To Provide Innovative and Leading-Edge Solutions Addressing the Security and Compliance Needs of Our Customers
MS Software Engineering, 17 years as CIO and Business Transformation leader, leading fortune 500 companies with P&L responsibility, leading innovation and large system implementations.
BS in Computer Science, 15 years leading global infrastructure for cloud and on premise for fortune 500 companies. Managed Multiple Large Enterprise ERP implementations as well as managing operations in startup.
MS in Computer Science, 15 years leading technical architecture, information security and dev ops development for fortune 500 companies.
Krishna Bhaskaran (KK)
Business savvy and technically sophisticated management professional with a pioneering career reflecting strong leadership qualifications coupled with over 14 years of experience in designing, implementing and supporting enterprise information management solutions.
Accomplished leader with deep expertise in Cloud Services, Life Cycle management, and software R&D. Extensive experience managing technical teams, developing and automating IT processes, and delivering projects on time and within budget.
Director Marketing & Web
Seasoned entrepreneur with 15 years experience managing marketing and strategy. Website development to drive brand recognition and content. Strong experience in project management, vendor and customer relationship building, graphic design, and branding.
MS in Computer Science, 15 years of experience in design, engineering and IT with a proven track record in building and leading teams towards successful launch of enterprise software.
Chief Operating Officer, SVP of WW Operations
A seasoned executive with more than 35 years of experience in Engineering, Customer Service, Operations, and Information Systems at companies, both large and small – from start-ups that went public to larger companies such as Nortel Networks.
Managing Partner- RFA
High Performance executive, accomplished in leading teams who achieve consistent top line growth and operational improvement.
Vice President at Brocade
IT Executive with 15+ years of proven experience in building and leading IT organizations that are committed to driving business value through technology products and solutions. Forges a forward looking strategic mindset to deliver IT solutions aligned with organizational needs.
A founder of two businesses striving to be exceptionally good not perfect
A strong believer that ‘everything is possible’ and that ‘innovation is not restricted to the lab’. A contributor on development of the Berkeley Innovation Index with the Sutardja Centre for Entrepreneurship & Technology, UC Berkeley, California.
Vice President Of Infrastructure & Operations at Plantronics
IT Executive, Globally experienced (EMEA and US, and Asia based) in delivering/managing/executing all aspects of Information Technology (including Application Development, Data Center Management, IT Strategy and Operations, Program and Project) Management
Torii is a pioneering leader in the field of security and compliance founded by technology and compliance professionals with extensive hands-on experience. Our team comes from leadership roles in high technology, biotechnology, software and Big4 consulting with resposibilities in development, implementation and support of software applications, infrastructure, security infrastructure and compliance, both on-premise and in cloud.
Our flagship security solution, Torii CSC, is focused on helping our customers reduce the risk of cyber-attacks using industry-standard CIS controls. Our solution allows customers to leverage their existing investment in their infrastructure to harden their security posture by providing a risk-based scorecard that provides a phased approach to improve their cyber-security posture.
We believe in relentless focus on solving our customers’ needs and be their trusted partner.
Our security platform, Torii CSC, is a best-in-class open-standards-based set of security dashboards. It was developed using the CIS industry-standard controls that are recognized by cyber-security experts as the de facto controls needed to address cyber-security threats.