This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Corporate Supporter Bios"
Line 11: | Line 11: | ||
| [[File:Amazon_Logo.jpg]] || ||Amazon.com, a Fortune 500 company based in Seattle, opened on the World Wide Web in July 1995 and offers Earth's Biggest Selection, where customers can find and discover anything they might want to buy online. The brightest minds come to Amazon to develop technology that improves the lives of shoppers and sellers around the world. Pioneering technical challenges of unprecedented scale and complexity, Amazon also provides developers access to Amazon's own back-end platform and in-the-cloud infrastructure. Examples include Amazon Elastic Compute Cloud, Amazon Simple Storage Service, Amazon SimpleDB, Amazon Simple Queue Service, Amazon Flexible Payments Service, and Amazon Mechanical Turk.|| www.amazon.com | | [[File:Amazon_Logo.jpg]] || ||Amazon.com, a Fortune 500 company based in Seattle, opened on the World Wide Web in July 1995 and offers Earth's Biggest Selection, where customers can find and discover anything they might want to buy online. The brightest minds come to Amazon to develop technology that improves the lives of shoppers and sellers around the world. Pioneering technical challenges of unprecedented scale and complexity, Amazon also provides developers access to Amazon's own back-end platform and in-the-cloud infrastructure. Examples include Amazon Elastic Compute Cloud, Amazon Simple Storage Service, Amazon SimpleDB, Amazon Simple Queue Service, Amazon Flexible Payments Service, and Amazon Mechanical Turk.|| www.amazon.com | ||
|- | |- | ||
− | | [[File:Accuvant_Labs.jpg]] || || Accuvant LABS is the world's best and most respected attack and | + | | [[File:Accuvant_Labs.jpg]] || || Accuvant LABS is the world's best and most respected attack and penetration team. Since 2002, Accuvant LABS has provided penetration testing, application and enterprise security assessments, vulnerability |
− | penetration team. Since 2002, Accuvant LABS has provided penetration | + | research and training to more than 2,000 clients across industry verticals. Experts from the team have won numerous awards and been featured by broadcast outlets and publications such as Ars Technica, Associated Press, BNN, CNN, Forbes, The New York Times, and The Wall Street Journal, among others, and regularly speak at top tier information security conferences. || |
− | testing, application and enterprise security assessments, vulnerability | ||
− | research and training to more than 2,000 clients across industry | ||
− | verticals. Experts from the team have won numerous awards and been | ||
− | featured by broadcast outlets and publications such as Ars Technica, | ||
− | Associated Press, BNN, CNN, Forbes, The New York Times, and The Wall | ||
− | Street Journal, among others, and regularly speak at top tier information security conferences. || | ||
www.accuvant.com | www.accuvant.com | ||
|- | |- |
Revision as of 17:38, 16 April 2012
DBAPPSecurity Inc.: ( www.DBAppSecurity.com )OWASP globle partner. A well known company focused on WEB Application security and Data security. They have hundreds of customers including many fortune 500, which cover the field like Financial, Telecom, Energy, Government etc. The products include WEB application vulnerability scanner, Database vulnerability scanner, WEB application firewall, Database Auditor and Log Auditor. They have very competitive solution for Data leakage, WEB defense, Compliance, and Cloud security. They also have well known security research team.
HP Enterprise Security: About HP Enterprise Security: HP is a leading provider of security and compliance
solutions for modern enterprises that want to mitigate risk in their hybrid environments and defend against
advanced threats. Based on market leading products from ArcSight, Fortify, and TippingPoint, the HP Security
Intelligence and Risk Management (SIRM) Platform uniquely delivers the advanced correlation, application
protection, and network defense technology to protect today’s applications and IT infrastructures from
sophisticated cyber threats. Visit HP Enterprise Security at: www.hpenterprisesecurity.com.
IBM: IBM's security portfolio provides the security intelligence to help organizations holistically protect its people, infrastructure, data and applications. IBM offers solutions for identity and access management, database security, application development, risk management, endpoint management, network security and more. IBM operates the world's broadest security research and development organization and delivery organization. This comprises nine security operations centers, nine IBM Research centers, 11 software security development labs and an Institute for Advanced Security with chapters in the United States, Europe and Asia Pacific. IBM monitors 13 billion security events per day in more than 130 countries and holds more than 3,000 security patents. For more information, visit ibm.com/security.
NetIQ: NetIQ is an enterprise software company with relentless focus on customer success. Customers and partners choose NetIQ to cost-effectively tackle information protection challenges (driven by regulatory requirements such as PCI DSS, HIPAA/HITECH, SOX, NERC and others) and manage the complexity of dynamic, highly-distributed business applications. Our portfolio includes scalable, automated solutions for Identity, Security, Resource, and Service Management that help organizations securely deliver, measure, and manage computing services across physical, virtual, and cloud computing environments.
Oracle:With more than 380,000 customers—including 100 of the Fortune 100—and with deployments across a wide variety of industries in more than 145 countries around the globe, Oracle offers an optimized and fully integrated stack of business hardware and software systems that helps organizations overcome complexity and unleash innovation. Oracle engineers hardware and software to work together in the cloud and in your data center–from servers and storage, to database and middleware, through applications.
Security is a key priority at Oracle. Encompassing every phase of the product development lifecycle, Oracle Software Security Assurance is Oracle's methodology for building security into the design, build, testing, and maintenance of its products. Oracle's goal is to ensure that Oracle's products, as well as the customer systems that leverage those products, remain as secure as possible.
Praetorian Company: Praetorian is an information security provider and research center that provides risk assessment, penetration testing, secure software development, computer forensics, and security education services. Our mission is to help our clients understand and minimize their overall risk and liability. Through our assessment services, your organization can obtain an accurate, independent security evaluation. Through our advisory offerings, we can help your organization build, define, communicate, and enforce a comprehensive security strategy.
As an independent security firm, Praetorian builds its reputation on our expertise, integrity, professionalism, and client satisfaction. As a boutique firm, Praetorian must distinguish itself by the quality of its service and the technical prowess and business acumen of its consultants. Subsequently, Praetorian only considers the top five percent from the security industry for employment. Our consultants come from a wide range of backgrounds and specialties. All consultants come from a computer science or engineering discipline and many consultants have obtained masters and doctorates. Our team members include published authors, open source developers, industry researchers, and conference presenters.
Protiviti: Protiviti is a global business consulting and risk consulting firm composed of experts specializing in risk, advisory and transaction services. The firm helps solve problems in finance and transactions, operations, technology, information security & privacy, litigation, governance, risk, and compliance. Protiviti's highly trained, results-oriented professionals provide a unique perspective on a wide range of critical business issues for clients in the Americas, Asia-Pacific, Europe and the Middle East. Protiviti has more than 70 locations worldwide and is a wholly owned subsidiary of Robert Half International Inc. (NYSE: RHI). Founded in 1948, Robert Half International is a member of the S&P 500 index. For additional information about Protiviti, Contact Rocco Grillo at [email protected] / 212.603.8381.
Many thanks!
Qualys, Inc.: Qualys, Inc. is the pioneer and leading provider of information security and compliance cloud solutions with 5,500+ customers in 85 countries, including 51 of the Forbes Global 100. The QualysGuard Cloud Platform and integrated suite of applications helps businesses simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance and protection for IT systems and web applications. Founded in 1999, Qualys has established strategic partnerships with leading managed service providers and consulting organizations including BT, Dell SecureWorks, Fujitsu, IBM, NTT, Symantec, Verizon, and Wipro. The company is also a founding member of the Cloud Security Alliance (CSA).
For more information, please visit www.qualys.com.
Stack Exchange: In 2008, Jeff Atwood and Joel Spolsky created a site called Stack Overflow and brought together millions of computer programmers from around the world to help each other with detailed technical questions. Stack Overflow quickly became a cherished resource for programmers and IT professionals from many different backgrounds, including security.
When the Stack Exchange company was formed to apply the Stack Overflow formula to other fields, IT Security was one of the first sites proposed. A beta version opened in November of 2010, and the site launched in July of 2011 - today, it's a growing community of 7 thousand registered users with over 3 thousand expertly-answered security questions under their belts. The site continues to expand into wider security areas such as elements of physical security, audit and emerging technologies, and is attracting a strong core of security professionals. Key themes and popular questions are also discussed on the Security Stack Exchange blog[1] and in the site's chat room "The DMZ"[2].
1: http://blog.security.stackexchange.com
2: http://chat.stackexchange.com/rooms/151/the-dmz