Varun Badhwar

Founder

Palo Alto, California, United States20 yrs 9 mos experience
Most Likely To SwitchHighly Stable

Key Highlights

  • Founded Endor Labs to automate open source security analysis.
  • Built Prisma Cloud to $300M ARR in just 3 years.
  • Led RedLock from inception to acquisition by Palo Alto Networks.
Stackforce AI infers this person is a SaaS and Cloud Security expert with a strong entrepreneurial background.

Contact

Skills

Core Skills

Application SecurityCloud SecurityBusiness DevelopmentProduct MarketingTechnical SalesSecurity StrategySaasRisk AssessmentPenetration Testing

Other Skills

Agile MethodologiesBusiness AlliancesBusiness IntelligenceBusiness StrategyCRMCompetitive AnalysisConsultingCustomer Relationship Management (CRM)Customer SuccessCybersecurityData CenterDemand GenerationGo-to-market StrategyIT AuditsIT Strategy

About

“Our latest scan found 39,205 CVEs,” your head of AppSec says. “Where do we even start?” asks your engineering lead. Your anxiety rises as you think about the endless meetings, arguments, and email exchanges that will inevitably follow. But open source security problems aren’t going away any time soon. Did you know only 12% of the open source code your developers import is actually used in your applications? So what you need to do, and badly, is prioritize these findings. Software composition analysis (SCA) tools generate a ton of noise. And they require expertise and time - which are both expensive - to interpret their output. To protect your company without shutting down your business operations, you need a strategy: 1. Find the signal in the noise. At most 10% of vulnerabilities in open source libraries are exploitable in any given app, but security scanners are deafeningly loud. Understanding the interaction between first-party (your proprietary) and third-party (open source) code is key to determining whether an attacker can exploit a bug. 2. Identify the top risks. Incidents like the log4shell disclosure have shown how bad a single vulnerability can be. Even worse, there are huge amounts of malicious code in circulation. Identifying and mitigating the most pressing issues will help you stay out of the headlines and get back to business. 3. Trim your dependency trees, safely. Technical debt is a fact of life and accumulates steadily. Removing old libraries from your code can reduce your attack surface. But it can also crash your application. Having a comprehensive call graph, though, can show you where you can apply the scalpel for maximum effect. You can’t hack code that doesn’t exist, so identifying and cutting the fat is an important step. We launched Endor Labs to help enterprises automate this type of detailed analysis so they can mitigate open source security and operational risks. I launched Endor Labs to help enterprises automate this type of detailed analysis so they can mitigate open source security and operational risks. After building RedLock from scratch, selling it to Palo Alto Networks within 3 years from inception, and then creating the Prisma Cloud product from 0 to a $300M ARR business in 3 years, I know exactly how to tackle these types of problems. Want to learn more about how we can help? Head to https://www.endorlabs.com/

Experience

Forbes technology council

Member

Jan 2023Present · 3 yrs 2 mos · San Francisco Bay Area

Endor labs

Founder & CEO

Sep 2021Present · 4 yrs 6 mos · Palo Alto, California, United States

  • Endor Labs is the Application Security platform for the AI-driven software development revolution
Application SecurityOpen-Source SoftwareCloud Security

Cowbell

Board of Directors

Oct 2019Present · 6 yrs 5 mos

Palo alto networks

SVP & GM, Prisma Cloud

Oct 2018Sep 2021 · 2 yrs 11 mos · San Francisco Bay Area

  • Built the business from scratch to $300M in ARR, and 2700 customers (including 77% of the Fortune 100) in 3 years. Fastest growth rate for any enterprise SaaS company, ever!
Cloud SecuritySaaSBusiness Development

Redlock

Founder & CEO (acquired by Palo Alto Networks)

Jan 2015Sep 2021 · 6 yrs 8 mos · San Francisco Bay Area

  • Secure any cloud infrastructure environment in seconds. Inception to acquisition by Palo Alto Networks 3 years.
Cloud SecurityApplication SecurityBusiness Development

Ciphercloud

Cofounder, VP of Products & Field Operations

Jan 2010Jan 2015 · 5 yrs

  • Responsible for product marketing & strategy, technical sales, professional services and customer success across a global enterprise customer base, with heavy focus on Financial Services, Healthcare and Hi-Tech verticals. CipherCloud is one of the fastest growing cloud security companies that enables enterprises to retain complete control over data in the cloud.
  • Developed and launched CipherCloud’s flagship product to market within 6 months of founding.
  • Engage with Fortune 500 CIOs and CISOs for uniquely positioning the CipherCloud Platform as a market leader, and enabler to cloud adoption. Maintain a continuous feedback loop to ensure CipherCloud offerings and align roadmap with expected customer outcomes.
  • Instrumental in managing partnerships with salesforce.com, Accenture and Deloitte to plan, execute and measure the success of various technical engagements, and go-to-market activities across North America and Europe.
  • Create and manage a 90 member, metrics driven global Sales Engineering, Professional Services and Support organization with tightly controlled processes to drive improved customer satisfaction/success, increased productivity and reduced costs.
  • Lead all internal and product security efforts, including FIPS 140-2, FIPS 197, HIPAA, and 3rd party assessments
Product MarketingTechnical SalesCustomer Success

Salesforce

Senior Manager, Force.com Security

Jan 2007Jan 2011 · 4 yrs

  • Responsible for the overall security strategy and direction of the Force.com Platform, and managed a multi-million dollar security operation.
  • Created a scalable and repeatable security program for the AppExchange (US & Japan): a software as a service (SaaS) marketplace with over 1800 third-party business applications.
  • Architected the first-ever on-demand Secure Cloud Development program that included free educational resources, secure coding guidelines and on-demand testing tools for platform developers.
  • Managed public relations for the security organization - closely interact with customers and partners, deliver periodic updates via webinars and social-media channels, and lead sessions attended by industry veterans at security conferences.
  • Conducted partner training sessions, and documented policies, requirements and guidelines around security best practices.
Security StrategySaaSSecurity Program Development

Kpmg us

Consultant, IT Advisory - Information Protection Services

Jan 2006Jan 2007 · 1 yr

  • Responsible for conducting organizational risk assessments with a focus on delivering solutions that enabled prominent Fortune 500 Clients to manage IT security and privacy, operational risks, and alignment with overall business strategy.
  • Architected a global solution to automate portions of KPMG’s project assessment methodology, thereby reducing project costs and allowing teams to focus on data analysis and project delivery.
  • Managed teams of up to four staff members in successful execution of small and medium advisory engagements while tracking and operating within stringent timelines and budgets.
  • Performed penetration testing and vulnerability assessments for several global corporations leveraging manual techniques and automated tools such as: WebInspect, AppScan, nCircle, BurpSuite, Qualys, Nessus, RedSeal RSM, MBSA, etc. The scope of these engagements included host and web application scanning, data center network architecture reviews and network devices configuration reviews.
  • Designed, planned, and executed integrated IT audits and attestation reviews by understanding IT objectives, organizational structure, policies, processes, and internal controls; identifying areas of risk, operational weaknesses, and inefficiencies; determining audit scope and objectives; and developing audit programs.
  • Led SAS 70, Sarbanes-Oxley (SOX) and Financial Services Audit (FSA) IT general controls design, analysis, and audit test work at Fortune 500 clients.
  • Recipient of KPMG’s Encore Outstanding Achievement award and highest performance rating nationally for unprecedented success in project execution and business development as an Associate.
Risk AssessmentPenetration TestingIT Audits

Information sciences institute (isi)

Researcher

Jul 2005Jun 2006 · 11 mos

  • Simulate battle-field scenarios for Defense Advanced Research Projects Agency using the Torque game engine
  • Investigate cognitive experiments that provide insight into human computational mechanisms that could prove useful in creation of “human-like” cognitive machines
  • Research on online courses to build automated tools for student performance evaluation by professors
  • Scope was to formulate a tool that would enable professors to track qualitative performances as opposed to the currently used quantitative approach for online courses
  • Analyzed research to create paper for submission at the 2006 American Educational Research Association conference

Northrop grumman corporation

Project Manager

Jan 2005Jan 2005 · 0 mo

  • Responsibilities included performing the role of primary client interface, identifying and evaluating business needs, formulating & tracking key milestones / project schedules, and maintaining business partner relationships.

Education

University of Southern California

BS — Computer Science

Stackforce found 100+ more professionals with Application Security & Cloud Security

Explore similar profiles based on matching skills and experience