web applications for desktop and mobile. SmartClient combines the productivity and performance of traditional desktop software with the simp...
"We've discovered that after shows 80% if leads that people get, 80% of the conversations end up on the show floor, meaning people forget about it, people forget who they talk to, people forget that there are actual business opportunities to be had here so we try to help out and keep the conversations going," explained Jeff Mesnik, Founder and President of ContentMX, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
"When you think about the data center today, there's constant evolution, The evolution of the data center and the needs of the consumer of technology change, and they change constantly," stated Matt Kalmenson, VP of Sales, Service and Cloud Providers at Veeam Software, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Redis is not only the fastest database, but it is the most popular among the new wave of databases running in containers. Redis speeds up just about every data interaction between your users or operational systems. In his session at 19th Cloud Expo, Dave Nielsen, Developer Advocate, Redis Labs, will share the functions and data structures used to solve everyday use cases that are driving Redis' popularity.
I wanted to gather all of my Internet of Things (IOT) blogs into a single blog (that I could later use with my University of San Francisco (USF) Big Data “MBA” course). However as I started to pull these blogs together, I realized that my IOT discussion lacked a vision; it lacked an end point towards which an organization could drive their IOT envisioning, proof of value, app dev, data engineering and data science efforts. And I think that the IOT end point is really quite simple…
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 19th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world and ThingsExpo Silicon Valley Call for Papers is now open.
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
"My role is working with customers, helping them go through this digital transformation. I spend a lot of time talking to banks, big industries, manufacturers working through how they are integrating and transforming their IT platforms and moving them forward," explained William Morrish, General Manager Product Sales at Interoute, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
To leverage Continuous Delivery, enterprises must consider impacts that span functional silos, as well as applications that touch older, slower moving components. Managing the many dependencies can cause slowdowns. See how to achieve continuous delivery in the enterprise.