• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Pat Townsend Secure with New President

    July 20, 2009 Dan Burger

    Patrick Townsend Security Solutions (PTSS), one of the best-known security software developers in the IBM i OS market, has hired John Earl as its president and chief executive officer.

    Earl is one of the i community’s most familiar faces. He’s the former chief technology officer and a vice president at PowerTech (a company he founded with others) and a long-time volunteer at the COMMON user group, where he has served on the board of directors and is currently a security subject matter expert for that organization. His IT career spans nearly 30 years.

    Patrick Townsend, PTSS founder and president until Earl’s hiring last week, has become chairman of the board and chief technology officer.

    Earl only recently left PowerTech to start a consulting business called iSecurity Experts, which was reported in the June 30 issue of Four Hundred Stuff. Since that time, he was contacted by Townsend and subsequently offered the president and CEO position.

    The basic concepts and principles of security that Earl brings from his past will translate well to the new assignment, Earl says, while acknowledging no product overlap whatsoever. However, he sees implementable business processes arising from his experience translating compliance requirements from standards such as SOX, HIPPA, and PCI.

    “This is a bit of a shift from the host-based security and compliance monitoring that PowerTech does,” Earl says. “Now my focus will be on encryption and secure data transfer. It’s a tremendous technology. Pat Townsend was able to convince me–on the strength of the technology alone–that this is a great place to be.”

    The day-to-day business at PTSS will be handled by Earl, who will be in charge of a 20-person staff that includes product development, customer support, sales, administration, and marketing.

    “This is a successful company, so it’s just a matter of refining processes and practices and taking the company up another notch. It’s a great growth situation here,” he says. “Patrick is an incredible technologist. His grasp of security, especially as it applies to encryption and key management solutions, is top drawer and there are other individuals in the company that are right there at a level with Patrick.”

    The i platform is the home base for PTSS. It has a strong customer base, and Earl says there is great rapport between the company and its customers. Although PTSS technologies have proved useful to i shops, the company also has customers that apply PTSS technology to other platforms. Network-enforced key management is the primary example.

    “This is technology that we will be able to drive forward,” Earl says. “The future in front of this company has a lot of open field. It’s a matter of us executing on the technology we have and the technology that is in our roadmap.”

    RELATED STORIES

    iSecurity Experts: New Name, Familiar Face, Services a Priority

    Pat Townsend Hooks up with Solutionary for Outsourced i Log Monitoring

    Pat Townsend Unveils Encryption Key Appliance

    Pat Townsend Turns to Managed Services



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: mtfh_rc, Volume 18, Number 27 -- July 20, 2009

    Sponsored by
    ARCAD Software

    DevSecOps & Peer Review – The Power of Automation

    In today’s fast-paced development environments, security can no longer be an afterthought. This session will explore how DevSecOps brings security into every phase of the DevOps lifecycle—early, consistently, and effectively.

    In this session, you’ll discover:

    • What DevSecOps is and why it matters?
    • Learn how to formalize your security concerns into a repeatable process
    • Discover the power of automation through pull requests, approval workflows, segregation of duties, peer review, and more—ensuring your data and production environments are protected without slowing down delivery.

    Whether you’re just getting started or looking to enhance your practices, this session will provide actionable insights to strengthen your security posture through automation and team alignment to bring consistency to the process.

    Watch Now!

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    JDA Plots Course Forward for MMS, and–Surprise–It’s Java IBM Kills Secure Perspectives Tool

    Leave a Reply Cancel reply

TFH Volume: 18 Issue: 27

This Issue Sponsored By

    Table of Contents

    • Sundry Power Systems i Storage Announcements
    • Servers Slammed in IBM’s Second Quarter
    • IBM Sunsets More Power Systems Features
    • As I See It: Injured Wing
    • Fincham Rides Point for iManifest EMEA
    • IT Organizations Tuning Up Employee Recruitment Efforts
    • Sun Shareholders Vote to Sell to Oracle
    • IBM Cranks Out Power Systems i Redbooks
    • Criminal Enterprise or Legit Business? It Can Be Hard to Tell, Cisco Says
    • Pat Townsend Secure with New President

    Content archive

    • The Four Hundred
    • Four Hundred Stuff
    • Four Hundred Guru

    Recent Posts

    • What You Will Find In IBM i 7.6 TR1 and IBM i 7.5 TR7
    • Three Things For IBM i Shops To Consider About DevSecOps
    • Big Blue Converges IBM i RPG And System Z COBOL Code Assistants Into “Project Bob”
    • As I See It: Retirement Challenges
    • IBM i PTF Guide, Volume 27, Number 41
    • Stacking Up Power11 Entry Server Performance To Older Iron
    • Big Blue Boosts IBM i Support In Instana, Adds Tracing
    • It Is Time To Tell Us What You Are Thinking And Doing
    • IBM i PTF Guide, Volume 27, Number 40
    • The GenAI Boom Is Only Slightly Louder Than The Dot Com Boom

    Subscribe

    To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

    Pages

    • About Us
    • Contact
    • Contributors
    • Four Hundred Monitor
    • IBM i PTF Guide
    • Media Kit
    • Subscribe

    Search

    Copyright © 2025 IT Jungle