SAN DIEGO—May 1, 2017—With a clear focus on helping organizations address data protection challenges from cloud migration to the Internet of Things (IoT), high-speed cybersecurity software developer FHOOSH™, Inc. has appointed Bill Bonney vice president product marketing and chief strategist. A former Intuit information security executive and a co-author of the “CISO Desk Reference Guide,” Bonney will tap his extensive experience in cybersecurity, including IoT security and identity management, to oversee the company’s strategic solutions and partnerships.
Prior to joining FHOOSH, Bonney was vice president product management as well as principal consulting analyst for IS, identity management, IoT and risk/governance at San Diego-based consultancy TechVision Research. He also founded the eCyber Advisory Group to realize the “Virtual chief information security officer (CISO)” model for experts to either run IS teams or guide individuals in their roles. Bonney holds board positions with the San Diego CISO Round Table and San Diego ISACA, and is a frequent industry speaker. Most recently, Bonney spoke about the Industrial Internet of Things at Industry of Things World USA.
FHOOSH creates advanced data protection software that safeguards data from the edge to the cloud and delivers an unexpected upside for organizations and their users: significantly faster performance (certified up to 8x faster than transmitting and storing unprotected data). As a result, deploying FHOOSH helps organizations turn cybersecurity into a competitive business advantage that boosts overall customer experience as it protects valuable information.
FHOOSH CEO and Co-founder Eric Tobias stated, “Bill has a keen eye for new technologies, and he’s expert at blending innovative solutions with an organization’s current and legacy systems to address ever more sophisticated cyber challenges. He stands out with his ability to translate market requirements into real solutions, so organizations can quickly realize tangible benefits. From the start, Bill saw the value FHOOSH delivers across industry verticals, especially to protect data immediately upon capture or creation to simplify compliance, and to migrate large amounts of data to the cloud.”
FHOOSH President and Co-founder Linda Eigner commented, “Bill’s deep technical knowledge with his IS and analyst background gives him an intuitive understanding of the issues facing an organization’s cybersecurity stakeholders, from CISOs, CIOs, CTOs and product teams to any group with their own tech portfolio. He’s the right person to work with customers and partners to explore how FHOOSH can enhance and extend their cybersecurity toolbox. He’ll also forge new alliances with companies that want to differentiate their own offerings by integrating FHOOSH high-speed cybersecurity.”
“With the breakdown of perimeter and firewall security, we now have to focus on two things to help all types of organizations mitigate risk and accelerate business: delivering data protection upon creation/inception, and recognizing that identity has really become the new firewall,” noted Bonney. “When I came on board as an advisor last year, I realized immediately FHOOSH can help CISOs and their team members address both of those concerns and much more. I’m looking forward to working with the team in my new role to solve customer and partner data protection challenges by creating the right FHOOSH solutions and strategic partnerships.”
FHOOSH, Inc. develops high-speed cybersecurity software that protects data from inception, in transit and at rest at speeds certified up to eight times faster than handling unencrypted data. FHOOSH delivers on the promise of “Faster Data, More Secure™” using patent-pending protections that fragment, disassociate, separately encrypt and then disperse data upon capture from the edge to the cloud for storage or archiving. FHOOSH enables stronger data protection with faster performance, built-in threat detection, rapid recovery from ransomware attacks and “always-on” compliance. With FHOOSH, security is built in from architecture to implementation, and an unauthorized access to your systems or network does not expose sensitive data. FHOOSH software easily integrates with both legacy and new technologies, and is the right option to secure data in any cloud, IoT or enterprise environment.
(888) 434-6674 x. 701