5 Motivations Behind My Decision to Become CMO at Uptycs

Blog Author
Elias Terman

I’ve made a big change. 

After two and a half years of riding the Orca Security wave (massive thank you to Avi Shua and team!), I’ve joined Uptycs as their CMO.

Here are the five top reasons why I joined Uptycs.


1. Product depth and breadth – from MacOS to AWS. Unified Cloud & Endpoint Security and Compliance

A developer’s Macbook Pro is just a hop away from production infrastructure. Uptycs focuses on public cloud security, private cloud security, laptops, and servers.


According to a 451 Research study, 57% of organizations are on board with hybrid IT environments that leverage on-premises resources and public cloud in an integrated fashion. 

With Uptycs, you can prioritize, investigate and respond to threats across your modern attack surface—all from a single platform, UI, and data model. This includes the ability to tie together attack activity as it traverses on-prem and cloud boundaries.


And it’s blazing fast, with one of our global financial services customers boasting “0.7 seconds from execution to detection and 1.6 seconds from execution to case management alert.”

The industry is starting to take notice. Last month, Gartner acknowledged Uptycs as a representative vendor for both Cloud Infrastructure Entitlement Management (CIEM) and Kubernetes and Container Security.

(Emerging Tech: CIEM Is Required for Cloud Security and IAM Providers to Compete, Published 13 July 2022; and Hype Cycle for Workload and Network Security, 2022, Published 18 July 2022)


2. Outcomes, not acronyms, although we have those, too 

Will CNAPP eat XDR, or will XDR eat CNAPP? It doesn’t matter. As Ganesh Pai, our co-founder and CEO says “our customers care about outcomes.” That being said, here’s our current coverage and what’s next against key CNAPP and XDR capabilities.



Cloud Native Application Protection Platform


eXtended Detection and Response


Cloud Workload Protection Platform


Endpoint Detection and Response


Kubernetes Security Posture Management


Managed Detection and Response


Cloud Security Posture Management


SaaS Security Posture Management


Cloud Infrastructure Entitlement Management


SaaS Detection and Response


Cloud Detection and Response


Identity Threat Detection and Response

You could approach this kind of end-to-end visibility through vendor consolidation and a Cybersecurity Mesh Architecture (CSMA) – two of Gartner’s Top Strategic Technology Trends for 2022. According to Gartner, a cybersecurity mesh architecture helps provide a common, integrated security structure and posture to secure all assets, whether they’re on-premises, in data centers, or in the cloud. Why wait? Uptycs customers are getting this today.


3. Six years of underinvestment in sales and marketing

Uptycs has poured almost every dollar into product and customer success. The payoff is proven technology and one of the best-kept secrets in cybersecurity (but not for long).


Uptycs also got a headstart in its platform by leveraging osquery – developed by Facebook security engineering in 2014 – which exposes an operating system as a high-performance relational database. Uptycs has engineered osquery to be a high-performance / low-footprint sensor that provides high-quality telemetry that Uptycs consumes for malware and vulnerability detection, compliance reporting, and optional blocking and remediation capabilities. Uptycs has gone on to develop cloudquery and kubquery, which takes the idea of structured telemetry for security to cloud infrastructures. 


Osquery continues to play an important role in maintaining insight into the security of Facebook's infrastructure. It’s also in production at high-scale companies such as Airbnb, Dropbox, Netflix, Palantir, Etsy, Comcast, and Uber. The osquery community is vibrant with 400 contributors and 6,000 commits. As fellow early adopters, Uptycs hosts the annual osquery@scale conference. 


4. Customer kudos, revenue, and runway

If I could show you our logo slides your jaw would drop. Mine did. Dozens of household names and the world’s most demanding security teams have placed their trust in Uptycs. Here’s a few customer quotes we can share today. 


“As a cloud-based company running on AWS, Flexport needed a single solution to secure all its AWS accounts and services, audit and inventory cloud assets, and provide endpoint detection and response. Uptycs allows us to do more with less, save time, while maintaining a strong cloud security posture.”    

Kevin Page




“Comcast chose Uptycs for instant endpoint and asset visibility that powers detection and response as well as compliance and governance.”

Leon Li

Vice President

Comcast Security


“We use Uptycs for security visibility, threat detection, and incident investigation across our Linux and MacOS fleet. Their audit and compliance analytics solution has been instrumental for our FedRAMP authorization and ISO 27001 certification.”

Grant Kahn

Security Intelligence Engineering



5. Thoughtful, visionary, and customer-obsessed

Uptycs has a talented and experienced management team and a collaborative and supportive culture. Ganesh was most recently chief architect at Akamai by way of its acquisition of Verivue, which he co-founded with his friend and colleague of more than 20 years, Uptycs’ cofounder and chief product officer, Uma Reddy. Their founding vision for Uptycs was to help CISOs measure the effectiveness of their cybersecurity program, address the security engineering shortage, and answer key security questions with Google-like scale and simplicity. 


During the interview process, I had conversations with Uptycs customers. The CISOs I spoke to not only raved about the technology but also about its people.


“We really like Ganesh and customer service.”

“Good humans at following through.”

“Deliver when they say they’re going to deliver.”


But as I said before, we’re light on sales and marketing. Over the next year, we’ll be tripling the size of our marketing team. Please connect with me on LinkedIn if you’re interested in joining our team


And whether you’re looking to protect 200 Macbooks or 20,000 VMs or 2,000 AWS accounts, we’d love to help you, too. Try a Free 30-day Proof of Value, or Sign Up for a Personalized Demo Today.