About us | Advertising | SecurityWatch
Home   Articles   Blog   Reviews   Press Releases   Security Tools   Sponsored Solutions
Press Releases
Cranite Bolsters Management Team; Adds Senior Marketing and Sales Executives
Monday, 15 November 2004 15:59 EST

Execs bring proven experience winning enterprise customers and marketing security products

SAN JOSE, Calif., November 15, 2004 – Cranite Systems, Inc., a leading provider of comprehensive security solutions for wireless local area networks (LANs), today announced two additions to its executive team: Donald Beery as vice president of sales and Chad Harrington as vice president of marketing.

Beery brings more than 20 years of IT industry and general business management experience to his role of managing and growing sales for Cranite. Before joining the company, Beery founded B2Gov, a consulting firm that helped companies enter the government market. He also held various positions with RealNetworks, EDS and Eastman Kodak Company. In addition, Beery served as vice president and general manager of Beyond.com's Government Systems Group. There, he was responsible for the division's e-commerce services, software sales and operations, as well as the company's overall success in electronic licensing agreements and Enterprise Distribution Manager (EDM) technology. Under Beery’s leadership, the Beyond.com Government Systems Group grew from a startup team to a division generating nearly $60 million in revenues in just over four years. Beery earned an M.B.A. from George Washington University and a B.S. - Finance from George Mason University's School of Business. He is a veteran of the U.S. Navy, and an amateur adventure racer.

Harrington is responsible for marketing Cranite’s WirelessWall® wireless LAN security software as well as defining future product initiatives. He has worked extensively in the information security industry, most recently serving as director of endpoint security products and services for Check Point Software Technologies, Ltd. Harrington joined Check Point following the company’s acquisition of Zone Labs, Inc., where he drove product strategy and developed a content services business. Prior to that, Harrington was director of business development and chief evangelist for Entercept Security Technologies, which was acquired by Network Associates. During Harrington’s tenure at Entercept, the company grew revenues from less than $1 million to more than $10 million annually. In addition, Harrington worked at Symantec Corporation (which acquired his company, AXENT Technologies) in a variety of product marketing and management roles. He earned a B.S. in Computer Engineering from Brigham Young University, where he was a presidential scholar.

“To fully capitalize on the promise of the wireless security market, Cranite needed to add depth to its executive team,” said John Vigouroux, chairman and CEO, Cranite Systems, Inc. “Don Beery and Chad Harrington are proven executives who know this industry and the opportunities it presents. They both add value to our team, and will help us most effectively penetrate and grow the market.”

Biographies for Cranite’s management team, as well as the company’s board of directors and advisory board, are available on Cranite’s Web site. For more information, contact Cranite at , , or on the Web at www.cranite.com.

About Cranite Systems, Inc.
Cranite provides comprehensive security for wireless networks, enabling organizations to safely take advantage of their mobile computing resources. By encrypting all transmitted information—network addresses, applications and ports—as well as the data itself, Cranite’s software provides better security with greater mobility, while meeting the government’s highest security standards. Headquartered in San Jose, Calif., Cranite was founded in 2000 and is privately held. For more information, e-mail , call , or visit www.cranite.com.



Featured Articles

Tribal thinking in today’s IT
George Santayana once famously observed; “Those who cannot remember the past are condemned to repeat it.”. But when it comes to IT security, a better way of thinking might be; “those who fail to understand the impact of the past on their thinking may find themselves somewhat exposed”…

You can’t manage what you can’t see!
Security threats have grown more menacing with the appearance of the likes of Sober, Mytob, and Bagle. Along with the newer trends of spyware, phishing and key logging the implications of ineffective information security have become potentially debilitating to business operations and indeed strategy.

The development and execution of an endpoint security strategy is an increasingly important and urgent issue for businesses of all sizes. Many are executing – or wanting to execute - flexible working practices and organisation models that leverage contemporary technology.

Scan all company email for viruses, Trojans and worms with 4 virus engines, all in one package - GFI MailSecurity for Exchange/SMTP! Download your free 60-day trial today!

Check your website security with Acunetix Web Vulnerability Scanner. Audit your web applications for SQL injection, cross site scripting & more. Download trial!

Network Security Tools

SpyDefense
SpyDefense protects your computer against annoying, and harmful software such as Spyware, Adware, Trojan horses, etc. SpyDefense is anti-spyware software that prides itself on a very user friendly environment.


Proactive Security Auditor
Proactive Password Auditor is a password security test tool that's designed to allow Windows NT, Windows 2000, Windows XP and and Windows Server 2003-based systems administrators to identify and close security holes in their networks.


File Securer
File Securer is a powerful tool designed to protect your sensitive folder and personal file. With strong security, File Securer embeds the protect into windows system kernel, both on command mode and window mode, all work professionally.




What's up, IT? Blog

Phishing By The Numbers: 41,000 Blocked Sites in 2005
Top 7 PHP Security Blunders
The human factor and information security
Why I Love Vulnerability Analysis In 2005
IT security fear factor: Tape backups
Uncovering Cyber Flaws
State of the security mart
When the hardware gets smart
Security for SMBs
Four Security Resolutions For The New Year

Copyright © IT-Observer.com 2000 - 2006    Privacy Policy | RSS Feeds
Site Meter