Welcome!

Java IoT Authors: Liz McMillan, Zakia Bouachraoui, Yeshim Deniz, Elizabeth White, Pat Romanski

News Feed Item

Pioneer of Mobile Application Protection, V-Key, Hires Two Top-Tier Executives, Richard Trovato and Matt Rose

Executives with proven and successful track records like Richard Trovato and Matt Rose will be essential to V-Key as they ready themselves for rapid growth in 2013.

SAN FRANCISCO, Feb. 25, 2013 /PRNewswire/ -- V-Key Inc., pioneer and inventor of mobile application intrusion protection and intelligence today announced that Richard Trovato and Matt Rose have joined the Company as Senior Vice President Sales and Vice President of Mobile Solutions, respectively.  The new appointments of Trovato and Rose are timely as V-Key makes a RSA Conference splash in San Francisco this week (February 26-March 1) and kicks off its rapid growth for 2013.

"Adding results-oriented, top-tier executives like Richard and Matt will help us meet worldwide demand for better mobile device security," said Benjamin Mah, CEO, V-Key. "They both bring a wealth of experience and strategic vision to our leadership team. Their proven track records in this advanced mobile security market will deliver value as our company continues to execute against its goals."

Trovato brings two decades of experience in software to V-Key. Before joining V-Key, Trovato was Vice President, Worldwide Field Operations for Fortify Software and was a major contributor to the success and growth from a start up company to application security market leader.  He has lead sales teams in many startups that were later bought by big name companies such as Hewlett-Packard or went IPO.

"I feel strongly that I have joined a company that has a top-notch team, innovative technology and a worldwide marketplace in much need of its unique security solution," said Trovato.

Rose brings 14 years of experience ensuring organizations applications are secure. He has held technical leadership roles at high-growth companies, Fortify Software, Plumtree Software and Highground Software who were all successfully acquired by industry leaders such as Hewlett-Packard, BEA and Sun Microsystems.

"Securing applications for companies has been the cornerstone of my career so when I learned how V-Key approached securing mobile apps I knew it was the place for me," said Rose. " I am honored to become part of this amazing company."

V-Key focuses on mobile application threat research, protection, and intelligence solutions. V-Key researches into the latest mobile threats and delivers advanced protections to meet the evolving mobile application threat landscape, powered by its patent pending V-OS secure mobile middleware and V-Guard suite of products. For more information, please visit www.v-key.com.

Contact:  Robin Trovato, +1-617-543-8600,  [email protected]

SOURCE V-Key Inc.

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

IoT & Smart Cities Stories
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
"MobiDev is a Ukraine-based software development company. We do mobile development, and we're specialists in that. But we do full stack software development for entrepreneurs, for emerging companies, and for enterprise ventures," explained Alan Winters, U.S. Head of Business Development at MobiDev, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists discussed what things are the most important, which will have the most profound e...
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...
Bill Schmarzo, author of "Big Data: Understanding How Data Powers Big Business" and "Big Data MBA: Driving Business Strategies with Data Science," is responsible for setting the strategy and defining the Big Data service offerings and capabilities for EMC Global Services Big Data Practice. As the CTO for the Big Data Practice, he is responsible for working with organizations to help them identify where and how to start their big data journeys. He's written several white papers, is an avid blogge...
When talking IoT we often focus on the devices, the sensors, the hardware itself. The new smart appliances, the new smart or self-driving cars (which are amalgamations of many ‘things'). When we are looking at the world of IoT, we should take a step back, look at the big picture. What value are these devices providing. IoT is not about the devices, its about the data consumed and generated. The devices are tools, mechanisms, conduits. This paper discusses the considerations when dealing with the...
Business professionals no longer wonder if they'll migrate to the cloud; it's now a matter of when. The cloud environment has proved to be a major force in transitioning to an agile business model that enables quick decisions and fast implementation that solidify customer relationships. And when the cloud is combined with the power of cognitive computing, it drives innovation and transformation that achieves astounding competitive advantage.
With 10 simultaneous tracks, keynotes, general sessions and targeted breakout classes, @CloudEXPO and DXWorldEXPO are two of the most important technology events of the year. Since its launch over eight years ago, @CloudEXPO and DXWorldEXPO have presented a rock star faculty as well as showcased hundreds of sponsors and exhibitors! In this blog post, we provide 7 tips on how, as part of our world-class faculty, you can deliver one of the most popular sessions at our events. But before reading...
If a machine can invent, does this mean the end of the patent system as we know it? The patent system, both in the US and Europe, allows companies to protect their inventions and helps foster innovation. However, Artificial Intelligence (AI) could be set to disrupt the patent system as we know it. This talk will examine how AI may change the patent landscape in the years to come. Furthermore, ways in which companies can best protect their AI related inventions will be examined from both a US and...