Jade splits software and security units

Jade Software's chief operating officer promoted to managing director, previous MD takes over security business Wynyard Group
  • Randal Jackson (Computerworld New Zealand)
  • — 17 January, 2013 00:53

Jade Software Corporation has announced changes to its operating structure and executive team.

The company's chair, Ruth Richardson, says that Jade had largely completed a three-year business transformation programme and would now operate as two discrete operations -- Jade and Wynyard Group.

"Over the course of the past three years, management has focused on clarifying our value proposition, expanding our technology capability and narrowing our market focus," she says. "This has created significant new opportunities we believe are best executed as two focused, independent business operations."

Craig Richardson, managing director of Jade since 2009 and principal architect of the business transformation plan, becomes managing director of the recently launched Wynyard Group. He remains a director of Jade, Wynyard's holding company, and will continue to report to its board.

Wynyard's operational software helps manage and connect mission-critical risk management, intelligence and investigations cycles. Its customers include financial institutions, government security and justice agencies, and critical infrastructure operators.

Richardson says that Wynyard Group is experiencing strong global growth and now needs his 100 percent focus to ensure the investment made in product and talent, the sales momentum created, and global growth potential continues to be realised.

Jade's current chief operating officer, David Lindsay, has been appointed managing director of Jade. He will lead the company's global marine terminal (Master Terminal) enterprise and mobile development (JOOB Mobile) and infrastructure service business.

Lindsay was chief financial officer for nine years and has been chief operating officer for the past two years.

Tags: business issues, security, software, Jade Software

JP Morgan to invest £150 million on boosting cyber security

READ THIS ARTICLE
DO NOT SHOW THIS BOX AGAIN [ x ]
Comments are now closed.
CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Cloud Security and Compliance Solutions

Manage and visualize the security and compliance of VMware, physical, and hybrid-cloud infrastructure from the RSA Archer eGRC Platform.

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.