This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Front Range OWASP Conference 2013/Sponsors"
Mark Major (talk | contribs) m |
Mark Major (talk | contribs) (Commented out the sponsorship package options) |
||
(12 intermediate revisions by 3 users not shown) | |||
Line 1: | Line 1: | ||
− | + | ==Current Sponsors== | |
− | <center> | + | === [https://aerstone.com/ Aerstone] === |
+ | |||
+ | {| style="width: 100%;" | ||
+ | |- valign="top" | ||
+ | | Aerstone provides strategic and technical cyber security consulting services including assessments, planning, architecture designed incident response, regulatory compliance, and computer forensics. We provide services and products for medium to large healthcare providers, financial services organizations and legal firms, and law enforcement. Clients range from local businesses to government agencies. | ||
+ | | style="width: 200px; | | ||
+ | | [[Image:BoulderSponsorAerstone.png|160px| link=http://aerstone.com |alt=Aerstone|right]] | ||
+ | |} | ||
+ | |||
+ | |||
+ | === [http://www.appliedtrust.com/ Applied Trust] === | ||
+ | |||
+ | {| style="width: 100%;" | ||
+ | |- valign="top" | ||
+ | | AppliedTrust provides IT infrastructure, security, and opensource consulting services. Our clients are organizations where effective IT is critical to the reputation and growth of their business, and hail from a variety of industries including healthcare, financial services, hospitality, recreation, and government. Our specialty areas include: | ||
+ | <br> | ||
+ | <ul> | ||
+ | <li>Web Application Security</li> | ||
+ | <li>Drupal and Linux</li> | ||
+ | <li>Security</li> | ||
+ | <li>Technology Selection and Implementation</li> | ||
+ | <li>Operations</li> | ||
+ | <li>Performance and High Availability</li> | ||
+ | <li>Assessment and Audit</li> | ||
+ | <li>System, Network, and Security Architecture</li> | ||
+ | <li>Strategy and Governance</li> | ||
+ | </ul> | ||
+ | | style="width: 200px; | | ||
+ | | [[Image:AppliedTrust.png |160px| link=http://www.appliedtrust.com|alt=Applied Trust|right]] | ||
+ | |} | ||
+ | |||
+ | |||
+ | === [http://www.checkmarx.com Checkmarx] === | ||
+ | |||
+ | {| style="width: 100%;" | ||
+ | |- valign="top" | ||
+ | | Checkmarx - Source Code Analysis Made Easy | ||
+ | |||
+ | Checkmarx is the developer of next generation Static Code Analysis (SCA) solutions. The company pioneered the concept of a query language-based solution for identifying technical and logical code vulnerabilities. Checkmarx provides the best way for organizations to introduce security into their Software Development Lifecycle (SDLC) which systematically eliminates software risk. The product enables developers and auditors to easily scan un-compiled / un-built code in all major coding languages anywhere, anytime. CxSuite's application security testing is available in both "On Premise" and "On Demand" configurations. The security testing scans for the most prevalent security vulnerabilities as determined by OWASP Top 10, SANS, and other major standards. Checkmarx was recognized by Gartner as sole visionary in their latest SAST magic quadrant and as Cool vendor in application security. Customers include Fortune 500, government organizations and SMBs in over 30 countries. | ||
+ | | style="width: 200px; | | ||
+ | | [[Image:Checkmarx.png |160px| link=http://www.checkmarx.com/|alt=Checkmarx|right]] | ||
+ | |} | ||
+ | |||
+ | |||
+ | === [http://www.hp.com/ HP] === | ||
+ | |||
+ | {| style="width: 100%;" | ||
+ | |- valign="top" | ||
+ | | HP is a leading provider of security and compliance solutions for the modern enterprise that wants to mitigate risk in its hybrid environment and defend against advanced threats. Based on market leading products from HP ArcSight, HP Fortify, and HP TippingPoint, the HP Security Intelligence Platform uniquely delivers the advanced correlation, application protection, and network defenses to protect today’s hybrid IT infrastructure from sophisticated cyber threats. | ||
+ | | style="width: 200px; | | ||
+ | | [[Image:HP.png |160px| link=http://www.hp.com/ |alt=HP|right]] | ||
+ | |} | ||
+ | |||
+ | |||
+ | === [http://www.securitypursuit.com/ Security Pursuit] === | ||
+ | |||
+ | {| style="width: 100%;" | ||
+ | |- valign="top" | ||
+ | | Security Pursuit provides computer security services to help organizations protect their critical information systems. Based in Denver, Colorado, Security Pursuit's services include: IT Security Risk Analysis, Data Breach Incident Response, Network Penetration Testing and Vulnerability Assessments, Website Penetration Testing and Vulnerability Assessments, Wireless Network Security, Social Engineering Prevention, Security Awareness Training, Employee Termination Assistance and Virtual CISO consulting. We have conducted hundreds of security assessments for financial institutions, healthcare providers, retailers, utilities, airports, and municipal governments; many in support of PCI, GLBA, NCUA, and HIPAA compliance requirements. Security Pursuit’s computer security services provide you with a higher level of awareness about the security posture of your organization. | ||
+ | | style="width: 200px; | | ||
+ | | [[Image:SecurityPursuit.png |160px| link=http://www.securitypursuit.com/ |alt=Security Pursuit|right]] | ||
+ | |} | ||
+ | |||
+ | |||
+ | === [http://www.southseascorp.com/ SouthSeas] === | ||
+ | |||
+ | {| style="width: 100%;" | ||
+ | |- valign="top" | ||
+ | | Escaping network insecurity means identifying and eliminating vulnerability at each and every level. At South Seas Corporation, we consider the big picture and the finest details of your information technology, from computers to routers to servers and the cabling between, from intranets to the internet, from mobile devices to web applications to remote networks across the globe. We also address administrative issues, including security policy and federal compliance. Of course, your budget is top of mind from the beginning. The end result is a tailored solution designed to secure every byte of information traveling through, to and around your organization at every point, installed by certified experts trained to work hand in hand with your IT department. Take a load off your mind with South Seas Corporation. | ||
+ | | style="width: 200px; | | ||
+ | | [[Image:SouthSeas.png |160px| link=http://www.southseascorp.com/|alt=SouthSeas|right]] | ||
+ | |} | ||
+ | |||
+ | |||
+ | === [https://www.veracode.com/ Veracode] === | ||
+ | |||
+ | {| style="width: 100%;" | ||
+ | |- valign="top" | ||
+ | | Today most global enterprises live under the constant threat of being hacked, which begs this critical question – how do they innovate and rapidly release new and improved applications required to be an industry leader while still securing their organizations critical IP and data assets? Before Veracode, application security was widely thought to slow innovation, but not anymore. With the Veracode Platform, application security and innovation can go hand-in-hand. Whether applications are built, brought or outsourced, Veracode’s patented testing technology provides the intelligence needed to quickly secure them from the most common forms of attack. | ||
+ | | style="width: 200px; | | ||
+ | | [[Image:Veracode.png |160px| link=https://www.veracode.com/ |alt=Veracode|right]] | ||
+ | |} | ||
+ | |||
+ | <!--<center> | ||
{| style="width:95%;" cellpadding="40" style="border-collapse:collapse;" align="center" | {| style="width:95%;" cellpadding="40" style="border-collapse:collapse;" align="center" | ||
|- | |- | ||
− | | [[Image:BoulderSponsorAerstone.png | + | | [[Image:BoulderSponsorAerstone.png | 256px | link=https://aerstone.com | alt=Aerstone | Aerstone]] |
− | | [[Image:AppliedTrust.png | + | | [[Image:AppliedTrust.png | 256px | link=http://www.appliedtrust.com | alt=Applied Trust | Applied Trust]] |
− | | [[Image: | + | | [[Image:Checkmarx.png | 256px | link=http://www.checkmarx.com/ | alt=Checkmarx | Checkmarx]] |
|- | |- | ||
− | | [[Image: | + | | [[Image:HP.png | 256px | link=http://www.hp.com/ | alt=HP | HP]] |
+ | | [[Image:SecurityPursuit.png | 256px | link=http://www.securitypursuit.com/ | alt=Security Pursuit | Security Pursuit]] | ||
+ | | [[Image:SouthSeas.png | 256px | link=http://www.southseascorp.com/ | alt=SouthSeas | SouthSeas]] | ||
+ | |- | ||
+ | | [[Image:Veracode.png | 256px | link=https://www.veracode.com/ | alt=Veracode | Veracode]] | ||
|} | |} | ||
− | </center> | + | </center>--> |
Line 23: | Line 110: | ||
--> | --> | ||
− | + | <!-- | |
+ | ==Sponsorship Opportunities== | ||
Please contact [[User:Mark_Major|Mark Major]] for information regarding SnowFROC sponsorship opportunities. | Please contact [[User:Mark_Major|Mark Major]] for information regarding SnowFROC sponsorship opportunities. | ||
Line 106: | Line 194: | ||
|- | |- | ||
! style="width:16%; border-bottom: 1px solid #365F91; color:#365F91" align="right" | Food Sponsorships | ! style="width:16%; border-bottom: 1px solid #365F91; color:#365F91" align="right" | Food Sponsorships | ||
− | ! style="width:28%; border: 1px solid #365F91; background:#F79646; color:#FDFDD9" align="center" | Breakfast (1x) | + | ! style="width:28%; border: 1px solid #365F91; background:#F79646; color:#FDFDD9" align="center" | Breakfast (1x) -- SOLD |
! style="width:28%; border: 1px solid #365F91; background:#8064A2; color:#E5DFEC" align="center" | Coffee (2x) | ! style="width:28%; border: 1px solid #365F91; background:#8064A2; color:#E5DFEC" align="center" | Coffee (2x) | ||
! style="width:28%; border: 1px solid #365F91; background:#4BACC6; color:#DAEEF3" align="center" | Lunch (2x) | ! style="width:28%; border: 1px solid #365F91; background:#4BACC6; color:#DAEEF3" align="center" | Lunch (2x) | ||
Line 143: | Line 231: | ||
|- | |- | ||
| style="border-bottom: 1px solid #365F91; color:#365F91" align="right" valign="top" | '''Cost''' | | style="border-bottom: 1px solid #365F91; color:#365F91" align="right" valign="top" | '''Cost''' | ||
− | | style="border: 1px solid #365F91; background:#FDFDD9; color:#984806" align="left" valign="top" | '' | + | | style="border: 1px solid #365F91; background:#FDFDD9; color:#984806" align="left" valign="top" | ''<Call for details>'' |
| style="border: 1px solid #365F91; background:#E5DFEC; color:#5F497A" align="left" valign="top" | '''$3,000''' | | style="border: 1px solid #365F91; background:#E5DFEC; color:#5F497A" align="left" valign="top" | '''$3,000''' | ||
| style="border: 1px solid #365F91; background:#DAEEF3; color:#31849B" align="left" valign="top" | ''<Call for details>'' | | style="border: 1px solid #365F91; background:#DAEEF3; color:#31849B" align="left" valign="top" | ''<Call for details>'' | ||
|- | |- | ||
| style="border-bottom: 1px solid #365F91; color:#365F91" align="right" valign="top" | OWASP Member Discount | | style="border-bottom: 1px solid #365F91; color:#365F91" align="right" valign="top" | OWASP Member Discount | ||
− | | style="border: 1px solid #365F91; background:#FDFDD9; color:#984806" align="left" valign="top" | | + | | style="border: 1px solid #365F91; background:#FDFDD9; color:#984806" align="left" valign="top" | ''<Call for details>'' |
| style="border: 1px solid #365F91; background:#E5DFEC; color:#5F497A" align="left" valign="top" | - $600 | | style="border: 1px solid #365F91; background:#E5DFEC; color:#5F497A" align="left" valign="top" | - $600 | ||
| style="border: 1px solid #365F91; background:#DAEEF3; color:#31849B" align="left" valign="top" | ''<Call for details>'' | | style="border: 1px solid #365F91; background:#DAEEF3; color:#31849B" align="left" valign="top" | ''<Call for details>'' | ||
Line 159: | Line 247: | ||
|- | |- | ||
! style="width:16%; border-bottom: 1px solid #365F91; color:#365F91" align="right" | Event Sponsorships | ! style="width:16%; border-bottom: 1px solid #365F91; color:#365F91" align="right" | Event Sponsorships | ||
− | ! style="width:28%; border: 1px solid #365F91; background:#365F91; color:#DBE5F1" align="center" | Capture the Flag (1x) | + | ! style="width:28%; border: 1px solid #365F91; background:#365F91; color:#DBE5F1" align="center" | Capture the Flag (1x) -- SOLD |
! style="width:28%; border: 1px solid #365F91; background:#C0504D; color:#F2DBDB" align="center" | Networking Social (1x) -- SOLD | ! style="width:28%; border: 1px solid #365F91; background:#C0504D; color:#F2DBDB" align="center" | Networking Social (1x) -- SOLD | ||
! style="width:28%; border: 1px solid #365F91; background:#9BBB59; color:#EAF1DD" align="center" | Birds of a Feather (1x) | ! style="width:28%; border: 1px solid #365F91; background:#9BBB59; color:#EAF1DD" align="center" | Birds of a Feather (1x) | ||
Line 237: | Line 325: | ||
| style="border: 1px solid #365F91; background:#FFDDAA; color:#E07946" align="left" valign="top" | ''<Call for details>'' | | style="border: 1px solid #365F91; background:#FFDDAA; color:#E07946" align="left" valign="top" | ''<Call for details>'' | ||
|} | |} | ||
+ | --> |
Latest revision as of 15:42, 4 April 2013
Current Sponsors
Aerstone
Aerstone provides strategic and technical cyber security consulting services including assessments, planning, architecture designed incident response, regulatory compliance, and computer forensics. We provide services and products for medium to large healthcare providers, financial services organizations and legal firms, and law enforcement. Clients range from local businesses to government agencies. |
Applied Trust
AppliedTrust provides IT infrastructure, security, and opensource consulting services. Our clients are organizations where effective IT is critical to the reputation and growth of their business, and hail from a variety of industries including healthcare, financial services, hospitality, recreation, and government. Our specialty areas include:
|
Checkmarx
Checkmarx - Source Code Analysis Made Easy
Checkmarx is the developer of next generation Static Code Analysis (SCA) solutions. The company pioneered the concept of a query language-based solution for identifying technical and logical code vulnerabilities. Checkmarx provides the best way for organizations to introduce security into their Software Development Lifecycle (SDLC) which systematically eliminates software risk. The product enables developers and auditors to easily scan un-compiled / un-built code in all major coding languages anywhere, anytime. CxSuite's application security testing is available in both "On Premise" and "On Demand" configurations. The security testing scans for the most prevalent security vulnerabilities as determined by OWASP Top 10, SANS, and other major standards. Checkmarx was recognized by Gartner as sole visionary in their latest SAST magic quadrant and as Cool vendor in application security. Customers include Fortune 500, government organizations and SMBs in over 30 countries. |
HP
HP is a leading provider of security and compliance solutions for the modern enterprise that wants to mitigate risk in its hybrid environment and defend against advanced threats. Based on market leading products from HP ArcSight, HP Fortify, and HP TippingPoint, the HP Security Intelligence Platform uniquely delivers the advanced correlation, application protection, and network defenses to protect today’s hybrid IT infrastructure from sophisticated cyber threats. |
Security Pursuit
Security Pursuit provides computer security services to help organizations protect their critical information systems. Based in Denver, Colorado, Security Pursuit's services include: IT Security Risk Analysis, Data Breach Incident Response, Network Penetration Testing and Vulnerability Assessments, Website Penetration Testing and Vulnerability Assessments, Wireless Network Security, Social Engineering Prevention, Security Awareness Training, Employee Termination Assistance and Virtual CISO consulting. We have conducted hundreds of security assessments for financial institutions, healthcare providers, retailers, utilities, airports, and municipal governments; many in support of PCI, GLBA, NCUA, and HIPAA compliance requirements. Security Pursuit’s computer security services provide you with a higher level of awareness about the security posture of your organization. |
SouthSeas
Escaping network insecurity means identifying and eliminating vulnerability at each and every level. At South Seas Corporation, we consider the big picture and the finest details of your information technology, from computers to routers to servers and the cabling between, from intranets to the internet, from mobile devices to web applications to remote networks across the globe. We also address administrative issues, including security policy and federal compliance. Of course, your budget is top of mind from the beginning. The end result is a tailored solution designed to secure every byte of information traveling through, to and around your organization at every point, installed by certified experts trained to work hand in hand with your IT department. Take a load off your mind with South Seas Corporation. |
Veracode
Today most global enterprises live under the constant threat of being hacked, which begs this critical question – how do they innovate and rapidly release new and improved applications required to be an industry leader while still securing their organizations critical IP and data assets? Before Veracode, application security was widely thought to slow innovation, but not anymore. With the Veracode Platform, application security and innovation can go hand-in-hand. Whether applications are built, brought or outsourced, Veracode’s patented testing technology provides the intelligence needed to quickly secure them from the most common forms of attack. |