Corporate Supporter Bios
Adobe: Adobe is changing the world though digital experiences. We help our customers develop and deliver high-impact experiences that differentiate brands, build loyalty, and drive revenue across every screen, including smartphones, computers, tablets and TVs. Adobe content solutions are used daily by millions of companies worldwide—from publishers and broadcasters, to enterprises, marketing agencies and household-name brands. Building on our established design leadership, we enable customers not only to make great content, but to manage, measure and monetize it for maximum impact. For more information, visit www.adobe.com.
Amazon.com:Amazon.com, a Fortune 500 company based in Seattle, opened on the World Wide Web in July 1995 and offers Earth's Biggest Selection, where customers can find and discover anything they might want to buy online. The brightest minds come to Amazon to develop technology that improves the lives of shoppers and sellers around the world. Pioneering technical challenges of unprecedented scale and complexity, Amazon also provides developers access to Amazon's own back-end platform and in-the-cloud infrastructure. Examples include Amazon Elastic Compute Cloud, Amazon Simple Storage Service, Amazon SimpleDB, Amazon Simple Queue Service, Amazon Flexible Payments Service, and Amazon Mechanical Turk. For more info, visit: www.amazon.com
Bayshore Networks: Bayshore Networks is the leading provider of high-end information assurance and security products for the defense industrial base, government and critical infrastructure organizations and commercial enterprise. Trusted by the worldʼs top defense contractors and developed exclusively in the United States, Bayshoreʼs flagship product SingleKey™ is a multi-protocol application firewall that secures all links and applications behind the DMZ. SingleKey blocks Advanced Persistent Threat (APT) actors and insider threats, mitigates vulnerabilities in SCADA industrial control systems and protects mission-critical applications. Bayshoreʼs threat management and analytics platform, SingleView™, manages and controls multiple SingleKeys in a highly distributed environment and provides real-time situational awareness and big data analytics about the highly sensitive digital assets of our defense and government customers. For more information follow Bayshore Networks on Twitter @bayshorenet or visit www.bayshorenetworks.com.
Best Buy Co., Inc.: (NYSE: BBY) is a leading multi-channel global retailer and developer of technology products and services. Every day our employees - 180,000 strong - are committed to helping deliver the technology solutions that enable easy access to people, knowledge, ideas and fun. We are keenly aware of our role and impact on the world, and we are committed to developing and implementing business strategies that bring sustainable technology solutions to our consumers and communities. For information about Best Buy, visit www.bby.com and to shop at Best Buy, visitwww.bestbuy.com.
DBAPPSecurity Inc.: ( www.DBAppSecurity.com )OWASP globle partner. A well known company focused on WEB Application security and Data security. They have hundreds of customers including many fortune 500, which cover the field like Financial, Telecom, Energy, Government etc. The products include WEB application vulnerability scanner, Database vulnerability scanner, WEB application firewall, Database Auditor and Log Auditor. They have very competitive solution for Data leakage, WEB defense, Compliance, and Cloud security. They also have well known security research team.
HP Enterprise Security:About HP Enterprise Security: HP is a leading provider of security and compliance solutions for modern enterprises that want to mitigate risk in their hybrid environments and defend against advanced threats. Based on market leading products from ArcSight, Fortify, and TippingPoint, the HP Security Intelligence and Risk Management (SIRM) Platform uniquely delivers the advanced correlation, application protection, and network defense technology to protect today’s applications and IT infrastructures from sophisticated cyber threats. Visit HP Enterprise Security at: www.hpenterprisesecurity.com.
IBM: IBM's security portfolio provides the security intelligence to help organizations holistically protect its people, infrastructure, data and applications. IBM offers solutions for identity and access management, database security, application development, risk management, endpoint management, network security and more. IBM operates the world's broadest security research and development organization and delivery organization. This comprises nine security operations centers, nine IBM Research centers, 11 software security development labs and an Institute for Advanced Security with chapters in the United States, Europe and Asia Pacific. IBM monitors 13 billion security events per day in more than 130 countries and holds more than 3,000 security patents. For more information, visit ibm.com/security.
NetIQ:NetIQ is an enterprise software company with relentless focus on customer success. Customers and partners choose NetIQ to cost-effectively tackle information protection challenges (driven by regulatory requirements such as PCI DSS, HIPAA/HITECH, SOX, NERC and others) and manage the complexity of dynamic, highly-distributed business applications. Our portfolio includes scalable, automated solutions for Identity, Security, Resource, and Service Management that help organizations securely deliver, measure, and manage computing services across physical, virtual, and cloud computing environments.
Praetorian Company: Praetorian is an information security provider and research center that provides risk assessment, penetration testing, secure software development, computer forensics, and security education services. Our mission is to help our clients understand and minimize their overall risk and liability. Through our assessment services, your organization can obtain an accurate, independent security evaluation. Through our advisory offerings, we can help your organization build, define, communicate, and enforce a comprehensive security strategy. As an independent security firm, Praetorian builds its reputation on our expertise, integrity, professionalism, and client satisfaction. As a boutique firm, Praetorian must distinguish itself by the quality of its service and the technical prowess and business acumen of its consultants. Subsequently, Praetorian only considers the top five percent from the security industry for employment. Our consultants come from a wide range of backgrounds and specialties. All consultants come from a computer science or engineering discipline and many consultants have obtained masters and doctorates. Our team members include published authors, open source developers, industry researchers, and conference presenters.