Carroll joins Avertium from Bishop Fox where as chief operating officer he helped guide the security company’s growth since 2019, according to a prepared statement.
Carroll’s Deep Tech Experience
Carroll brings more than 30 years of experience with technology companies, including Aasonn, Fruition Partners and Hewlett Packard, the company said. He succeeds Jeff Schmidt, who led Avertium as CEO since 2019 when private equity firm Sunstone Partners merged Terra Verde Security LLC, TruShield Security Solutions, and Sword & Shield Enterprise Security, as well as the subsequent acquisition of 1440 Security.
Carroll expressed enthusiasm for the job ahead:
“I am thrilled to help lead Avertium in its next stage. I am grateful for the employees who have built this leading cyber fusion company, and I intend to continue the company’s growth trajectory.”
Mike Biggee, co-founder and Managing Partner at Sunstone Partners, added:
“We are very excited to have Bill Carroll join us to take Avertium to the next level. Bill’s experience in leading scalable, technology-enabled companies will bring a wealth of wisdom to the company. We are grateful for Jeff Schmidt’s leadership from the Company’s inception, and we are confident in Bill Carroll’s vision for Avertium’s next chapter.”
Avertium Banks On Fusion MXDR
Avertium recently launched its premium service, Fusion MXDR (managed extended detection and response). Fusion MXDR combines threat intelligence, attack surface monitoring and vulnerability management with endpoint protection, security orchestration and incident response automation.
Fusion MXDR combines security operations with third-party risk and compliance assessments to help organizations get the most value out of their security programs. Fusion MXDR also can be used in conjunction with MXDR platforms from LogRhythm, SentinelOne and other cybersecurity companies.
Key features of Fusion MXDR include:
- Access to a dedicated account team. Organizations can access a service delivery manager and receive monthly cyber maturity reports.
- Compliance with the NIST CSF framework. Organizations can conduct NIST assessments and align their security programs with the CSF framework.
- Threat exposure management: Organizations can perform vulnerability scans and attack surface analyses and review threat intelligence.