Difference between revisions of "Corporate Supporter Bios"

Jump to: navigation, search
Line 111: Line 111:
| {{MemberLinks|link=http://www.tenablesecurity.com|logo=Tenable_T.png}} || || ||www.tenablesecurity.com
| {{MemberLinks|link=http://www.tenablesecurity.com|logo=Tenable_T.png}} || || ||www.tenablesecurity.com
| {{MemberLinks|link=https://www.trustwave.com/application-security.php|logo=SPL-LOGO-SMALL.png‎}} || || Trustwave is a global leader in providing on-demand data security and payment card industry compliance management solutions to businesses and organizations throughout the world. Trustwave SpiderLabs has helped thousands of businesses and organizations throughout the world secure data, optimize network assets and mitigate the risk of data loss through shortfalls in application security controls. SpiderLabs offer "white hat" or "ethical hacking" services such as penetration testing (application, network, wireless and social engineering) to identify any weaknesses in your current environment that can be exploited by hackers and also offers incident response and forensics services worldwide. Trustwave is headquartered in the United States in Chicago, Ill. with offices throughout Africa, Asia, Australia, Europe, North America and South America || www.trustwave.com
| {{MemberLinks|link=https://www.trustwave.com/application-security.php|logo=SPL-LOGO-SMALL.png‎}} || || SpiderLabs is Trustwave’s elite security team focused on application security, incident response, penetration testing, physical security and security research — including anti-malware and threat intelligence Trustwave is headquartered in the United States in Chicago, Ill. with offices throughout Africa, Asia, Australia, Europe, North America and South America || [http://www.trustwave.com www.trustwave.com]
| {{MemberLinks|link=https://www.twitter.com|logo=Twitter-bird-blue-on-white_sized.png}} ||Jan 2013||With 400 million Tweets per day and more than 200 million active users, there is something for everyone on Twitter, no matter what you're interested in or where you are in the world. Twitter can be accessed on the web, on smartphones and on the simplest of feature phones. At Twitter, we believe that the open exchange of information can have a positive global impact and are inspired by stories of people using Twitter to improve the world in unexpected ways. Twitter is one of the top 5 most visited sites in the world, and we're tackling unique challenges at scale while keeping our users safe.|| www.twitter.com
| {{MemberLinks|link=https://www.twitter.com|logo=Twitter-bird-blue-on-white_sized.png}} ||Jan 2013||With 400 million Tweets per day and more than 200 million active users, there is something for everyone on Twitter, no matter what you're interested in or where you are in the world. Twitter can be accessed on the web, on smartphones and on the simplest of feature phones. At Twitter, we believe that the open exchange of information can have a positive global impact and are inspired by stories of people using Twitter to improve the world in unexpected ways. Twitter is one of the top 5 most visited sites in the world, and we're tackling unique challenges at scale while keeping our users safe.|| www.twitter.com

Revision as of 09:34, 2 March 2013

Disclaimer: Corporate Supporter Bios are not endorsements and reflect the message of the supporter only.

Company Member Since Company Description Contact
Accuvant_Labs.jpg        Accuvant LABS is the world's best and most respected attack and penetration team. Since 2002, Accuvant LABS has provided penetration testing, application and enterprise security assessments, vulnerability research and training to more than 2,000 clients across industry verticals. Experts from the team have won numerous awards and been featured by broadcast outlets and publications such as Ars Technica, Associated Press, BNN, CNN, Forbes, The New York Times, and The Wall Street Journal, among others, and regularly speak at top tier information security conferences. www.accuvant.com
Acunetix_logo_200.png        Acunetix is a leading provider of web security solutions and a pioneer in the development of web application security scanning technologies. Its engineers focused on web security as early as 1997 and developed an engineering lead in website analysis and vulnerability detection. The company was established in 2004 to combat the alarming rise in web attacks. In July 2005, the company announced the release of Acunetix Web Vulnerability Scanner (WVS) - a heuristic tool designed to replicate a hacker's methodology to find dangerous vulnerabilities, such as SQL injections and Cross-Site scripting, before hackers do. Acunetix WVS brings an extensive feature-set of both automated and manual penetration testing tools, enabling security analysts to perform a complete vulnerability assessment, and repair detected threats, with just the one product. The Acunetix development team consists of highly experienced security developers, all with extensive development experience in network security scanning software prior to working on Acunetix WVS. The management team is backed by years of experience in marketing and selling security software.Acunetix WVS includes many innovative features:Innovative AcuSensor Technology that allows accurate scanning with low false positives, by combining black box scanning techniques with feedback from its sensors placed inside the source code.An automatic JavaScript analyzer allowing for security testing of Ajax and Web 2.0 applications. Industry’s most advanced and in-depth SQL injection and Cross site scripting testing. Visual macro recorder makes testing web forms and password protected areas easy.Multi-threaded and lightning fast scanner able to crawl hundreds of thousands of pages without interruptions.Acunetix WVS understands complex web technologies such as SOAP, XML, AJAX and JSON.Acunetix Customers include the London Stock Exchange, Cisco, NASA, US Air Force, US Army PriceWaterhouseCoopers, KPMG, Deloitte, Sony, Bank of China, HSBC, Barclays, Deutsche Bank, The Pentagon, Nokia, Fujitsu, Skype, California Department of Justice, US Geological Service and many more. You can find us on Facebook at http://www.facebook.com/Acunetix. www.acunetix.com
Adobe_logo.png        Adobe is changing the world though digital experiences. We help our customers develop and deliver high-impact experiences that differentiate brands, build loyalty, and drive revenue across every screen, including smartphones, computers, tablets and TVs. Adobe content solutions are used daily by millions of companies worldwide—from publishers and broadcasters, to enterprises, marketing agencies and household-name brands. Building on our established design leadership, we enable customers not only to make great content, but to manage, measure and monetize it for maximum impact. www.adobe.com
Adp.jpg        www.adp.com
Akamai_logo.gif        www.akamai.com
Amazon_Logo.jpg        Amazon.com, a Fortune 500 company based in Seattle, opened on the World Wide Web in July 1995 and offers Earth's Biggest Selection, where customers can find and discover anything they might want to buy online. The brightest minds come to Amazon to develop technology that improves the lives of shoppers and sellers around the world. Pioneering technical challenges of unprecedented scale and complexity, Amazon also provides developers access to Amazon's own back-end platform and in-the-cloud infrastructure. Examples include Amazon Elastic Compute Cloud, Amazon Simple Storage Service, Amazon SimpleDB, Amazon Simple Queue Service, Amazon Flexible Payments Service, and Amazon Mechanical Turk. www.amazon.com
Architectgroup_130131.png        Feb 2013 ArchitectGroup, Inc. is one of the leading consulting providers of Information Technology services and business solutions in South Korea and China. Enterprise professionals service clients across diverse industries Telecommunication, Banking, Insurance, and Semi-conductor at major company like Samsung, GM, KT, Hyundai and LG etc…. Our vision is to achieve global IT services leadership in providing value-added high quality IT solutions to our clients in selected horizontal and vertical segments, by combining technology skills, domain expertise, process focus and a commitment to long-term client relationships. ArchitectGroup has a major focus on providing services on and around Security Service Engineering *Security Testing and Management Tool *Security Vulnerability Management Platform *Mobile Security Tool Other Services include:* Application Security Engineering Service *IT Infrastructure Management Services *Embedded Security Expert Program www.architectgroup.com
Aspect_logo_owasp.jpg        Aspect Security Founded in 2002, we are consulting firm focusing exclusively on application security. We help to ensure that the software that drives business is protected against hackers. Aspect’s Security Engineers analyze, test and validate approximately 5,000,000 lines of code a month, most of which are critical to the national infrastructure. Our work unearths over 10,000 vulnerabilities every year across a wide range of technologies and architectures. Our recommendations dramatically improve our clients’ security posture. We support a worldwide clientele with critical applications in the government, defense, financial, healthcare, services and retail sectors. Our educational division has taught tens of thousands of people around the world how to build, test and deploy secure applications making us a leader in application security training. Flexible delivery options include instructor-led training either in-person or via webcast, or, on-demand through our innovative eLearning curriculum. Aspect Security’s principals are pioneers in the field having started one of the world’s first application security practices in 1998. They conceived of several industry-leading standards such the OWASP Top Ten, WebGoat, the Application Security Verification Standard (ASVS), Risk Rating Methodology and Enterprise Security API (ESAPI). These free and open materials are downloaded over 50,000 times a month. We are a founding member of the Open Web Application Security Project (OWASP) in support of educating organizations about the ever-changing threat landscape and how to properly build and secure applications. Headquartered in Columbia, MD, our personnel is located throughout the United States serving our worldwide clientele. www.aspectsecurity.com
Gif_at.gif        AsTech empowers clients to increase their security awareness and capability maturity in the SDLC, to better manage overall risk. By understanding our clients’ unique risk appetites and business objectives, our security engineers bring strategic focus to application security initiatives. AsTech provides source code and deployment assessment, penetration testing, continuous monitoring, vulnerability remediation and secure development training. www.AstechConsulting.com
BayShoreNetworks.png        Bayshore Networks is the leading provider of high-end information assurance and security products for the defense industrial base, government and critical infrastructure organizations and commercial enterprise. Trusted by the worldʼs top defense contractors and developed exclusively in the United States, Bayshoreʼs flagship product SingleKey™ is a multi-protocol application firewall that secures all links and applications behind the DMZ. SingleKey blocks Advanced Persistent Threat (APT) actors and insider threats, mitigates vulnerabilities in SCADA industrial control systems and protects mission-critical applications. Bayshoreʼs threat management and analytics platform, SingleView™, manages and controls multiple SingleKeys in a highly distributed environment and provides real-time situational awareness and big data analytics about the highly sensitive digital assets of our defense and government customers. For more information follow Bayshore Networks on Twitter @bayshorenet www.bayshorenetworks.com
BestBuy_Logo_Resized.png        Best Buy Co., Inc.(NYSE: BBY) is a leading multi-channel global retailer and developer of technology products and services. Every day our employees - 180,000 strong - are committed to helping deliver the technology solutions that enable easy access to people, knowledge, ideas and fun. We are keenly aware of our role and impact on the world, and we are committed to developing and implementing business strategies that bring sustainable technology solutions to our consumers and communities. For information about Best Buy, visit www.bby.com and to shop at Best Buy, visitwww.bestbuy.com www.bby.com
Cargill.gif        www.cargill.com
Best_Resolution_-_Final_Logo_15%25.jpg        Checkmarx is the developer of next generation Static Code Analysis (SCA) solutions.The company pioneered the concept of a query language-based solution for identifying technical and logical code vulnerabilities.Checkmarx provides the best way for organizations to introduce security into their Software Development Lifecycle (SDLC) which systematically eliminates software risk.

The SAST solution streamlines the workflow of key stakeholders in the software development process, increasing their effectiveness in finding problems and reducing the need for costly professional services. The product enables developers and auditors to easily scan uncompiled / unbuilt code in all major coding languages anywhere, anytime. For CISOs, it means that securing applications in the enterprise is finally practical and achievable. Application security testing is available in both On Premise and On Demand configurations. The security testing scans for the most prevalent security vulnerabilities as determined by OWASP Top 10, SANS, and other major standards. Checkmarx was recognized by Gartner as sole visionary in their latest SAST magic quadrant and as Cool vendor in application security.Customers include multiple Fortune 500, government organizations and SMBs

Cigital_OWASP.GIF        Cigital, Inc. is the leading software security consulting firm in the world. Established in 1992, Cigital plans and implements initiatives that help organizations ensure their applications are secure and reliable while also improving how they build and deploy software. Our recognized experts apply a combination of proven methodologies, tools, and best practices to meet each client’s unique requirements. Cigital is headquartered outside Washington, D.C. with regional offices in the U.S., Europe, and India. www.cigital.com
Core_TM_wtag.png        The Power of Thinking Ahead As the leading provider of predictive security intelligence solutions, CORE Security answers the call of organizations demanding a proactive approach to eliminating business risk. Our solutions empower customers to think ahead, take control of their security infrastructure, and predict and prevent IT security threats. Organizations have to predict security threats – not just react to them Today, the majority of security spending is focused on solutions that take defensive or reactive approaches to threats. As a result, security teams are saddled with overwhelming amounts of disparate security data, tools that don’t communicate, and alerts that sound only after the damage has been done. Organizations that seek to survive and thrive must go on the offensive and predict and preempt threats before it’s too late. We empower organizations to preempt business risk At CORE Security, we believe the greatest risk organizations can take is to remain reactive to IT security threats. We therefore enable our customers to proactively identify critical threats and reveal risk in the context of specific business objectives, operational processes, and regulatory mandates. As a result, security teams not only predict threats but also more effectively communicate their implications to peers in the line of business. CORE Security Solutions CORE Insight Enterprise: Enterprise-class predictive security intelligence platform Business risk identification, validation and prioritization, Continuous threat simulation,Proactive threat replication. CORE IMPACT Professional: Comprehensive vulnerability assessment and testing software Real-world, exploit-based security testing, Network, web, client-side, wireless & mobile coverage CORE WebVerify: Web application testing software Automated testing of custom web sites and applications, Proactive identification of OWASP Top 10 threats CORE CloudInspect: Security testing SaaS for Amazon AWS cloud deployments- Affordable, on-demand cloud security assessment, No prior Amazon authorization required CORE Services- Security consulting services, Product implementation services, Onsite and online training, Customer support (24/7 available) CORE Security Benefits Align with corporate goals Protect brand, reputation and valuation, Retain customers and avoid fines / penalties. Align with performance objectives· Prevent system downtime, Mitigate risks to intellectual property and customer data. Comply with policies and regulations - Address PCI, FISMA/NIST, HIPAA, SOX, GLBA, etc. Increase efficiency and effectiveness - Increase security assessment scope and frequency, Optimize headcount and consulting resources. Practice process excellence- Conduct documented, repeatable security assessments, Validate security using established best practices. CORE Security helps more than 1,400 customers worldwide preempt critical security threats throughout their IT environments, and communicate related risk to the business. Our patented, proven, award-winning enterprise solutions are backed by more than 15 years of applied expertise from CoreLabs, the company’s innovative security research center. www.coresecurity.com.
Dbapp_logo.jpg        DBAPPSecurity, Inc. OWASP global partner. A well known company focused on WEB Application security and Data security. They have hundreds of customers including many fortune 500, which cover the field like Financial, Telecom, Energy, Government etc. The products include WEB application vulnerability scanner, Database vulnerability scanner, WEB application firewall, Database Auditor and Log Auditor. They have very competitive solution for Data leakage, WEB defense, Compliance, and Cloud security. They also have well known security research team. www.DBAppSecurity.com
Denim_Group_Logo.gif        Denim Group is a custom software development firm skilled in large-scale development projects across multiple platforms, languages and applications. What makes Denim Group unique is that the company brings significant core competencies in software security to the table, offering an innovative blend of secure software development, testing and training capabilities that protect a company’s biggest asset, its data. Denim Group customers span an international client base of commercial and public sector organizations across the financial services, banking, insurance, healthcare and defense industries. Its depth of experience building large-scale software development systems in a secure fashion has made the company's leaders recognized experts in their fields. Denim Group has been recognized as one of the 5,000 Fastest Growing Company's by Inc. Magazine several years in a row, and has won multiple awards including its recent accolades as one of the best places to work in San Antonio. www.denimgroup.com
DDI_Logo_150x45.GIF        Founded in 1999, Digital Defense, Inc. (DDI) is the premier provider of managed security risk assessment solutions protecting billions in assets for small businesses to Fortune companies in over 65 countries. DDI’s dedicated team of experts helps organizations establish a culture of security through regular information security assessments, awareness education and Decisive Security Intelligence. This proven method bolsters the capability of organizations to reduce risk and keep information, intellectual property and reputations secure. The combination of DDI’s certified Security Analysts, patent-pending scanning technology and proprietary cloud-based vulnerability management system, Frontline™ Solutions Platform, delivers the most powerful assessment results and remediation management solutions possible. www.ddifrontline.com
DreamLab.jpg        Dreamlab Technologies AG Dreamlab Technologies is a leading company in developing and implementing individual solutions for integral security concerning your information, your organizations and your systems. Being a per­formance oriented and reliable partner, we ad­vise you independently and neutrally, we work ob­jectively verifiable, based on open standards, and we pass on our knowledge in an integral and in­tegrable way. Integral security stands for security as an overall package. For example, besides IT it also contains processes, ways of communication and structural measures. Integral information security is an important prerequisite in order to responsibly lead an or­ganization. www.dreamlab.net
Ernst_%26_Young_Logo_Resized.png        www.ey.com
[FICO-logo-108px.gif        FICO (NYSE:FICO) delivers superior predictive analytics solutions that drive smarter decisions. The company's groundbreaking use of mathematics to predict consumer behavior has transformed entire industries and revolutionized the way risk is managed and products are marketed. FICO's innovative solutions include the FICO® Score — the standard measure of consumer credit risk in the United States — along with industry-leading solutions for managing credit accounts, identifying and minimizing the impact of fraud, and customizing consumer offers with pinpoint accuracy. Most of the world's top banks, as well as leading insurers, retailers, pharmaceutical businesses and government agencies rely on FICO solutions to accelerate growth, control risk, boost profits and meet regulatory and competitive demands. FICO also helps millions of individuals manage their personal credit health through www.myFICO.com. Founded in 1956, FICO introduced analytic solutions such as credit scoring that have made credit more widely available, not just in the United States but around the world. We have pioneered the development and application of critical technologies behind decision management. These include predictive analytics, business rules management and optimization. We use these technologies to help businesses improve the precision, consistency and agility of their complex, high–volume decisions. www.fico.com
Fishnet_Logo_AppSec.jpg        FishNet Security is the No. 1 provider of information security solutions that combine technology, services, support, and training. We are the only nationally focused information security solutions provider with a full suite of professional services in Information Assurance, Security Integration, 24x7 Support, Managed Services, and Training. Since 1996, we have been providing our clients with solutions to help them effectively manage risk, meet compliance requirements, and reduce cost, while maximizing security effectiveness and operational efficiency.Our commitment to information security excellence is unparalleled. We distinguish ourselves with the most comprehensive offering available in the market and a track record of delivering quality solutions to over 5,000 clients nationwide, FORTUNE 500 companies and global institutions alike. We serve customers in various industries, such as financial services, healthcare, government, retail, and technology.FishNet Security provides consulting services in a broad base of relevant information security domains. We have mature and established consulting practices that focus on the following: PCI Compliance, Governance, Risk, and Compliance, Incident Management, Security Assessment, Application Security, Network Security, Data Security and Privacy, Enterprise Mobility, and Identity and Access Management. Our Professional Services team is powered by experienced consultants that possess numerous certification designations, including CISSP, CISM, CISA, ISO Lead Auditor, PCI QSA, PCI PAQSA, NSA-IAM, and countless product-focused certifications. We actively grow, recruit, and retain the industry’s best security talent. We differentiate our services by providing security solutions that combine business acumen, technical expertise, real-world experience, and outstanding customer service. Our thought leadership is greatly valued by the security community and frequently featured in many publications and national conferences. Our company has experienced tremendous growth in the last few years and we expect to continue growing at that same pace. We will remain at the forefront in providing security solutions to our customers and enabling them to conduct their business successfully and securely. www.fishnetsecurity.com
Gemalto_brand.jpg        About Gemalto: the world leader in digital security In an increasingly connected society, Gemalto is the leader in making digital interactions secure and easy Gemalto is at the heart of our evolving digital society. Billions of people worldwide increasingly want the freedom to communicate, travel, shop, bank, entertain and work – anytime, anywhere – in ways that are convenient, enjoyable and secure. We deliver on their expanding needs for personal mobile services, identity protection, payment security, authenticated online services, cloud computing access, modern transportation, M2M communication, eHealthcare and eGovernment services.Our expertise spans the entire process for creating digital security solutions that embed the trust of our clients and their customers. We develop secure operating systems and run them on trusted devices – like UICC and smart cards, banking cards, ePassports, eID cards, tokens and other devices – which we assemble and personalize. We deploy the software for managing these, and the services they enable, throughout their life-cycle. And we innovate so our clients can offer more ways of enhancing the convenience and security of their end-users’ digital lives. www.gemalto.com
GDS_LOGO_SMALL.jpg        Gotham Digital Science (GDS) is an international security services company specializing in Application and Network Infrastructure security, and Information Security Risk Management. GDS clients number among the largest financial services institutions and software development companies in the world. GDS security specialists work with clients to assess risk and then design, build, and maintain secure applications, networks, and processes. With offices located in New York City and London, GDS seamlessly and efficiently assists clients with operations on both sides of the Atlantic. GDS is a member of CREST, the Council of Registered Ethical Security Testers, as well as a member of the UK Government CHECK scheme, allowing GDS to provide security assurance services to Her Majesty's Government and UK Critical National Infrastructure on systems processing protectively marked information. www.gdssecurity.com
Imperva_2color_RGB.jpg        www.imperva.com
IBI_Logo.jpg        www.informationbuilders.com
IOA_logo_300-Transparent.jpg        IOActive Established in 1998, IOActive is an industry leader that offers comprehensive computer security services with specializations in smart grid technologies, software assurance, and compliance. Boasting a well-rounded and diverse clientele, IOActive works with a majority of Global 500 companies including power and utility, game, hardware, retail, financial, media, router, travel, aerospace, healthcare, high-tech, social networking, and software development organizations. As a home for highly skilled and experienced computer security professionals, IOActive attracts consultants who contribute to the growing body of security knowledge by speaking at such elite conferences as BlackHat, Defcon, BlueHat, CanSec, Syscan, WhatTheHack, and 21c3. www.ioactive.com
ISC2_main_logo-small.jpg        (ISC)² is the largest not-for-profit membership body of certified information security professionals worldwide, with over 87,000 members in more than 135 countries. Globally recognized as the Gold Standard, (ISC)² issues the CISSPÒ and related concentrations, CSSLPÒ, CAPÒ, and SSCPÒ credentials to qualifying candidates. More information is available at www.isc2.org www.isc2.org
Mnemonic_securing_150.png        mnemonic is the leading independent provider of IT security professional services and 24x7 managed security services in the Nordics. We deliver a full range of integrated IT security services enabling all types of enterprise to protect their business including 7 of the top 10 companies in Norway. Our customers trust us to protect their assets because our scale, expertise, flexibility and agility allow us to meet their differing security requirements. mnemonic has around 110 staff, about 80 of whom are graduate-level consultants. The company was founded in 2000 and has offices in Oslo (HQ), Stavanger and Stockholm. Our business model is based on three Professional Services practices and a Managed Security Services division. With these four areas we offer services for the entire information security lifecycle from definition of security policy to security control design, implementation, support and operation. In addition, our Threat Intelligence team studies the evolution of advanced threats across the Nordic region so that we can keep our customers' businesses safe from attack. We complement these services by having partnerships with class-leading manufacturers of security technology allowing us to deliver complete solutions www.mnemonic.no
Mozilla.png        Mozilla is a proudly non-profit organization dedicated to keeping the power of the Web in people’s hands. We’re a global community of users, contributors and developers working to innovate on your behalf. When you use Firefox, or any Mozilla product, you become a part of that community, helping us build a brighter future for the Web. Link to:https://www.mozilla.org/mission/ www.mozilla.com
Netspi_logo.png        NetSPI is a privately held information-security consulting company founded in 2001. By using its consulting team's deep security knowledge and its CorrelatedVM vulnerability management & reporting solution, the company is a trusted advisor to large enterprises. NetSPI provides a range of assessment and advisory services designed to analyze and mitigate risks and ensure compliance with relevant regulations and industry standards. Clients include large financial services firms, retailers, healthcare organizations and technology companies. www.netspi.com
NIXU_C12.jpg        We are Nordic’s largest specialist company in information security consulting. Nixu advises, builds, develops and inspects its customers’ information security capabilities as an independent advisor. Our goal is to ensure the continuity of our customer’s business and internet services by anticipating and preventing information security-related risks. We employ over 100 experienced information security consultants, technical experts and software developers, who form Nordics’ leading cluster of information security expertise. Over 20 years of information security and network experience ensure that Nixu is a trusted advisor for many large corporations and public sector organizations. www.nixu.com
Nokia.jpg        www.nokia.com
NT_Objectibves_Logo_Resized.png        August 2012 NT OBJECTives (NTO) provides highly automated, comprehensive and accurate web application security software, services and SaaS. By dedicating more than 10 years to solving the most difficult application security challenges through automation, NTO’s software, SaaS and services solutions enable organizations to maximize both efficiency and effectiveness of their web application security programs. NTO customers appreciate NTO’s dedication, rapid response and personal service. NT OBJECTIVES is privately held with headquarters in Irvine, CA. Follow us on Twitter @ntobjectives. www.ntobjectives.com
Oracle_logo.gif        Oracle With more than 380,000 customers—including 100 of the Fortune 100—and with deployments across a wide variety of industries in more than 145 countries around the globe, Oracle offers an optimized and fully integrated stack of business hardware and software systems that helps organizations overcome complexity and unleash innovation. Oracle engineers hardware and software to work together in the cloud and in your data center–from servers and storage, to database and middleware, through applications. Security is a key priority at Oracle. Encompassing every phase of the product development lifecycle, Oracle Software Security Assurance is Oracle's methodology for building security into the design, build, testing, and maintenance of its products. Oracle's goal is to ensure that Oracle's products, as well as the customer systems that leverage those products, remain as secure as possible. www.oracle.com
Pentasecurity_ci.png        Penta Security Systems Inc. is focused on providing end-to-end security solutions. Founded in 1997, Penta Security has been Korea’s leading IT security vendor for the past five years. As one of South Korea’s earliest IT security pioneers and developers, we remain committed to enhancing data and web security not just within Korea, but also worldwide.Penta Security currently offers multiple security products: a data encryption and access control suite (D’Amo), a Single-Sign-On platform (ISign Plus), a key management solution, and both a hardware and virtual web application firewall (WAPPLES). Some of Penta’s clients include household names such as Samsung, LG, Nikon, and Meritz. Penta Security Systems operates from its headquarters in Seoul, South Korea--with a branch office in Tokyo, Japan and various partnerships throughout Southeast Asia. www.pentasecurity.com
Praetorian_Logo_150x45.png        Praetorian is an information security provider and research center that provides risk assessment, penetration testing, secure software development, computer forensics, and security education services. Our mission is to help our clients understand and minimize their overall risk and liability. Through our assessment services, your organization can obtain an accurate, independent security evaluation. Through our advisory offerings, we can help your organization build, define, communicate, and enforce a comprehensive security strategy. As an independent security firm, Praetorian builds its reputation on our expertise, integrity, professionalism, and client satisfaction. As a boutique firm, Praetorian must distinguish itself by the quality of its service and the technical prowess and business acumen of its consultants. Subsequently, Praetorian only considers the top five percent from the security industry for employment. Our consultants come from a wide range of backgrounds and specialties. All consultants come from a computer science or engineering discipline and many consultants have obtained masters and doctorates. Our team members include published authors, open source developers, industry researchers, and conference presenters. www.praetorian.com
Protiviti.jpg        Protiviti is a global business consulting and risk consulting firm composed of experts specializing in risk, advisory and transaction services. The firm helps solve problems in finance and transactions, operations, technology, information security & privacy, litigation, governance, risk, and compliance. Protiviti's highly trained, results-oriented professionals provide a unique perspective on a wide range of critical business issues for clients in the Americas, Asia-Pacific, Europe and the Middle East. Protiviti has more than 70 locations worldwide and is a wholly owned subsidiary of Robert Half International Inc. (NYSE: RHI). Founded in 1948, Robert Half International is a member of the S&P 500 index. For additional information about Protiviti, Contact Rocco Grillo at rocco.grillo@protiviti.com / 212.603.8381 www.protiviti.com
PWC_log_resized.png        www.pwc.com
Qualys_Logo.gif        Qualys, Inc. is the pioneer and leading provider of information security and compliance cloud solutions with 5,500+ customers in 85 countries, including 51 of the Forbes Global 100. The QualysGuard Cloud Platform and integrated suite of applications helps businesses simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance and protection for IT systems and web applications. Founded in 1999, Qualys has established strategic partnerships with leading managed service providers and consulting organizations including BT, Dell SecureWorks, Fujitsu, IBM, NTT, Symantec, Verizon, and Wipro. The company is also a founding member of the Cloud Security Alliance (CSA). www.qualys.com
Sys_scsk_logo_banner_3.jpg        Dec 2012 Japan-based global IT service company, SCSK supplies the whole range of IT solutions, system integration to IT infrastructure implementation, IT management, BPO, IT hardware and software sales.Particularly in security field, SCSK offers full-line Web security solution which is prompt and accurate provision against up-to-date cyber attack with a service brand, “SECURE YOUR SITE ™”. On a mission to contribute to enterprises’ business, SCSK assures the safety of IT system with security-oriented consulting, system design, application development, security system implementation, operation and monitoring. SCSK SOC and CSIRT team strongly support enterprises’ stability on a 24/7 basis. www.scs.co.jp/sys/
Securityinnovation.png        Security Innovation focuses on the most difficult problem of IT security, and the root cause of most data breaches – insecure software applications. For more than a decade, we have helped organizations like Microsoft, ING, GoDaddy.com, Progress Energy, Nike and others build internal expertise, uncover critical vulnerabilities, and integrate security into their software development lifecycle (SDLC). The company's Application Security Risk solutions are based on the three pillars of a secure Software Development Lifecycle (SDLC), which feed into one another to create an ecosystem of repeatable, secure software development and deployment: Standards, Education, and Assessment. Standards drive the need for education and continued assessments; Education ensures standards and assessments are applied correctly; and, Assessment results drive standards, education and improved tools usage. We deliver these solutions via our TeamMentor product, “out of the box” secure development best practices; our TeamProfessor product, over 100 hours of computer-based training; and our Professional Services which assess software applications & SDLC against industry standards. www.securityinnovation.com
55X80_seeker.PNG        www.seekersec.com
Symantec.png        Symantec was founded in 1982 by visionary computer scientists. The company has evolved to become one of the world’s largest software companies with more than 18,500 employees in more than 50 countries. We provide security, storage and systems management solutions to help our customers – from consumers and small businesses to the largest global organizations – secure and manage their information-driven world against more risks at more points, more completely and efficiently than any other company. www.symantc.com/about/profile
Tenable_T.png        www.tenablesecurity.com
SPL-LOGO-SMALL.png        SpiderLabs is Trustwave’s elite security team focused on application security, incident response, penetration testing, physical security and security research — including anti-malware and threat intelligence Trustwave is headquartered in the United States in Chicago, Ill. with offices throughout Africa, Asia, Australia, Europe, North America and South America www.trustwave.com
Twitter-bird-blue-on-white_sized.png        Jan 2013 With 400 million Tweets per day and more than 200 million active users, there is something for everyone on Twitter, no matter what you're interested in or where you are in the world. Twitter can be accessed on the web, on smartphones and on the simplest of feature phones. At Twitter, we believe that the open exchange of information can have a positive global impact and are inspired by stories of people using Twitter to improve the world in unexpected ways. Twitter is one of the top 5 most visited sites in the world, and we're tackling unique challenges at scale while keeping our users safe. www.twitter.com
UPS.jpg        www.ups.com
VeraCode_Resized.png        Veracode is the only independent provider of cloud-based application intelligence and security verification services. The Veracode platform provides the fastest, most comprehensive solution to improve the security of internally developed, purchased or outsourced software applications and third-party components. By combining patented static, dynamic and manual testing, extensive eLearning capabilities, and advanced application analytics, Veracode enables scalable, policy-driven application risk management programs that help identify and eradicate numerous vulnerabilities by leveraging best-in-class technologies from vulnerability scanning to penetration testing and static code analysis. Veracode delivers unbiased proof of application security to stakeholders across the software supply chain while supporting independent audit and compliance requirements for all applications no matter how they are deployed, via the web, mobile or in the cloud. Veracode works with customers in more than 80 countries worldwide representing Global 2000 brands. For more information, visit www.veracode.com, follow on Twitter: @Veracode or read the Veracode Blog. www.veracode.com
Visible_Risk_Logo_Resized.jpg        VisibleRisk integrates with your security operations to identify any interesting or suspicious activity within your network. Our goal is to hunt and identify suspicious or malicious activity within your network to help you protect your enterprise and investments. Our expertise allows for maximum flexibility within your unique environment to effectively identify any adversaries that exist in your environment. www.visiblerisk.com
Whitehat.gif        WhiteHat Security is the leading provider of website risk management solutions that protect critical data, ensure compliance and narrow the window of risk. WhiteHat Sentinel, the company’s flagship product family, is the most accurate and cost-effective website vulnerability management solution available, delivering the visibility, flexibility, and control that organizations need to prevent website attacks. www.whitehatsec.com
WireHarbor_Logo_1.png        Sept. 2012 WireHarbor Security Inc. (a Delaware Corporation), with its corporate headquarters located in Chicago, IL. is a leading provider of IT risk management solutions to corporations throughout the midwest. Our organization specializes in Application, Mobile and Network security assessment and risk mitigation for a wide range of companies. Our employees are dedicated to building long-term collaboration on your toughest security challenges. We aim to be the trusted partner in your information security success...” www.wireharbor.com