This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Front Range OWASP Conference 2013/Sponsors"

From OWASP
Jump to: navigation, search
m
(Commented out the sponsorship package options)
 
(4 intermediate revisions by 2 users not shown)
Line 1: Line 1:
====Current Sponsors====
+
==Current Sponsors==
  
== [http://aerstone.com/ Aerstone] ==
+
=== [https://aerstone.com/ Aerstone] ===
  
 
{| style="width: 100%;"
 
{| style="width: 100%;"
Line 11: Line 11:
  
  
== [http://www.appliedtrust.com/ Applied Trust] ==
+
=== [http://www.appliedtrust.com/ Applied Trust] ===
  
 
{| style="width: 100%;"
 
{| style="width: 100%;"
 
  |- valign="top"
 
  |- valign="top"
  | Sponsor information coming soon
+
  | AppliedTrust provides IT infrastructure, security, and opensource consulting services. Our clients are organizations where effective IT is critical to the reputation and growth of their business, and hail from a variety of industries including healthcare, financial services, hospitality, recreation, and government. Our specialty areas include:
 +
<br>
 +
<ul>
 +
<li>Web Application Security</li>
 +
<li>Drupal and Linux</li>
 +
<li>Security</li>
 +
<li>Technology Selection and Implementation</li>
 +
<li>Operations</li>
 +
<li>Performance and High Availability</li>
 +
<li>Assessment and Audit</li>
 +
<li>System, Network, and Security Architecture</li>
 +
<li>Strategy and Governance</li>
 +
</ul>
 
  | style="width: 200px; |
 
  | style="width: 200px; |
 
  | [[Image:AppliedTrust.png  |160px| link=http://www.appliedtrust.com|alt=Applied Trust|right]]
 
  | [[Image:AppliedTrust.png  |160px| link=http://www.appliedtrust.com|alt=Applied Trust|right]]
Line 21: Line 33:
  
  
== [http://www.checkmarx.com Checkmarx] ==
+
=== [http://www.checkmarx.com Checkmarx] ===
  
 
{| style="width: 100%;"
 
{| style="width: 100%;"
Line 33: Line 45:
  
  
== [http://www.hp.com/ HP] ==
+
=== [http://www.hp.com/ HP] ===
  
 
{| style="width: 100%;"
 
{| style="width: 100%;"
 
  |- valign="top"
 
  |- valign="top"
  | Sponsor information coming soon
+
  | HP is a leading provider of security and compliance solutions for the modern enterprise that wants to mitigate risk in its hybrid environment and defend against advanced threats. Based on market leading products from HP ArcSight, HP Fortify, and HP TippingPoint, the HP Security Intelligence Platform uniquely delivers the advanced correlation, application protection, and network defenses to protect today’s hybrid IT infrastructure from sophisticated cyber threats.
 
  | style="width: 200px; |
 
  | style="width: 200px; |
 
  | [[Image:HP.png  |160px| link=http://www.hp.com/  |alt=HP|right]]
 
  | [[Image:HP.png  |160px| link=http://www.hp.com/  |alt=HP|right]]
Line 43: Line 55:
  
  
== [http://www.securitypursuit.com/ Security Pursuit] ==
+
=== [http://www.securitypursuit.com/ Security Pursuit] ===
  
 
{| style="width: 100%;"
 
{| style="width: 100%;"
Line 53: Line 65:
  
  
== [http://www.southseascorp.com/ SouthSeas] ==
+
=== [http://www.southseascorp.com/ SouthSeas] ===
  
 
{| style="width: 100%;"
 
{| style="width: 100%;"
 
  |- valign="top"
 
  |- valign="top"
  | Sponsor information coming soon
+
  | Escaping network insecurity means identifying and eliminating vulnerability at each and every level. At South Seas Corporation, we consider the big picture and the finest details of your information technology, from computers to routers to servers and the cabling between, from intranets to the internet, from mobile devices to web applications to remote networks across the globe. We also address administrative issues, including security policy and federal compliance. Of course, your budget is top of mind from the beginning. The end result is a tailored solution designed to secure every byte of information traveling through, to and around your organization at every point, installed by certified experts trained to work hand in hand with your IT department. Take a load off your mind with South Seas Corporation.
 
  | style="width: 200px; |
 
  | style="width: 200px; |
 
  | [[Image:SouthSeas.png  |160px| link=http://www.southseascorp.com/|alt=SouthSeas|right]]
 
  | [[Image:SouthSeas.png  |160px| link=http://www.southseascorp.com/|alt=SouthSeas|right]]
Line 63: Line 75:
  
  
== [https://www.veracode.com/ Veracode] ==
+
=== [https://www.veracode.com/ Veracode] ===
  
 
{| style="width: 100%;"
 
{| style="width: 100%;"
Line 98: Line 110:
 
  -->
 
  -->
  
 +
<!--
 
==Sponsorship Opportunities==
 
==Sponsorship Opportunities==
  
Line 312: Line 325:
 
  | style="border: 1px solid #365F91; background:#FFDDAA; color:#E07946" align="left"  valign="top" | ''<Call for details>''
 
  | style="border: 1px solid #365F91; background:#FFDDAA; color:#E07946" align="left"  valign="top" | ''<Call for details>''
 
|}
 
|}
 +
-->

Latest revision as of 15:42, 4 April 2013

Current Sponsors

Aerstone

Aerstone provides strategic and technical cyber security consulting services including assessments, planning, architecture designed incident response, regulatory compliance, and computer forensics. We provide services and products for medium to large healthcare providers, financial services organizations and legal firms, and law enforcement.  Clients range from local businesses to government agencies.
Aerstone


Applied Trust

AppliedTrust provides IT infrastructure, security, and opensource consulting services. Our clients are organizations where effective IT is critical to the reputation and growth of their business, and hail from a variety of industries including healthcare, financial services, hospitality, recreation, and government. Our specialty areas include:


  • Web Application Security
  • Drupal and Linux
  • Security
  • Technology Selection and Implementation
  • Operations
  • Performance and High Availability
  • Assessment and Audit
  • System, Network, and Security Architecture
  • Strategy and Governance
Applied Trust


Checkmarx

Checkmarx - Source Code Analysis Made Easy

Checkmarx is the developer of next generation Static Code Analysis (SCA) solutions. The company pioneered the concept of a query language-based solution for identifying technical and logical code vulnerabilities. Checkmarx provides the best way for organizations to introduce security into their Software Development Lifecycle (SDLC) which systematically eliminates software risk. The product enables developers and auditors to easily scan un-compiled / un-built code in all major coding languages anywhere, anytime. CxSuite's application security testing is available in both "On Premise" and "On Demand" configurations. The security testing scans for the most prevalent security vulnerabilities as determined by OWASP Top 10, SANS, and other major standards. Checkmarx was recognized by Gartner as sole visionary in their latest SAST magic quadrant and as Cool vendor in application security. Customers include Fortune 500, government organizations and SMBs in over 30 countries.

Checkmarx


HP

HP is a leading provider of security and compliance solutions for the modern enterprise that wants to mitigate risk in its hybrid environment and defend against advanced threats. Based on market leading products from HP ArcSight, HP Fortify, and HP TippingPoint, the HP Security Intelligence Platform uniquely delivers the advanced correlation, application protection, and network defenses to protect today’s hybrid IT infrastructure from sophisticated cyber threats.
HP


Security Pursuit

Security Pursuit provides computer security services to help organizations protect their critical information systems. Based in Denver, Colorado, Security Pursuit's services include: IT Security Risk Analysis, Data Breach Incident Response, Network Penetration Testing and Vulnerability Assessments, Website Penetration Testing and Vulnerability Assessments, Wireless Network Security, Social Engineering Prevention, Security Awareness Training, Employee Termination Assistance and Virtual CISO consulting. We have conducted hundreds of security assessments for financial institutions, healthcare providers, retailers, utilities, airports, and municipal governments; many in support of PCI, GLBA, NCUA, and HIPAA compliance requirements. Security Pursuit’s computer security services provide you with a higher level of awareness about the security posture of your organization.
Security Pursuit


SouthSeas

Escaping network insecurity means identifying and eliminating vulnerability at each and every level. At South Seas Corporation, we consider the big picture and the finest details of your information technology, from computers to routers to servers and the cabling between, from intranets to the internet, from mobile devices to web applications to remote networks across the globe. We also address administrative issues, including security policy and federal compliance. Of course, your budget is top of mind from the beginning. The end result is a tailored solution designed to secure every byte of information traveling through, to and around your organization at every point, installed by certified experts trained to work hand in hand with your IT department. Take a load off your mind with South Seas Corporation.
SouthSeas


Veracode

Today most global enterprises live under the constant threat of being hacked, which begs this critical question – how do they innovate and rapidly release new and improved applications required to be an industry leader while still securing their organizations critical IP and data assets? Before Veracode, application security was widely thought to slow innovation, but not anymore. With the Veracode Platform, application security and innovation can go hand-in-hand. Whether applications are built, brought or outsourced, Veracode’s patented testing technology provides the intelligence needed to quickly secure them from the most common forms of attack.
Veracode