This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Front Range OWASP Conference 2013/Sponsors"
Jess Garrett (talk | contribs) |
Jess Garrett (talk | contribs) |
||
Line 7: | Line 7: | ||
| Sponsor information coming soon | | Sponsor information coming soon | ||
| style="width: 200px; | | | style="width: 200px; | | ||
− | | [[Image:BoulderSponsorAerstone.png|160px|alt=Aerstone|right]] | + | | [[Image:BoulderSponsorAerstone.png|160px| link=https://aerstone.com |alt=Aerstone|right]] |
|} | |} | ||
Line 17: | Line 17: | ||
| Sponsor information coming soon | | Sponsor information coming soon | ||
| style="width: 200px; | | | style="width: 200px; | | ||
− | | [[Image:AppliedTrust.png |160px|alt=Applied Trust|right]] | + | | [[Image:AppliedTrust.png |160px| link=http://www.appliedtrust.com|alt=Applied Trust|right]] |
|} | |} | ||
Line 37: | Line 37: | ||
Customers include Fortune 500, government organizations and SMBs in over 30 countries. | Customers include Fortune 500, government organizations and SMBs in over 30 countries. | ||
| style="width: 200px; | | | style="width: 200px; | | ||
− | | [[Image:Checkmarx.png |160px|alt=Checkmarx|right]] | + | | [[Image:Checkmarx.png |160px| link=http://www.checkmarx.com/|alt=Checkmarx|right]] |
|} | |} | ||
Line 47: | Line 47: | ||
| Sponsor information coming soon | | Sponsor information coming soon | ||
| style="width: 200px; | | | style="width: 200px; | | ||
− | | [[Image:HP.png |160px|alt=HP|right]] | + | | [[Image:HP.png |160px| link=http://www.hp.com/ |alt=HP|right]] |
|} | |} | ||
Line 60: | Line 60: | ||
governments; many in support of PCI, GLBA, NCUA, and HIPAA compliance requirements. Security Pursuit’s computer security services provide you with a higher level of awareness about the security posture of your organization. | governments; many in support of PCI, GLBA, NCUA, and HIPAA compliance requirements. Security Pursuit’s computer security services provide you with a higher level of awareness about the security posture of your organization. | ||
| style="width: 200px; | | | style="width: 200px; | | ||
− | | [[Image:SecurityPursuit.png |160px|alt=Security Pursuit|right]] | + | | [[Image:SecurityPursuit.png |160px| link=http://www.securitypursuit.com/ |alt=Security Pursuit|right]] |
|} | |} | ||
Line 70: | Line 70: | ||
| Sponsor information coming soon | | Sponsor information coming soon | ||
| style="width: 200px; | | | style="width: 200px; | | ||
− | | [[Image:SouthSeas.png |160px|alt=SouthSeas|right]] | + | | [[Image:SouthSeas.png |160px| link=http://www.southseascorp.com/|alt=SouthSeas|right]] |
|} | |} | ||
Line 80: | Line 80: | ||
| Today most global enterprises live under the constant threat of being hacked, which begs this critical question – how do they innovate and rapidly release new and improved applications required to be an industry leader while still securing their organizations critical IP and data assets? Before Veracode, application security was widely thought to slow innovation, but not anymore. With the Veracode Platform, application security and innovation can go hand-in-hand. Whether applications are built, brought or outsourced, Veracode’s patented testing technology provides the intelligence needed to quickly secure them from the most common forms of attack. | | Today most global enterprises live under the constant threat of being hacked, which begs this critical question – how do they innovate and rapidly release new and improved applications required to be an industry leader while still securing their organizations critical IP and data assets? Before Veracode, application security was widely thought to slow innovation, but not anymore. With the Veracode Platform, application security and innovation can go hand-in-hand. Whether applications are built, brought or outsourced, Veracode’s patented testing technology provides the intelligence needed to quickly secure them from the most common forms of attack. | ||
| style="width: 200px; | | | style="width: 200px; | | ||
− | | [[Image:Veracode.png |160px|alt=Veracode|right]] | + | | [[Image:Veracode.png |160px| link=https://www.veracode.com/ |alt=Veracode|right]] |
|} | |} | ||
Revision as of 17:56, 14 March 2013
Current Sponsors
Aerstone
Sponsor information coming soon |
Applied Trust
Sponsor information coming soon |
Checkmarx
Checkmarx - Source Code Analysis Made Easy Checkmarx is the developer of next generation Static Code Analysis (SCA) solutions. The company pioneered the concept of a query language-based solution for identifying technical and logical code vulnerabilities. The product enables developers and auditors to easily scan un-compiled / un-built code in all major coding languages anywhere, anytime.
CxSuite's application security testing is available in both "On Premise" and "On Demand" configurations. Customers include Fortune 500, government organizations and SMBs in over 30 countries. |
HP
Sponsor information coming soon |
Security Pursuit
Security Pursuit provides computer security services to help organizations protect their critical information systems. Based in Denver, Colorado, Security Pursuit's services include: IT Security Risk Analysis, Data Breach Incident Response, Network Penetration Testing and Vulnerability Assessments, Website Penetration Testing and Vulnerability Assessments, Wireless Network Security, Social Engineering Prevention, Security Awareness Training, Employee Termination Assistance and Virtual CISO consulting. We have conducted hundreds of security assessments for financial institutions, healthcare providers, retailers, utilities, airports, and municipal governments; many in support of PCI, GLBA, NCUA, and HIPAA compliance requirements. Security Pursuit’s computer security services provide you with a higher level of awareness about the security posture of your organization. |
SouthSeas
Sponsor information coming soon |
Veracode
Today most global enterprises live under the constant threat of being hacked, which begs this critical question – how do they innovate and rapidly release new and improved applications required to be an industry leader while still securing their organizations critical IP and data assets? Before Veracode, application security was widely thought to slow innovation, but not anymore. With the Veracode Platform, application security and innovation can go hand-in-hand. Whether applications are built, brought or outsourced, Veracode’s patented testing technology provides the intelligence needed to quickly secure them from the most common forms of attack. |
Sponsorship Opportunities
Please contact Mark Major for information regarding SnowFROC sponsorship opportunities.
- mark dot major at owasp dot org
- (720) 33-OWASP
Booth Sponsorships | Gold (1x) | Silver (3x) | Bronze |
---|---|---|---|
Expo Space | Premium sized booth space (15x15); Premier location (first choice); | Premium sized booth space (15x15); Premier location (second choice); | Standard booth space (10x10); |
Expo Booth Passes | 4 | 3 | 2 |
Conference Passes | 4 | 4 | 2 |
Conference Pass Discount | 20% (up to 20x) | 20% (up to 10x) | 20% (up to 10x) |
Logo Placement |
|
|
|
Company Description Placement | Full-page info sheet in attendee pack | Half-page info sheet in attendee pack | Quarter-page info sheet in attendee pack |
Additional Perks |
|
|
|
Cost | $15,000 | $6,500 | $3,500 |
OWASP Membership Discount | - $3,000 | - $1,300 | - $700 |
Food Sponsorships | Breakfast (1x) -- SOLD | Coffee (2x) | Lunch (2x) |
Description | Kick-start the day with a friendly and useful offering. This is the first sponsorship visible to attendees. | Sponsor either the morning or afternoon coffee break. This is a highly-visible sponsorship with heavy circulation. | Co-sponsor lunch and target a captive audience. Sponsors may have promotional opportunities during the lunch break. |
Sponsor Acknowledgement |
|
|
|
Branding | Breakfast area signage | Coffee bar area signage | Lunch area signage |
Sponsor Table Branding |
|
|
|
Cost | <Call for details> | $3,000 | <Call for details> |
OWASP Member Discount | <Call for details> | - $600 | <Call for details> |
Event Sponsorships | Capture the Flag (1x) -- SOLD | Networking Social (1x) -- SOLD | Birds of a Feather (1x) |
Description | As the exclusive host of the conference hacking competition you will target the most technical attendees at SnowFROC. | This event will be the last impression made on most conference attendees. The sponsor will provide a relaxed social setting for after-hours networking. | Sponsor the follow-up training and Birds of a-Feather events. This opportunity offers exclusive venue branding throughout the Friday morning sessions. |
Sponsor Acknowledgement |
|
|
|
Branding |
|
|
|
Conference Passes | 4 | 4 | - |
Cost | <Call for details> | <Call for details> | <Call for details> |
Swag Sponsorships | Badges -- SOLD | Internet Service | Miscellaneous |
Description | Provide high-quality, co-branded badges produced according to SnowFROC specifications for all conference speakers, sponsors, volunteers, and other attendees (approximated 320). | Sponsor Internet access to conference attendees. (Actual service will be provided by the venue.) | Provide approximately 320 co-branded lanyards, pens, notebooks, or other swag (apparel, bottles, stress balls, contest giveaways, etc.). All items require SnowFROC approval. |
Sponsor Acknowledgement | Conference website and brochure | Conference website and brochure | Conference website and brochure |
Branding | Co-branded (with OWASP) on conference badges | Co-branded (with OWASP) on WiFi SSID | Co-branded (with OWASP) on selected item(s) |
Sponsor Table Branding | - |
|
- |
Cost | <Call for details> | <Call for details> | <Call for details> |